助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   异常点检测 的翻译结果: 查询用时:0.024秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
更多类别查询

图标索引 历史查询
 

异常点检测
相关语句
  outlier detection
     Class Outlier Detection Algorithm and Application in IDS Model
     分类异常点检测算法及在IDS模型中的应用
短句来源
     Outlier Detection is an important research issue in Data Mining,the number of cells in the cell-based disk algorithm increases exponentially.
     异常点检测是数据挖掘的一个重要研究方向,基于Cell的异常点检测算法生成的Cell(单元)数与维数成指数增长.
短句来源
  “异常点检测”译为未确定词的双语例句
     The Research of Algorithm of Attribute-Based Detection of Outlier Data
     一种基于属性的异常点检测算法
短句来源
     Application of Project Pursuit in Hyperspectral Anomaly Detection
     投影追踪方法在高光谱图像异常点检测中的应用
短句来源
     In this paper, a new method of hyperspectral anomaly detection based on project pursuit is presented.
     该文提出了一种基于投影追踪的高光谱图像异常点检测方法.
短句来源
     At the same time, project pursuit approach can extract target information efficiently and improve the effect of anomaly detection.
     同时,投影追踪方法能有效的提取目标参数,进一步提高了异常点检测的效果.
短句来源
     The experimental results show that the performance of the CD-Tree based and cluster-based disk algorithms are outperformed that of the cell-based disk algorithm,and the number of dimensions processed by the proposed algorithms is higher than that of the old one.
     实验表明,采用CD-Tree以及聚簇技术设计的异常点检测磁盘算法的效率,以及所能处理的数据集维数较原基于Cell的磁盘算法都有显著的提高.
短句来源
更多       
  相似匹配句对
     A Review and Analysis of Outlier Detection Algorithms
     异常检测算法分析
短句来源
     The Research of Algorithm of Attribute-Based Detection of Outlier Data
     一种基于属性的异常检测算法
短句来源
     Crowd abnormality surveillance
     群体异常检测(英文)
短句来源
     Research on DIM Point Target Detection
     弱小目标的检测
短句来源
     Class Outlier Detection Algorithm and Application in IDS Model
     分类异常检测算法及在IDS模型中的应用
短句来源
查询“异常点检测”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  outlier detection
For the purposes of capturing accurate subspace information, an additional outlier detection process is presented to identify the possible local outliers of subspace clusters, and is embedded between the E-step and M-step of the algorithm.
      
Outlier Detection Algorithms in Data Mining Systems
      
The paper discusses outlier detection algorithms used in data mining systems.
      
Constructing three-dimension space graph for outlier detection algorithms in data mining
      
Outlier detection has very important applied value in data mining literature.
      
更多          


A fingerprint classification algorithm which can work in poor quality of fingerprint image is presented. It is based on position of core and delta points and their related position relationship as well as their constructed oriented information.The feature of invariability of rotating and displacing between two fingerprint images is still kept on. Experiment results indicate that this algorithm is of excellent feature,which is to meet real requirement.

针对大型指纹数据库中的匹配难点 ,基于异常点检测及其相互位置关系和结构化方向信息 ,提出了一种针对指纹图像质量较差环境下的分类算法。实验结果表明 ,该算法具有良好的特性 ,满足实用要求

With the tremendous growth of the Internet, information security has become an serious issue of global concern. As the attacking technology has been replacing all the time, to develop effective intrusion detection methods becomes much more urgent in order to assure computer and information security. Since most attacks and abuses could be recognized through the examination of system audit log files and pattern analysis therein, an approach to intrusion detection could be built on their basis. Based on the analysis...

With the tremendous growth of the Internet, information security has become an serious issue of global concern. As the attacking technology has been replacing all the time, to develop effective intrusion detection methods becomes much more urgent in order to assure computer and information security. Since most attacks and abuses could be recognized through the examination of system audit log files and pattern analysis therein, an approach to intrusion detection could be built on their basis. Based on the analysis of attack and abuse patterns in log files in depth, a model using support vector machine for anomaly detection is proposed. First, one-class support vector machine (SVM) is improved to be a model adapting the intrusion detection. Second, the model is trained by abstract data to determine various parameters. Experimental results show that it is an effective approach.

计算机网络尤其是互联网的迅速发展与普及 ,使得信息安全已经成为一个全球瞩目的重要研究课题。随着攻击技术的不断进步与更新 ,迫切需要一种有效的入侵检测技术来保护信息系统的安全。由于几乎所有的攻击与滥用都被记录在系统的网络数据中 ,因而可以基于计算机系统的网络数据构造入侵检测系统。在对网络数据进行深刻的分析和研究的基础上 ,提出了入侵检测的 1类支持向量机模型。第一 ,构造适于异常点检测的1类支持向量机模型 ;第二利用抽象化的网络数据对该模型进行训练以确定其中各个参数的值。实验表明 ,该方法是行之有效的

In this paper, a new method of hyperspectral anomaly detection based on project pursuit is presented. The Generalized Likelihood Ratio Test(GLRT) is used to establish a binary hypotheses detector and estimates the unknown parameters that represent the background in the detector from the image. Target information, the key parameter, is got by using project pursuit approach to search anomaly information. The algorithm reduces the dependence of pre-information, enhances the arithmetic practicability. At the same...

In this paper, a new method of hyperspectral anomaly detection based on project pursuit is presented. The Generalized Likelihood Ratio Test(GLRT) is used to establish a binary hypotheses detector and estimates the unknown parameters that represent the background in the detector from the image. Target information, the key parameter, is got by using project pursuit approach to search anomaly information. The algorithm reduces the dependence of pre-information, enhances the arithmetic practicability. At the same time, project pursuit approach can extract target information efficiently and improve the effect of anomaly detection.

该文提出了一种基于投影追踪的高光谱图像异常点检测方法.它通过广义似然比检验(GLRT)模型构建二元检测算子,并利用观测数据估计出算子中代表背景的未知参数,而算子的关键参数——目标参数是通过投影追踪算法搜索异常点得到的.此算法消除了传统的基于多元统计模型的目标检测方法对先验信息的依赖。增强了算法的实用性.同时,投影追踪方法能有效的提取目标参数,进一步提高了异常点检测的效果.

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关异常点检测的内容
在知识搜索中查有关异常点检测的内容
在数字搜索中查有关异常点检测的内容
在概念知识元中查有关异常点检测的内容
在学术趋势中查有关异常点检测的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社