概率識別 的英文怎麼說

中文拼音 [gàizhìbié]
概率識別 英文
probabilistic identification
  • : Ⅰ名詞1 (大略) general outline 2 (神氣) manner of carrying and conducting oneself; deportment ...
  • : 率名詞(比值) rate; ratio; proportion
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 概率 : [數學] probability; chance概率論 probability theory; theory of chances; 概率曲線 probability curv...
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. Following the research route of mend with study and development with creation, give the definition of risk and the methods of risk identifying, divide the risk attitude into risk loving, risk neutralism and risk avoiding, point out the importance of enhancing the risk consciousness for lightning hazard, and summarize the mechanisms of lightning hazard the theories and methods of risk assessment for lightning hazard. provide a set of risk assessment parameters for lightning hazard, which includes lightning times n, hazard probability p, hazard loss d, hazard risk r and protection efficiency e, and give the definition, decisive factor, value method and value scope of each parameter. establish a risk assessment model for lightning hazard which includes lightning hazard base module, lightning hazard probability module, lightning hazard loss module, lightning hazard accepted risk module, lightning protection cost module, correcting coefficient module, lightning hazard risk module, and lightning protection class and efficiency module

    遵循借鑒改造和發展創新的研究思路,給出了風險的定義和風險的方法,將風險態度分為風險喜好型、風險中庸型和風險逃避型,指出了提高雷電災害風險意的重要性,總結了雷電災害的作用機制和雷電災害風險評估的理論與方法;提供了包括雷擊次數n 、雷災p 、雷災損失d 、雷災風險r和雷電防護級與防護效e等5類基本參數的雷電災害風險評估參數體系,並給出了各個參數的定義、參數的決定因素和取值方法以及取值范圍;設計了包括雷電災害基礎模塊、雷電災害評估模塊、雷電災害損失評估模塊、雷電災害允許風險評估模塊、雷電防護成本評估模塊、校正系數模塊、雷電災害風險評估模塊、雷電防護級與效分析模塊等8個模塊的雷電災害風險評估模型,評估模型以iec61662的評估模型為基本參考,以雷災損失d為中心,把雷災風險劃分為經濟雷災風險r _ e和人身雷災風險r _ l ,並對r _ e和r _ l分開單獨處理。
  2. Then the thesis presents a probabilistic viterbi algorithm to segment address block and gets the character. finally, after independent chinese characters are recognized and fitted with address database, we get the address. in this way, automatic recognition of envelope ' s address is realized

    對得到的地址塊提出了一種利用型viterbi演算法進行字元切分的方法,最後將切分好的單個字元進行,並與地址數據庫進行匹配,從而得到地址,進而實現了信封地址的自動
  3. Turbo codes represent the new code structures, which consist of pccc ( parallel serially convolutional code ) and sccc ( serially concatenated convolutional code ). in this paper, the background of turbo codes are firstly introduced, which includes the base principle of error correction code 、 block code and convolutional code ; the principle of turbo code and the iterative decoding is secondly expanded ; the key decoding algorithm : a revised map algorithm and iterative decoding theory are detailed ; then, a new turbo code structure : hccc ( hybrid concatenated convolutional code ) is presented, and the capacity of this code method is analyzed, the average capacity upper bound is derived ; at last, this code is simulated on awgn ( additive white gaussian noise ) channel and rayleigh fading channel

    本文首先介紹了turbo碼的背景知,包括差錯控制的基本原理、分組碼和卷積碼;然後闡述了turbo碼的基本原理,包括turbo編譯碼器結構及迭代譯碼原理;較為詳細地描述了關鍵的譯碼演算法: ?種改進的最大后驗( map )譯碼演算法及迭代譯碼演算法;提出了一種新的turbo碼結構:混合turbo碼(混合級聯卷積碼) ;並用編碼性能聯合界分析方法對混合turbo碼進行了性能分析,得出了其平均性能上界;並在高斯白噪聲通道和瑞利衰落通道上分作了一些應用研究及計算機模擬實驗。
  4. The d - s rule of the information fusion of rockmass mechanical parameters is presented. meanwhile, the basic probability assignments, belief functions, plausibility functions, and similar probability functions are given. this method is applied to an example of analysis and selection for rockmass mechanical parameters of the rock engineering, and the satisfactory results are obtained

    構造了巖體力學參數的框架,建立了巖體力學參數的基本可信度分配的應用模型,定義了巖體力學參數的信度函數、似真度函數、以及類函數,提出了巖體力學參數的d - s信息融合法則,明確了巖體力學參數d - s信息融合方武漢理工大學博士學位論文法的實施步驟。
  5. After analyzing the character of risk, i introduce data mining method into risk management, to solve the contradiction between great capacity of data and lack of information, the methods include mathematics statistics and artificial neural network ( ann ). then, i study on the methods of risk management in risk identification, risk evaluation and risk disposal, what is advanced, fault tree analysis method based on fuzzy probability, stochastic simulation method and the topsis method based on interval number all consider the characteristic of risk. finally, i discussed the application of information system ( mis ) in project risk management, and developed a risk management information system

    論文在深入分析了風險特徵之後,將數據挖掘技術引入風險管理,用以解決海量數據與貧乏信息之間的矛盾,所採用的技術有數理統計和人工神經網路( ann )兩種方法;接著,論文對風險、風險評價、風險處理中的風險管理方法進行了研究,所提出的基於模糊的故障樹技術、隨機模擬技術和基於區間數的topsis方法都體現了風險管理的特點;最後,論文對信息系統( mis )在工程項目風險管理中的應用進行了探討,開發出一個風險管理信息系統。
  6. Secondly, we use the hmm neural network to recognize on - line handwritten character

    神經網路用於聯機手寫字元的
  7. But the results have shown that the hmm neural network can work successfully on the recognition of handwritten characters

    但是我們的試驗結果表明,神經網路可以成功的用於聯機手寫字元的問題。
  8. Compared with the general radar, the harmonic radar can provide more imformation when it is used to detect the nonlinear scattering target, and therefore improvers the radar resolution

    與一般雷達探測技術相比,諧波雷達在探測非線性散射體時能提供更多的信息,提高了
  9. About the applications of cognitive map : line feature detection and form based on fuzzy cognitive map, basic shapes recognition based on fuzzy cognitive map, object recognition based on probabilistic fuzzy cognitive map, a new method of image understanding based on cognitive map and robot high - level planning based on fuzzy cognitive map have been realized in this dissertation

    對于認知圖在圖像分析及理解中的應用:本文在認知圖理論研究的基礎上,把認知圖應用到圖像分析與圖像理解中。實現了一種基於模糊認知圖的線特徵檢測與形成方法、基於模糊認知圖的基本形狀方法、基於模糊認知圖的目標方法及基於認知圖的圖像理解方法,並將圖像理解與認知圖應用到機器人的高層規劃系統中。
  10. This dissertation is the expanding of the military project of ‘ 95 ’ advance research, a novel multi - modulation technique designing radar signal waveform is introduced on the links with the project of the national natural science fundation of china ( nsfc ), named " produce and process the multi - modulation signal of the sensor with strong detectability and identifiability ". based on the analysis of the equal - probability - distributing fsk / psk multi - modulation signal, we construct a new pseudo - random fsk / psk multi - modulation signal and we design and simulink on the computer the partly - matched processing signal of this signal. the purpose of the design is to construct a processing signal to combine with the pseudo - random fsk / psk multi - modulation signal, so that we could get a strong response of the target

    本論文是『九五』軍事預研項目「低截獲雷達波形研究」的擴展與深入,同時結合國家自然科學基金項目「強探測強傳感器新型復合調制信號產生及處理」展開。在分析等分佈的fsk / psk復合調制信號的基礎上,構造了一種新的偽隨機fsk / psk復合調制信號及其非完全匹配處理的設計及模擬。設計的目的是能對偽隨機fsk / psk復合調制信號進行處理的處理信號,以期獲得對所探測目標信息的強探測。
  11. A method of recognizing color grain image based on maximum probability

    基於最大和色彩信息的物粒圖像
  12. Firstly, for the errors of text ’ character and word, utilizing neighborship of character or word, check character and word errors by character string co - occurrence probability. secondly, for the errors of syntax of text, according to statistic and analysis of a large - scale contemporary chinese corpus, recognize the predicate focus word and the others sentence ingredient, check the syntax errors. thirdly, for the errors of text ’ semanteme, establishing semantic dependency relationship tree based on hownet knowledge, presents a method that based on semantic dependency relationship analysis to compute sentence similarity, check the semantic errors

    對于文本字詞錯誤的檢查,本文主要利用了字詞二元接續關系,根據同現檢查文本字詞錯誤;對于文本語法錯誤的檢查,本文利用教研室已有的一個大規模語料庫,通過對語料庫進行統計分析,獲得語法查錯所需要的語言規律和知,利用謂語中心詞和其他句子成分的方法,檢查文本語法結構上的錯誤;對于文本語義錯誤的檢查,本文主要利用知網知得到語義依存樹,通過對句子的有效搭配對的相似度計算檢查語義錯誤。
  13. Thirdly, comprehensive attribute method and risk coefficient are used to comprehensively evaluate the risk of the three sites so as to identify key risk factors and evluate the whole risk probability. fourthly, optimal scheme is selected via comparing schemes of the three plant sites through using investment model based on maximum shannon rule. lastly, measures to monitor and control risk consisting in this project are analyzed

    在對該項目三個備選廠址的風險的基礎上,利用極大熵準則對各廠址存在的風險進行估計,得出各風險發生的,然後利用綜合屬性度法和風險系數對各廠址存在的風險進行綜合評價,找出了關鍵風險,並得到了該項目的整體風險水平,進而通過基於極大熵準則的大型工程投資決策模型對該項目的廠址選擇方案進行決策,選出了最優方案,最後,分析了該項目中存在的風險的應對監控措施。
  14. It can be used in sea - route measurement, terrain mapping, underwater archeology, salvage and oil industry etc. it is useful to improve mine ' s identify probability, too

    它可用於航道測量、地形地貌測繪、水下考古、打撈和石油工業等。此外對于提高水雷的也有益處。
  15. The first hypothesis is true according to the pd of 1 - year and pds of each quarterly in one year before special treatment and the second hypothesis also is true in three quarterlies before a corporation is specially treated. default probability of a specially treated corporation is high and tends to increase as time near the exposure date. 2. kmv model has a capacity of discriminating the bad borrowers from good borrowers. 3. volatility of market value of asset is determinant of default probability

    本文得出的主要結論有: (一)假設一在特處理前一年及各個季度內成立,假設二在特處理前三個季度內成立,我國資本市場中的特處理公司具有較高的違約且隨著時間向特處理實施日期逼近違約增加; (二) kmv模型具有較強的對違約債務人的力; (三)影響違約的主要因素是公司資產價值波動
  16. In order to identify the dependent relationship between words based on statistics efficiently and accurately, this paper has rectified part of the shortcomings of present algorithms by making the best of the distribution characteristic between words, distinguishing the collocation, coordinate and affiliation relationship between words, identifying them respectively by different strategies, presenting a new module of matching between strings and a new module of dependent intensity between words, constructing the tree of dependent relationship, pruning the constructed tree of dependent relationship and identifying some latent dependent relationship

    摘要本文擴展和改進了現有的詞語間依存關系定量演算法,充分考慮詞項分佈的影響;明確區分詞項之間的搭配關系、並列關系和從屬關系,針對它們不同的特點,提出不同的演算法;提出字串匹配模型;充分考慮兩個詞項之間相互位置的離散分佈和距離的影響、以及它們的分佈特性,提出詞項間的依存強度模型,並據此構建詞語間依存關系樹;提出更新策略,對已經建好的依存關系樹進行裁剪,並挖掘出潛在的依存關系。
  17. Based on the above theories, two softwares were developed for continuously shot input images and random shot input images. the softwares are with the ability of recognizing true and false objects, estimating the pose of the true objects and calculating the recognition probability of both true object and false object in the input image sequence

    基於以上原理,開發了針對連續拍攝的待圖像序列和隨機拍攝的圖像序列的應用程序,實現了旋轉畸變不變和對真目標旋轉姿態的估計以及待圖像序列中為真目標和假目標的的計算。
  18. Structural damage localization using probabilistic neural network

    神經網路進行結構損傷位置
  19. Again, a simple supported beam with stochastic mass density is used as an example. its statistics ( the mean value and the variance ) are calculated and compared with the theoretical values to verify the correctness of the used formulas. eventually this becomes the theoretical basis of the probability damage identification of the bridges

    3 .對于簡支梁橋,用該方法進行損傷,無論何種情況,結果都比較理想:對于有損傷單元,其單元損傷達到98 %以上;對于無損傷單元,其單元損傷一般都小於10 % ,可以認定,這些單元發生損傷的情況為小事件,即不發生損傷。
  20. Over the years the concept has been greatly miniaturized, landing rfid technology in such settings as animal tags, toll - collection devices, passports, keyless entry systems for cars and wireless credit cards

    經過了這么多年,這種念已經大大地微縮化了,將無線頻技術用作動物身份標簽,計費設備,護照,無鑰匙汽車開門系統,無線信用卡。
分享友人