人工检查 meaning in Chinese
visual check
Examples
- Each rotor core is visually inspected for complete filling of the die - cast end rings and fan blades
每个转子芯都经过人工检查是否完整配置压铸轴承挡圈和风机叶片。 - This system gets original information by image sensor , which avoids direct contact with objects being processed and manual inspection . so this system can meet the requirement that industrial parts should be inspected on - line
本系统采用图像传感器摄取原始信息,避免了与对象的直接接触和人工检查,所以更符合工业生产在线检查的要求。 - With a combined method of real - time monitoring , routine monitoring as well as manual inspection , the general framework of the bhms for donghai bridge is designed and the methods for constituting and realizing each subsystem of the bhms are discussed in details
以实时监测、定期监测及人工检查相结合的方法,设计了桥梁结构健康监测系统的总体架构,时各子系统的构成及实现方法进行了较为详细的论述。 - The ids works by two way , misuse detection and anomaly detection , misuse detection flags an intrusion on intrusion signature , this kind of detecting technic can be realized much more easily , and much more accurate , but it can not find some intrusiones that have been disguised or new kinds of intrusion . the anomaly detection can detect in more wide field , anomaly detection can compare new statistic data with average record , then anomaly record will be found , but it ' s more difficult to set a threshold , if the threshold is too big , some intrusion may be put through , if the threshold is too small , the ids will give more false positive alarm , and the threshold will be different with different people or different period , so the ids just simply show us their suspicious record , the administrator or expert will be in duty to analyze this record and give conclusion , the ids give more alarm than it should , leave us more detection record to analyze , and this is a hard work , we can not distinguish an intrusion or not if we analyze only one record , but we can judge if we find the relation among mass detection evidence . in this article , we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work , the ids will be more helpful and efficient
滥用检测采用的是特征检测的方法,实现较为简单,判断的准确性较高,但是不能判断一些经过伪装的入侵或特征库中尚未包含的入侵,异常检测能够根据以往记录的特征平均值,判断出异常情况,但是对于异常到什么程度才视为入侵,这个阀值非常难以确定,阀值设定的太高,有可能漏过真正的入侵,如果设定的阀值太低,又会产生较高的误警率,而且这个阀值因人而异,因时而异,因此现在的入侵检测系统把这部分异常记录以一定的形式显示出来或通知管理人员,交给管理人员去判断,而这些ids系统难以判断的记录,如果对每个证据单独地进行观察,可能是难以判断是否是入侵,而把许多先后证据关联起来,专家或管理人员根据经验能够判断访问的合法性,本文试图引入人工智能中证据理论的推理策略和示例学习方法,代替人工检查分析,可以提高效率,降低误警率,并可以对一个正在进行得可疑访问实现实时检测,通过搜索及时判断,及时阻断非法访问,比事后得人工处理更有意义。 - Although the software specification described using natural language is easy to write and understand , its validity , integrality , non - ambiguity , consistency are hard to guarantee . the process of verification can only be done by manpower which is not normative and not rigorous . and the complexity of a lot of software has made it impossible to check the specifications artificially
需求规格说明是需求分析阶段的产品,我们通常采用的是未使用任何限制非形式化的自然语言进行描述,这种自然语言书写的需求说明,虽然易于理解和使用,但难以保证其正确性、完整性、无二义性、一致性,验证过程只能采用不太规范、不太严格的人工走查的方法进行检查,稍微复杂一些软件的需求规格说明的检查,实际上已经超出了人工检查的能力。