英语人>网络例句>key chains 相关的网络例句
key chains相关的网络例句

查询词典 key chains

与 key chains 相关的网络例句 [注:此内容来源于网络,仅供参考]

The key to design is the effective management of the dual exploration of both the problem space and the solution space.

设计的关键是有效管理的双重探索双方的问题空间与解空间。

Key words: compound dual structure,relation between rural and urban areas,the construction of socialism new rural areas

作者单位华东理工大学人文科学研究院上海 200237;华东理工大学社会与公共管理学院上海 200237

In the paper, the basic theory, the key technology of New GPS is investigated. The framework of GPS knowledge base is constructed based with databases based on the general matrix model and Inference Mechanisms based on the duality principle of New GPS.

本文通过对新一代GPS 的理论基础、关键技术的分析和研究,依据新一代GPS 的通用矩阵模型和对偶性原理,研究并提出了GPS 知识库的基本框架,GPS 知识库由基于通用GPS(来源:A31BC论文网www.abclunwen.com)矩阵模型搭建的数据库和基于对偶性原理设计的知识推理机构组成。

The paper, first of all, particularly expounded the new characteristics of the control within the accountants of the enterprises on the accounting computerization basis-control object dualization, control key points singularity, control form procedure, control content data, control range magnifying, and control technique modernization; then put forward the new methods of increasing the enterprises.

具体地阐述了在会计电算化条件下,企业会计内部控制的新特点———控制对象二元化、控制重点单一化、控制形式程序化、控制内容数据化、控制范围扩大化、控制技术现代化;其次提出了企业会计内部控制应增加的新方法,并作了相关的建议。

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

Up in the apartment Key tossed the duffel bag of her clothes aside and double locked the door.

向上在公寓钥匙中在一边投掷她的衣服粗呢大衣袋子,而且加倍锁了门。

Whose roots are tangled deep in Duma Key.

金的作品,超越于传统的恐怖小说。

One of the most efficient ways to transfer product to the next processing step is a Key Tote Bin Dumper system.

Key 传送倾倒机系统是将产品运送至下一加工程序的最有效方式之一。

This is one of the key goals of Wrath of the Lich King's dungeon design.

这就是《巫妖王之怒》副本设计要考虑的最重要一点。

A unique key identifying this duplicate file action within its product.

一个独一无二的密钥,它在其产品里标识此复制文件操作。

第500/500页 首页 < ... 492 493 494 495 496 497 498 499 500
相关中文对照歌词
Chains
Rockin All My Chains On
Egypt (The Chains Are On)
Free
Breaking The Chains
Chains
Jordans Gold Chains
Chains
In Chains
Down On Longboat Key
推荐网络例句

Liapunov—Schmidt method is one of the most important method in the bifurcation theory.

Liapunov—Schmidt方法是分叉理论的最重要方法之一。

Be courteous -- even when people are most discourteous to you .

要有礼貌──即使当別人对你最不礼貌的时候。

I think we have to be very careful in answering these questions, because nothing is really so simple.

我认为,我们在回答这些问题的时候应该非常谨慎,因为事情远没有那么简单。