規則誤用 的英文怎麼說
中文拼音 [guīzéwùyòng]
規則誤用
英文
rule misapplication- 規 : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
- 則 : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
- 誤 : Ⅰ名詞(錯誤) mistake; error Ⅱ動詞1 (弄錯) mistake; misunderstand 2 (耽誤) miss 3 (使受損害...
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
- 誤用 : misuse
-
Meanwhile, the more regular the structures under consideration are, the better precision of the gridiron method is exhibited. so we must think much of this difference, and we can say this method is only applicable for simply structures and regular components of a structure
該方法對結構的規則部分分析較為準確,而對結構的非規則部分分析誤差較大,不適用於結構深入的研究和分析,僅適用於結構的粗略計算。This technical route was based on integrated ccd camera calibration and image registration by orthograph. ccd camera calibration was accomplished by vertical photograph on the wall of buildings
通過對現有ccd相機標定方法的綜合分析,提出利用建築物立面現成規則圖形紋理結構的垂直攝影法來完成ccd相機綜合誤差的標定。In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection
首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。Tasuoka ( 1983, 1986, 1990 ) developed the rule space model to investigate the cognitive processes that underlie problem solving. lt conjoins cognitive psychology model with psychometrics model. and is used to identify cognitive misconceptions and to report students ' cognitive structure
為了診斷被試的認知過程, tasuoka ( 1983 , 1986 , 1990 )提出了規則空間模型。它結合了認知心理學和心理計量學模型,可用於識別被試解題的認知錯誤和判別被試的屬性掌握模式。Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience
這些模式可用來指導系統屬性的選擇和構造,挖掘生成出有用的系統或者用戶的行為模式(正常的或者異常的) ;通過比較當前的系統行為模式和已有的模式規則的相似度來發現已知或者未知的誤用入侵和異常入侵活動。The gpss have one output and two inputs which are speed error and its derivative. selecting triangular function as fuzzy variable ' s membership function, mamdani max - min synthetic method as fuzzy inference method and centroid method as denazification method, fuzzy control rules are given according to the control expectation of governor and the experience of operating staff
這種模糊gpss採用二輸入單輸出結構,以機組轉速誤差及其導數為輸入量,以三角形函數作為模糊量的隸屬函數,根據水電機組穩定控制要求和操作人員的經驗制定控制規則,以mamdani的max - min合成法和重心法分別作為模糊推理方法和清晰化方法。The communication system ' s performance is briefly analyzed by channel capacity, which is a function of bit error rate ( ber ). the decision rule is based on the most likelihood method. for reproducing the original binary signals more correctly, time scale transformation method and the approach of ensemble average probability of error bits are introduced
通過理論分析和模擬實驗,本文研究了這個非線性數字通信系統性能,給出了誤碼率和通道容量公式,提出了系統參數調節方法,採用最大似然法設計了適合這個系統輸出的判決規則。Subsequently, weighted association rules algorithm is given in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false
為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文把加權關聯規則演算法應用於入侵檢測系統,此方法能在一定程度上提高了入侵檢測的檢測率也限制了無趣規則的產生,並降低了誤報率。Subsequently, it in the paper gives weighted association rules algorithm in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false positive rate
首先我研究了關聯規則的各種實用演算法及其改進演算法,之後為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文給出加權關聯規則詳細的演算法說明,並將此方法應用於入侵檢測。It has the important influence on detection rate, false positive rate and ability of real time responds. so this thesis labors over kdd cup 99 intrusion detection data set and uses some rules to reduce the dimensions of feature sample space in the derection of sbg. thus the phenomena of dimension exploding can be avoided
特徵提取是入侵檢測的關鍵,對檢測率、誤報率和實時性有著重要影響,因此本文在針對kddcup99入侵檢測數據進行了大量分析,並沿sbg的搜索方向,使用一定的規則集來達到特徵樣本空間的維數的削減的目的,從而避免了「維數爆炸」的現象。Some pedagogical methods are therefore proposed, such as emphasizing phonetic rules in memorizing new words ; accumulating more words in accordance to word formation rules ; enhancing the input of authentic english to reduce the negative effect of interlingual transfer ; teaching learners to lead them to collocate words consciously ; comparing the differences between mother tongue and target language
同時提出了解決詞匯誤用問題的教學策略:加強語音教學,重視發音規則的傳授;加強構詞法教學,注意符合規則詞匯的歸納積累;增加地道英文輸入,降低語際負遷移的影響;傳授搭配知識,引導學生自主學習詞匯搭配;通過語言對比進行詞匯教學。Flux position & error in flux magnitude and error in torque are used as fuzzy state variables. fuzzy logic is used for choosing the switching state. a fuzzy logic controller can choose the switching states according to a set of fuzzy rules based on both specialists " experience and knowledge, which improves the response performance of the system effectively during start - up and change in load
作為本文的一個創新點,針對普通的直接轉矩控制在給定轉矩躍變時反應較慢的缺點,提出了一種模糊控制器,把磁鏈位置、磁鏈誤差和轉矩誤差作為模糊輸入變量,應用模糊邏輯來確定逆變器的開關狀態,該模糊控制器根據一套基於專家經驗和知識的模糊規則來選擇開關狀態,從而有效地提高了系統在啟動和負載突變時的響應速度。The mrafc scheme employs a reference model to provide closed - loop performance feedback for generating or modifying a fuzzy controller ' s knowledge base. the adaptive compensation term of optimal approximation error is adopted. by theoretical analysis, the closed - loop fuzzy control system is proved to be globally stable, with tracking error converging to zero
該方案利用參考模型作為閉環系統的反饋信號來產生、調節模糊控制器的規則庫,並通過引入最優逼近誤差的自適應補償項來消除建模誤差的影響,不但能保證閉環系統穩定,而且可使跟蹤誤差收斂到零。The algorithm generates three - dimensional terrain model and displays in real time. it uses an efficient and simple method to attain the dependency between sampling points on terrain, and refines the center points in top - down way. it incorporates the dependency of points into their errors so that the cracks inside the terrain block are avoided, at the same time eliminates the cracks at the edges of blocks through adjusting the elevations of those points that cause the cracks
該演算法基於規則格網數據實時生成三維地形模型,並實時顯示;採用了一種簡單而高效的方法來求解采樣點之間的依賴關系;以「從頂向下」方式細分中心頂點;並把頂點依賴關系融合進頂點誤差中,避免了地形塊內部的裂縫,同時通過調整塊邊界點的高程消除了塊邊界處的裂縫;演算法還具有利用幀間相關性,視相關等方面特點。Furthermore this system uses snort rule language and fuzzy reasoning in the system. consequently, this system has low false alarm rate as well as low miss alarm rate. all these characters make this instrusion detection expert system have much more protecting capacity
此外,本系統將模糊推理和snort規則描述語言用於對入侵特徵的分析與識別,構建起基於誤用和基於異常相結合的入侵檢測系統,使系統的誤報率漏報率降低,而且數據分析更據實時性。Accountant report calculates change and manual fiscal distinguishs main show to be in the following respects : ( 1 ) operation tool is different ; ( 2 ) the carrier of accountant data and information is different ; ( 3 ) data processing speed, accuracy and deepness development are used different ; ( 4 ) book - keeping regulation and correct wrong method differs ; ( 5 ) program of zhang wu processing is different ; ( 6 ) the method of account setting and zhang book that register is different ; ( 7 ) the constituent system that the accountant works is different ; ( 8 ) money is met the quality of personnel is different ; ( 9 ) built - in control system is different
會計電算化和手工會計的區別主要表現在以下幾個方面: ( 1 )運算工具不同; ( 2 )會計數據與信息的載體不同; ( 3 )數據處理速度、準確性與深度開發利用不同; ( 4 )簿記規則與更正錯誤的方法不同; ( 5 )賬務處理程序不同; ( 6 )賬戶設置和賬簿登記方法不同; ( 7 )會計工作的組織體制不同; ( 8 )財會人員的素質不同; ( 9 )內部控制制度不同。If a catastrophic error occurs, automatic restart management will take charge starting elements based on the active automatic restart policy that is in effect at this time
如果發生致命錯誤,自動重啟管理將會根據當前起作用的自動重啟規則管理啟動元素。However, association rule mining algorithms tend to produce a huge number of rules, most of which are of no interest to the user. in this paper, we analyzed some problems existed in the association rule mining firstly
但在實際應用中僅考慮支持度和置信度是不夠的,因為這些耗費了很大的計算代價挖掘出的強規則並不一定都是對用戶有用的或者說有趣的規則,它們中有的甚至是誤導的。Firstly, the backgrounds and techniques of intrusion detection system ( ids ) are introduced briefly in this paper, also the current status. then an intrusion detection system based on a new nonstationary machine learning technique model is presented and improved. on the precondition of the same false alarm rates, more intrusions have been detected, and less time for detection is needed with the improved system
本文首先引入了一種基於機器學習規則的、用於入侵檢測系統的動態模型,並對該模型加以改進,在誤警率不變的前提下,使系統能夠檢測到更多的入侵種類,縮短了系統檢測時間,從而提高了系統性能。The first rule of user input is : all input is bad until proven otherwise
用戶輸入的首要規則是:在經過驗證之前,所有輸入都是錯誤的。分享友人