設計檢測規則 的英文怎麼說

中文拼音 [shèjiǎnguī]
設計檢測規則 英文
check design rule
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 設計 : devise; project; plan; design; excogitation; layout; layout work; styling
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先了基於數據挖掘技術的入侵建模方案,提出使用該技術建立入侵描述性模型和分類模型的思想,並用分類判決樹建立了入侵分類模型;其次,和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯挖掘和序列挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並出基於模式匹配的入侵引擎,該引擎具有誤用和異常功能。
  2. On the designing part of the raas, the generation of events, the normal library of users, the process of detecting and analyzing, and the response units were described based on the cidf

    在此基礎上,在實時審分析系統的部分,依照通用的入侵模型( cidf )對監控事件的產生、用戶正常庫、監控分析過程和響應單元逐個進行闡述。
  3. This paper includes the architecture diagram and important flowcharts of the system, discus ses in depth the generation and utilization of conditional rules, and presents the design of important modules which perform the packet - sniffing, muti - variant statistics and association detecting. some key data structures are listed, with description of important functions in the implementation

    文中給出了該原型系統的總體結構圖和重要流程圖,較為詳細地介紹了條件的生成與使用,給出了數據包捕獲、多變量統、關聯等重要模塊的,列出了重要的數據結構,並對實現中所使用的主要函數做了說明。
  4. At present, the most of vtr which are used in watch - control occasion for speciality are short of a uniform control - check - alarm system, which brings on the discommodiousness of operation and the user can not know the time of occurring a fault, which reduces the reliability of the watch - control system. therefor, at first, i carefully analyze the servo theory of the vtr which had been produced by chmavc with k mechanism to find out the work rule of the control signal ; second, take out some right control signal ; then for dealing with the problem of vtr in use for watch - control, i choose some right components to design the uniform control system for many special vtr with protel software. it mainly includes the following functions : operation functions of all vtr ( for example : power, play, ff, rew, stop, rec, eject, fwd, rwd, sp, lp ) was controlled by line at the same time ; in, the process of recording, when the tape walks to the end or stops by itself, the system gives an alarm and shows the number of the wrong vtr ; in the process of recording, the system gives an alarm and shows the number of the wrong vtr when the video signal from vidicon is losed ; the system controls all vtr to record on the non - working time when there is something wrong in the guarding section ; the system controls the video from vtr to switch to right monitor

    目前,用在監控場合的業務用錄像機普遍缺乏一個統一的控制及報警系統,這就導致了操作的不方便和出現了故障用戶不知道,降低了監控系統的可靠性,為此,我首先對華錄松下生產的k機芯的錄像機伺服原理進行仔細分析,找出各個伺服控制信號的控制變化律;然後從中選出合適的控制信號;針對目前錄像機在實際監控使用過程中存在的問題,選用合適的元器件;運用protel繪圖軟體,了這個多臺業務用錄像機的統一控制系統,她主要包括以下功能:錄像機操作功能(如power play ff rew stop rec eject及正尋反尋帶速定等)的統一線控控制功能;磁帶在記錄過程中,磁帶到頭和磁帶自己「偷停」的報警,並要能顯示出具體是哪一臺錄像機;在記錄狀態下,攝像頭輸入信號丟失報警,並要能顯示出具體是哪一臺錄像機;在休息或其他不需要記錄時,一旦警戒區有情況,控制所有機器自動進入錄像狀態的功能;從錄像機輸出的監控圖像信號對監視器的切換功能。
  5. Benefit from designer experience, expert system regulations are built by c language. through the inference, all fixed logic fault and most multi - line short circuit fault are detected by expert system. on that account, the design process built by c language will be a mode that can be imitated by other intelligent fault diagnosis system

    對于專家系統智能故障診斷技術而言,構建專四川大學碩士學位論文家系統庫和推理機制是重點,本文採用c語言構建庫,然後通過精心的專家推理機,從而使得固定邏輯故障和大多數多線橋接故障能夠被專家診斷系統出來。
  6. And the fuzzy control technology has been studied that reduce the stator terminal voltage to achieve higher power factor through testing power factor and using certain rules. the asynchronous motor intelligence operating control system plan design has been completed. simulation design and simulation experiment of the system has been carried on, and the simulation result indicated this intelligence control system has achieved the anticipated effect

    在分析電機功率因數角的變化律及功率因數角對晶閘管輸出電壓的影響的基礎上,提出了異步電動機在輕載或空載運行時通過功率因數並經過一定降低定子端電壓來達到提高功率因數目的的模糊控制方法,完成了異步電動機節能運行控制系統的軟硬體,並進行了系統的模擬研究與實驗研究。
  7. In this page the disadvantages of common intrusion detection system are presented. and the details of designs of a expertsystem based real - time intrusion detection system with brief introduction of expert system in artificial intelligence are also exhibited in this paper. meanwhile an example of definition of rule - set in knowledge - rule database is included in the introduction mentioned above

    該文討論了普通型入侵系統的弱點,對人工智慧的重要領域專家系統作了簡要介紹,提出了一個基於專家系統的實時入侵系統的詳細方案和實現方法,同時舉例說明如何定義知識庫中的集。
  8. Finally, it is proved feasible to simulate the road - driving condition of electric bicycle on the testing platform. the collectivity programming of electric bicycle automatic testing system is maken out, including the simulated application strategy and method of road - resistance and wheeling inertia, design principle and evaluation system

    ( 2 )對電動自行車自動系統做出了總體劃,確定了行駛阻力與轉動慣量的模擬策略和方法,明確了系統,建立了系統評價體系,運用多級模糊綜合評價模型對各方案進行了評價選優。
  9. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵、安全審、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法,制定了行之有效的章制度。
  10. When the data of logistics in current process are used for input of simulating logistics in future 100 % continuous casting process, supply of hot metal from iron - making process may not satisfy the needs of 100 % continuous casting on raw materials. because planning scheme in continuous casting process depends greatly on smelting scheme in convertor vessel, it is important for operator to balance raw materials supply, smelting and casting in order to realize the scheme of 100 % continuous casting. when some equipment are work abnormally, mixer of hot metal and lf furnace can be used for logistics buffer

    用攀鋼煉鋼生產數據對模擬軟體系統進行的試和模擬研究結果表明:模擬系統的隨機數發生演算法可以實現對作業時間的依分佈隨機抽取;在相似的輸入條件下,模擬結果與實際生產物流的時間分佈律基本吻合,達到了模擬軟體的預期目標;若以攀鋼提釩煉鋼廠現工藝的鐵水輸入作為全連鑄后的輸入條件,現工藝的物料供應能力可能難以滿足全連鑄生產的要求;連鑄機的連澆劃對轉爐爐次劃的編制有很高的要求,合理安排來料、煉鋼與澆鑄三者間的物流平衡關系將是保證全連鑄作業的重要條件;當出現備異常情況時,可以利用混鐵爐與lf爐站前等待作為物流緩沖池,通過延長系統的平均物流時間來緩解因修和故障等擾動所造成的影響,確保生產的順利進行。
  11. In transferring proprietary know - how, the licensor should provide the licensee with the relevant design blueprints, the rules for the manufacturing processes, illustrated instructions, technical data, prescriptions, formulae, key equipment, models, samples, list of materials and materials specifications, operating instructions, detailed regulations on on - site operations, and the relevant information and data regarding technical demonstrations, on - site guidance, product quality control and inspection procedures, repair procedures and equipment, and other commercial information

    供方轉讓專有技術,應向受方提供有關的圖紙、工藝程和示意圖、技術數據、配方、公式、關鍵備、模型、樣品、材料清單和說明書、操作方法說明、現場工作細、技術示範、現場指導、產品質量控制和方法、維修的方法和備以及有關的商業情報等資料。
  12. Based on the techniques of main memory database, we have designed and realized the rule subsystem, the rule expression, rule memory structure, rule trigger mechanism, rule execution mechanism, events detection mechanism, transaction analyzing and conversion mechanism from the rule to statement so as to implement the active function of the system. we also discuss cascade trigger, rule termination of the active rule set

    在改進的nhdb ~ *子系統中,實現了nhdb ~ *的形式化定義、的存貯結構,研究了nhdb ~ *觸發機制、事件機制、的執行機制、事務處理機制等,從而使得nhdb ~ *系統具有相應的主動功能,實現nhdb ~ *主動數據庫的主動行為。
  13. The network fluxes are classified as secure, suspicious, or repulsive using the rules collection, and only the suspi - cious ones will be handled to next stage. furthermore, using the idea of cache, the paper proposed the states collection structure

    訪問控制採用了狀態防火墻的技術,通過表把網路流量劃分成信任?受懷疑?拒絕的類別,只有受懷疑的流量才會交給下一個步驟來處理。
  14. All of work above can work as the basic knowledge for further research for operating characteristics and simulation, the detecting principle and implementing method with sensor as the means for requirement of information about rotor position are described. next, a novel inductance method and rotor position angle estimation using fuzzy logic are studied. in this dissertation, some knowledge about error signals are detailed, at the same time, some rese arch for improving precision is also provided

    通過分析有位置傳感器的原理和實現方法,重點研究了兩種無位置傳感器轉子位置方法:一是採用改進電感法(閥值電感法)的轉子位置方法,並了實現方法;二是基於模糊推理的轉子位置估算方法,針對此方法中誤差信號進行分析,研究提高角度估算精度的策略和方法。
  15. This dnids is composed of four parts : ldu, smu, gau and mcu. finally, the author studies the technology of nids in linux including the intrusion technology and system design. brings forward a integrated frame of a dnids, it concludes the following modules : network packet capture module, network protocol analysis module, rules analysis module, etc

    最後在linux平臺下分析研究了基於網路的入侵技術及其系統,提出了一個結構完整的入侵系統框架,主要包括的模塊有:網路數據包捕獲模塊、網路協議解析模塊、解析模塊、決策模塊、響應模塊、通信模塊、存儲模塊、互動介面和界面管理模塊。
  16. In addition, protection and display function units are added into this system. on the basis of study about working principle of previous indirect rotor - position detecting techniques, the fuzzy rules with the relation knowledge of - i - is studied in this paper as an approach for sensorless position angle estimation, and the simulation research for control performance and rotor position estimation are carried out. some experimental research on structure of srd controller is well made, and a fuzzy + pid speed controller with tms320f240 as core control unit is designed

    研究了srd系統結構,對已有的主電路和驅動電路進行改進,完善了系統的各種保護和顯示等功能;在對已有的無位置傳感器轉子位置原理進行研究的基礎之上,根據sr電機的磁鏈?電流?角度之間的關系,研究了採用模糊無位置傳感器方案;對srd系統的控制器結構進行研究,採用tms320f240高速信號處理器的fuzzy + pid控制器,研究了fuzzy + pid控制器以及系統運行中的各種保護、顯示、報警等功能的思想和實現方法。
  17. This paper studies a design method of decentralized signal detection system which consists of adaptive fuzzied local - detectors and a data fusion rule of on - line self - learning weights. the local - detectors for inaccurate signal parameters are modeled by means of fuzzy sets which can be adapted to change of the inaccurate signal parameteres. the data fusion center where the optimal declsion rules are used as objective function can learn the local decision weights on - line. the robustness of the fuzzied local - detectors and the adaptability of the self - learned fusion rule make it true that the detection performance of the decentralized detection system is improved under uncertainty and this system can also process the decentralized signal detection with a unknown parameter of unknown distribution or non - random unknown parameter

    本文研究了一種由局部自適應模糊器和在線自學習融合演算法所構成的分散式信號系統的方法.由模糊集對不精確信號參數的局部器進行建模,該模糊模型可自適應不精確信號參數的變化.融合中心以最佳融合作為目標函數在線自學習局部判決的權重.局部模糊器的魯棒性和自學習融合演算法的自適應性使該分散式系統在不確定環境下的性能得到提高.也使該系統能夠處理未知分佈的未知參數以及非隨機未知參數的分散式信號
  18. A project has been brought forward, which focuses on the combination of an oscillation equipment with double steel - rob and the photoelectric technology on non - contact measuring. with collective precision being analyzed, the paper also points out how to bring it into effect. secondly, the design of mechanism, hardware and software of photoelectric measuring system with a core of at89c51 single chip microcomputer is accomplished

    首先進行了不外形剛體轉動慣量量的理論探索,找出了剛體轉動慣量與振動固有周期的關系,提出了以雙鋼柱扭擺機構,結合光電非接觸技術量航彈極轉動慣量的方案,並進行了總體精度分析,提出實施手段;其次,完成了航彈極轉動慣量量系統的機械、以at89c51單片機為核心的光電系統的硬體及軟體的;最後,給出了實驗數據分析及結論。
  19. In the part of interface technology, author analyzes how to design interface to realize the intrusion detection and feed back the dynamic policies of content filter subsystem

    在介面部分,分析了如何介面實現入侵和內容過濾系統的動態反饋。
分享友人