助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   规则 在 互联网技术 分类中 的翻译结果: 查询用时:0.075秒
图标索引 在分类学科中查询
所有学科
互联网技术
诉讼法与司法制度
国际法
计算机软件及计算机应用
体育
法理、法史
民商法
自动化技术
经济法
更多类别查询

图标索引 历史查询
 

规则     
相关语句
  rules
    Tests show that the algorithm has high operation speed,high storage utilization rate and low collision rate,its flow matching speed is up to 2 million packets per second and it supports 50000 matching rules.
    测试结果表明,该算法运算速度快、空间利用率高、冲突率低,用于流匹配时匹配速度可以达到2Mpacket/s,支持规则数达5万条以上。
短句来源
    By constructing IPv6 testing rules, adding IPv6 decoding module IPv6 sub reorganization Rapid detection algorithm and the transition to IPv6 technology, a set of supports IPv4. IPv6 transition technology and the intrusion detection system.
    通过构造IPv6检测规则,添加IPv6解码模块,IPv6分段重组,IPv6快速检测算法以及对过渡技术的支持,实现了一套同时支持IPv4、IPv6和过渡技术的入侵检测系统。
短句来源
    Secondly,according to the RDFS inference rules,the closure of RDFS ontology graph model was constructed.
    根据RDFS推理规则生成RDFS本体图模型的闭包;
短句来源
    We took the research object of one actual network forum in this paper, used classical Apriori algorithm of association rules mining technique, researched latent action rules of network forum from large-scale database, improved mining efficiency infinitely by mending mining flow and embedded data analysis, got valuable mining result.
    本文以实际论坛为研究对象, 采用关联规则挖掘技术中经典的Apriori算法,对从大规模数据库中发现网络论坛的潜在行为规律进行研究,通过改进挖掘流程和深入的数据分析,提高挖掘效率,获取有价值的挖掘结果。
    We designed and implemented a fuzzy anomaly detection rules generation technology for IPv6 using genetic algorithm and detect the anomaly using fuzzy detection rules.
    设计并实现了基于遗传算法的IPv6模糊异常检测规则生成技术,使用模糊检测规则进行异常检测。
更多       
  rule
    This model deals effectively with the familiar imperfect information lying in overlay network architecture, with the help of attribute reduction algorithm and decision rule optimization algorithm in rough sets theory.
    该机制利用粗糙集理论中属性集约简算法以及决策规则集优化算法,有效处理了overlay网络体系中普遍存在的不完备信息。
短句来源
    Results from experiment indicate that decision rule optimization algorithm can realize the rough matching of user demand and service attribute, therefore avoiding the low efficiency of traditional exact matching in exactness and maturity, so this model broadens the application field of rough sets.
    结果表明,通过决策规则优化能够实现用户需求和网络服务之间的模糊匹配,从而克服了传统精确匹配的查全率低、查准率差的缺点,扩展了粗糙集的应用领域。
短句来源
    This system put two values from the simple-ruled detection engine and ANN detection engine into the interpreter , then improve the accuracy of rule detection.
    该系统将分别来自简单规则的检测引擎和ANN检测引擎的两个输入值输入分析器,从而提高规则检测的准确率。
短句来源
    IDS(Intrusion Detection System) cooperation set and widespread attack detection rule were formed after combination of hosts' relations and rights through modified Take-Grant model.
    通过Take-Grant改进模型将主机间关系和权限联系结合,形成了入侵检测系统(IDS:Intrusion Detection System)的合作集合和识别广泛攻击的规则
短句来源
    GSPN Simulate Analysis Model of Rule Based Expert System
    基于规则专家系统的广义随机Petri网仿真分析模型
短句来源
更多       
  regulation
    THE RELATION BETWEEN TOPOLOGY REGULATION OF FAST ETHERNET AND CSMA/CD
    快速以太网拓扑规则与CSMA/CD间的关系
短句来源
    SOAP protocol has been simply described, including structure of SOAP, element of SOAP, regulation of code and using SOAP via HTTP.
    并介绍了SOAP协议,包括SOAP的结构、SOAP元素、SOAP编码规则;
短句来源
    In this article,we analyze the SOAP,introduce the mechanism of SOAP,including the encapsulation of structure,encode regulation and information exchange model.
    首先对SOAP协议进行了分析,并介绍了SOAP机制,包括封装结构,编码规则和消息交换模型等。
短句来源
    It allows a group of people in different places discuss, edit, modify,complete and store electronic works(may including kinds of multimedia)real time according to a certain negotiatory regulation under the support ofnetwork.
    它借助网络允许分布在不同物理地点的小组人员,按照一定的协商规则实时地讨论、编写、修改,最终完成并发布电子作品(可包括各种多媒体成分)。
短句来源
    In the thesis, the key technical problems utilizing genetic algorithm and random method to design any- cast routing algorithms are explored. We designed and realized the any-cast routing algorithm based on genetic algorithm. Resolved the problems concerned in the algorithms, such as the code model, the original genus selection, the fitness function, the crossover strategy, the mutation regulation, and the algorithm's convergence, avoidance of dead loop etc.
    论文探讨利用遗传算法和随机方法研究选播路由算法的关键技术问题,设计实现了基于遗传算法的选播路由算法,解决了算法中的编码模式、初始种群选择、适应度函数、交叉策略、变异规则,以及算法的收敛、路由死循环的避免和负载均衡等问题。
短句来源
更多       
  the rule
    Formalized Description of Management Object Behavior Based on the Rule Approach
    基于规则方法的管理对象行为形式化描述
短句来源
    Analysis of the Rule of Snort and the Module of Snort Rule Process
    Snort规则规则处理模块分析
短句来源
    Product Configuration System Over Internet Based on the Rule Base and J2EE FrameWork
    J2EE体系架构下基于规则库的网上产品配置系统研究
短句来源
    Optimization on the Rule Sets of Snort
    Snort规则集的优化
短句来源
    Meanwhile essence the most popular firewall constructed the platform netfilter frame to Linux in the 2.4.x to carry on the multianalysis, including the netfilter frame overall structure, the netfilter clasp position, in the iptables table construction of data and the firewall the application filtered the table (filter) and the network address translation table (nat), the rule construction of data, rule filling in with the application, the data match and the goal and so on.
    同时对Linux 2.4.x内核中最流行的防火墙构建平台netfilter框架进行了详细分析,包括netfilter框架总体结构、netfilter钩子位置、iptables表的数据结构和防火墙中应用的过滤表(filter)和网络地址转换表(nat)、规则的数据结构、规则的填写和应用、数据匹配与目标等。
短句来源
更多       

 

查询“规则”译词为其他词的双语例句

 

查询“规则”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  rules
For these polynomials we prove an integral representation, a combinatorial formula, Pieri rules, Cauchy identity, and we also show that they do not satisfy any rationalq-difference equation.
      
We also describe the multiplication rules of the above basos elements ofY.
      
These are analogous to "fusion rules" in tensor product decomposition and their derivation obtains from an analysis of theR-matrix.
      
The result generalizes and implies the classical "branching rules" that describe the restriction of an irreducible representation of the symmetric groupSn toSn-1.
      
By constructing an interval extension of adjustable entropy function and some region deletion test rules, a new interval algorithm is presented.
      
更多          
  rule
This compares very favorably with the direct O(B6) algorithm derived from a basic quadrature rule on O(B3) sample points.
      
In previous work, under some assumptions, we specified a replacement rule which minimizes the long-run (expected) average cost per unit time and possesses control limit property.
      
At each step of the algorithm, a system of linear equations is solved to get a search direction and the Armijo's rule is used to determine a stepsize.
      
Evolution complexity of the elementary cellular automaton of rule 22
      
In this paper, the elementary cellular automaton of rule 22 is studied by the tools of formal language theory and symbolic dynamics.
      
更多          
  regulation
Allosteric Regulation of Binding and Function at GCPRS
      
Alpha2-Adrenergic Receptors in Intestinal Epithelial Cells: Mechanisms of Signaling, Role, and Regulation
      
Alpha2-Adrenergic Receptors in Intestinal Epithelial Cells: Mechanisms of Signaling, Role, and Regulation
      
Regulation of Xenobiotic Detoxification by Nuclear Receptors
      
Positive periodic solution for a nonautonomous logistic model with linear feedback regulation
      
更多          
  the rule
The simulation work lays a foundation for the further research on the rule of explosion treatment's effect on welding residual stresses and the factors that may influence it.
      
In a room temperature environment, the Au-Al bonding samples' lifespan has also been predicted on the basis of the rule of reliability evaluation.
      
Because drilling data are very important to describe the characters of multi-scale of the spatial data for rock mass, the rule of how to process drilling data is developed to help appropriately display them in the viewpoint of 3D space.
      
Calculations are made for triaxial ellipsoids with different ratios of the semiaxes, and the limits of applicability of the rule are found.
      
The method is based on the use of the solutions of [1], which were obtained for the case of total absorption of incident molecules on an interphase surface, and on application of the rule of scaling proposed in [4].
      
更多          
  其他


This paper introduces a natural language developing environment (NLDE) based on deductive DBMS (DDBMS) which is the combination of PROLOG and INGRES. A subset of natural language that users need can be described in intermediate transforming grammars(ITG), then users "can express their requirements in the natural language. The DDBMS can infer answers for users from rules stpred in PROLOG database and relational tuples stored in INGRES database. As an example, this paper introduces an airline advisory system(AAS)....

This paper introduces a natural language developing environment (NLDE) based on deductive DBMS (DDBMS) which is the combination of PROLOG and INGRES. A subset of natural language that users need can be described in intermediate transforming grammars(ITG), then users "can express their requirements in the natural language. The DDBMS can infer answers for users from rules stpred in PROLOG database and relational tuples stored in INGRES database. As an example, this paper introduces an airline advisory system(AAS). It is useful for users to inquire flight numbers, book tickets and ask for some other services. Specially, AAS can help users to solve some complex problems which are only answered by inference. The NLDE and AAS have been implemented on DUAL-68000 microcomputers. By means of NLDE, users can develop a natural language processing system in their interesting extent easily and flexibly.

平文介绍了一个基于演译数据库(由PROLOG与INGRES组成的DDBMS)的自然语言开发环境(NLDE)。用户采用中间转换文法(ITG)就可将用户的需要描述成自然语言形式。DDBMS能从PROLOG数据库中存储的规则与INGRES数据库中存储的元组,为用户推理得出回答。例如,本文介绍了一个航空咨询系统(AAS)。它可用干查询航班、订票及其他一些服务。特别是:AAS还能帮助用户解决一些推理性的复杂问题。本文中的NDLE及AAS是在DUAL68000微机上实现的。籍助NDLE,用户可在他们感兴趣的别的领域,方便而容易地开发一个用自然语言处理的系统。

An adaptive routing algorithm called Local Address Information (LAI), which is suitable for the distributed optimal double loop local networks, is presented. Its rules and implementation procedures are discussed. With this small overhead algorithm, a packet can not only be sent along the shortest path to destination while there is no failure but also bypass failed nodes and/or links while there are failures. The availability and correctness of the algorithm have been verified by simulation.

本文提出了一种适用于分布式最佳双环局部网络的路由算法,文中称之为局部地址信息(LAI)算法.该算法具有分布适应式特点;它以局部地址信息为基本依据,开销小;在正常状态下,本路由算法能使信包经由最短路径抵达信宿,在故障状态下,它能使信包绕过故障节点或链路,准确寻径.文中着重描述了LAI路由算法规则,给出了实现本算法的过程,并对其有效性和正确性进行了模拟验证.

Open-EDI is a precondition for using EDI simultaneously in differentcountries and in different fields. It is also necessary for popularizing EDI among individuals.The third party network technology should be applied in order to generalize open-EDI.Thisarticle emphasizes on discussing the role and the rules of the third party networks. Whilesuggesting some models of the third party network design. the author also raises severalquestions which should be paid attention to.

开放式EDI是EDI应用跨国化、跨行业化、普及个人化的先决条件。为实施开放式EDI工程,应当运用第三方网络技术,本文重点探讨了第三方网络(软件)的作用,功能、应遵循的规则,并且提出了第三方网络设计的模型及应当注意的若干问题。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关规则的内容
在知识搜索中查有关规则的内容
在数字搜索中查有关规则的内容
在概念知识元中查有关规则的内容
在学术趋势中查有关规则的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社