行為異常的 的英文怎麼說

中文拼音 [hángwéichángde]
行為異常的 英文
dystropic
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : 形容詞1 (有分別; 不相同) different 2 (奇異; 特別) strange; unusual; extraordinary 3 (另外的;...
  • : 4次方是 The fourth power of 2 is direction
  • 行為 : action; behaviour; conduct; deed
  1. As object lessons to explain : 1 the nature and habits of oviparous animals, the possibility of aerial flight, certain abnormalities of vision, the secular process of imbalsamation : 2 the principle of the pendulum, exemplified in bob, wheelgear and regulator, the translation in terms of human or social regulation of the various positions clockwise of movable indicators on an unmoving dial, the exactitude of the recurrence per hour of an instant in each hour, when the longer and the shorter indicator were at the same angle of inclination, videlicet, 5 5 11 minutes past each hour per hour in arithmetical progression

    他把它們作實物教材,用以說明: 1卵生動物本性與習性,空中飛可能性,一種視覺器官,世俗界用防腐藥物保存屍體方式。 2體現于擺錘輪與整時器上鐘擺原理不動針盤上那可移動正轉長短指針在各個位置作人或社會規范所包含意義長針和短針每小時在同一傾斜度相遇那一瞬間,也就是說,按照算術級數,每小時超過5 5 11分那一瞬間,每小時重復一次精確性146 。
  2. The main causes which lead to tensile abnormal fracture of swrh82b steel rods are the network cementite sod the big brittle inclusion

    摘要通過對swrh82b盤條拉伸斷口進分析,認網狀滲碳體和大顆粒脆性夾雜物等缺陷是引起斷口主要原因。
  3. A simple, robust method is proposed that relies on high - resolution measurements and on - line analysis of network traffic to provide real - time alarms in the incipient phase of network anomalies. the anomaly identification algorithms based on behavior model using path changes, flow shift and packet delay variance

    通過高性能測量和在線分析網路流和路由信息對初始網路產生實時報警,提出基於路由變化、流變化和包延遲建立網路模型網路檢測演算法。
  4. Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience

    這些模式可用來指導系統屬性選擇和構造,挖掘生成出有用系統或者用戶模式(正或者) ;通過比較當前系統模式和已有模式規則相似度來發現已知或者未知誤用入侵和入侵活動。
  5. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統核心,主要分入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及用入侵檢測技術進比較分析基礎上,提出了一個基於遺傳神經網路入侵檢測方法,採用遺傳演算法和bp神經網路相結合方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統bp演算法收斂速度慢、易陷入局部最小點問題。
  6. However there are interesting parallels with the study of deviance

    然而這有一些有趣研究類似。
  7. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法實質是在監控特權進程系統調用基礎上建立正模糊子集a ,用檢測到實時調用序列建立模糊子集b ,然後用模糊識別方法中最小距離原則進檢測。本文創新點是:通過對特權進程系統調用及參數序列研究,提出了基於euclidean距離入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成可能;設計有獨立而完整特徵數據庫,根據被監控程序類別,分別設計正等,提高了檢測系統強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實頻度優先原則,優先分析和處理信息表中高頻度特徵,提高檢測速度和效率,使實時入侵檢測成可能;同時實現了入侵檢測和誤用入侵檢測,彌補了單一檢測方法不足。
  8. Statistics implies the self - serving attribution behavior is very popular in listed companies and violates the reliability principle for information disclosure

    統計數據顯示, 「非典」時期,相關業公司自利性歸因突出,違背了信息披露「可靠性原則」 。
  9. Doctors traditionally consider the possibility of autism only if a child shows delayed speech or unusually repetitive behaviors

    傳統醫學認,只有嬰兒表現出語言發育遲緩或才有患上自閉癥可能。
  10. In the listing companies, the related trading is so frequent that it has played an extremely active part in adjusting the operational structure, enlarging the scale of enterprises and enhancing the economic strength of listing companies

    在我國上市公司中,關聯方交易頻繁,上市公司通過關聯方交易調整了企業經營結構,擴大了企業規模,增強了上市公司經濟實力,無疑具有積極作用。
  11. Item 40 : use checked exceptions for recoverable conditions and runtime exceptions for programming errors

    第40條:可恢復條件使用檢查型編程錯誤使用運
  12. In c, errors in the program at run time are propagated through the program using a mechanism called exceptions

    在c #中,程序中時錯誤使用一種稱機制在程序中傳播。
  13. This paper is intended to provide an explorative study on mbo, employing comparative analysis and case study. my research shows : the price of transferred shares is relatively low, while has its reasonability ; the mbo financing result in high financial risk ; present evidence does not support the view that mbo has a negative effect on the companies " performance ; and on average the mbo companies do not have over - dividend behaviors

    本文分析表明:我國上市公司管理層收購過程中非流通股轉讓定價偏低,但偏低價格具有一定合理性;管理層收購存在比較大融資風險;當前仍不能做出管理層收購對上市公司績效有負面影響結論;實施管理層收購上市公司整體上沒有分紅派現
  14. Meditation helps to maintain a more balanced and stable physiological functioning. this, in effect, brings about significant changes in the long - standing aberrant behavior patterns of drug abusers

    打坐可以幫助維持生理平衡及穩定功能,對于濫用藥物所引起長期行為異常的犯人,產生重要改變。
  15. Compass deflection, panda behavior, together with the legacy of disappearances before the benefit of the doubt, the ravine before us suddenly and bewildering up

    指南針偏轉、熊貓,連同之前失蹤事件遺留疑點,令黑竹溝在我們面前忽然又撲朔迷離起來。
  16. Children are particularly vulnerable to lead exposure. elevated blood lead in children can also result in learning disabilities, behavioural problems and mental retardation

    兒童較成人易受鉛毒傷害,病徵包括學習遲緩及智力發展障礙。
  17. Generally, mental and behavioural disorders are common during childhood and adolescence

    來說,精神和在兒童和成人都很見。
  18. 31 of them grew into normal adults and shown no physiological and behavior abnormality

    健康成年31隻icsi小鼠,沒有明顯生理和
  19. Twenty - five per cent of individuals develop one or more mental or behavioural disorders at some stage in life, in both developed and developing countries

    在發達國家和發展中國家, 25 %兒童和成人在一生中會發生一種或多種精神和
  20. During the uptake phase, the abnormal behavior of treated fish in 95 % flumorph technical ( 2. 165 mg / l ) was observed, and the growth including weight and length were retarded to some extent

    試驗結果表明: 95氟嗎啉原藥2 . 165mg l濃度組鯉魚在試驗期間其生長發育及,體重和體長受到不同程度抑制。
分享友人