• The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.

    本文网络安全防范角度讲述了设计实现一个FTP日志分析系统重要性

    youdao

  • Auditing enables the database server to log sensitive operations performed by users and administrators for analysis and identifying system misuses.

    审计功能允许服务器记录用户管理员执行敏感操作,以便进行分析识别系统误用

    youdao

  • Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.

    重新设计实现了计算机日志勘察取证系统日志分析平台。

    youdao

  • UE log analysis is one of the key methods of trouble location in WCDMA system test.

    WCDMA系统测试中,分析手机日志故障定位重要手段之一

    youdao

  • Event log is one of the most information sources about analysis of fault in modern IT system.

    事件日志现代IT系统分析处理故障重要信息来源

    youdao

  • Log analysis regard as component part of network security defending system, it plays a very important role in the network security.

    日志分析作为网络安全防御系统组成部分网络安全中重要作用

    youdao

  • The automatic optimal design system is based on the circuit analysis software-PSPICE. In application, a video log amplifier is designed and the results are presented.

    介绍基于PSPICE电路分析程序的自动优化设计系统及其对数视频放大器设计中的应用实验结果。

    youdao

  • The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.

    操作规程其他操作是指疑义信息反馈核查日志查询统计分析系统管理操作。

    youdao

  • An exact statistical fit and auto-correction system for neutron log data has been set up with the use of image network statistics, network weighted analysis (algorithm) and fit.

    利用图象网络统计、拟合、加权分析技术,提出中子测井资料环境影响校正分析方法处理模式,建立精细统计合自动分析校正系统

    youdao

  • Second, By powerful digital image processing technique, the system analysis dust density when needed, so it change the case in which log parameter in industrial field occurs.

    通过图像的去噪处理分析识别,由识别的结果有效迅速烟尘排放情况进行分析判别

    youdao

  • The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    youdao

  • The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定