數據增強 的英文怎麼說

中文拼音 [shǔzēngqiáng]
數據增強 英文
data enhancement
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 強形容詞(強硬不屈;固執) stubborn; unyielding
  • 數據 : data; record; information
  1. Further more, this thesis presents an improved distribution loss calculation method with few labors of data collection increased, which eliminates the traditional methods " assumptive preconditions. thus, the correctness and practicability is improved

    提出用改進平均電流法計算配電網線損,該方法在不收集工作量的前提下去除傳統假定條件,實現配電網線損計算,提高了準確度,了實用性。
  2. The document image segmentation is very useful for printing, faxing and such data processing. in this paper, an algorithm is developed for segmenting and classifying document image. feature used for classification is based on the histogram distribution pattern of different image classes

    通過對文檔圖像中不同類型直方圖差異的研究,首次提出了一種利用小波域子圖像來原始文檔圖像,從而對文檔圖像進行有效分割的演算法。
  3. We believe that along with internet business is in the chinese fast development, the local entrepreneur strengthen with mass network in people consciousness gradually, will have more business enterprises pass jinzhou consociation data technology development limited company this network takes together the world connects with each other, thering will be the excellent product in more races pass this bridge heads for the world

    我們相信,隨著網際網路事業在中國的快速發展,國內的企業家和人民群眾的網路意識的逐步,將會有更多的企業通過錦州聯合科技發展有限公司這條網路紐帶同世界相連,會有更多的民族優秀產品通過這座橋梁走向世界。
  4. At the same time analysis and design the components of the system using uml. according to the data integrity for the copartner, give the xml - based data integrity architecture

    對于企業集成與交互,給出了基於xml的集成服務,作為為開發平臺的服務的
  5. 19 henry d s, kuszmaul b c, loh g h, sami r. circuits for wide - window superscalar processors. in proc. the 27th annual int

    針對具有相同路徑的標準多發處理器而言, momr的多發處理器提供了更多的加速比。
  6. The paper establishes a ecological transect, with a length of 90 km and width of 16 km, utilizing the part of tm data on 16th august 1998, from harbin to the natural secondary forests in maoershan, heilongjiang province. with supervised classification, the tm data which had been corrected and enhanced via erdas, combining the data of gps in the field, was classified by seven types including : residential area, glebe, paddy field

    本論文利用1998年8月16日的tm衛星的一部分,設置從黑龍江省哈爾濱市到帽兒山天然次生林區,長90km ,寬16km的生態研究樣帶。通過用erdas對衛星的校正、圖像等處理,結合gps野外實地調查,進行有監督分類。共分為7種類型:居民點、旱田、水田、河流、灌叢、闊葉林、針葉林,並建立了衛星影像分類解譯標志。
  7. The model reproduced the following facts of wa97 experimental data : the yield of strange particles increases with increasing mass and increasing centrality of the colliding system, and also with increasing strangeness content of hyperons in relativis - tic nucleus - nucleus collisions. the simulation of strangeness production using luc1ae model shows that strangeness production is related not only to the rescattering. but also to the collective interaction among strings in relativistic nucleus - nucleus collisions

    Luciae模型能很好地描寫wa97發表的單奇異和多奇異重子的產額和橫質量分佈的實驗,能較好描寫wa97實驗所揭示的相對論性核-核碰撞中奇異粒子產額隨碰撞體系質量、中心度的大而加和奇異粒子隨奇異粒子所含奇異夸克加而的實驗事實。
  8. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型庫中某種特殊屬性對象來存儲,以庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  9. After analysis of tm / etm + data ' s advantage over the forest change detection, tasseled cap transformation, principal component analysis and normalized difference vegetation index were chosen to enhance the vegetation spectral information. expert classification system was adopted to extract the main tree species in the littoral shelter forest

    在分析etm +在森林資源監測中的優勢的基礎上,通過纓帽變換、主成分分析和植被指植被光譜信息,結合專家分類系統對沿海防護林主要樹種進行提取。
  10. In recent years, mobile - phone reading has become a new way of reading style which has become a fashion in south korea and japan for young people. according to morganstanley, by the year 2008, the benefit of wireless market would be over 40, 000, 000, 000 dollars. however, wireless mobile - phone reading it ' s still a virgin land in china wireless mobile - phone reading books are different from the general wireless application. compared with the traditional wireless application, the wireless mobile - phone reading is facing with more difficulties causing by the different types of cellphones. one reading program can not suit all the cell phones. therefore, the present reading programs are just designed for some specific mobile phone brands

    隨著無線通信技術的不斷發展,手機作為最為普遍的無線終端設備早已在我們生活充當重要的角色。最新的研究分析指出,在無線應用方面,關注焦點之一是如何在目前的無線網路情況下構架一個具備可擴展性、穩定性、終端自動匹配的無線值平臺。本文探討了如何構架一個可擴展以及終端自動匹配的無線值平臺,填補了目前國內技術空白。
  11. In this paper, we make the study on mathematical methods using in some problems of valuing intangible assets, which increase the applicability of mathematical methods in valuing intangible assets, make the mathematical methods integrated with the theoretics of valuing intangible assets well. this study can give the people some working gist and boost up veracity and the valuation of intangible assets

    本文對無形資產的幾個方面進行了學方法應用研究,將學方法與無形資產評估理論緊密結合,提高了學方法在無形資產評估中的適用性,為評估實踐提供一定的依了無形資產評估值的準確性和公允性。
  12. Concepts and constructs of metadata - fortified aop

    數據增強的aop的概念和結構
  13. In a metadata - fortified aop implementation, you map core concerns to classes just as you have all along

    在通過元數據增強的aop實現中,就像平時做的那樣,可以將核心關注點映射到類。
  14. Data enhancement resynchronizes this data

    數據增強將重新同步這些
  15. Is metadata - fortified aop optional, or is it necessary

    數據增強的aop是可選的還是必需的?
  16. Pointcut syntax differs in the various metadata - fortified aop systems

    切入點語法在不同的元數據增強的aop系統中是不同的。
  17. I ll conclude with a practical example, evolving a design through five stages using metadata - fortified aop

    最後是一個實際的例子,將使用元數據增強的aop分五步完善一個設計。
  18. Next, i ll quickly review the basics of aop s join point model and explain where it would benefit from metadata fortification

    下一步,我將快速地回顧aop的連接點模型的基本內容,並說明它從元數據增強中可以獲得哪些好處。
  19. In the next section i ll quickly review the basics of aop s join point model, then explain where it could be beneficially fortified with metadata

    在下一節中,我將快速地回顧aop的連接點模型( join point model )的基本內容,然後說明是如何用元數據增強它。
  20. This paper carried through the detailed description and the discussion first to the new generation of operation strut system ngoss theory and its the system organization which proposed by telecommunication management forum tmf. and it unified the existing oss of chongqing tietong to carry on analysis, contrast and reorganization, then fully used the service process flows, public bus structure, public service data and the technical thought of ngoss module and so on. according the frame construction instruction of etom, carried on the analysis, the conformity and develop the useful and discard the useless on the foundation of the system in existence, constituted the new generation of operation support program tbss holistic frame and the system skeleton of tietong characteristic, conforming to the chongqing tietong actual situation, to guarantee the realization of enterprise strategic target according to tbss concentrated deployment and manages the key application system and the data gradually, insure realizing the complete sharing of information in the entire enterprise and the end - to - end process automation, broke thoroughly the information isolated island of the chimney

    本論文首先對新一代運營支撐系統( ngoss )的理論及其體系機構進行了詳細的探討,並且結合重慶鐵通現有運營支撐系統進行分析、對比、整理,接著充分利用ngoss體系架構和理論中的業務過程流、公共總線結構、公共業務以及ngoss組件等技術思想,根型電信運營圖etom的框架結構,在對已有系統的進行分析、整合和揚棄的基礎上,制定了具有鐵通特色、符合重慶鐵通實際情況的新一代運營支持系統tbss的整體框架和體系構架,以確保逐步根該體系架構集中部署和管理關鍵應用系統和,實現全企業信息的完全共享和端到端的過程自動化,徹底打破煙囪式垂直應用體系而造成的信息孤島,保證企業戰略目標的實現。
分享友人