算術異常 的英文怎麼說

中文拼音 [suànshùcháng]
算術異常 英文
arithmetic exception
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • : 形容詞1 (有分別; 不相同) different 2 (奇異; 特別) strange; unusual; extraordinary 3 (另外的;...
  • 算術 : arithmetic figure; arithmetic
  1. As object lessons to explain : 1 the nature and habits of oviparous animals, the possibility of aerial flight, certain abnormalities of vision, the secular process of imbalsamation : 2 the principle of the pendulum, exemplified in bob, wheelgear and regulator, the translation in terms of human or social regulation of the various positions clockwise of movable indicators on an unmoving dial, the exactitude of the recurrence per hour of an instant in each hour, when the longer and the shorter indicator were at the same angle of inclination, videlicet, 5 5 11 minutes past each hour per hour in arithmetical progression

    他把它們作為實物教材,用以說明: 1卵生動物的本性與習性,空中飛行的可能性,一種的視覺器官,世俗界用防腐藥物保存屍體的方式。 2體現于擺錘輪與整時器上的鐘擺的原理不動的針盤上那可移動的正轉的長短指針在各個位置作為人或社會規范所包含的意義長針和短針每小時在同一傾斜度相遇的那一瞬間,也就是說,按照級數,每小時超過5 5 11分的那一瞬間,每小時重復一次的精確性146 。
  2. Embedded system is an application specific computer system that focuses on the application and it is based on the computer technologyjts hardware and software is cuttable. the development of embedded systems is very fast during the last ten years, furthermore, as an important part of embedded system, embedded operating system is uesed in the embedded systems more and more, especially in handheld devices and electronic devices. but the design techniques of embedded system and embedd software is still germinant, and there are no standards and universal methods about it

    嵌入式系統是以應用為中心,以計機技為基礎,軟硬體可剪裁的專用計機系統。近十幾年來,嵌入式系統的發展迅速,嵌入式操作系統作為嵌入式系統的核心,其應用也越來越廣泛,尤其在手持設備、信息家電領域更加突出。但嵌入式系統以及嵌入式軟體設計技仍舊處于起步階段,仍舊未能形成一套完整、有效、通用的開發方法和規范。
  3. Hi this thesis, the technique of detector array is used to obtain the location of anomalous infrasound, it is the basic of the study of prediction of earthquake. to derive useful information by using spectrum analysis on infrasonic signal. then combing with other methods a forecast could be made

    本課題主要是利用數字技,採用用傳感器陣列計次聲波波源的方位,這是今後預測震中位置研究的前提;並對次聲信號進行頻譜分析,提取有用的關于臨震次聲方面的信息,再結合其他的預報方法,作出準確的地震預報。
  4. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技的入侵檢測建模方案,提出使用該技建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和檢測功能。
  5. Arithmetic exceptions : zero - divide, overflow, and underflow

    算術異常:被零除、溢出和下溢。
  6. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技是入侵檢測系統的核心,主要分為入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及用入侵檢測技進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演法的收斂速度慢、易陷入局部最小點的問題。
  7. Floating - point arithmetic overflow or division by zero never throws an exception, because floating - point types are based on ieee 754 and so have provisions for representing infinity and nan not a number

    浮點溢出或被零除從不引發,因為浮點類型基於ieee 754 ,因此可以表示無窮和nan (不是數字) 。
  8. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的演法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  9. The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles

    流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學界和工業界共同關注的前沿課題之一。
  10. In order to resolve the problem of low accuracy, computing overhead and the high false negative probability that the current detection technology suffered, the protocol misuage detection becomes one of the research fields in the development of network intrusion detection

    針對基於模式匹配方法的誤用檢測技存在的檢測率低、計量大和高漏報率等問題,使用協議分析方法實現檢測技成了網路入侵檢測的重要研究方向。
  11. A base class for exceptions that occur during arithmetic operations, such as

    期間發生的(如
  12. After the orderly reduction methods of massive scattered data being studied, this paper proposes a partial tangent plane slicing method and a virtual second - scan line method after giving a new k - nearest algorithm to re - organize the massive data. the new proposed methods of data reduction and grey theory based unusual noisy data process can be used to generate the scan line type data and it can be directly used to reconstruct curves and surfaces. the research lays a good foundation for reconstructing the cad model in a point - line - surface manner

    4 .深入研究了海量散亂數據的有序簡化技,在提出建立海量數據點鄰接關系k -鄰近新的演法基礎上,提出了局部切平面切片法和虛擬二次掃描線法,實現了海量數據的有序重組,通過基於灰理論的數據簡化和點處理新方法,生成可用於直接重構曲線曲面的掃描線類型數據,為以點?線?面方式重構cad模型打下了良好的基礎。
  13. Furthermore we try to get a new approach by combining data clustering and outlier detection. discuss the sampling techniques frequently used in clustering and outlier detection

    對聚類利檢測演法中大量使用的采樣技進行了討論,並提山了密度偏向的采樣技
  14. From these values and line 7 we can deduce that the arithmetic exception is due to a divide by zero

    根據這些值和第7行中的語句,我們可以推斷出算術異常是由除數為0的除法運造成的。
  15. Gdb indicates that the program gets an arithmetic exception at line 7 and usefully prints out the line and the values of the arguments to the wib function

    Gdb指出在程序第7行發生一個算術異常,通它會列印這一行以及wib ( )函數的自變量值。
  16. Stratus technologies is referred to the total technologies needed to maintain operating systems work regularly when computers break down due to such causes as worn parts, input errors, environmental effects or original design errors

    容錯技是指當計機由於器件老化、錯誤輸入、外部環境影響及原始設計錯誤等等因素產生行為時維持系統正工作的技總和。
  17. Arithmetic shifts never generate overflow exceptions

    移位絕不會產生溢出
  18. Msil includes instructions for loading, storing, initializing, and calling methods on objects, as well as instructions for arithmetic and logical operations, control flow, direct memory access, exception handling, and other operations

    Msil包括用於加載、存儲和初始化對象以及對對象調用方法的指令,還包括用於和邏輯運、控制流、直接內存訪問、處理和其他操作的指令。
  19. At present we already use tradition method ( non - linearity parameter estimate method -, logarithm coordinate graph explain method and surplus analysis method ) ascertain measure area ' s every element ' s background value and abnormity lower limit, manage result is difference between real data. this article use fractal method ' s sum arithmetic ascertain geochemistry abnormity. by the contrast of these two arithmetic and abnormity graph, we think receive better effect

    目前可用傳統的方法(非線性參數估計法、對數坐標圖解法和剩餘分析法)確定測區各元素的背景值和下限,處理結果與實際資料有一定差。本文用分形技中的求和演法來確定地球化學元素的下限,實踐證明,其處理結果具有較好的效果。
  20. Clone principle is led into evolutionary computing, and a hybrid algorithm is combining antibody clone strategy with fuzzy c - means clustering method is given. it is used in intrusion detection

    提出將人工免疫與模糊c -均值聚類技相結合進行聚類,從而實現對行為的檢測的演法。
分享友人