法魯基 的英文怎麼說

中文拼音 []
法魯基 英文
farooqi
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ名1 (山東的別稱) another name for shandong province2 (姓氏) a surname Ⅱ形容詞1 (遲鈍; 笨) ...
  • 魯基 : ruki
  1. Improving anil jain ' s algorithm, we propose a minutiae match algorithm. our improvement is focused on the following two aspects : first, we use a minutiae alignment algorithm based on the iteration of the neighbor minutia centered at the minutia gravity. secondly, we use a modifiable bounding - box to carry out minutiae matching, which makes our algorithm more robust to the non - linear transform of the fingerprint images

    我們的改進主要體現在二個方面:首先我們利用了一種「於重心附近遍歷的特徵點對齊演算」 ,該方不需要記錄特徵點的多餘信息來進行特徵點的對齊;其次,我們利用一個可變大小的「界限盒」來進行特徵點的匹配,使得我們的匹配演算對指紋圖像的非線性形變具有更好的棒性。
  2. In the next place, by studying the change of the resonant frequency of the whole system, this paper designs the circuit to track the resonant frequency of the system by cd4046 mainly. at the same time, in order to improve the efficiency and get better dynamic capability of the converter, we choose pll and fuzzy control after comparing the pll circuit, fuzzy circuit and pll ? fuzzy control circuit. in the end, this paper brings forward the control blue print to realize the drive control circuit of the high frequency converter, using the dsp chip as the key part to realize four routes of pwm drive pulses with dead band of the control system

    其次,通過對整個系統諧振頻率變化的分析和研究,設計了以鎖相環cd4046為核心的鎖相環控制電路,同時,在綜合比較鎖相環控制、模糊控制以及模糊控制和鎖相環復合控制三種控制演算礎上,進行了系統模擬,得出採用復合控制可使跟蹤電路既具有鎖相環路較好的穩態性能,又擁有模糊控制較好的動態性能,系統棒性能好,同時也提高了逆變器的效率。
  3. Launched into earth ' s orbit by an ariane - 5 booster rocket from kourou, french guiana, in september 2003, smart - 1 used its ion engine to slowly raise its orbit over 14 months until the moon ' s gravity grabbed it

    2003年9月, 「智能1號」探測器從國蓋亞那地區的庫地由ariane五號火箭發射升空,在其離子引擎的推進下, 「智能1號」緩慢脫離運行軌道,在14個月後進入月球重力場。
  4. At first, the paper confirms singular area by singular detection, then designs a series of low - pass filters that have different templates according to the different position in finger image for a local area, at last sets up gabor filter parameters according to the characteristics of fingerprint image. the improved enhancement algorithm has a better robust, and can preserve texture structure of singular area effectively. in binary noise clearance, the paper presents an algorithm that clears the biggish white speckles and black speckles

    在指紋圖像增強方面,本文針對傳統的於gabor濾波器指紋圖像增強演算棒性差以及通常會改變奇異區紋理結構的缺點,對原有演算進行了一些改進:首先通過檢測奇異點確定奇異區,然後根據局部區域在指紋圖像中的位置構建相應取值方式的低通濾波器並對該局部區域方向圖進行濾波,最後根據指紋圖像紋線的特點對gabor濾波器參數進行設置。
  5. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的於奇異值分解的數字水印演算並且對該方的理論礎給出分析.實驗結果表明這種方要比目前提出的流行演算
  6. Then we make a deep research on human visual system and wavelet transformation, and a new wavelet watermarking method based on hvs is proposed to solve the conflict between robustness and imperceptibility

    在此礎上,論文又將人眼視覺系統和小波變換結合在一起,提出了一種於hvs的小波水印演算,人眼視覺模型的應用緩解了演算棒性和不可見性間的矛盾。
  7. Ujfalusi brings down kily on the left wing and inter win a free kick. miha whips the ball into the viola box. . cambiasso makes contact but his shot is wide

    烏伊西在左翼放倒利,又是一個自由球,米哈將球開入對方禁區,坎比亞索搶到了點,但他的射門偏了。
  8. Experimental results show that after reducing the dependency of features, sa method works better. the most three important features of the license plate regions are obtained in the experiment and our algorithm is robust in filtering out false plate regions. in the module of binarization of license plate, based on algorithm of casda ( cluster algorithm based on spatial distribution analysis ) an improved quick binarization algorithm i - casda are proposed to get rid of the influence of the illumination

    運用本演算對復雜背景的車輛牌照進行檢測,實驗結果表明,於簡單平均融合運算元的檢測演算得到的檢測率高, 80 . 36 (訓練樣本)和76 . 54 (測試樣本) ,平均檢測速度為每幅圖象0 . 81秒,滿足實時性要求;區域寬高比、區域密度和區域寬度比率是車牌區域最重要的三個特徵;本演算棒性好,可較好地排除相似紋理區域(如廣告牌等)的干擾。
  9. Artificial feature landmark is first leaded into vision computation in this paper. our approach is to extract marker points and to use correlation to find an initial set of matches, then use relaxation, robust recover epipolar geometry and reprojection to discard false matches in this set and find more matches

    首次將人工圖標引入視覺計算,通過提取人工特徵點,採用灰度相關進行初始匹配,再利用鬆弛棒估計礎矩陣恢復極線約束和結構再投影剔除錯誤匹配點、尋找更多匹配對。
  10. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算礎上,著重研究了代數方編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供棒的傳送和重構方,是dos攻擊過程中的反向追蹤問題的一種新的解決方; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;於源的ddos防禦方作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  11. Secondly, image enhancement technique based on linear filtering is adopted. a new image segmentation method by means of automatic multilevel threshold is given, which realizes partial multilevel threshold segmentation based on image region partition of gray - level position projection, removes the influence of uneven illuminance or uneven gray - level distribution on goal recognition, and resolves the problem of error segmentation caused by threshold step between adjacent regions by threshold transition. the method has well robustness

    在圖像處理時,採用於線性濾波的圖像增強方,並提出了一種新的自動多閾值圖像分割方,該方於灰度位置投影的圖像分區實現局部多閾值分割,克服了不均勻照明或不均勻灰度分佈對目標識別的影響,同時,通過閾值過渡很好地解決了相鄰區域閾值「階躍」引起的錯誤分割問題,具有很好的棒性。
  12. Both methods provide good performance, and the latter is better since it can give a better describing of the residual distribution of matches. in the study of camera self - calibration, firstly, based on discussion of using and the selecting of scene constraints, two new robust vanishing point estimation algorithms are presented. one is based on peransac, and the other is based on clustering

    在相機自定標技術的研究中,首先,在討論利用和選擇景物約束的礎上,提出兩個新的消失點估計演算:於peransac的估計演算於聚類分析的估計演算,後者在估計精度上優於前者;其次,提出了綜合利用空間平行線約束和相機主點位置約束的線性迭代自定標方,提高了相機自定標的棒性。
  13. Pakistani prime minister zafarullah jamali said dialogue between pakistan and india is needed by the people of both countries

    斯坦總理扎拉?賈邁利指出印巴兩國和平對話是兩國人民的共同意願
  14. Genetic algorithm is a kind of stochastic whole - searching regression algorithm, which is built on natural selection and molecule genetic mechanism, as a kind of universal algorithm to optimize the problems of complicated system, it is widely used in many fields due to its suppleness, universality, well self - fitness, robustness and fitness for collateral process, as a kind of bionic algorithms, the research on ga ' s application keeps far ahead of its theoretic research

    遺傳演算是藉助生物界自然選擇和遺傳學機理而建立的一種迭代全局優化隨機搜索演算,是一種求解復雜系統優化問題的通用框架。它不依賴于問題的具體領域,具有簡單、通用、較強的自適應性和棒性,以及適于并行處理等顯著特點,因此被廣泛應用於眾多領域。作為一種仿生演算,遺傳演算的應用研究遠遠領先於演算礎理論研究。
  15. The current control approaches are based on frequency domain methods such as pid control which assumes linear time invariant system dynamics. the advantages of these approaches are simplicity and ease of stability and robustness analysis. however, the decrease in performanc e and poor efficiency translates to additional payload and cannot meet the demand of current spacecraft control

    當前飛行器主要的控制方於近似時不變線性系統的頻域分析(如pid控制) ,這種方的優點是簡單且易於穩定性和棒性分析,但它所達到的低性能和低效率卻轉化成了飛行器控制過程的附加載荷,還遠不夠滿足當前飛行器控制的要求。
  16. Level set is a strong robust algorithm about curves ’ evolution by taking the evolving curves as level set in the higher dimensions, utilizing the computing approach based on hyperbolic conversation law, and applying the similarity between of curves evolution and hamiton - jacobi equations

    Levelset方本數學思想是將當前正在演化的曲線看作是一個更高維函數的水平集,借用雙曲守恆定律的計算方,利用曲線演化與hamilton - jacobi方程的相似性,給出了一種曲線演化的強棒性的計算方
  17. Based upon the deficiencies of the back propagation algorithm in the practical application, after some mechanisms effecting the network training and the other performances are analyzed when training samples with disturbance are employed in training, in this paper, through combining the chief thoughts of the classical bp algorithm and the robust statistic technique, improving the optimal algorithm of the bp algorithm, a new algorithm with high robustness - robust adaptive bp algorithm is proposed, and also make a good effect when integrated this new algorithm with the dynamical bp network to predict the stock price

    本文從本bp演算在應用中存在的不足出發,著重分析了訓練樣本中所含噪聲對本bp演算在網路訓練過程中產生的不良影響,並以此為依據,採用棒統計技術,同時在優化演算上做了一些有益的改進,提出一種新的具有較強抗干擾能力的bp演算? ?棒自適應bp演算,並將其應用於動態bp網路,進行股票價格的預測,取得了較好的預測效果。
  18. At the basis of analyzing different boundary tracking algorithms, boundary point estimate algorithm based on angle and boundary point searching algorithm based on circumferential neighborhood extending were advanced to avoid tracking trap and to improve the robust of the boundary tracking algorithm

    通過分析不同演算的特點,提出了於已知點夾角的邊界點預估計演算於圓弧鄰域擴展的邊界點搜索演算,以避免跟蹤進入搜索陷阱,提高邊界跟蹤對邊界變化的棒性。
  19. The embedded bw also successfully survives cropping, filtering, noise and multi - watermarking etc. the new ideas the thesis proposed are : first, frequency - based watermarking idea using toral automorphisms is really a novel one, although, in the literature, there are some waterniarking schemes using toral autpmorphisms, all of which are based on space ; second, some improvements of the quantization function contribute to the algorithm ' s performances to some degree

    另外該演算對圖象裁剪、濾波、噪聲和多重水印處理等都具有較強的棒性。本文提出了兩個新思想:第一,雖然現有文獻已經提出了利用環形自同構映射的數字水印處理演算,但這種演算於空域的,而利用環形自同構映射於頻域的水印處理演算,目前文獻上未見報道。
  20. Hollywood actress nicole kidman and husband keith urban are eager to spend more time with nicole ' s kids from her first marriage to tom cruise. the oscar winner and her kiwi born husband hardly get to spend time with isabella and connor, the two children kidman and cruise adopted while they were married and who now stay with cruise and his current wife katie holmes

    這位奧斯卡影后和她的紐西蘭籍丈夫幾乎沒德曼和克斯結婚時收養的兩個孩子-伊莎貝拉和康諾在一起,這兩個孩子現在與克斯和他現任的妻子凱蒂赫爾墨斯一起生活。
分享友人