亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        提高網(wǎng)絡(luò)安全,科學(xué)家在努力

        2023-03-20 02:16:46重慶
        瘋狂英語·新悅讀 2023年2期
        關(guān)鍵詞:中作點石成金省略

        重慶 龔 勇

        主題語境:科技與信息 篇幅:314詞 建議用時:7分鐘

        1Network-based technologyhasbecome increasingly widespread,and it is now being used by countless individuals,professionals,and businesses worldwide.Despite the technology's advantages,most network-based systems are highly weak to malicious attacks.The consequences of a malicious attack on network-based systems can be extremely severe and devastating.For instance,an attack on a power utility network could leave millions of individuals and offices without electricity,while attacks on social media networks can lead to the disclosure of user information.

        2To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion(入侵)detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.In recent years,machine learning(ML)algorithms(算法)have been found to be particularly promising for automatically detecting attacks and intrusions on a network's functioning.

        3A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.Ideally,by analyzing large datasets,researchers should be able to identify the most suitable features for solving a given task using ML tools,and this is also applicable to intrusion detection.

        4Researchers at Canadian University Dubai in the UAE have recently developed a new feature selection method that could enable the development of more effective ML-based IDSs.This method,presented in a paper pre-published on arXiv,was found to perform remarkably well when compared with other commonly employed feature selection techniques.“Our goal is to study feature selection in network traffic data with the aim of detecting potential attacks,”Firuz Kamalov,Sherif Moussa,Rita Zgheib and Omar Mashaal,the researchers who carried out the study,wrote in their paper.“We consider various existing feature selection methods and propose a new feature selection algorithm to identify the most effective features in network traffic data.”

        Reading

        Check

        1.What's the function of the two examples mentioned in paragraph 1?

        A.To present the power of network-based systems.

        B.To show the weaknesses of network-based systems.

        C.To explain the variety of malicious attacks.

        D.To illustrate the serious results of malicious attacks.

        2.How do IDSs improve a network's safety?

        A.By preventing malicious attacks.

        B.By recognizing malicious attacks.

        C.By imitating malicious attacks.

        D.By devastating malicious attacks.

        3.What's the key to the development of ML-based IDSs?

        A.The settlement of tasks.

        B.The analysis of datasets.

        C.The prediction of the model.

        D.The choosing of data features.

        Language

        Study

        Ⅰ.Useful expressions

        for instance例如;比如

        rely on依靠;依賴

        be able to do能夠做……

        compare with與……相比較

        Ⅱ.Difficult sentences

        1.To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點,世界各地的計算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測系統(tǒng),這類系統(tǒng)可以幫助識別惡意攻擊,提高網(wǎng)絡(luò)的安全性。

        【點石成金】該句的主干為computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs);that could help to identify...safety為that引導(dǎo)的定語從句,修飾先行詞intrusion detection systems,且關(guān)系代詞that在從句中作主語;To overcome...systems為不定式結(jié)構(gòu)作目的狀語。

        2.A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.基于機(jī)器學(xué)習(xí)的入侵檢測系統(tǒng)開發(fā)和訓(xùn)練的關(guān)鍵步驟是選擇模型在進(jìn)行預(yù)測時可以依賴或關(guān)注的數(shù)據(jù)特征。

        【點石成金】該句的主干為A key step is the selection of data features;in the development and training of ML-based IDSs為介詞結(jié)構(gòu)作后置定語,修飾A key step;that a model can rely...focus on為that引導(dǎo)的定語從句,修飾先行詞data features,且關(guān)系代詞that在從句中作賓語;when making predictions為when引導(dǎo)的時間狀語從句的省略形式,省略了主語a model和be動詞is。

        猜你喜歡
        中作點石成金省略
        Of Human Bondage(Excerpt)
        鍥而不舍 點石成金
        偏旁省略異體字研究
        點石成金
        寶藏(2018年1期)2018-01-31 02:05:09
        2017年,“點石成金”攻略
        寶藏(2017年2期)2017-03-20 13:17:00
        分析高考試題,辨別what與that
        分析高考試題,辨別what與 that
        中間的省略
        詩選刊(2015年6期)2015-10-26 09:47:13
        點石成金
        省略
        詩歌月刊(2009年4期)2009-05-22 03:38:04
        日产精品一区二区三区免费| 久久er99热精品一区二区| 精品国产精品久久一区免费式| 亚洲人成影院在线高清| 一区二区三区一片黄理论片| 中文有码无码人妻在线| 亚洲国产激情一区二区三区| 婷婷激情六月| 99久久精品人妻一区二区三区| 国产精品女同久久久久电影院| 韩国19禁无遮挡啪啪无码网站| 日本道免费精品一区二区| 亚洲国产一区二区视频| 精品人妻大屁股白浆无码| 醉酒后少妇被疯狂内射视频| 亚洲AV无码一区二区水蜜桃| 亚洲男人的天堂av一区| 日本高清视频永久网站www | 98色花堂国产精品首页| 白色橄榄树在线阅读免费| 天堂一区二区三区在线观看视频| 午夜精品久久久久久| 精品午夜一区二区三区久久| 中文字幕在线亚洲精品一区| 日本一区二区三区免费播放| 草莓视频成人| 成人黄网站免费永久在线观看 | 日本做受120秒免费视频| 5级做人爱c视版免费视频| 亚洲精品国产av一区二区| 2020国产在视频线自在拍| 久久亚洲精品11p| 成人日韩av不卡在线观看| 亚洲精品一区二区网站| 乱子伦在线观看| 亚洲国产精品国自产电影| av有码在线一区二区三区| 亚洲人精品午夜射精日韩| 少妇邻居内射在线| 青青草视频原手机在线观看| 国产青青草在线观看视频|