查询词典 detection device
- 与 detection device 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Among the diversity of security technologies, intrusion detection technology is one of the focuses. This thesis at first elicits the situation of nowadays intrusion detection technology and Intrusion Detection System after explaining the basic concept of intrusion detection. Then on the basis of analyzing some representative IDSs the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity, flexibility, interoperability etc. Therefore new technologies are needed for explored to improve the overall performance of IDS.
入侵检测系统是目前网络安全领域的一个研究热点,本文首先从入侵检测的基本概念出发,阐述了入侵检测技术以及入侵检测系统的发展现状,通过分析当前一些有代表性的入侵检测系统指出了入侵检测系统存在的一些不足,在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。
-
Tested the detection efficacity, the detection accuracy of the system, then, the experiments prove that the system has the higher detection efficiency and detection accuracy.
实验证明系统具有较高的检测效率和检测准确率。
-
Due to its good effect in the reservation of information of signal abrupt change, mathematical morphology is often applied in the detection and location of short-term power quality disturbance, however, there is still a defect of invalid detection existing in partial detection methods based on mathematical morphology while some zero-crossing disturbances are detected. In this paper three mathematical morphology based disturbance detection and location methods, i.e., the method based on first-order derivation and morphological gradient, the method based on morphological gradient and soft threshold processing and the method based on dq decomposition and top-hat transform, are analyzed, that is, by means of simulation the adaptability of these methods in the analysis on the signals of voltage sag, voltage swell and electromagnetic transient oscillation is compared.
数学形态学因其在保留信号突变点信息方面有很好的效果,因此常用于短时电能质量扰动的检测和定位,但基于数学形态学的部分方法仍存在对某些过零点扰动检测失效的缺点,文章分析了3种基于数学形态学的扰动检测和定位方法,即基于1阶求导和形态梯度的方法、基于形态梯度和软阈值处理的方法、基于dq分解和高帽变换的方法,通过仿真比较了3种方法在分析电压暂降、电压暂升、电磁暂态振荡等信号方面的适应性,结果发现基于dq分解和高帽变换的方法在检测过零点扰动时具有很好的效果,因此选取这种方法对实测扰动数据进行了检测和定位分析。
-
First of all, this paper introduces the whole design project and interrelated knowledge about Non-destructive detection, ultrasonic detection, and Phased-Array ultrasonic detection Then the paper depicts the principle of Phased-Array focus and abstracts a set of math model and feasible arithmetic on the base of the real parameter of the system. Put forward several problems that exist during the course of system development and program. Introduce some measures of distinguish that are often used in non-destructive detecting and echo wave crest. Then I depict one of the measures in detail that used in the course of non-destructive detection, which is the way of distinguishing whether defects exist or not. Then provide part core program to realize it. This paper also provides main flow chart through analyzing how main control program controls different parts to make the whole system more effective.
然后在文中以较大的篇幅,描述了相控阵聚焦的原理,并根据该系统的实际参数,抽象出一套数学模型和可行的算法,在此基础上提出了在系统开发过程及编程实现过程中存在的一些问题;介绍了在无损检测中缺陷的分类和对回波峰常用的识别方法,详述了系统开发过程中使用的其中一种识别方法,即判别是否存在缺陷的算法,并给出实现之的部分核心程序;详述主控程序如何控制各部分并协调各相关软件的工作,使整个系统发挥最高效能,并给出主要设计框图和程序。
-
Although the unique independence, mobility of Mobile Agent can improve the haleness, tolerableness, adaptability and expansi- bility of the intrusion detection system, which induce Mobile Agent has used for intrusion detection system, it is necessary to improve on the intrusion detection system which base on Mobile Agent for questions faced the intrusion detection system.
虽然移动Agent独特的自主性和移动性可以提高入侵检测系统的健壮性和容错性,增强适应性和可扩展性,使得移动Agent技术目前已经用于入侵检测系统,但是考虑目前入侵检测所面临的问题,有必要对基于移动Agent的入侵检测系统改进。
-
Based on the study of Likelihood Ratio Test voice activity detection algorithm and discussion about decision-directed LRT and smoothed LRT voice activity detection algorithms, we proposed a novel voice activity detection algorithm for improving speech detection robustness in noisy environments.
深入研究了基于似然比测试的语音激活检测算法,并对基于直接决策似然比测试的语音激活检测算法和基于平滑似然比测试的语音激活检测算法进行了讨论。
-
By comparing the common edge detection algorithms, the magniloquent Kirsch edge detection algorithm is selected to process the result of background subtraction. The result of edge detection is denoised by mathematical morphology method. Shadow edge restrained arithmetic and detection-line-based background updating method are presented. Shadow edge restrained arithmetic reduces vehicle shadow edge efficaciously. Background updating precision is improved by presented background updating method.
在处理过程中,对常用的背景差方法进行了改进,有效的保留了车辆目标信息;通过对常用的边缘检测方法比较,选用了突出边缘的Kirsch边缘检测方法对背景差后的图像进行了边缘检测;使用形态除噪算法对边缘检测的结果进行了噪声去除;提出了阴影边缘去除算法和基于检测线的背景更新方法,阴影边缘去除算法有效的抑制了车辆阴影边缘,背景更新方法则提高了背景更新的精度。
-
Generally, the traditional Intrusion Detection Techniques can be categorized into anomaly detection or misuse detection. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. In this technique, a Markov chain model is used to represent a temporal profile of normal behavior of a process. The Markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on UNIX system.
传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。
-
Firstly, electrization knowledge related to the research is introduced. After a deep study on various contact loss detection techniques, especially on the electric arcs detection techniques, we draw the conclusion that the untouched detection technique based on phototube sensor can acquire exact contact loss information, and will to be the leading technique for contact loss measurement in future. Secondly, combining with the special railways system in our country, we analyze the cause of the arcs, and the influence on the power supply system and the on board traction drive due to the arcs in detail, and study the arcs' spectrum characteristic. We also analyze detecting principles and put forward with a method - using phototube sensor to detect the contact loss arcs, conceive the configurations and detection flows of the measurement.
文章通过对电气化铁道相关知识的了解及对国内外离线检测技术的深入了解,尤其是对离线电弧检测技术的了解,总结出了基于光电传感器的非接触离线电弧检测系统能够得到准确的弓网离线情况,并且是国内外检测技术的发展方向;文章详细的分析了离线电弧产生的原因,电弧对机车牵引动力的影响情况,研究了我国铁路系统中离线电弧的光谱特征分布;分析了系统的检测原理,提出了采用光电传感器实现对离线电弧进行检测的方法,并设计了"电力机车弓网离线电弧检测装置"的检测功能和管理功能,规划了系统的组成结构及检测流程。
-
In case of simple background, we use image difference for motion region detection, and then adopt the original Chan-Vese model for face contour detection and tracking, while in case of complex background, we use Wronskian change detector for motion region detection, and then adopt the modified Chan-Vese model for face contour detection and tracking.
对于简单背景情况,首先利用图像差分进行运动区域检测,然后在运动区域内采用Chan-Vese模型检测人脸轮廓,并根据其定位结果计算下一帧中新的运动区域和提取人脸轮廓;对于背景复杂的情况,则用朗斯基变化检测算子来首先检测出运动区域,然后在运动区域内采用改进的Chan-Vese模型检测人脸轮廓,并根据其定位结果计算下一帧中新的运动区域和提取人脸轮廓。
- 相关中文对照歌词
- Nuclear Device
- Electro Man
- Sexual Device
- Sexual Device (The Vari Mix)
- Townie
- The Thrill
- Brain Removal Device
- Just Can't Kill The Beast
- Transatlantic Flight
- Electronic Apology
- 推荐网络例句
-
The shaping method of noncircular part and the tool holder's radial motion characters in noncircular turning process are discussed in detail in the thesis.
论文详细研究了非圆零件的成型方法和加工过程中刀架的径向运动规律。
-
I have not really liked him,I do not like his this kind of disposition.
我没有真的喜欢他,我不喜欢他的这种性格。
-
As we know the price of traditional product is composed of the cost and the profit of the company involving market competition, monopolizes and many other factors.
我们知道作为传统的商品,定价的模式往往是在成本的基础上增加厂商的预计利润而形成其价格,当然也要考虑到市场竞争、垄断等其他方面的因素。