識別數據 的英文怎麼說

中文拼音 [zhìbiéshǔ]
識別數據 英文
identification data
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  • 數據 : data; record; information
  1. So the plate - like drawing correcting process can be divided into two stages : absolute errors checking and comparative errors checking absolute errors checking include four modules which were line - weight checking, hatch checking. dimension checking and overlapped line checking comparative errors checking module include drawing compartmentalization, view recognizing, data getting and data compare in this correction system, line - scanning and circle - scanning algorithm, direct graphics element compare algorithm and character compare are used, which simplify the process and reduce difficulties

    相對錯誤檢查包括區域劃分、視圖提取、提取等過程。相對錯誤的判斷依是答案圖。本批改系統採用直線和圓弧掃描演算法,並且結合圖形元素直接比較法和特徵比較法,既簡化了處理過程,又降低了處理難度,比較圓滿地完成了開題報告確立的任務。
  2. The thesis describes the detailed procedures of hand - writing data processing, including chinese character dot matrix building and display, vector data storage, chinese character dot matrix compression, transfer protocol and hand - writing chinese character re - building. also, stroke order based hand - writing chinese character recognition method is explored, and characteristic - recognition methods for chinese character with similar stroke order codes and the structure of hand - writing chinese character recognition dictionary are discussed

    第四,設計了服務器端的服務軟體,可以實現的解碼、重建、筆劃特徵提取、管理功能;採用了基於筆段筆順編碼和結構特徵的方法並設計了字典的結構,可以有效的提高速度,達到較高的率。
  3. Bioinfomatics, image processing, pattern recognition, data mining

    生命信息科學,字圖像處理,模式挖掘。
  4. Due to its unsupervised learning ability, clustering has been widely used in numerous applications, such as pattern recognition, image processing, market research and so on

    聚類具有無監督學習能力,被廣泛應用於多個領域中,如模式分析、圖像處理以及市場調研等。
  5. Some key techniques, such as monitoring and identifying a data package, analyzing a data package, reducing lost package rate have been used in this system

    該系統採用了監聽與識別數據包、分析包、減小丟包率等關鍵技術。
  6. In the paper, we design a system which can not only recognize container characters on real time but also administrate container transport. the system includes character location module, character recognition module and database module

    本課題在visualc + + 6 . 0編程平臺上開發了一個基於sqlserver2000庫的集裝箱編號自動及管理軟體系統,包含編號定位、字元庫功能等三個模塊。
  7. It is an expensive proposition to bring in direct exchange feeds, to develop and maintain the systems that are needed to decode and normalize the various exchange protocols so your application engines can make sense of the data

    採用交易直接交換是昂貴的,需要開發和維護系統以解碼各種協議,這樣系統才能識別數據
  8. We study the dealing with of prolog, the recognition of character encoding, the cutting apart of data, the parallel parser and carry on the experiment

    我們研發了序言處理、字元編碼方式分割、并行解析器,並進行實驗驗證。
  9. Cluster analysis is one of the means of multivate analysis and is widely used in pattern recognition, data mining and decision analysis etc. now the popular clustering algorithm is transitive closure clustering algorithm and fuzzy c means clustering algorithm

    聚類分析是多元統計分析的方法之一,廣泛的應用在模式挖掘和決策分析等領域。目前常有的聚類演算法有傳遞閉包聚類演算法和fuzzyc - mean演算法。
  10. First of all we discuss the model of information purifying and bring forward the methods of setting up the according fuzzy set and subject function. secondly after analyzing the traditional technology and the strongpoint and the shortcoing of information purifying we improve it combining with the technique of fuzzy mode identifying, data warehouse, cache etc. and we can perpetrate an on - line and synchronous purifying through analyzing the text and picture showing in the pages of network. finally, we choose sql server 2000 to design the url database and delphi, wingate as the tool for system development to develop an efficient system of information purifying which can keep the network consumer especially young student apart from the intrusion of unfriendly information and make the environment of network pure and fine

    本文首先探討了該系統中的信息「凈化」模型,提出了模型中的模糊集及隸屬函的構造方法;然後分析了傳統的信息「凈化」技術及其優缺點,結合模糊模式倉庫、高速緩存等技術對傳統的信息「凈化」技術進行了改進,改進后的信息「凈化」技術可通過分析正在顯示中的網頁文字、圖片內容,做即時、同步性的網頁內容篩選;最後,利用sqlserver2000設計了url庫,選擇delphi 、 wingate作為系統開發工摘要具,設計開發了一種高效的網路「凈化」器,使網路用戶尤其是青少年學生遠離非友善信息的侵擾,讓網路環境更加純凈、美好。
  11. Clustering technique have been applied to a wide range of problems, including pattern cognition, data mining, decision - analyzing and prediction, etc., yet it is imperfect both theoretically and methodologically, even severe fault

    聚類分析雖已廣泛地應用於模式挖掘、計算機視覺、模糊控制、決策分析和預測等許多領域,但它在理論和方法上仍不完善,甚至還有嚴重的不足之處。
  12. Then, to facilitate error correction, highly accurate word alternatives are suggested by combining speech data with statistical predictive data. as a result, the desired word can be selected with a minimum number of keystrokes

    然後,為方便糾錯,語音識別數據和統計預測結合在一起,極大地提高了選詞精度,最終以最少的擊鍵次找到想要的單詞。
  13. The back - propagation network is the core part of ahead - propagation network in artificial neural network and is widely applied in many aspects such as function approach, mode distinguishing and data condensation

    Bp網路是人工神經網路中前向網路的核心內容,它在函逼近、模式壓縮等方面使用非常廣泛。
  14. Data mining is a collection of engineering methods proposed for solving large practical problems of machine learning, pattern recognition, database technology etc. the purpose of data mining is to discover the implicit knowledge or rule, and to help human expert to make decision. frequent pattern mining ( fpm ) and bayesian network learning ( bnl ) are two useful technologies of data mining

    挖掘技術是解決機器學習、模式庫技術等各種領域中的大型實際應用問題而提出的一些工程性方法的集合,主要是為了從大型庫中高效地發現隱含在其中的知或規律,並為人類專家的決策提供支持。
  15. Assist gdrcc in identifying project implementation risks in various projects within gdrcc data centralization project, provide solutions so that gdrcc could avoid risk timely, and to ensure the success of the project

    能協助廣東農信識別數據大集中工程各相關項目實施的風險,提出解決方案,使廣東農信及時規避風險,確保項目成功。
  16. Address : a switch pattern which identifies the location of a piece of data or a program step

    地址:可以識別數據或程序位置的轉換模型。
  17. Identification of aerospace components. rules for the use of the identification block in data records

    航空航天元件的標.記錄中識別數據塊的使用規則
  18. The typical data smart tag appears when data - aware objects are dragged onto forms. for more information, see

    將可識別數據的對象拖到窗體上時會出現典型的智能標記。
  19. In particular, the goal of identifying a data source solely by its contents makes support for annotations on changing data sources challenging

    地,僅僅通過它的內容來識別數據源的目標使得對于變化中的源的注釋的支持成為一個難題。
  20. A transaction either recognizes data in the state it was in before another concurrent transaction modified it, or it recognizes the data after the second transaction has completed, but it does not recognize an intermediate state

    事務識別數據所處的狀態,要麼是另一併發事務修改它之前的狀態,要麼是第二個事務修改它之後的狀態,事務不會中間狀態的
分享友人