查询词典 intrusion tone
- 与 intrusion tone 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In the model, the characteristics of fast attenuates and update and being sensitive to outside information of instantaneous memory were used to detect abnormal data promptly and prevent intrusion at an early time. The short-term and long-term memory can adjust memory intensity with anomalous accesses, and interconvert with each other that attempts to achieve maximum effect.
在本模型中,利用瞬时记忆衰减更新速度快且对外界信息反应敏感的特点,对异常数据进行及时检测,尽可能较早地阻止入侵的发生;短时记忆和长时记忆可以随着异常访问频度调整记忆强度并进行相互转化,以达到最佳的记忆效果。
-
The intrusion ages range from 183.1 Ma to 99.5 Ma(except one of 715.6 Ma), most of them about 150 Ma with isochron age of 132.1 Ma, placing them in early Jurassic to Cretaceous in age.
40Ar/~(36)Ar—40K/~(36)Ar等时线图解给出的等时年龄为132.1Ma,说明这些花岗岩在形成时代上属中侏罗到早白垩世。
-
This thesis study some issues on set up an distributed intrusion detection system based on mobile agent technology.
本文研究了利用移动代理技术实现分布式入侵检测系统的若干问题。
-
No wonder that many of the ISPs judge this intrusion on their turf by the phone and cable companies to constitute unfair competition.
难怪不少的法官商对他们这种入侵的草坪和有线电话公司构成不正当竞争。
-
When this approach is undertaken, the Court examines the extent of the intrusion on the constitutional functions of the other Branch, gauges the extent to which the challenged action aggrandizes in one Branch power that should properly be shared, and balances the competing interests at stake.
在应用这一思路的时候,最高法院考察对其他部门的宪法职能的侵犯程度,研究被质疑的行为在多大的程度上将本应适当共享的权力集中到了一个部门,并且平衡各种相互竞争的利益关系。
-
Particularly, intrusion detection system has been presented to detect attacks that bypassed the prevention methods.
入侵检测系统能够用于检测各种形式的入侵行为,是安全防御体系的一个重要组成部分。
-
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
-
The direction of intrusion detection is the based on network node of it, each node only does the particular detection, and it does deeper intelligent analyzing after centralizing them in the future.
3基于网络节点的入侵检测是今后发展的趋势,每个节点只完成特定的检测,汇集起来后采用智能关联的技术进行分析。
-
Sequence analysis to system call sequences is an important method in intrusion detection,for most of the system intrusions are conduced by illegimate or irregular system calls to operation system.
大多数的入侵行为是由于一系列操作系统内部的非法或异常调用引起的,因此对系统调用序列进行分析是入侵检测的一个重要方法。
-
In a network-based intrusion-detection system, the sensors are located at choke points in the network to be monitored, often in the demilitarized zone or at network borders.
在一个基于网络的入侵检测系统,传感器,分别位于窒息点在网络中加以监测,往往是在非军事区或在网络的边界。
- 相关中文对照歌词
- Heat Rising
- Mellow Tone
- "Why Do You Take That Tone With Me?"
- LAMC
- Mr. Spindel's Phone Call
- Caramel Sundae
- In A Mellow Tone
- City Of Champions
- Clear 'Em Out
- Grand Illusion
- 推荐网络例句
-
You can snipe the second and third union leaders from this position.
您可以鹬第二和第三工会领袖从这一立场出发。
-
Aiming at the currently shortage of XML streams quality detecting, this paper proposes a new forecasting method of XML streams quality by least squares support vector machines, which is used the method of XML keys' vector matrix as windows, and vector product wavelet transform to multilevel decompose and refactor the XML streams series, that can fulfill real-time checking demand of XML quality, and ensure constraint, consist- ency and integrality. For even more adapting net load, it proposes a control strategy by weight and adaptive adjustment to ensure XML streams quality.
针对当前XML数据流质量检测存在的不足,提出构建XML键的矢量矩阵作为窗口,利用矢量积小波变换多级分解与重构XML数据流,再结合最小二乘支持向量机对XML数据流质量进行预测的一种方法,满足XML数据流质量重构时实时检测的要求,保证XML数据的约束性、一致性与完整性;为了更好的适应网络负载,采取加权与自适应窗口调整等调度策略充分保证XML数据流的质量检测。
-
This is a very big challenge to developers especially that Ajax is constantly changing.
这对开发者来说是一个非常大的挑战,尤其是需要不断变化的Ajax。