• Such analysis includes calculation of source-code metrics, detection of potential bugs based on defined patterns, and discovery of violations of coding conventions and rules.

    这种分析包括计算源代码指标根据预定义模式筛查潜在bug发现是否违反编程约定规则

    youdao

  • Faced with the significant limitations of association rules method based axis attribute, a intrusion detection method based aggregation emerging pattern is proposed in this paper.

    分析基于属性关联规则方法局限性,提出了基于聚集显露模式入侵检测方法。

    youdao

  • Fault detection is performed through the knowledge based system, where fault detection heuristic rules have been generated from deep and shaoolw knowledge of the process.

    故障检测基于知识系统实现通过过程深层知识获得故障检测产生规则

    youdao

  • This language provided a common method of specifying protection, detection and response policies based on CNDPM model, which could be mapped to corresponding defense rules by policy engine.

    语言面向CNDPM模型能够统一描述保护检测响应策略通过策略引擎映射相应防御规则

    youdao

  • We propose a new approach to generating optimum intrusion detection rules based on extension matrix and Genetic Algorithm(GA)theory.

    提出一种新的基于扩张矩阵遗传算法理论产生检测规则方法

    youdao

  • In order to solve these problems, an intrusion detection system model based on AIS is put forward. Detection rules are produced by negative selection algorithm.

    为了解决这些问题提出了基于人工免疫原理的入侵检测模型,该模型使用筛选算法产生检测规则集。

    youdao

  • The paper also gives the rules of subassembly detection, employing connection graph and local blocking graph, based on the definition of subassembly.

    根据装配定义给出利用联接局部阻碍识别子装配体的规则

    youdao

  • On the basis of analyzing the intrusion detection system existing, this paper has proposed an intrusion detection system based on classification rules.

    本文分析现有入侵检测系统基础上提出基于分类规则的入侵检测系统。

    youdao

  • As pattern recognition method used in intrusion detection system, the limitation in traditional detection methods based on rules is cancelled.

    模式识别方法应用入侵检测系统中解决了传统基于规则的入侵检测方法缺陷

    youdao

  • This framework is based on CIDF, and uses Data Mining to mine intrusion models, then automatically transforms it into intrusion detection rules for rule base's updating.

    系统基于公共入侵检测框架CIDF)构建,当出现新攻击时,利用数据挖掘对海量数据进行挖掘,得出入侵模型后由系统自动转换检测规则以实现规则的自动更新

    youdao

  • Fault detection is performed through the knowledge-based system, where fault detection heuristic rules have been generated from deep and shallow knowledge of the process.

    故障检测基于知识系统实现,通过过程深层浅层知识获得故障检测产生式规则

    youdao

  • In this paper, we propose a new approach based on spectral entropy and spectral subtraction for noisy speech endpoint detection, and discriminative rules with robustness.

    本文提出基于减法相结合带噪语音端点检测改进算法以及端点检测的判决准则。

    youdao

  • A blind adaptive algorithm based on the stochastic approximation is discussed and then the performances of these detection rules are analyzed.

    然后介绍一种基于随机估计方法的自适应算法。最后三种判决准则进行性能分析。

    youdao

  • A blind adaptive algorithm based on the stochastic approximation is discussed and then the performances of these detection rules are analyzed.

    然后介绍一种基于随机估计方法的自适应算法。最后三种判决准则进行性能分析。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定