算術異常 的英文怎麼說
中文拼音 [suànshùyìcháng]
算術異常
英文
arithmetic exception-
As object lessons to explain : 1 the nature and habits of oviparous animals, the possibility of aerial flight, certain abnormalities of vision, the secular process of imbalsamation : 2 the principle of the pendulum, exemplified in bob, wheelgear and regulator, the translation in terms of human or social regulation of the various positions clockwise of movable indicators on an unmoving dial, the exactitude of the recurrence per hour of an instant in each hour, when the longer and the shorter indicator were at the same angle of inclination, videlicet, 5 5 11 minutes past each hour per hour in arithmetical progression
他把它們作為實物教材,用以說明: 1卵生動物的本性與習性,空中飛行的可能性,一種異常的視覺器官,世俗界用防腐藥物保存屍體的方式。 2體現于擺錘輪與整時器上的鐘擺的原理不動的針盤上那可移動的正轉的長短指針在各個位置作為人或社會規范所包含的意義長針和短針每小時在同一傾斜度相遇的那一瞬間,也就是說,按照算術級數,每小時超過5 5 11分的那一瞬間,每小時重復一次的精確性146 。Embedded system is an application specific computer system that focuses on the application and it is based on the computer technologyjts hardware and software is cuttable. the development of embedded systems is very fast during the last ten years, furthermore, as an important part of embedded system, embedded operating system is uesed in the embedded systems more and more, especially in handheld devices and electronic devices. but the design techniques of embedded system and embedd software is still germinant, and there are no standards and universal methods about it
嵌入式系統是以應用為中心,以計算機技術為基礎,軟硬體可剪裁的專用計算機系統。近十幾年來,嵌入式系統的發展異常迅速,嵌入式操作系統作為嵌入式系統的核心,其應用也越來越廣泛,尤其在手持設備、信息家電領域更加突出。但嵌入式系統以及嵌入式軟體設計技術仍舊處于起步階段,仍舊未能形成一套完整、有效、通用的開發方法和規范。Hi this thesis, the technique of detector array is used to obtain the location of anomalous infrasound, it is the basic of the study of prediction of earthquake. to derive useful information by using spectrum analysis on infrasonic signal. then combing with other methods a forecast could be made
本課題主要是利用數字技術,採用用傳感器陣列計算異常次聲波波源的方位,這是今後預測震中位置研究的前提;並對次聲信號進行頻譜分析,提取有用的關于臨震次聲方面的信息,再結合其他的預報方法,作出準確的地震預報。In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection
首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。Arithmetic exceptions : zero - divide, overflow, and underflow
算術異常:被零除、溢出和下溢。Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value
入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。Floating - point arithmetic overflow or division by zero never throws an exception, because floating - point types are based on ieee 754 and so have provisions for representing infinity and nan not a number
浮點算術溢出或被零除從不引發異常,因為浮點類型基於ieee 754 ,因此可以表示無窮和nan (不是數字) 。The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method
本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles
異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。In order to resolve the problem of low accuracy, computing overhead and the high false negative probability that the current detection technology suffered, the protocol misuage detection becomes one of the research fields in the development of network intrusion detection
針對基於模式匹配方法的誤用檢測技術存在的檢測率低、計算量大和高漏報率等問題,使用協議分析方法實現異常檢測技術成了網路入侵檢測的重要研究方向。A base class for exceptions that occur during arithmetic operations, such as
在算術運算期間發生的異常(如After the orderly reduction methods of massive scattered data being studied, this paper proposes a partial tangent plane slicing method and a virtual second - scan line method after giving a new k - nearest algorithm to re - organize the massive data. the new proposed methods of data reduction and grey theory based unusual noisy data process can be used to generate the scan line type data and it can be directly used to reconstruct curves and surfaces. the research lays a good foundation for reconstructing the cad model in a point - line - surface manner
4 .深入研究了海量散亂數據的有序簡化技術,在提出建立海量數據點鄰接關系k -鄰近新的演算法基礎上,提出了局部切平面切片法和虛擬二次掃描線法,實現了海量數據的有序重組,通過基於灰理論的數據簡化和異常點處理新方法,生成可用於直接重構曲線曲面的掃描線類型數據,為以點?線?面方式重構cad模型打下了良好的基礎。Furthermore we try to get a new approach by combining data clustering and outlier detection. discuss the sampling techniques frequently used in clustering and outlier detection
對聚類利異常檢測演算法中大量使用的采樣技術進行了討論,並提山了密度偏向的采樣技術。From these values and line 7 we can deduce that the arithmetic exception is due to a divide by zero
根據這些值和第7行中的語句,我們可以推斷出算術異常是由除數為0的除法運算造成的。Gdb indicates that the program gets an arithmetic exception at line 7 and usefully prints out the line and the values of the arguments to the wib function
Gdb指出在程序第7行發生一個算術異常,通常它會列印這一行以及wib ( )函數的自變量值。Stratus technologies is referred to the total technologies needed to maintain operating systems work regularly when computers break down due to such causes as worn parts, input errors, environmental effects or original design errors
容錯技術是指當計算機由於器件老化、錯誤輸入、外部環境影響及原始設計錯誤等等因素產生異常行為時維持系統正常工作的技術總和。Arithmetic shifts never generate overflow exceptions
算術移位絕不會產生溢出異常。Msil includes instructions for loading, storing, initializing, and calling methods on objects, as well as instructions for arithmetic and logical operations, control flow, direct memory access, exception handling, and other operations
Msil包括用於加載、存儲和初始化對象以及對對象調用方法的指令,還包括用於算術和邏輯運算、控制流、直接內存訪問、異常處理和其他操作的指令。At present we already use tradition method ( non - linearity parameter estimate method -, logarithm coordinate graph explain method and surplus analysis method ) ascertain measure area ' s every element ' s background value and abnormity lower limit, manage result is difference between real data. this article use fractal method ' s sum arithmetic ascertain geochemistry abnormity. by the contrast of these two arithmetic and abnormity graph, we think receive better effect
目前可用傳統的方法(非線性參數估計法、對數坐標圖解法和剩餘分析法)確定測區各元素的背景值和異常下限,處理結果與實際資料有一定差異。本文用分形技術中的求和演算法來確定地球化學元素的異常下限,實踐證明,其處理結果具有較好的效果。Clone principle is led into evolutionary computing, and a hybrid algorithm is combining antibody clone strategy with fuzzy c - means clustering method is given. it is used in intrusion detection
提出將人工免疫與模糊c -均值聚類技術相結合進行聚類,從而實現對異常行為的檢測的演算法。分享友人