數據密度選擇 的英文怎麼說

中文拼音 [shǔxuǎnzhái]
數據密度選擇 英文
dds data density select
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • : Ⅰ動詞1. (挑選) select; choose; pick 2. (選舉) elect Ⅱ名詞(挑選出來編在一起的作品) selections; anthology
  • : 擇動詞(挑選) select; pick; choose
  • 數據 : data; record; information
  • 選擇 : select; choose; opt; election; choice; culling; alternative
  1. And understanding and studying the spectral features and variation rules of geo - targets in the experimental area, raising that it is the basis of geo - targets information collection with imaging spectrometer data to understand spectral features and variation rules of geo - targets, realizing that in a great extent spectral - integrated - form - based classification method can remove the phenomenon of " different spectrum with same objects " resulted from reflection ratio curve translation because of the angle change among sensor, targets and observation direction, and the average and variance images can be introduced to solve the problem of two kinds of geo - target with similar spectral forms and much different values of whole reflection ratio. it is suggested that " red edge " range bands of vegetation, which has close relationship with vegetation cover and biomass, is the main characteristic bands and important basis for careful vegetation classification and quantitative retrieval, and pixel - based derivative spectral analysis is very useful for removing the effects of soil background values and quantitatively retrieving vegetation biomass and cover. the remote sense quantitative retrieval model is developed for main appraisable factors of desertification monitoring assessment with imaging spectrometer data and then the applicability of model is analyzed

    研究結果如下:首先針對荒漠化地區的地物特徵,對高光譜不同波段的質量、波段組合進行了評價,提出了適用於荒漠化監測的基本波段集;初步了解和掌握了研究地區的地物光譜特性及變異規律,進一步明確了掌握地物光譜特徵和變異規律是用成像光譜儀提取地物信息的基礎;發現了基於光譜整體形狀的分類方法在很大程上能夠消除由於傳感器、地物目標觀測方向之間的角變化引起的反射率曲線整體平移的「同物異譜」現象,對于譜形相似而整體反射率的值相差較大的兩類地物,通過引入均值和方差圖像參與分類得到解決;研究還表明在植被「紅邊」范圍內的波段是進行荒漠化監測的主要特徵波段,這些波段與植被生物量和蓋都有切的關系,是開展精細植被分類研究和植被定量反演的重要基礎;像元的導光譜分析可以消除土壤背景的影響,是進行植被生物量和蓋定量反演的有力工具;建立了荒漠化監測主要評價因子的定量反演模型,並分析了模型的適用性。
  2. Nasdaq lays much emphasis on self - supervision with multi - level markets, where enterprises can, in accordance with their own conditions, choose to list on national ones or small ones. it lays down various quantity standards and uniform non - quantity standard and sets down precise information - publicizing system under the " three open " principle. hong kong gem is beginning the practice of self - supervision

    納斯達克市場強調自律監管,設立多層次市場,企業可以根自身的條件在全國市場或小型資本市場上市,規定了退市的不同的量標準和統一的非量標準,在「三公」原則的指導下制定了詳細周的信息披露制;香港創業板市場正在向自律監管過渡,設立單一市場,退市的量標準和非量標準缺乏彈性,強調信息披露有效、即時與充分。
  3. The paper puts forward the clustering algorithm includes : clustering based on grid and iterative, enhanced clustering algorithm base on density and k - medoids, enhanced k - means algorithm ( optimize chooseing consult _ points in iterative process ), enhanced clustering algorithm base on distance. they can overcome many limitations ( some traditional algorithms terminate in local optimization. many results of cluster are roundness, too many times in partition iterative process ), which are related to the static architecture of traditional model

    在傳統聚類演算法的基礎上,結合我們科學挖掘的應用對象?分子動力學,提出了迭代網格聚類演算法, k -平均和基於結合的聚類演算法,迭代過程中優化中心點的k -平均方法,以及改進型的基於距離的聚類演算法等模式識別方法,能夠解決傳統演算法帶來的諸多問題(比如一些傳統的聚類演算法常常收斂于局部最優,發現都模式都趨近於球形,劃分方法中迭代次過多帶來的效率問題) 。
  4. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色dc系是魯棒性非常好的參,因而dc系作為水印信息載體,同時,採用可變的步長部分系,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根用戶輸入的id號和碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  5. The most commonly applied assay parameters accuracy, precision, detection limit, specificity, selectivity, calibration linearity or nonlinearity, stability, recovery, reproducibility and repeatability are carefully defined along with some recommendations required for assessing data acceptability arrived at the conference on analytical methods validation

    美國分析方法認證會議曾推薦用分析參(準確,精,檢測限,專屬性、性、校準線性或非線性、穩定性、回收率、重演性與重覆性)作為判斷實驗的可采納性。
  6. The choice of laser output window height is relation to many factors, such as pressure loading, thermal loading, yield stress, influence on wavefront, failure by fatigue. spherical windows can endure higher laser intensity. however, it brings some phaseshifts, which connect with laser windows parameters

    激光器輸出窗口厚取與壓力載荷、熱載荷、材料極限強、厚對波前的影響、材料疲勞等多種因素有關,由於球殼窗口能承受較高的功率,但窗口本身帶來相移,該相移大小與窗口參有關,根位相均方根值球殼窗口參
  7. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,採用與之相適應的基於b s體系架構、三層業務分佈、二層分佈的整體方案,實現業務與的分離,降低開發與應用過程的復雜和總體成本;對列車運行圖系統的信息進行分析,設計符合3nf規范的e - r關系模型,並著重研究處于分散式系統中的列車運行圖信息的訪問權限和安全問題,提出以視圖模式結合用戶識別權限審定實現權限劃分,以並發處理、容錯技術、恢復技術提高系統的安全性;在基於b s架構的系統整體方案基礎上,對當前多種傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、等技術手段提高系統的網路安全性能。
  8. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的庫訪問代理設計介紹了組件開發技術、庫訪問代理的組件標準庫訪問代理的組件框架設計;網路通信平臺設計和實現研究了網路通信平臺的工作原理、實現過程中使用的基本技術,論述了網路加傳輸關鍵技術,設計了網路通信平臺的程序結構;代理服務端設計和實現研究了代理服務端的工作原理,論述了庫流量控制和訪問優先級調緩沖及安全庫支持等關鍵技術,設計了代理服務端的程序結構;代理客戶端設計和實現研究了代理客戶端的工作原理,設計了代理客戶端的程序結構和組件介面。
  9. Ssl indiscriminately encrypts all data with the same key strength, which can be unnecessary or even undesirable for some applications

    Ssl不加地用同一鑰強所有,對某些應用程序而言,這是不必要甚至是不合要求的。
分享友人