規則誤用 的英文怎麼說

中文拼音 [guīyòng]
規則誤用 英文
rule misapplication
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • : Ⅰ名詞(錯誤) mistake; error Ⅱ動詞1 (弄錯) mistake; misunderstand 2 (耽誤) miss 3 (使受損害...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  • 誤用 : misuse
  1. Meanwhile, the more regular the structures under consideration are, the better precision of the gridiron method is exhibited. so we must think much of this difference, and we can say this method is only applicable for simply structures and regular components of a structure

    該方法對結構的部分分析較為準確,而對結構的非部分分析差較大,不適於結構深入的研究和分析,僅適於結構的粗略計算。
  2. This technical route was based on integrated ccd camera calibration and image registration by orthograph. ccd camera calibration was accomplished by vertical photograph on the wall of buildings

    通過對現有ccd相機標定方法的綜合分析,提出利建築物立面現成圖形紋理結構的垂直攝影法來完成ccd相機綜合差的標定。
  3. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使該技術建立入侵檢測描述性模型和分類模型的思想,並分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯挖掘和序列挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應,並設計出基於模式匹配的入侵檢測引擎,該引擎具有檢測和異常檢測功能。
  4. Tasuoka ( 1983, 1986, 1990 ) developed the rule space model to investigate the cognitive processes that underlie problem solving. lt conjoins cognitive psychology model with psychometrics model. and is used to identify cognitive misconceptions and to report students ' cognitive structure

    為了診斷被試的認知過程, tasuoka ( 1983 , 1986 , 1990 )提出了空間模型。它結合了認知心理學和心理計量學模型,可於識別被試解題的認知錯和判別被試的屬性掌握模式。
  5. Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience

    這些模式可來指導系統屬性的選擇和構造,挖掘生成出有的系統或者戶的行為模式(正常的或者異常的) ;通過比較當前的系統行為模式和已有的模式的相似度來發現已知或者未知的入侵和異常入侵活動。
  6. The gpss have one output and two inputs which are speed error and its derivative. selecting triangular function as fuzzy variable ' s membership function, mamdani max - min synthetic method as fuzzy inference method and centroid method as denazification method, fuzzy control rules are given according to the control expectation of governor and the experience of operating staff

    這種模糊gpss採二輸入單輸出結構,以機組轉速差及其導數為輸入量,以三角形函數作為模糊量的隸屬函數,根據水電機組穩定控制要求和操作人員的經驗制定控制,以mamdani的max - min合成法和重心法分別作為模糊推理方法和清晰化方法。
  7. The communication system ' s performance is briefly analyzed by channel capacity, which is a function of bit error rate ( ber ). the decision rule is based on the most likelihood method. for reproducing the original binary signals more correctly, time scale transformation method and the approach of ensemble average probability of error bits are introduced

    通過理論分析和模擬實驗,本文研究了這個非線性數字通信系統性能,給出了碼率和通道容量公式,提出了系統參數調節方法,採最大似然法設計了適合這個系統輸出的判決
  8. Subsequently, weighted association rules algorithm is given in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false

    為了解決將關聯演算法應於入侵檢測系統提高系統檢測率的同時也增加系統報率的問題,論文把加權關聯演算法應於入侵檢測系統,此方法能在一定程度上提高了入侵檢測的檢測率也限制了無趣的產生,並降低了報率。
  9. Subsequently, it in the paper gives weighted association rules algorithm in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false positive rate

    首先我研究了關聯的各種實演算法及其改進演算法,之後為了解決將關聯演算法應於入侵檢測系統提高系統檢測率的同時也增加系統報率的問題,論文給出加權關聯詳細的演算法說明,並將此方法應於入侵檢測。
  10. It has the important influence on detection rate, false positive rate and ability of real time responds. so this thesis labors over kdd cup 99 intrusion detection data set and uses some rules to reduce the dimensions of feature sample space in the derection of sbg. thus the phenomena of dimension exploding can be avoided

    特徵提取是入侵檢測的關鍵,對檢測率、報率和實時性有著重要影響,因此本文在針對kddcup99入侵檢測數據進行了大量分析,並沿sbg的搜索方向,使一定的集來達到特徵樣本空間的維數的削減的目的,從而避免了「維數爆炸」的現象。
  11. Some pedagogical methods are therefore proposed, such as emphasizing phonetic rules in memorizing new words ; accumulating more words in accordance to word formation rules ; enhancing the input of authentic english to reduce the negative effect of interlingual transfer ; teaching learners to lead them to collocate words consciously ; comparing the differences between mother tongue and target language

    同時提出了解決詞匯問題的教學策略:加強語音教學,重視發音的傳授;加強構詞法教學,注意符合詞匯的歸納積累;增加地道英文輸入,降低語際負遷移的影響;傳授搭配知識,引導學生自主學習詞匯搭配;通過語言對比進行詞匯教學。
  12. Flux position & error in flux magnitude and error in torque are used as fuzzy state variables. fuzzy logic is used for choosing the switching state. a fuzzy logic controller can choose the switching states according to a set of fuzzy rules based on both specialists " experience and knowledge, which improves the response performance of the system effectively during start - up and change in load

    作為本文的一個創新點,針對普通的直接轉矩控制在給定轉矩躍變時反應較慢的缺點,提出了一種模糊控制器,把磁鏈位置、磁鏈差和轉矩差作為模糊輸入變量,應模糊邏輯來確定逆變器的開關狀態,該模糊控制器根據一套基於專家經驗和知識的模糊來選擇開關狀態,從而有效地提高了系統在啟動和負載突變時的響應速度。
  13. The mrafc scheme employs a reference model to provide closed - loop performance feedback for generating or modifying a fuzzy controller ' s knowledge base. the adaptive compensation term of optimal approximation error is adopted. by theoretical analysis, the closed - loop fuzzy control system is proved to be globally stable, with tracking error converging to zero

    該方案利參考模型作為閉環系統的反饋信號來產生、調節模糊控制器的庫,並通過引入最優逼近差的自適應補償項來消除建模差的影響,不但能保證閉環系統穩定,而且可使跟蹤差收斂到零。
  14. The algorithm generates three - dimensional terrain model and displays in real time. it uses an efficient and simple method to attain the dependency between sampling points on terrain, and refines the center points in top - down way. it incorporates the dependency of points into their errors so that the cracks inside the terrain block are avoided, at the same time eliminates the cracks at the edges of blocks through adjusting the elevations of those points that cause the cracks

    該演算法基於格網數據實時生成三維地形模型,並實時顯示;採了一種簡單而高效的方法來求解采樣點之間的依賴關系;以「從頂向下」方式細分中心頂點;並把頂點依賴關系融合進頂點差中,避免了地形塊內部的裂縫,同時通過調整塊邊界點的高程消除了塊邊界處的裂縫;演算法還具有利幀間相關性,視相關等方面特點。
  15. Furthermore this system uses snort rule language and fuzzy reasoning in the system. consequently, this system has low false alarm rate as well as low miss alarm rate. all these characters make this instrusion detection expert system have much more protecting capacity

    此外,本系統將模糊推理和snort描述語言於對入侵特徵的分析與識別,構建起基於和基於異常相結合的入侵檢測系統,使系統的報率漏報率降低,而且數據分析更據實時性。
  16. Accountant report calculates change and manual fiscal distinguishs main show to be in the following respects : ( 1 ) operation tool is different ; ( 2 ) the carrier of accountant data and information is different ; ( 3 ) data processing speed, accuracy and deepness development are used different ; ( 4 ) book - keeping regulation and correct wrong method differs ; ( 5 ) program of zhang wu processing is different ; ( 6 ) the method of account setting and zhang book that register is different ; ( 7 ) the constituent system that the accountant works is different ; ( 8 ) money is met the quality of personnel is different ; ( 9 ) built - in control system is different

    會計電算化和手工會計的區別主要表現在以下幾個方面: ( 1 )運算工具不同; ( 2 )會計數據與信息的載體不同; ( 3 )數據處理速度、準確性與深度開發利不同; ( 4 )簿記與更正錯的方法不同; ( 5 )賬務處理程序不同; ( 6 )賬戶設置和賬簿登記方法不同; ( 7 )會計工作的組織體制不同; ( 8 )財會人員的素質不同; ( 9 )內部控制制度不同。
  17. If a catastrophic error occurs, automatic restart management will take charge starting elements based on the active automatic restart policy that is in effect at this time

    如果發生致命錯,自動重啟管理將會根據當前起作的自動重啟管理啟動元素。
  18. However, association rule mining algorithms tend to produce a huge number of rules, most of which are of no interest to the user. in this paper, we analyzed some problems existed in the association rule mining firstly

    但在實際應中僅考慮支持度和置信度是不夠的,因為這些耗費了很大的計算代價挖掘出的強並不一定都是對戶有的或者說有趣的,它們中有的甚至是導的。
  19. Firstly, the backgrounds and techniques of intrusion detection system ( ids ) are introduced briefly in this paper, also the current status. then an intrusion detection system based on a new nonstationary machine learning technique model is presented and improved. on the precondition of the same false alarm rates, more intrusions have been detected, and less time for detection is needed with the improved system

    本文首先引入了一種基於機器學習的、於入侵檢測系統的動態模型,並對該模型加以改進,在警率不變的前提下,使系統能夠檢測到更多的入侵種類,縮短了系統檢測時間,從而提高了系統性能。
  20. The first rule of user input is : all input is bad until proven otherwise

    戶輸入的首要是:在經過驗證之前,所有輸入都是錯的。
分享友人