未識別 的英文怎麼說

中文拼音 [wèizhìbié]
未識別 英文
unidentification
  • : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. You should give as much information as possible about your location when making an emergency call. if you do not have a global positioning system device you can : identify the number of the nearest distance post on hiking trails

    致電求助時,你應盡量提供身處位置的資料;若你並無攜帶任何全球定位系統( gps )器材,而亦身處位置,則應提供以下資料:
  2. With the help of video detection and recognition methods, we can sample real - timely traffic messages, such as traffic flow, road situation and so on, and get the relative information so as to avoid traffic jam before it happens, on the other hand, to real - time traffic breach detection, video detection and recognition methods is also very effective, especially, it can provide strong evidence for traffic policemen

    通過視頻圖象的檢測與,可以對道路的交通流、路況等實時監視,提取交通流信息(車流量、車道佔有率、車速等) ,在交通擁擠發生時,及時採取措施、疏導交通、防止交通擁擠發生;另一方面,通過視頻圖象的檢測與,還可以實時檢測交通違章現象、違章車輛的車牌號碼,為公安交通管理部門提供強有力的執法證據。
  3. In character recognition, the distance between the undistorted surface of a document and a specified part of a printed character

    在字元中,文卷變形表面與列印字元的指定部分之間的距離。
  4. They can then use predications of future volume levels to identify high - cost and low - cost actions

    然後他們便可以使用來產量水平的論斷來高成本和低成本的行為。
  5. The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory dete ctors. so it takes the advantages of anomaly detection and misuse detection, overcomes the natural shortcoming of them and can identify known intrusion and novel intrusion in computer systems

    它同時兼備了異常檢測法和誤用檢測法的優點,克服了兩者固有的缺陷,因此可以任何已知或知的本地主機上的異常行為模式和網路系統中的異常通信模式。
  6. Classification is to predict the class label of unknown data with supervisor obtained from experiential data, which is a basic problem in pattern recognitionx machine learning and statistics, as well as in data mining

    分類即通過由經驗數據訓練得到的分類器預測知數據的歸屬,是模式、機器學習、統計分析等領域的一個基本問題,也是一種最常見的數據挖掘任務。
  7. That is the task of handwritten character recognition. but the problem is too large and difficult to be solved all

    手寫體漢字的是尚攻克的難題,相關的資料有限,在短期內試圖完全解決這一難題是不大可能的。
  8. 2. nonlinear source term identification problem about a quasilinear parabolic heat equation is investigated. for the given function determined, the existence and the uniqueness of the solution of the state equation are proved and the dependence of the solution of the state equation on the identification parameter is discussed ; then the identifiability is verified ; through choosing suitable basic functions, the above identification problem can be transformed into a constant coefficients identification problem ; and an practical iterative algorithm for solving the identification problem is presented, the feasibility and validity of the algorithm is verified by the numerical experiments

    2 、研究一擬線性拋物型熱傳導方程非線性知源項的問題;對于給定函數,論證了狀態方程解的存在惟一性、方程解與函數的依賴關系和可性;通過選取適當的基函數,把對非線性源項的轉化成常系數問題;給出了實現非線性源項的迭代演算法,通過數值實驗證明了演算法的有效性。
  9. Intrusion - detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion

    入侵探測系統是用來探測計算機系統網路上不尋常的活動,以出此活動是不友好的或者經授權的,以便能夠對此入侵作出響應。
  10. The segments are called as isochores. so far identification of isochore boundaries is still not solved satisfactorily by bioinformatics methods

    真核生物基因組的isochore邊界是生物信息學尚很好解決的問題之一。
  11. National identification and classification and their development in lao

    寮國的民族與劃分及其來發展
  12. The government s foresight programme which sets an agenda for future action on science is working out new strategies in flood and coastal defence, exploiting the electromagnetic spectrum ; in cyber - trust and crime prevention, in addiction and drugs, the detection and identification of infectious disease, tackling obesity, sustainable management of energy and mental well - being

    政府的前瞻計劃為科技制定了來的行動議程。該計劃要制定出有關應對洪水和海岸防護、開發利用電磁頻譜、線上安全機制及犯罪預防、成癮與毒品、傳染性疾病的檢測與、解決肥胖問題、可持續能源管理以及心理健康的新戰略
  13. But the research of theory concerning object of civil action is relatively in the condition of delay in our country, such as the question of implication 、 function 、 recognition standard of object of civil action has not widely and fully been discussed

    而在我國,民事訴訟標的理論的研究則處于相對滯后的狀態,諸如訴訟標的的含義、功能與標準等問題均展開廣泛而充分的探討。
  14. By means of the measuring the natural frequencies of a beam on a elastic foundation together with the transfer matrix method and the computer algebraic language , the paper deduces the high - order equation , which contains unknown quantity of the stiffiness of supports. this method , the validity of which has feen verified by experiments , can be applied to identifying the foundation coefficient

    本文通過實測彈性地基梁的固有頻率,以傳遞矩陣法為基礎,利用計算機代數語言,導出以支承剛度為知數的高次方程,從而出地基系數,並通過實驗驗證該方法的正確性。
  15. Eds watch the computer and network traffic for intrusive and suspicious activities, they not only detect the intrusion from the extranet hacker, but also the intranet users

    他對計算機和網路資源上的惡意使用行為進行和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的授權活動。
  16. Idss watch the computer and network traffic for intrusive and suspicious activities. they not only detect the intrusion from the extranet hacker, but also the intranet users

    它對計算機和網路資源上的惡意使用行為進行和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的授權活動。
  17. Dealing with faces illumination variation based on dynamic directional gradient vector flow snake and gamma algorithm a new dynamic directional gradient vector flow snake ddgvf snake algorithm was presented which can detect the image shadow and highlight contours of the unknown face images. according to the given standard face database, the image gray median could be c.

    使用一種動態方向梯度矢量流snake ddgvf snake演算法來檢測知圖像的陰影和高光區域,根據已知的標準人臉圖像庫中圖像的灰度分佈,計算出灰度中值,然後採用加權非線性gamma灰度矯正演算法來歸一化待圖像的光照變化,使之與已知的標準庫中的圖像灰度一致。
  18. The significance of the research about the unidentified ethnic groups in yunnan

    雲南未識別群體研究的族群理論意義
  19. Used when the type option sent by the server was not recognized by the client

    當客戶端未識別由服務器發送的類型選項時使用。
  20. If an element of the list is not recognized as a valid table header cell an

    如果列表的某個元素未識別為有效的表標題單元格,則在調用
分享友人