Chinese translation for "proof theory"
|
- 证蜜
证明论
Related Translations:
- Example Sentences:
| 1. | The subsumption and request of problem is formalized by xdd and the problem is evaluated by means of proof theory 将证明论方法引入到xml中,建立了基于xml的证明论。 | | 2. | Applying the methods of gray system synthesize evaluation and proof theories , got the outburst dangerous grade samples 在此基础上,提出了危险信度的概念,用以衡量突出矿井危险程度,编制了神经网络,并对其进行训练。 | | 3. | The author anticipate future of constitutionlism building in china and proof theory of constitution chang , recruitment and explanation . at the same time 预测了我国宪政建设的趋势,论述了现行宪法应修改、补充的内容及解释原理。 | | 4. | A clause is formalized as a relational algebra expression and evaluated by employment of relational algebra operations . 3 . the proof theory based on xml is presented 提出了利用关系代数运算实现xml查询子句求值的方法,并证明了该方法的正确性。 | | 5. | Based on the characteristics of measurement safety inspection system for railway freight transportation under the condition of electrification and informationization , the essay the nessity to apply lightning proof by modern proof theory , and introduces the integrated lighting proof technology 摘要针对电气化、信息化条件下铁路货运计量安全检测系统的特点,利用现代防雷理论分析对其进行雷电防护的必要性,并对其综合防雷技术进行了相应介绍。 | | 6. | The ids works by two way , misuse detection and anomaly detection , misuse detection flags an intrusion on intrusion signature , this kind of detecting technic can be realized much more easily , and much more accurate , but it can not find some intrusiones that have been disguised or new kinds of intrusion . the anomaly detection can detect in more wide field , anomaly detection can compare new statistic data with average record , then anomaly record will be found , but it ' s more difficult to set a threshold , if the threshold is too big , some intrusion may be put through , if the threshold is too small , the ids will give more false positive alarm , and the threshold will be different with different people or different period , so the ids just simply show us their suspicious record , the administrator or expert will be in duty to analyze this record and give conclusion , the ids give more alarm than it should , leave us more detection record to analyze , and this is a hard work , we can not distinguish an intrusion or not if we analyze only one record , but we can judge if we find the relation among mass detection evidence . in this article , we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work , the ids will be more helpful and efficient 滥用检测采用的是特征检测的方法,实现较为简单,判断的准确性较高,但是不能判断一些经过伪装的入侵或特征库中尚未包含的入侵,异常检测能够根据以往记录的特征平均值,判断出异常情况,但是对于异常到什么程度才视为入侵,这个阀值非常难以确定,阀值设定的太高,有可能漏过真正的入侵,如果设定的阀值太低,又会产生较高的误警率,而且这个阀值因人而异,因时而异,因此现在的入侵检测系统把这部分异常记录以一定的形式显示出来或通知管理人员,交给管理人员去判断,而这些ids系统难以判断的记录,如果对每个证据单独地进行观察,可能是难以判断是否是入侵,而把许多先后证据关联起来,专家或管理人员根据经验能够判断访问的合法性,本文试图引入人工智能中证据理论的推理策略和示例学习方法,代替人工检查分析,可以提高效率,降低误警率,并可以对一个正在进行得可疑访问实现实时检测,通过搜索及时判断,及时阻断非法访问,比事后得人工处理更有意义。 |
- Similar Words:
- "proof technique" Chinese translation, "proof test" Chinese translation, "proof test for accommodation ladder" Chinese translation, "proof test for shicargo handling gear" Chinese translation, "proof test value" Chinese translation, "proof timber" Chinese translation, "proof to cracking" Chinese translation, "proof to the contrary" Chinese translation, "proof total" Chinese translation, "proof tree" Chinese translation
|
|
|