说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 弱紧k网络
1)  weak-compact k-networks
弱紧k网络
1.
In this paper,a space with a closed image of a locally compact metric space is obtained if and only if it is a Frchet space with a point-countable weak-compact k-network,it is a new characterization of closed images with locally compact metric spaces by means of weak-compact k-networks.
借助弱紧k网络,获得了局部紧度量空间闭映象内部特征一个新的刻画,即空间X是局部紧度量空间的闭映象当且仅当X是具有点可数的弱紧k网络的Fr chet空间。
2)  k-networks
k网络
1.
In this paper,a space with a closed image of a locally compact metric space is obtained if and only if it is a Frchet space with a point-countable weak-compact k-network,it is a new characterization of closed images with locally compact metric spaces by means of weak-compact k-networks.
借助弱紧k网络,获得了局部紧度量空间闭映象内部特征一个新的刻画,即空间X是局部紧度量空间的闭映象当且仅当X是具有点可数的弱紧k网络的Fr chet空间。
3)  A K network
A-K网络
4)  RP(k) network
RP(k)网络
5)  K neural network
K型网络
1.
Compared with other local connection neural networks, K neural network is proved to have more advantages than others.
最后将K型网络应用到函数逼近以及建模上,通过与其他局部连接网络的性能对比验证K型网络所具有的优越性。
6)  network vulnerability
网络弱点
1.
In some case, single network vulnerability may be safe, or in some single act does not constitute a threat, but in the complex network connection, the attackers can make use of network-related vulnerabilities to exploit, and gradually improve their own power, and ultimately achieve the purpose of controlling objectives the machine or service.
网络弱点评估技术能够检测网络系统潜在的安全弱点,评估网络系统的安全状况,因此,深入分析和研究网络弱点评估对保障计算机系统与网络安全具有重要意义。
2.
The model collects the network vulnerability, analyzes the vulnerability relation, references network configuration and topology, simulates the produce of the exploitation state change, builds exploit graph, analyzes the key exploit queue and constructs assessment of network vulnerability, which provides a useful evidence and guidance for making risk decision.
提出一种基于渗透图的网络弱点评估模型(EG_NVM),从网络弱点采集、弱点关联分析出发,参考网络环境配置与拓扑结构、模拟渗透状态改变的过程,构建渗透图,通过对关键渗透序列的量化分析进行网络弱点评估。
3.
The method identifies the correlation graphs to be integrated through alert relativity, and reasons out missing alerts by analyzing network vulnerability and exploit.
该方法根据报警相关度确定可组合的关联图,利用网络弱点和攻击关系推出漏报警,使得分裂的关联图能够组合起来,进而重建完整的攻击场景。
补充资料:胎紧浸入和套紧浸入


胎紧浸入和套紧浸入
tight and taut immersions

矍数) 图3 犷鳖{ 图4 称空间A CB的嵌人在Z:同调中为单射的(in-Jeetive),如果对于i)0,诱导同态万.(注,22)~H.(B,22)是单的.令HC=R“是R“中带有超平面边界aH的半空间.例如, H=H:(t)={x“R“:z’(x)簇r}.如果f是一个胎紧浸人,h:是一个非退化的高度函数,那么由Morse理论得到f一’(万:(r))C=M在22同调中是单的.于是由连续性,对任一半空间H这种单性都成立.对于闭流形的光滑浸人,这种半空间性质等价于胎紧性.然而,这种半空间定义也能应用于更大范围的从流形和其他紧拓扑空间到RN中的连续浸人或甚至是映射中去.一个例子是胎紧的“瑞士干酪”,它是一个带边的嵌人曲面,见图5.一个到R中的胎紧映射也称为一个完满函数(详rfect丘inction).公 图5今 图6 对于曲线和闭曲面,半空间性质可导出对任一半空间H,f一’(H)是连通的.它等价于R功ehoff两片性质(R朔chofft场。一pieee pro详rty),即R“中的任一超平面日H将M至多分割成两个连通的片,见图3和图4中的胎紧曲面和图2中的非胎紧曲线. 半空间定义将胎紧性置于经典几何学和凸性理论之中.由于胎紧性在RN中的任意将凸包才(f(M))映到RN内的射影变换下是不变的,因此胎紧性是一个射影性质(见射影几何学(projeetive罗。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条