隱含計算 的英文怎麼說

中文拼音 [yǐnhánsuàn]
隱含計算 英文
computation implicit
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 動詞1 (東西放在嘴裏 不咽下也不吐出) keep in the mouth 2 (藏在裏面; 包含) contain 3 (帶有某種...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • 隱含 : implication
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Firstly, second harmonic component ratio and dead angles of two phase inrush ' s dispersion in three - phase transformes are acted as input variable. secondly, the method applies improved algorithm based on the original algorithm of multi - layer forward back propagation network, that is to say, adding last variational effect of weight value and bias value to this time and making use of variable learning rate. at the same time, this method also adopts dynamic form in the number of hidden floor node

    首先,文中將三相變壓器兩相涌流差流的二次諧波量比和間斷角作為網路的輸入變量;其次,利用對原有bp網路訓練演法基礎上的改進型演法(即在本次權值和閾值的變化時增加上一次權值和閾值變化的影響以及採用變學習率,與此同時層神經元個數採用動態形式) ,通過樣本訓練使網路結構模型達到最優。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過機網路傳輸數據日益增加,其中包了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  3. By convention, all capital and financial flows, except those arising from transactions in official foreign reserves undertaken by the monetary authority on behalf of the exchange fund, are added to current transactions together with implied errors and omissions " above the line " in arriving at what is termed the " overall " surplus or deficit in the balance of payments accounts

    傳統以來,在國際收支平衡帳的整體盈餘或赤字時,除金融管理專員代外匯基金進行的官方外匯儲備交易外,其他所有資本與金融流量,以及經常帳的交易連同誤差都會入線上項目內。
  4. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演法進行了研究,討論了聚類問題的編碼方式和適應度函數的構造方案與方法,分析了不同遺傳操作對聚類演法的性能和聚類效果的影響意義。然後對k - means演法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演法的k - means聚類改進(混合聚類演法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演法確定聚類數k ,用遺傳聚類演法的聚類結果作為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演法對完整數據集進行聚類。由於遺傳演法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是并行性和對全局信息的有效利用的能力,所以新的改進演法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  5. By taking advantages of epipolar line features and depth discontinuities in reference 中國科學院 軟件 研究所 博士 學位 論文 基于 圖 象 的 快速 繪制 技術 的 研究 images , an efficient inverse wmping algorithm is pfoposed in chapter 3 for gcnerating nagcs of novel views by combining multiple eference images 帆 enhm different vie 呷 oints because continuous segnents determi 。 d by pairs ofedge pixels at co 。 spending epipolar lines are order kept , only pairs of edge pixels in the reference 渝 明 e e necess 叨 口 cowute to obtain generalized disparity of all points in the desired image as a result , sighficant acceleraion could be made in the endering pfo 比 鴕 two accelerating techiq 此 s e presented in this algori 山 mb accelerate the hole illing process his algorithm extends the reference images rom projection of single col : ii ’ ected surface in previously developed nvnverse w 出 下 er to ima 驢 s captured rom complex scene in chapter 4 , an 《 dent ibr method is prese 庇 仙 y takn ull 訕 antage of 呷 bies c 咖 the method can simulate the 3d details on sllri : ace of object successfully he 。 叩 proach , called rered ature mopmp consists of two pans at fst , an origi 。 ltexture with orthogonal displacements per pixel is deco 啊 osed into a series of new t6 刀 mfcs with each 他 lug a given displacement per pixel , called ae , ea atures , or lt hen hese lt e used to render the novel view by conventional texture mapping d avoid gaps n the endered hlla 驢 , some phels are to be interpolated nd extended in the 廠 kaccoding to the depth differe eee between two neighbor pixels in the original texture as these ltlt fc … e much storage nd therefore much time is equired to install ltlt into the text ’ ufc buffec an 舊 thod is pfoposed to co 呷 fcss the ltlt , nd the cottcspondingfclldering method is given experimental esults show that the new method is efficient , especially n rendering those objects with a smaller depth rnge compared withtheir size , such as relief surfaces of building

    與己有的三維變換方法相比較,該方法不但成功地填補了由於投影區域擴張而產生的第一類空洞,而且成功地填補了由於空間深度非連續物體相互遮擋而產生的第二類空洞,從而方便地實現了虛擬環境中的漫遊;基於物體表面深度的連續性,本文提出了一個位移預測方法? ?此方法可以從單幅參考圖象獲得逆映射過程中所需要的目標圖象的位移信息,從而大大提高了演法的效率:與通常的正向映射演法相比,此演法克服了多幅參考圖象所帶來的量成倍增長等問題,而且誤差較小。 2 )基於極線幾何的快速逆映射演法。利用參考圖象的邊界信息與的遮擋關系,以及極線幾何的性質,本文第三章提出了一個基於極線幾何的快速3 『一中國科學院軟體研究所博士學位論文基於圖象的快速繪制技術的研究逆映射演法,從多幅參考圖象精確合成當前視點目標圖象。
  6. Thirdly, genetic algorithm is a kind of search and optimization method simulating the life evolution mechanism, which has the advantages of global optimization and implicit concurrency

    遺傳演法是一種模擬生命進化機制的搜索和優化方法,與常規優化演法相比,具有并行性和全局搜索特性,因此選擇遺傳演法進行尋優
  7. ( 3 ) the methods of determining the degree of ii ? curves based on the boundary of objects and tightly fitting objects with ip curve are proposed. the algorithms would help to fit and describe objects automatically by computer

    這為機自動選取適當次數的多項式曲線擬合與描述物體提供了依據,同時減少了圖像物體識別中人的參與。
  8. Considering revenue business, we calculate support threshold of itemset and confidence threshold of rule, realize application and prediction by association rule mining in the audit department of tax system. by algorithms we analyse various illegal possibility, find out some implicit regulation among of factors, and guide current revenue work in audit

    聯系稅收業務,從對項集的支持度、規則的支持度和置信度的入手,實現了關聯規則演法在稅務稽查部門的應用預測,通過演法分析各類違章違法的可能性,找出各種因素之間的規律,從而指導當前稅收稽查實際工作。
  9. The algorithm included three steps : firstly, the text sub - region was selected adaptively according to the feature that the edges contained in text regions was stronger than those in non - text regions ; secondly, the blank bars between two text lines were extracted by blank blocks searching ; thirdly, the skew angle of blank bar was calculated by directional fitting, and this skew angle was just the document skew angle

    該方法首先通過對梯度圖像的統分析,自適應地選取到了包文字的特徵子區;在特徵子區內,論文把文字行間的空白條帶看作一條的線,用優化理論出空白條帶的傾斜角度,這也就是文本的傾斜角度。
  10. With dramatic advance and wide application of the internet and information systems, we can easily attain large quantities of data that is also in rapid increment daily. thereby it becomes impractical to handle these data manually. we wish that computers can automatically process these data and extract potentially useful knowledge from them to help us arrange managements and make decisions

    隨著網際網路和信息系統的迅猛發展和廣泛應用,人們可以輕易地獲得海量的數據,並且這些數據還在日益不斷地增長中,對這樣的數據仍然採用傳統的人工處理方法變得不切實際,於是希望機能夠自動地幫助我們處理這些海量的數據,並提取出的有價值的知識,輔助管理和決策,這就需要研究者對機器學習,特別是數據庫知識發現作更加深入和廣泛的研究。
  11. Compared with traditional optimization methods, genetic algorithm has two notable characters. one is the latent parallelism and the other is searching in the whole area. genetic algorithm has some advantages which traditional methods do n ' t have

    與常規的優化演法相比,遺傳演法具有并行性和全局收斂性兩大顯著特徵,並且具有常規優化方法所沒有的優點,如不需要梯度等。
  12. Therefore, quantitative analysis on the above two parameters is made in the thesis so as to find the cause of the differences comparing the option trend simulated by guotai & junan

    通過研究發現波動率只能利用歷史數據分析,根據實際經驗進行假設和修正,無法能夠準確出來。
  13. Supposing the company ' s value satisfies a certain probability distribution, then, we can calculate the company ' s value in the future as well as its connotative undulation basing on the relationship and a certain option pricing formula, which is based on the supposing talked above. further, we can calculate the company ' s expected default frequency. by now, the goal to measuring the company ' s credit risk has realized

    如果假設公司價值波動服從某一概率分佈,那麼根據與此概率分佈相對應的期權定價公式,以及股票價格波動率與公司資產價值波動率之間的函數關系,即可求出公司未來某個時點的期望價值及其波動率,並進一步出此時點公司違約的概率,由此便實現了對公司信用評級的目的。
  14. To conclude from the given examples, each model, after spending little time on training themselves from sample data, could assess the damage degree for existing bridges using trained weighted values and thresholds

    實例表明,各網路模型花費很少的時間完成對樣本的訓練后,便可利用訓練好的層權值與閾值對實際橋梁進行評估。
  15. Bp model can quite improve the accuracy of pricing result ; 2. need to confirm the number of the hidden layer of neuron rationally ; 3. should confirm population size rationally while optimizing ann ; 4

    基本結論如下: ( 1 ) bp模型能夠提高定價結果的準確度;武漢理工大學碩士學位論文( 2 )建模需要合理確定層神經元數目; ( 3 )優化網路應恰當確定初始群體規模; ( 4 )優化網路需要合理設交叉運元。
  16. In the network, the input node is 64, the middle is 20 and the output is 4. we also use matlab train and simulate the designed network. finally, we designed software, which combines all the correlate theory and method list above to validate the thinking

    神經網路在漢字識別中的應用包括研bp神經網路及其改進演法、設漢字識別所需要的bp神經網路,即在神經網路的輸入層、中間層、層採用64 ? 20 ? 4的結構,並利用matlab6 . 5對所設方案進行模擬和驗證。
  17. Since conventional approaches were ineffectual, theoretical analysis and calculation were applied to find out the fault area and the reasons, and the fault was eliminated without affecting the safe operation of the unit

    由於常規的消缺辦法無法奏效,通過觀察總結出規律,並依據理論分析和公式找出故障范圍和原因,在不影響機組安全運行的基礎上消除了缺陷。
  18. There is another approach. utilizing the basic theory of return and risk and the main methodologies and models of asset valuation, we can study the implied risk premium from the current share prices by incorporating stock analysts " forecast on companies " earnings and growth. by comparing the implied risk premium with the actual risk level of the particular investment, we can decide better whether its valuation is fair

    在主要投資價值分析方法和分析模型基礎上,本文換了一個角度,從風險收益基礎理論出發,研究利用更符合實際的三階段估值模型,結合證券分析師對企業贏利和未來增長的估,測證券定價背後的風險回報水平,通過考察風險補償率是否與該投資面臨的風險水平相匹配,來更好的解決證券定價合理評判這個問題。
  19. Soft computing includes artificial neural network, fuzzy logic, evolutionary algorithms, rough set ( rs ) theory, etc. as a new soft computing, rough set can analyze and handle imprecise, inconsistent and incomplete data efficiently. in addition, connotative knowledge and latent rules will be discovered by using rough set theory

    粗糙集理論是一種較新的軟方法,它能有效地分析和處理不精確、不一致、不完整等各種不完備信息,並從中發現的知識,揭示潛在的規律,是一個強大的數據分析工具,具有良好的容錯性能。
  20. Phase space reconstruction technology and characteristic indices algorithms, which show the wide prospects of engineering application, are presented to in order to distinguish dynamical behavior underlying observed time series from rub - impact rotor

    提出了具有工程化前景的相空間重構技術和統特徵指數演法,以評判碰摩轉子觀測數據所的動力學行為。
分享友人