| 1. | New development of sensor technique in metal ions detection 传感器技术在金属检测中的新发展 |
| 2. | Multiple ion detection mid 多离子检测 |
| 3. | Preparation of steel substrates before application of paints and related products - tests for the assessment of surface cleanliness - part 5 : measurement of chloride on surfaces prepared for painting ion detection tube method 涂覆涂料前钢材表面处理表面清洁度的评定试验第5部分:涂覆涂料前钢材表面的氯化物测定 |
| 4. | Preparation of steel substrates before application of paints and related products - tests for the assessment of surface cleanliness - measurement of chloride on steel surfaces prepared for painting ion detection tube method 涂装油漆和有关产品前钢材的预处理.表面清洁度的评定试验.涂装前钢材表面上氯化物的测定 |
| 5. | Preparation of steel substrates before application of paints and related products - tests for the assessment of surface cleanliness - part 5 : measurement of chloride on steel surfaces prepared for painting ion detection tube method 涂装油漆和有关产品前钢材预处理.表面清洁度的评定试验.第5部分:涂装前钢材表面上氯化物测定 |
| 6. | Ion detection technique has been successfully used in the study of rydberg states of na2 by pulse optical - optical double resonance . high - lying rydberg states near ionization limit have been observed and high sensitive and high gain spectra have been obtained . this technique is very useful for molecular spectroscopy 本文首次实现了钠分子体系中离子探测脉冲激光光谱,研究了钠分子电离限附近的高里德堡态,获得了高灵敏度和高增益的光谱,拓宽了分子光谱研究领域。 |
| 7. | The application may be a . helpful and innovational experiment . to each module and technology in the honeynet , for instance , data controlling , data analysis , data capture , virtual machine , intr is ion detection technique and secure communication technology , carry on detailed research and realize , provide intrision decetion source code . through this research about honeynet application in distributed denial of service , it have stated strong vitality on solve the new and old problem existing in network security 研究了将人工智能思想引入到蜜网中的可行性?对人工神经网络中的经典算法bp算法在蜜网数据检测和分析中的实际应用进行了详细的剖析,进行了实现;可以认为是将人工智能思想引入到蜜网中的一次有益的和创新的尝试;对蜜网中的各个模块和技术,如数据控制、数据分析、数据捕获、虚拟机、入侵检测技术和安全通信openssh技术等,进行了详细的研究和实现,给出了入侵检测部分功能的源码。 |