演算常式 的英文怎麼說

中文拼音 [yǎnsuànchángshì]
演算常式 英文
algorithmic routine
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 演算 : perform mathematical calculations; calculation; calculus演算器 exerciser
  1. Gathering fuzzy technique and model - identifying technique to processing research, fuzzy model - identifying technique, a intersecting science, has been come out, which has become hoto in this thesis, based on deeply researching the fuzzy unit - identifying and complete analysis on data of measuring well of the chandqing wushenqi district, the method of constructing self - adapting multi - dimension non - liner subjection degree function has been created without precedento based on the extraction of routine measuring well character parameters, and for adopting self - adapting method to carry through character compression, the model has been improved the performance and enhanced the convergence speed and sorted precision of the algorithm o the relation of measuring well information and the oiliness & gassiness of sandstones is fuzzy ? in the thesis, the law of max subjection degree has been studied and improved, and proved preferable effect in the practical application

    論文在提取一些規測井特徵參數的基礎上,採用自適應方法對各變量多項進行優選,減少了特徵參數間的相關性,突出了類別間的差異性,從而優化了模的質量,提高了分類的精度。測井信息和砂體的儲集性之間的關系是帶有模糊性的,論文對模糊「最大隸屬原則」進行了研究和改進,並在實際應用中取得了較好的效果。論文成功研製了「自適應」的法和軟體? ?即通過對正確回判率的比較,然後對參數進行調節的辦法,可將模「訓練」到最佳狀態。
  2. Teiresias finds patterns in spam training mail set and normal e - mail training mail set respectively. mutual information is used to select useful patterns in spam patterns. all selected patterns are used to filter e - mails

    法同時發現出現于垃圾郵件集與正郵件集中的大量模,經互信息方法做特徵選擇后獲得有效的垃圾模來過濾郵件。
  3. Considering the characters of bp neural network, such as the simple structure, the advisable malleability, self - fitness, self - studying, nonlinear function approximating, the considerable abilities of parallel computing, fault - tolerant and so on, the bp algorithm have been extensively applied to the areas of system modeling, pattern recognition and seismic exploration since 1986. compared with other algorithms, as the above reasons, the bp algorithm has become the most usual and efficient solutions to the artificial neural networks

    由於人工神經網路中的bp神經網路結構簡單,可塑性強,具有良好的自適應、自學習、極強的非線性逼近、大規模并行處理和容錯能力等特點,自1986年rumelhart等人提出以來,被廣泛應用於系統建模、模識別、地震勘探等重要領域。而bp法數學意義明確,步驟分明,是神經網路中最為用、最有效、最活躍的一種方法。
  4. A experienced equation which is summarized by many experiments is used to determine the number of mesosphere nerve cell and a sort of new square - sum function of errors is adopted. its characteristic is that weight errors of possible exceptional point is less. accordingly, the effect of errors of possible exceptional point is reduced, which make actual function relation simulation easier

    本系統針對bp法的局限性,給出了一種優化的bp法,採用經過大量實驗總結出的經驗公來確定隱層神經元的個數,並選取了一種新的誤差平方和函數,該函數的特點是對一些可能的異點的誤差權值設計的較小,從而降低了異值誤差帶來的影響,便於模擬出真實的函數關系。
  5. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對法進行了擴展和改進,挖掘出了網路數據的關聯模和序列模;最後,研究了描述性模的應用,並設計出基於模匹配的入侵檢測引擎,該引擎具有誤用檢測和異檢測功能。
  6. The fitness formula is the most - used function in the genetic algorithm it will be invoked population size x generations times, so you should make it as simple and as fast as possible

    適應性公是遺傳法中最用的函數, (它將要被調用的次數是(人群大小) x (代的數目)次) ,所以您應當盡可能的使它簡單、快速。
  7. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管理現狀和數據挖掘技術的發展狀況,從數據清洗方法、數據挖掘法、數據倉庫的建立等方面論述了如何將數據挖掘技術與檔案工作相結合的具體思路,並提出了一個數據挖掘系統的設計思想。文章首先,針對檔案數據的現狀,提出了應對檔案數據進行預處理工作,包括數據質量評估、數據清理、數據變換和歸約等過程;其次,在具體實現數據挖掘過程中,本文結合檔案數據的特點探討了概念描述、關聯規則、分類等三種見挖掘形的實現方法,提出了具體的實現法和程序設計框圖,並論述了各種法在檔案工作中的應用范圍及前景;第三,在上述基礎上,又論述數據倉庫在檔案數據挖掘中的重要性並提出了實現一個檔案數據倉庫的方法;最後,從處理數據的多樣性、法的多樣性、挖掘結果的多樣性、數據預處理可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案數據挖掘系統的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的檔案工作實踐中為核心。
  8. At first, the paper confirms singular area by singular detection, then designs a series of low - pass filters that have different templates according to the different position in finger image for a local area, at last sets up gabor filter parameters according to the characteristics of fingerprint image. the improved enhancement algorithm has a better robust, and can preserve texture structure of singular area effectively. in binary noise clearance, the paper presents an algorithm that clears the biggish white speckles and black speckles

    在指紋圖像增強方面,本文針對傳統的基於gabor濾波器指紋圖像增強法魯棒性差以及通會改變奇異區紋理結構的缺點,對原有法進行了一些改進:首先通過檢測奇異點確定奇異區,然後根據局部區域在指紋圖像中的位置構建相應取值方的低通濾波器並對該局部區域方向圖進行濾波,最後根據指紋圖像紋線的特點對gabor濾波器參數進行設置。
  9. However, recurrent kaufman formula used to compute call blocking probabilities ( cbps ) of virtual paths in “ step algorithm ” is time - consuming

    然而,步進法中用來計虛路徑上的呼叫損失率的kaufman迭代公的耗時。
  10. As an example, the implementation of the laplace equation with the gridless method has been presented at first and the resulting large scale matrix equations are solved by gmres algorithm. the numerical simulations of the flows over a cylinder are tested successfully with clouds of different scales, which shows the " cloud " effects on the computational accuracy

    本文先以代表定不可壓位勢繞流的laplace方程為例,研究了laplace方程的無網格離散形,並運用gmres高效法對其快速求解,數值模擬了典型的圓柱繞流;並通過不同點雲尺度的數值模擬,顯示出點雲尺度對計精度的影響。
  11. For supporting multilevel embedding domains, linear table instead of multilevel table is used to make the implementing of information tables management ( such as symbol table and constant table management ) simple and effective. to fulfill the searching algorithm of symbol table and constant table, an assistant table is introduced to solve the problem caused by the use of hash algorithm

    在信息表管理方面,沒有採用多級的表組織方,而採用了線性的表組織方,簡單高效地實現了對作用域多層嵌套的支持;在表的查找法的實現中,通過輔助表的引入,解決了符號表和量表的順序填寫法與hash法中表項記錄的hash函數定位法之間的矛盾這一難點。
  12. Traditional power control algorithin is to use a convergent iteration fimtion to set up a mathematical model. when such method is used to control the power of user, we should find the optimum solution vector of the convergent iteration funhon by iteration transform

    在傳統的功率控制法,通採用某個迭代關系為其建立某一的數學模型,該迭代關系應滿足收斂特性。
  13. Neural network control is an important mode of intelligent control, and it is widely used in branches of control science, first, the architecture and the learning rule ( error back propagation algorithm ) of multiplayered neural network which is widely used in control system are presentedo especially, the paper refers to the architecture of diagonal recurrent neural network and its learning algorithm - - - - - recurrent prediction error algorithm because of its faster convergence with low computing costo next, before introducing the neural network control to the double close loop dc driver system, the controllers of current and velocity loop are designed using engineering design approach after analysis of the system, simulation models of the system are created

    神經網路控制是智能控制的重要方之一,它廣泛應用於自動控制學科各個領域。本文首先敘述了控制系統中用的多層前饋網路結構及法( bp法) ,特別提及了能夠較好描述系統動態性能的對角遞歸神經網路和在用遞推預報誤差法訓練drnn時取得了較快的收斂速度。其次,應用工程方法分析設計了tf - 1350糖分離機的電流、轉速雙閉環直流調速系統的控制器,作為引入神經網路控制的設計基礎,並建立了系統的模擬模型。
  14. Both common forms of cryptographic algorithms

    加密法的兩種見形
  15. Abstract : an algorithm is presented for better legal solution in detailed placement of large scale mixed macros and standard cells ic design. due to the limitation of computing complexity, an effective and efficient initial placement is very important for detailed placement. novelty of this algorithm lies in a better solution at initial stage by using network - flow method to satisfy row capacity constraint and the thought of linear placement problem ( lpp ) to resolve overlaps. moreover, divide - and - conquer strategy and other simplified methods are adopted to minimize complexity. experimental results show that the algorithm can get an average of 16 wire length improvement on paflo in reasonable cpu time

    文摘:以大規模混合模布局問題為背景,提出了有效的初始詳細布局法.在大規模混合模布局問題中,由於受到計復雜性的限制,有效的初始布局法顯得非重要.該法採用網路流方法來滿足行容量約束,採用線性布局策略解決單元重疊問題.同時,為解決大規模設計問題,整體上採用分治策略和簡化策略,有效地控制問題的規模,以時間開銷的少量增加換取線長的明顯改善.實驗結果表明該法能夠取得比較好的效果,平均比paflo法有16的線長改善,而cpu計時間只有少量增加
  16. Generally, the euclidean distance and k - means algorithm can be used to clustering the time series, but it is hard to separate the time series with great different variability well

    可採用歐距離及k均值法進行時間序列聚類,但經分析發現單憑此方法還難以實現不同變化趨勢的交通流時間序列的有效分離。
  17. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形描述了推理的法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  18. In order to effectively determine the position and distribution of porosities in laser welding sampes with complex structure, a preliminary research was proceeded on the distribtion features of porosities and a formula which can calculate the buried depth of porosities was deduced based on the line profile distribution curve of the flaw position

    為了確定復雜結構激光焊件焊縫中氣孔缺陷的位置和分佈,對氣孔缺陷的分佈特徵進行了研究,推導出氣孔缺陷埋藏深度的計,設計了峰值異缺陷和斜凹型異缺陷投影距離自動提取法,確定了缺陷在鈦合金激光焊件中的分佈特徵,並通過模擬試件的破壞性試驗對該公進行了驗證。
  19. Led digital multi - parameters instrument in motorcycle is a new digital instrument. it consists of a 4 - ch a / d converter, two microprocessors, a 2 - wire serial eeprom, an optocoupler, led displays and etc. there are two displays : an analog - display, a digital - display. all displays are under the control of the microprocessor

    摩托車用《新型數字儀表盤設計及關鍵技術研究》項目是一項非復雜的系統工程,通過設計及關鍵技術的研究需要解決: 1如何用最簡的法對車速和發動機轉速在滿足工程需要的精度下進行實時測量?
  20. The result shows that the solar radiation pressure moments play a mainly part. based on kalman filtering, three kinds of attitude determination algorithms were studied using the attitude sensor now available on the explorer : the first based on digital solar sensor ( dss ) and gyroscope when the star sensor is not available ; another based on dss, high - gain antenna ( hga ) and gyroscope when the explorer is in the earth - safe mode ; the third based on star sensor combined with gyroscope when the explorer is in the normal mode

    針對配置了典型測量敏感器的深空探測器,基於擴展kalman濾波給出了其姿態確定的方法:針對星敏感器不可用情形,給出了使用太陽敏感器和速率陀螺定姿的濾波器法;針對安全模下的對地穩定定向情形,給出了太陽敏感器和高增益天線融合速率陀螺信息的定姿法;針對正巡航模給出星敏感器和速率陀螺聯合定姿法。
分享友人