pattern match 中文意思是什麼

pattern match 解釋
假箱
  • pattern : n 1 模範,榜樣;典範。2 型,模型;模式;雛型;【冶金】原型。3 花樣;式樣;(服裝裁剪的)紙樣;圖...
  • match : n (一根)火柴;〈古語〉(從前大炮發火用的)火繩,導火線。 light [strike] a match 擦火柴。 a safe...
  1. Query two : two public so - called and wild china south tiger photographs, fold to match together to analyze, discover different angle different focal distance takes not and meantime of " living " tiger, facial features, outline, striped pattern, height consistent

    質疑二:兩張公開的所謂野生華南虎照片,疊合在一起分析,發現不同角度不同焦距不同時間拍攝的"活生生"的老虎,五官、輪廓、斑紋、高度一致
  2. When they change to night work the pattern will only gradually go back to match the new routine and the speed with which it does so parallels, broadly speaking, the adaptation of the body as a whole, particularly in terms of performance

    當他們改上夜班時,這個模式又要重新逐漸適應新的情況,這一適應變化的速度與整個身體的適應程度大體一致,從工作表現方面來看更是如此。
  3. First, letter paper, do you hear, eight quires, like this pattern, you see ; gilt edged take the pattern, so as to be sure to match it ; varnish, sealing - wax according to mihail ivanitchs list

    信箋,要八帖,就是這個樣品金邊的一定要照這個樣清漆,火漆封蠟按照米哈伊爾伊萬內奇開的單子辦。 」
  4. Create repeats for print and pattern, match colors and color work

    設計花型花稿,對比顏色及確認顏色。
  5. Facet is a constraint on the value space of a data type, achieved by constraining the lexical space to literals that match a specific pattern. the value of

    Pattern方面是對數據類型的值空間的約束,這是通過將詞法空間約束為匹配特定模式的文本實現的。
  6. Based on analyzing the relationship between linear separability and a connected set in boolean space, the particular effect of a restraining neuron in extraction of rules from a bnn is discussed, and that effect is explained through a example called a mis problem in boolean space. in this paper, a pattern match learning algorithm of bnns is proposed. when a bnn has been trained by the algorithm, all the binary neurons of hidden layer belong to one or more ls series, if the logical meanings of those ls series are clear, the knowledge in the bnn can be dug out

    另一個研究成果是在分析線性可分和樣本連通性關系的基礎上,以mis問題為例,討論了抑制神經元在二進神經網路規則提取中的獨特作用,提出了二進神經網路的模式匹配學習演算法,採用這種演算法對布爾空間的樣本集合進行學習,得到的二進神經網路隱層神經元都歸屬於一類或幾類線性可分結構系,只要這幾類線性可分結構系的邏輯意義是清晰的,就可以分析整個學習結果的知識內涵。
  7. The theory of protocol analysis is listed. by explaining the course of nimda virus evades computer and server, it shows the reason why protocol analysis can detect nimda virus. afterwards it lists the advantage that pattern match can " t have

    重點介紹了協議分析的工作原理,並以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,並概括出其具有模式匹配無法比擬的優勢。
  8. When a process crashes ( e. g. failure of a bif or a pattern match ) exit signals are sent to all processes to which the failing process is currently linked

    當一個進程掛掉了(例如bif失敗或者模式匹配失敗) ,退出信號將發送給所有和該失效進程相關的其他進程。
  9. Secondly, the author plans and completes a network ids which adopt the protocol analysis and pattern match method. ip fragment reassembly and tcp stream assembling is analyzed and completed, decoding the http request which coding by the unicode to the ascii

    作者分析和實現對網路數據包的捕獲、對ip協議解碼和tcp協議解碼,正確的實現了ip分片重組和tcp流還原,將unicode編碼的http請求解碼為ascii編碼。
  10. In the detection of protocol analysis model, we mainly studied the fragment reassembly of ip packet on the bases study of tcp / ip protocol. in the detection of pattern match model, we analyzed several kinds of pattern match algorithms such as : kmp, bm, bmh and multiple pattern match algorithms ( wang 2002 )

    在基於協議分析的檢測方法中,從tcp / ip協議族的層次結構出發,主要分析了ip包的分片重組技術;在基於模式匹配的檢測方法中,主要分析了多種模式匹配演算法: kmp 、 bm 、 bm的改進演算法以及多模式匹配演算法。
  11. Extract a substring from a string based upon a pattern match

    基於模式匹配從字元串中提取子字元串。
  12. Woman : we just got a pattern match

    剛剛截獲相符的聲紋
  13. We also improved pattern match algorithm, the network engine can search intrusion signal more quickly

    同時改進了匹配演算法,使得網路引擎具有更好的實時性能。
  14. We also improved pattern match algorithm, so the network detection engine can perform more quickly

    同時改進了模式匹配演算法,使得網路檢測引擎具有更好的實時性能。
  15. At last, the author introduces how to describe the characteristic of attack and uses an improved pattern match algorithm to do pattern matching

    介紹了如何描述攻擊特徵,使用了改進的字元匹配演算法進行特徵匹配。
  16. First, model, constitutes, category, trend and problem of ids is presented, and then pattern match which is applied widely is introduced from the aspect of theory and technology. principle and performance data of three pattern match algorithms such as bm, bmh and ac _ bm are discussed in detail. previous two algorithms are realized by programming

    本文首先介紹了入侵檢測系統的模型、組成、分類、發展趨勢以及面臨的眾多問題,然後從原理上、技術上介紹了目前使用最廣泛的模式匹配檢測方法,以常用的網路入侵檢測系統snort為例,詳細討論了bm 、 bmh和ac bm三種模式匹配演算法的基本思想以及性能參數,並且編程實現了前兩種演算法。
  17. Here lists the innovations and achievements in the research. 1. target recognition in image by pattern match technique based on step ga is presented

    本文的創新點和研究成果如下: 1 .提出了基於「一步」遺傳演算法模式匹配的圖像目標識別方法。
  18. In the implement of the network engine, the combination of network protocol analysis and pattern match technology is used so that the scope to search is reduced. the foundation of cve - based intrusion detection system rule base gives the update of the ids rule base reliable foundation. we put forward a new form of rule syntax

    以cve標準為建立入侵檢測專家系統規則庫的基準,使得入侵檢測專家系統規則庫升級有了可靠的國際權威標準可以依據,採用基於snort的規則描述語言,這種描述方法簡單、易於實現,能夠描述絕大多數的入侵行為,而且可以及時針對最新的漏洞升級規則。
  19. Following are the main points of the paper : 1. signature - based intrusion detection system takes advantages of advanced pattern - match algorithms

    文章在如何提高特徵檢測的效率和準確性方面主要做了下面的工作: 1
  20. If the match succeeds, the recognition result will be attained directly, otherwise the characteristic district pattern match will be applied to the similar characters and the hollow template pattern match will be applied to other conditions

    該方法定義前景匹配度、背景匹配度和整體失配度3種匹配測度進行模板匹配,匹配成功則直接獲得識別結果,否則,對相似字元情形應用特徵區域模板匹配法,對其他情形應用空心模板匹配法。
分享友人