英语人>网络例句>detection 相关的网络例句
detection相关的网络例句

查询词典 detection

与 detection 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on information-theory, a lower bound on the size of the detector set is derived. Detector Generating algorithm is described. The performance of Artificial Immune Intrusion Detection System is better than the normal intrusion detection system based on knowledge engineering.

免疫原理在入侵检测领域的应用是一个刚刚兴起的研究,它的目的是使检测系统具有分布性、多样性、自适应性、自动应答和自我修复的特点,具有检测异常现象、利用不完备信息进行检测的能力,这是原有系统达不到的。

Then we descried our design idea and content of simulator.(3) We make analysis and study on the theory of traffic incidents and the detection of them. And then setup configuration for traffic incidents auto detection system.

3对交通事件及事件检测原理进行了分析研究,并建立了交通事件自动检测系统结构框架,阐述并分析了交通拥挤时的度量参数,对典型的交通事件检测算法作了简要的介绍。

for the detection of mrs, the vitek-32 ams can be used in routine diagnostic works, but as for cns, it should be detection again by fox and/or oxa to make sure.

我院临床分离的葡萄球菌株也是利用vitek-32 ams进行细菌鉴定、药敏和mrs常规检测,为了了解该系统检测mrs的可靠性,我们用头孢西丁纸片扩散法和苯唑西林盐琼脂纸片扩散法对其进行了初步的评价。

First the traditional non-optical detection technology for gas concentrations is briefly introduced, such as ultra-sound technology, gas sensing, catalytic thermal, gas chromatography, interferometry applications, and then the spectral analysis based on the concentration of gas detection is discussed. The latest technological developments on the differential absorption spectroscopy, Fourier transform infrared spectroscopy, tunable laser diode laser absorption spectroscopy, laser radar and differential absorption Raman scattering laser radar, laser-induced fluorescence spectroscopy, laser Photoacoustic Spectroscopy are reviewed in detail.

首先对传统的非光学气体浓度检测技术作出了简单的介绍,包括超声波技术、气敏法、热催化法、气相色谱法、干涉法应用技术,被动检气管法,然后重点阐述了基于光谱学分析气体浓度检测技术的最新发展动态,其中分别对差分吸收光谱技术、傅里叶变换红外光谱技术、可调谐激光二极管激光吸收光谱技术、差分吸收激光雷达和拉曼散射激光雷达、激光诱导荧光光谱技术、激光光声光谱技术进行了详细介绍,最后提出了现代气体浓度检测技术的发展方向。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Face detection system A new design of face detection system is proposed based upon color-based skin-like region segmentation and neural network-based face distinguishment.

人脸检测系统在对基于颜色的皮肤区域分割和基于神经网络的人脸判别方法进行研究的基础上,本文提出一种新的人脸检测系统设计。

In this paper, we present a detection technology based on intrusion events in order to overcome the shortcomings of high false alert rate, serious redundant alerts and poor expression about the intrusion activities in today's intrusion detection systems. We describe the design ideas about the important methods used in this technology such as multi-sensor data fusion, raw alert distinguishment based on fuzzy rules and so on in detail.

在本文中,我们针对目前入侵检测系统普遍存在的误报率高、报警信息冗余现象严重和对入侵表述能力不强的缺陷,提出了一种基于入侵事件的检测分析技术,详细描述了该技术所采用主要方法的设计思想,如多传感器数据融合以及基于模糊规则的原始报警信息鉴别等。

So, in chapter 2 we discussed the basic principle of AFM based single molecule force spectroscopy, including the immobilization method of the samples to be investigated, the experimental control of single molecule detection and the standard for the distinguishment of single molecule detection.

因此,在论文的第二章专门讨论了基于AFM的单分子力谱仪的工作原理。

We made some improvements in the system architecture and packet capture module and analysis method of the IDS and got satisfactory results. Based on protocol distributary, the system balances the load, making large numbers of network packets switch to different analysis module according to their protocols. The architecture solves the bottleneck of centralized detection system in which all the packets are sent to analysis module to process and enhances the detection efficiency.

在系统的体系结构上,我们利用协议分流技术进行负载均衡,使得大量的网络数据包按照不同的协议被分流到不同的分析处理模块,解决了集中式检测系统存在的瓶颈问题,即所有的数据包都被送到一个集中的分析模块进行分析、处理,既提高了检测的效率,同时也增强了系统的抗攻击能力,即使某一个分析模块无法正常工作,也不会影响到其他的分析模块。

Distributed constant false alarm rate detection with multisensor is the combination of CFAR processing and distributed detection with multisensor.

多传感器分布式恒虚警率检测是 CFAR 处理和多传感器分布式检测的结合点。

第19/500页 首页 < ... 15 16 17 18 19 20 21 22 23 ... > 尾页
相关中文对照歌词
Building A Wall
Goodbye Day
Information
No Imagination
Revolution
Realestate
Poet Laureate Infinity Vocal 5
Guilty As Charged
My Lovely Jezebel
Feed My Head
推荐网络例句

Listen,point and check your answers.

听,指出并且检查你的答案。

Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.

但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48

Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.

一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。