表演本文 的英文怎麼說

中文拼音 [biǎoyǎnběnwén]
表演本文 英文
performance text
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • 表演 : 1 (演出) perform; act; play; acting 2 (作示範動作) demonstrate 3 (以觀賞或觀摩為目的的展示)...
  • 本文 : 1. (所指的這篇文章)this text, article, etc. 2. (原文)the main body of a book
  1. The calculation of the37 # transonic compressor rotor shows that the simulation results of the author ' s multi - grid scheme fit fairly well with those of professor denton j. d. ' s, however, the author ' s converging speed is faster

    與nasarotor37的計算結果對比明,多重網格算法的計算結果與dentonj . d .的計算結果十分接近,而在提高計算效率方面比dentonj . d的多重網格算法更加有效。
  2. In view of henan province ’ s typifying for the five provinces in central china in regard to rural industrial development, this paper chiefly examines the enterprise networks in three clusters in henan province, that is, the steel office furniture cluster in pangcun town, yanshi city, the steel measuring tape cluster in nanzhuang village, yucheng county and the hair products cluster in xuchang county, xuchang city, by means of the social network analysis ( sna ), transaction - cost analysis ( tca ) and space - time coupling approach. it explores the forms, process, evolution and performance of the networks among enterprises and other actors in clusters in rural areas of central china

    鑒于河南省鄉鎮企業發展在中部農區的代性,運用社會網路分析法、交易成分析法及時空耦合法,著重對河南省偃師市龐村鋼制傢具、虞城縣南莊村鋼捲尺和許昌縣發製品三個產業集群中的企業網路進行個案研究,從而探討中部農區產業集群中企業的結網形式和結網過程、企業網路的化機理以及它是如何提高企業和區域競爭力的。
  3. Very large data bases, brighton, england, 1987, pp. 507 - 518. 26 beckmann n, kriegel h - p, schneider r, seeger b. the r - tree : an efficient and robust access method for points and rectangles. in proc

    Iv在各種各樣的設置下利用合成的與真實的數據進行大量的實驗評估實驗結果提出的算法在效率和擴展性上均大大勝過其它同類算法。
  4. This paper analysis the data mining of the single nd multiple streams time series, and draw a conclusion that the relationship between the events of the multiple streams time series are the association patterns dependency patterns, sudden patterns, this paper call them are structure patterns, the existing algorithm have n ' t discuss these patterns, although msdd discussed the dependency patterns, however, it ignored the association patterns, sudden patterns, this paper have a definition of the association patterns, sudden patterns and dependency patterns, and have a complete, frank algorithm called twma ( time window moving and filtering algorithm ), the peculiarity of this algorithm is that events is listed by the time window, by this way, the relationship of the events is clear

    將它們統稱為結構模式,而這正是目前其它算法、沒有考慮到的,雖然msdd考慮了事件之間的依賴關系,但它忽略了突變模式,關聯模式等重要的知識示。給出了關聯模式、依賴模式、突變模式的定義,提出了一個比較靈活全面、直觀的挖掘它們的算法:時間窗口移動篩選算法twma ( timewindowmovingandfilteringalgorithm ) 。該算法的一個突出特點是將時間序列事件按時間窗口序列化,使得事件之間的時間關系示很直觀,該算法能成功地從多流時間序列中發現了事件之間的關系。
  5. The algorithm analysis and numerical tests have shown that the algorithm proposed in this paper is stable and highly effective, which provides a new useful tool for solving the operator equations of the first kind

    中還對實施算法的若干技術問題進行了討論。數值實驗結果提出的算法是穩定高效的,為第一類運算元方程的求解提供了一個新的有效工具。
  6. Experiments show that the face feather and the fingerprint feather is more accurate, more suitable for classify, and decreases the complexity of the algorithm, and improve the accuracy and the operating speed of the multi - biometrics system

    實驗明,算法得到的人臉特徵更有利於人臉分類且計算量大大減小,指紋特徵更為準確且提高了特徵提取速度,同時有利於提高綜合識別系統的準確度和速度。
  7. 27 richardson r, smeation a f, murphy j. using wordnet as aknowledge base for measuring semantic similarity between words. technical report ca - 1294, school of computerapplications, dublin city university, 1994. 28 hideki kozima, teiji furugori. similarity between wordscomputed by spreading activation on english dictionary

    而且,針對邊計算與基於上下的相似度計算,我們進行了充分的試驗,其結果明,所採用的邊計算方法與其它組合算法相比具有令人鼓舞的效果,並且,基於上下的相似度計算結果也是合理的。
  8. The fpga post simulation results prove that the trade - off algorithm is an effective fast search algorithm of vq coding on the three aspects of reducing the coding time, improving the reconstructed image quality, and lowering the difficulty of vlsi implementation

    該編碼電路的fpga實現及fpga驗證結果明,提出的快速算法大大地減少了編碼時間、有效地提高了恢復圖像質量,同時也降低了硬體實現的難度。
  9. The experimental results and attack analysis show that the watermark algorithm is transparent and robust against some image processing operations, such as jpeg lossy compression, median filtering, additive noise, scaling, and incorporating attacks

    實驗結論和攻擊測試明,所提議的算法具有較好的透明性,對如jpeg有損壓縮、中值濾波、附加噪聲、伸縮、裁剪等各種圖像處理的攻擊有較強的頑健性。
  10. What i am saying is that i ' m optimistic enough to believe that within the next decade, we will see progress to a level that for things like dealing with data in a spreadsheet or text in a word processor, or navigating the internet, you will find the speech interface has enough accuracy that it becomes a primary way of interacting with the machine

    我正在說是我夠樂觀來在下十年內相信那,我們將會看見對一個水平的進步為事物像由於數據處理在一臺件處理機中的試算中,或航行英特網,你將會找講介面有它變成的充足準確性一個主要的方式用機器互相影響。
  11. Experimental results manifest that the incremental algorithm in this paper is rather faster than the well - known godin ? algorithm

    實驗結果明,漸進式算法的時間性能要明顯優于著名的godin算法。
  12. Some strategies introduced in this recognition algorithm are proved to be effective and improve the performance of the algorithm. experiments show the recognition algorithm based on subpixel edge detection proposed here is advantageous over traditional recognition algorithm and can get a more accurate edge position between bar and space

    實驗的識別算法具有很好的性能,這里提出的基於亞像素邊緣檢測的識別方法優于傳統的條碼識別方法,能夠獲得更為準確的條空邊界位置。
  13. In this paper, several examples are presented and proved that proposed method is correct, reliable and effective

    中附有多個算例,計算結果明,提出的簡捷計算法是正確、可靠和有效的。
  14. Experimental results show that this formula improves the speed of video coder at the same psnr without damaging the image quality

    實驗明,的改進算法非常有效,避免了大量冗餘計算,在保證圖像質量的同時提高了編碼效率,提高了壓縮比。
  15. If possible try to recover portions of the image that have been tampered without accessing the original image. in the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication - fragile watermarks, semi - fragile watermarks, and self - embedding watermarks. the research of this thesis mainly includes self - embedding and semi - fragile watermarks

    目前用於數字圖像完整性驗證及自修復的數字水印方案主要有完全脆弱性水印、半脆弱性水印、自嵌入水印等,主要研究自嵌入及半脆弱數字水印,分別從空域及變換域角度詳細分析當前國內外現有的各種算法,指出其不足之處,並提出了相應的改進算法,實驗結果算法的有效性與實用性。
  16. The experiment materials include two parts, one is the gait database downloaded from casia and the other are several videos we shoot ourselves. we achieve on automatic detection and tracking of leg of walking people, using the arithmetic proposed in this paper. the experiment results indicate that the precision of the tracking of leg skeleton is satisfying, using our algorithm. it gets rid of the restriction of mannual intervention, and also the problem of self - occlusion could be solved effectively

    以中國科學院自動化研究所下載的步態圖像序列庫及實驗小組自己拍攝的視頻為實驗素材,用提出的算法實現了對步行人體腿部骨架的自動檢測及跟蹤。實驗結果明,算法對骨架的提取及跟蹤準確度較高,不僅擺脫了手工標注的約束,還有效解決了雙腿自遮擋造成跟蹤準確度降低的問題。
  17. The results of simulation show that the two algorithms are dependable and high precision, almost without any alteration when fault type, transition resistance and system parameter change

    模擬結果明,提出的兩種雙端故障測距新算法具有可靠性高、測距精度高的特點,完全不受故障類型、過渡電阻和系統參數的影響。
  18. In this paper, how to design the fitness function, encoding method, selection method, crossover method and mutaion method are discussed in detail

    實驗結果設計的遺傳算法的編碼方法和遺傳運算元是適合問題求解的。拓撲優化的結果是令人滿意的。
  19. The computer simulation results confirm that the variable step - size algorithm proposed in the paper outperform other variable step - size algorithm and lms algorithm

    模擬結果明,提出變步長lms的算法明顯優于其它變步長算法和lms算法。
  20. ( 4 ) because calculation of stress intensity factors using the finite element method of the linear elastic fracture mechanics cannot satisfy the need for the real - time monitoring and the real - time analysis of cracks in concrete dams, a four - layer neural network optimized by genetic algorithm and chaos optimization algorithm is proposed. the example shows that the optimized neural network can yield good results

    ( 4 )用斷裂力學有限元計算應力強度因子不能滿足對混凝土壩裂縫實時監測、實時分析中的要求,提出了利用遺傳算法和混沌優化算法改進的四層神經網路的解決方法,實例分析明,提出的四層優化神經網路計算的應力強度因子接近於用斷裂力學有限元計算的應力強度因子。
分享友人