鑒別網路 的英文怎麼說

中文拼音 [jiànbiéwǎng]
鑒別網路 英文
discrimination network
  • : Ⅰ名詞1 (鏡子 古代用銅製成) ancient bronze mirror2 (可以作為警戒或引為教訓的事) warning; objec...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. 3. " discriminating scale on internet addiction disorder of callan " is a credibile & effective tool for discriminating internet addiction disord 4

    《青少年學生成癮量表》具有較好信效度,符合心理測量學要求,可以作為青少年學生成癮的工具。
  2. Authority procedure in dedicate mode checks the ms ' s validity, and if it is valid, a safe cipher key for the use of channel encrypting is given

    專用模式下的權過程用於檢查ms提供的識是否真實,並給ms一個安全的密鑰。
  3. According to this objective, drawing on the viewpoints of neo - institution economics, the first part of this thesis emphasizes on expatiating the meanings of institution and its evolution laws, the characters and habitudes of network economy, as well as the institution evolution in society, domain and enterprise arrangements ; the second part of this thesis analysis the infection and its mechanism of the before - mentioned institution evolution on enterprise competition while summing up the new principia, characters and patterns of enterprise competition in network economy ; the final part of this thesis argues the enterprise competing stratagem in different domain evolution phrases hi network economy as the conclude of whole paper

    於此,本文第一部分中吸收了新制度經濟學的理論觀點,著重闡述了制度的含義與變遷規律,經濟的特點和性質,以及由於經濟所帶來的社會層次、產業層次和企業層次的制度變遷;在本文的第二部分則分析了上述三個層次的制度的變遷對企業競爭行為分產生的影響及其機制,歸納出經濟下企業競爭的新的特點,新的模式和新的競爭原則;在文章的第三部分則討論了經濟引發的不同演化階段的產業的特點,並分析了其中企業的競爭戰略。
  4. The potential applications of amr include both civil and military communication, especially non - cooperative communications and communication confrontation, such as identifying signals, supervising signals, distinguishing interference, electronic confrontation, analyzing military threat, etc. on the basis of our analysis to the existing research on feature abstraction, the related feature abstraction methods are optimized in this paper, resulting several effective methods such as the feature abstraction based on transformation domain, stepped voltage level analysis, normalized carrier - free spectral energy analysis, squared signal and fourth powered signal analysis, etc. both the decision theory based on recognition algorithms and the artificial neural network ( ann ) based on recognition algorithms is analyzed, and the former is selected as it is more appropriate for this research

    調制類型的自動識廣泛應用於民用通信與軍用通信,尤其是對于非合作性通信、通信對抗,比如:信號確認、信號監控、干擾辨識、電子對抗、軟體無線電、電子救援、通信對抗、軍事威脅分析等。本論文在分析現有研究的基礎上,借了已有的特徵提取方法,對相關調制類型特徵提取方法進行了優化,使用了一些有效的方法,如基於變換域特徵提取方法、梯層電平分析方法、剔除載波后的歸一化頻域能量分析方法、信號平方后的頻譜分析方法、信號四次方后的頻譜分析方法等。通過對基於決策理論和基於人工神經兩種識演算法進行分析,本論文選擇了較適合的基於決策理論的識演算法。
  5. At present, the overall tendency of software development is constructing object - oriented, network based, distributed and heterogonous application system using distributed component technologies, and dividing the software system into independent components with different functions, which can be platform and programming language independent, and can communicate with each other for collaboration, handwriting - based identification recognition is an important research field of biometric identification, and also an active topic in computer vision and pattern recognition

    目前,軟體開發的整體趨勢是採用分散式組件技術建立面向對象的、基於的、分佈的和異構的大規模應用系統,把整個軟體系統劃分為一個個相互獨立的組件,每個組件完成特定的功能,可以跨越多種操作平臺,獨立於程序設計語言,並且相互通信,協同完成工作。筆跡是人體生物特徵識中的一個重要研究領域,也是計算機視覺和模式識領域研究的熱點問題。
  6. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  7. In recent years, as the rapidly development of informatic technologies and the bloom of internet, a large number of transactions appeared in the internet. fingerprint verification technology, as the most efficient, reliable, and low - cost authentication technology, has been more and more widely used in banking, stock exchange and e - business fields besides traditional police applications

    近年來,隨著信息技術和技術的飛速發展以及大量internet事務與交易的出現,指紋自動識這種最快速、開銷最低並且效果良好的認證技術除了在傳統的刑事偵緝領域之外,在銀行、股市和電子商務等行業作為身份得到更廣泛的應用。
  8. Firstly, e - hmm is used to parameterize face image, the output likelihood of the e - hmm is encoded to form the input vector and is sent to the ann. by taking advantage of the discriminative training of ann, the weak discrimination of the maximum likelihood criterion can be improved, and the recognition performance can be improved by means of the learning ability of ann

    該混合識用e - hmm的參數來描述人臉的整體性和局部細節性特徵,用e - hmm的輸出似然值序列組成ann的輸入矢量,利用ann的訓練能力來克服e - hmm的基於最大似然準則訓練演算法區分力較差的弱點,同時利用ann的學習能力來提高e hmm的識性能。
  9. To encourage more participation from the youth, itc has dedicated the last day of the expo as youth day which will offer a series of innovative workshops and live demonstrations with support from various collaborative partners, including dna fingerprint, internet robot game, virtual bridge building, etc. honourable guests and rthk teen power wi ll host special programmes on the youth day

    為鼓勵更多青年人參與這個盛會,創新科技署特把創新博覽會的最後一天訂為「青年日」 。在各個合作夥伴的鼎力支持下,屆時會舉行一連串的創意工作坊及科技示範,包括dna指紋定、機器人游戲和虛擬建橋等。香港電臺teenpower更會聯同特嘉賓,在青年日主持特備節目。
  10. However the controversy over the name, attribution, identification, history, culture, and many other aspects of puerh tea is going on the internet or the books among shihai deng, kunmu shi, hong jie zhou, yu zhou, jiaju zhou, and etc, they all agree that the raw material should be the sun - dried green tea

    上、書籍上,從鄧時海、石昆牧到周紅傑、周渝以及鄒家駒等等,無論在普洱茶的名稱、歸屬、、歷史、文化等諸多方面如何唇槍舌戰,但提到普洱茶的製程時,都一直堅持曬青毛茶為原料。
  11. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為上的各種應用提供機密性、完整性、身份和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統性能的影響。
  12. Iad can be discriminated according to the 9 aspects such as, loss of intention, suffering from intellect, the sense of loneliness, blahs, motivaton conflict, double personality, addiction behavior, malajustment, body symptom and so on

    2成癮可以通過注意力缺失、智力受損、孤獨感、抑鬱、動機沖突、雙重人格、成癮行為、適應不良、軀體癥狀等9個方面進行
  13. In order to maintain the robustness of network security, we start our project of laboratorial chinese web documents " orientation text classifiers

    為了維護安全的健壯性,因此我們提出了實驗型中文web文檔傾向性分類器項目。
  14. ( 5 ) a series of design methods of classifiers are proposed, including the classifier based on the generalized inverse and the probabilistic reasoning method ( prm ), a new self - adaptive kohonen clustering network which overcomes the shortcomings of the conventional clustering algorithms, and the fuzzy neural classifier. the experimental study efface recognition is presented based on the combination of multi - feature multi - classifier. ( 6 ) this paper proposes a hybrid feature extraction method for face recognition, which is a combination of the eigen matrix, fisher discriminant analysis, and the generalized optimal set of discriminant vectors

    ( 5 )對圖象分類器設計方法進行研究,主要包括:提出了一種基於廣義逆和概率推理的分類器設計方法;提出了一種新的自適應模糊聚類演算法;提出了基於模糊神經的分類器設計方法;並對多特徵多分類器組合方法在人臉識中進行實驗研究; ( 6 )提出了一種只要一個訓練樣本就能解決人臉識問題的新方法,該方法結合了特徵矩陣、 fisher最優分析和廣義最優分析方法的優點。
  15. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與機制, mac機制,最小特權管理機制,可信通機制,密碼處理機制,客體重用機制以及隱通道分析機制,同時還進行了創新,引入了安全保護機制和審計機制。
  16. Based on the new development of the theoretical research of enterprise competitive intelligence system and the practical problems met in the competitive intelligence work, this paper first expatiates the flow and method of construction of collecting subsystem, analyzing subsystem and servicing subsystem. secondly this paper wants to explore how to construct a human network, how to analyze the demand for competitive intelligence, how to analyze the competitors and how to serve the competitive intelligence users. especially this paper puts forward a new model, which combines the analytical method with the analytical flow, and puts forward some new analytical methods

    本文根據企業競爭情報系統理論研究的新進展和企業競爭情報工作中所遇到的實際問題,首先從整體上論述了競爭情報的收集子系統、分析子系統、服務子系統的建設流程和方法;在此基礎上,對競爭情報需求分析、人際情報模型的建設、競爭對手分析、競爭情報服務等方面作了一些探索,特是對企業競爭情報系統的核心部分? ?競爭對手分析部分提出了一個將分析流程與方法相結合的新模型,並提出了一些新的分析方法,為我國企業建設企業競爭情報系統提供了一些借
  17. Today, with the rapid development of information and internet all over the world, information security is extraordinarily important, especially, personal identification technology. because biological feature identification technology has unique stability, uniqueness and convenience, it is applied more and more broadly

    當今社會高度信息化化,信息安全顯示出前所未有的重要性,身份定技術具有非常重要的應用價值,生物特徵識技術以其特有的穩定性、唯一性和方便性,得到越來越廣泛地應用。
  18. The techniques include thresholding, matching, feature extraction, and finally identification of seal images. seal verification by human visual inspection is a serious bottleneck of office automation in oriental countries. in this paper, we propose a new scheme for automatic seal imprint verification using neural network

    本文提出的利用神經實現印自動的研究方法,旨在對印圖像進行分割和配準的基礎上,提取其矩描述子和投影矩運算元特徵,然後利用改進的bp神經進行訓練和識
  19. This thesis was carried out basing on the seals automatically reorganization project in a information science company of chongqing municipalization. in the paper, based on the analyzing of the mathematical models and their algorithms of kinds of artificial neural networks ( ann ), the author analyzed the algorithm of the back - propagation ( bp ) networks model, at the same time, the author improved the algorithm practically and effectively, and applied it in the recognition technique of digital image successfully

    本文的研究工作是結合市內某信息科技公司的「印自動識系統」研發項目開展的,作者在深入分析了人工神經的各種數學模型及演算法的基礎上,重點剖析了前饋神經的演算法思想,對其進行了實用、有效的改進,並將它成功的應用於「圖象識技術」 ,取得了較為滿意的成果。
  20. Methods and results : proteomics approaches involve three critical techniques : two dimensional electrophoresis, biological mass spectrometry and bioinformatics. in 2 - de, we applied traditional ief in the first dimension and tris - tricine system in the second dimension and acquired protein profiles of serum and skin samples. in the identification of 10 proteins of serum and 16 proteins of skin, we acquired peptide mass of fingerprint ( pmf ) maps for all targets by means of matrix - assisted laser desorption - ionization time of flight mass spectrometry ( maldi - tof - ms ) and partial aminio acid sequences for 9 proteins by means of electrospray ionization ms / ms ( lisi - ms / ms )

    研究方法:採用雙向電泳技術獲取泥鰍創傷前後血清和皮膚的小分子蛋白圖譜,利用基質輔助激光解析飛行時間檢測質譜分析( matrix - assistedlaserdesorption - ionizationtimeofflightmassspectrometry , maldi - tof - ms )和電噴霧離子化串連質譜分析( electrosprayionizationms / ms , esi - ms hs )分獲得差異蛋白點的肽指紋圖譜( peptidemassoffingerprint , pmf )和部分序列信息,通過上的expasy服務器中和ncbi的相關軟體將這些信息和swissprot數據庫進行匹配定蛋白質種類。
分享友人