表徵碼 的英文怎麼說

中文拼音 [biǎozhǐ]
表徵碼 英文
mask
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • : 名詞[音樂] (古代五音之一 相當于簡譜的「5」) a note of the ancient chinese five tone scale corre...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 表徵 : surface features; superficial characteristics; characterization表徵碼 mask; 表徵因數 characteriza...
  1. 3. characteristic points are established through projecting images of regular points to measured surface. space dimidiate coding method which is called rough match and correlation technology, centroid technology, corner detect technology which are called precise match are used to acquire characteristic points accurately

    將空間規則點圖案投射到被測物體面形成特點,然後利用空間二分編粗略獲得空間特點(稱為粗匹配) ,再利用自相關技術、質心技術和角點技術精確獲得空間特點的圖像坐標(稱謂細匹配) 。
  2. The serial number of furcated needle is composed of three sections including 11 digital codes : the first section ( 1 - 5 digits ) is the standard size of international general mode ; the second section of the 6th digital code is the location of bending helve ; in the third section, except letter h representing " hengxiang " brand, the other group of digits represent the characters different parts of pricker

    叉形針的編號由三部分共11位代組成:第一部分( 1 - 5位)是國際通用方式的標準尺寸;第二部分即第6位代示彎柄位置;第三部分除英文字母h代「恆翔」牌外,其餘一組數字示叉形針的各部特
  3. The disquisition includes choice of algorithm, accomplish of algorithm, collection of learning sample, parameter of net, shortcoming of bp algorithm, extraction and reduction form line etc. referring to shortcoming of traditional bp algorithm, a modified learning factor with adaptation is introduced. because of every different font has robust, the way based chain coded and knaggy feature is used. a bizarre sample feature database is constructed for speeding up modified bp learning and classification

    本文對人工神經網路理論進行了研究,探討了網路形式及演算法的選擇、演算法的實現、學習樣本的收集、網路參數選擇、 bp演算法缺陷、格線提取、還原、生成及字元識別、還原生成等問題,並針對bp演算法的缺陷提出了和實現了改進型bp演算法,使網路學習效率提高,對不同人的不同字型字體有較強的魯棒性,採用了基於鏈和凹凸分佈特的方法來抽取字元特
  4. The length of this phytase gene is1506bp interrupted once by an intron of 102bp in the 5 " part of the gene, this intron contains donor sequence - gtatgc, lariat sequence - gctgac and acceptor sequence - cag which are typically conserved sequence of the intron of fungal phytase gene. this gene encodes a peptide of 467amino acid residues with molecular weight of 51. 37kda, containing 13 potential n - glycosylation sites and a signal peptide sequence made up of 19 amino acid residues at n teminal of the peptide

    核苷酸序列分析明, pcr擴增產物中包含有完整的phya基因,該基因全長1506bp ,其中包含一段長102bp的內含子,該內含子具有真菌植酸酶基因內含子的特保守序列: donor序列? gtatgc , lariat序列? gctgac及acceptor序列? cag 。該基因編467個氨基酸,理論分子量為51 . 37kda ,其上有13個潛在的n -糖基化位點, n端19個氨基酸為信號肽序列,植酸酶活性位點序列( crvtfaqvlsrhgaryptdskgk )位於氨基酸序列的+ 71 + 93 。
  5. Visual representation ; associative code ; top - down information processing ; inferior temporal lobe and prefrontal lobe

    視覺聯想性編頂-底信息加工顳下回皮層和前額葉皮層
  6. Based on the clustering property of the basis function of sparse coding, a basis function initialization method using fuzzy c mean algorithm is proposed to help the energy function of sparse coding to converge to a better local minimum for recognition. experimental results show that the classification and the sparseness of the features are both improved

    經過模糊c均值聚類初始化后的基函數能夠讓稀疏編的能量函數收斂到一個更有利於識別的局部最小點,試驗結果明特的分類性和稀疏性都得到了提高。
  7. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特為代的生物識別技術與基於密體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  8. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密體制的優點及研究現狀;其次研究了橢圓曲線密體制的基本理論;第三,分析了橢圓曲線密的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密體制;第四,深入研究了特為2的有限域f _ 2m中的元素在多項式基和最優正規基示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基示下的乘法和乘法逆運算的性能,還對這兩種基示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密體制,包括ecdh , eces , ecdsa 。
  9. At first synthesized professional branch and graphical symbols of coal mine geology and survey, mainly including point, line, region and so on, and then classified and coded the geology and survey information entity by different professional layers and formed a classification and code system based on gis

    摘要綜合煤礦地質測量信息的專業特性及信息示的幾何特(主要包括點、線、面等) ,按專題圖層對煤礦地質測量的實體對象進行分類與編,形成了一套基於gis的煤礦地質測量信息分類編體系。
  10. The purpose of digital image compress coding is to token the image within the limit of bit, and to maintain the quality of renew image

    數字圖像壓縮編的目的就是要以盡可能少的比特數來圖像,同時又必須保持恢復圖像的質量。
  11. Some research on chinese character structure is done, and after some coding schemes of chinese character are summarized and trait of computer vision is considered, a new code - eight - shape code for chinese character is presented, which indicates chinese character structure trait and can be extracted automatically by computer from chinese character images

    對漢字的構成進行了研究,在總結多種漢字編方案優缺點的基礎上,結合計算機視覺的特點,提出一種漢字特的機器認知漢字八形編制方法。 4 )仿人漢字識別系統。
  12. Bottom - up processing and feature detecting theory based on strong electrophysiological evidences has played a dominant role in the visual research for long time. people know top - down processing just by common sense. knowledge or experience are recalled from memory by reactivation of their neural representations and affected visual processes. however recently, researches from human and monkey provide experimental evidences for top - down processing. first, mnemonic representation of visual objects and faces, located in the ventral processing stream of visual perception in monkey, provide the best evidences of how neuronal codes are created by neurons that have the special ability to link the representations of temporally associated stimuli ; second, experiments suggest that not only bottom - up signals from the retina but also top - down signals from the prefrontal cortex can trigger the retrieval of associative codes, which may serve as a neural basis both for the conscious recall and for the visual processes affected by top - down processing further studies will improve people s understanding of the causal relation of activation and behavior by use of combined fmri and electrophysiology or lesion studies

    聯想性編是通過學習由一些具有特殊功能的神經元建立的,這些神經元具有將時間性關聯刺激的聯系起來的能力。其次,不僅來自視網膜的底-頂信號,而且來自前額葉的頂底信號都能觸發聯想性編的提取,既可以作為有意識回憶的神經基礎,又是頂-底加工影響視覺過程的基礎。腦損傷病人研究具有高時間解析度的人類功能性核磁共振成像functional magnetic resonance imaging , fmri和猴fmri研究以及猴細胞電生理分析相結合,將進一步加強人們對視覺腦機制的全面理解。
  13. ( 1 ) for wireless physical layers, the efficiency function is defined to quantify the upper layer throughput per unit of wireless resources while maintaining a certain maximum remnant bit error rate subjected to a certain snr

    ( 1 )針對無線物理層,引入效率函數來在一定殘余誤率ber要求和一定通道信噪比snr情況下,上層應用正確傳輸的數據量和下層無線資源的關系。
  14. ( 2 ) aiming at the discrete structure of composite shells, this thesis proposes two integer coding method, then uses one of them to optimize composite shells

    ( 2 )針對復合材料層合殼的離散型優化特點,提出兩種整數型編方式來層合殼結構參數。
  15. Given the communication protocol, this paper presents a state machine model based on primary / secondary distributive multicomputer communication system program, analyzes the solving methods of five parameters to present the state machine, and discusses the basic trellis architecture of source codes

    摘要在約定通信協議的情況下,本文給出主從分散式多機通信系統程序的狀態機模型,分析狀態機的5個參量的求解方法,討論源代實現的基本框架結構。
  16. Review had been done on some encoding modes that affected the effective learning, which included intra - example features, such as the integration of diagrams and text, integration of aural and visual information and the integration of steps and subgoals, and inter - example features, such as multiple examples, variability of example and example - problem pairs ; ( 3 ) research on interaction between learner and the worked example suggested that self - explanations are an important learning activity during the study of worked examples, which were the dual processes of generating inferences and repairing mental models

    關于樣例的外部與學習的基本關系主要是從樣例內特、樣例間特兩個方面進行了分析,前者主要討論了樣例文本和圖解的整合、視聽信息的整合和步驟2樣例解題步驟的編對原理學習和遷移的影響目標結構整合在樣例學習中的重要性;後者主要分析了多重樣例、樣例的變異性、樣例問題的配對等對學習遷移的影響。
  17. Meanwhile, we also study the convergence behavior of iterative detection in different methods, which are the proposed average source entropy and the covariance matrix perturbation characterized by the variations of its dominant eigenvalue as well as the conventional approach based on the mutual information

    為了分析迭代譯的收斂特性,本文從不同角度出發,在研究了傳統的互信息方法的基礎上,本文首次提出並使用了平均信源熵和用協方差矩陣最大特其抖動這兩種方法,使迭代過程的收斂分析變得簡單方便。
  18. Allows users to easily update stable packages that contain information that quickly goes out of date. examples are a virus scanner s signatures list or a spam filter s pattern set. for more information and a list of mirrors, please see the archive s

    服務可以讓使用者輕易得進行stable的套件更新,因為某些套件,像是病毒掃瞄引擎所使用的特,或是垃圾郵件過濾器所使用的樣本資訊,往往很快得就過時了。
  19. The research in this article shows that the adaptive binarization filtering algorithm for gray character image is effective ; the thinning algorithm for chinese character images and the stroke - extraction algorithm can extract hen, su, pie, na four sorts stroke from chinese character images ; eight - shape code of chinese character can effectively indicates the trait of chinese character structure. the chinese character recognition system based on eight - shape code can effectively improve noise immunity and correct rate of the system

    本文研究明,灰度文本圖像二值化濾波演算法有效可行;漢字細化及筆畫提取演算法能夠提取出漢字中的橫豎撇捺四種筆畫;八形漢字識別能有效的漢字的本質特性;基於八形漢字識別的仿人漢字識別演算法能夠有效提高系統的抗干擾性和識別正確率。
  20. Usb tokens rather than typing in passwords to access a system, users can rely on tokens that can be plugged into usb ports, putting token codes directly into the user ' s computer

    萬用串列總線並非在密中打字存取一個系統,使用者能仰賴能被將萬用串列總線港口插電,進入使用者的計算機之內直接地放
分享友人