隱藏節點 的英文怎麼說

中文拼音 [yǐnzàngjiédiǎn]
隱藏節點 英文
blank node
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : storing placedepositorydeposit
  • : 節構詞成分。
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • 隱藏 : hide; conceal; remain under cover; go into hiding
  • 節點 : [電學] panel point; hybrid; packing; node; nodal points; joint of framework; pitch point; point pitch
  1. Notice some corners much and much, will have already concealed to see a point to test you to probe an ability, a very divertive game. find out 12 kind things in the room first, there are more difficult several kinds to seek. bring about a pillow, the blind side that click the bedside and mattress contain one section battery, another a the section battery is also nearby in the bed, turning on a television, there is one personal dancing, he will point out a place finally, there is the star number manifestation, notice and wait film to broadcast to finish to click again 3 times, the safe - deposit box would appear

    多多注意一些角落,會有考考你的偵察能力,非常好玩的一個游戲.先在房間里找到12樣東西,有幾樣比較難找.把枕頭掀起,擊床頭和床墊的縫隙處有一電池,另外一電池也在床附近,打開電視,有一個人跳舞,最後他會指出一個地方,有星號顯示,注意要等影片播放完再擊3次,保險箱才會出現!
  2. To hide the expansion node indicators, set the

    若要展開指示符,請將
  3. To expose the hidden links, add to both site - map nodes a

    若要顯示的鏈接,請為這兩個站地圖均添加一個
  4. With reference to the bs / ms architecture of gsm system, the network nodes and user nodes are explicitly distinguished in sowmn ' s architecture. the network functions of self - organization, dynamic routing and user management are all completed in the network nodes and the details of network structure are hidden to mobile users, so the burden of network devices and their implementation complexity are distinctly alleviated while the sowmn system still has an excellent compatibility with existing ip networks and wireless terminals according with ieee802. 11 standard

    在網路體系結構上借鑒了gsm的bs / ms兩級體制,把網路和用戶明確區分開,使網路自組織、動態路由和網路管理等網路功能集中在網路中完成,並且對移動用戶了網路組織細,從而降低了網路設備的負擔和實現復雜度,並使整個系統對現有的ip網路和符合ieee802 . 11標準的無線終端設備具有較強的兼容能力。
  5. The program has a wrapper that deduces how many input nodes count and target are needed, based on the actual input file. choosing the number of hidden nodes is trickier

    這個程序有一個包,它能夠根據實際文件推斷出需要多少輸入(計算在內的和期望的) ,選擇隱藏節點的數目是一個訣竅。
  6. When output nodes take their inputs from hidden nodes, and the net finds that it is in error, its weight adjustments require an algorithm that will pick out how much the various nodes contributed to its overall error. the net needs to ask, " who led me astray

    當輸出隱藏節點獲得輸入,網路發現出現了誤差,權系數的調整需要一個演算法來找出整個誤差是由多少不同的造成的,網路需要問, 「是誰讓我誤入歧途?
  7. Is an algorithm that extends the analysis that underpins the delta rule to neural nets with hidden nodes

    這一演算法把支持delta規則的分析擴展到了帶有隱藏節點的神經網路。
  8. Hides implemented interface nodes on classes

    在類上已實現的介面
  9. As alur states on p 249, " the main benefit is hiding the details of the underlying service

    就像[ alur ]在第249頁所講的「主要的優了基礎服務服務的細。 」
  10. Hide and show actions pane controls on the actions pane based on user actions in xml nodes

    根據xml中的用戶操作和顯示操作窗格上的操作窗格控制項。
  11. Sum w, for all j where j is an output node that takes input from n. putting this together gives us a training rule

    這里j是一個從n獲得輸入的輸出,聯系起來,我們就得到了一個培訓規則,第1部分:在隱藏節點n和輸出j之間權系數改變,如下所示:
  12. Where d for a hidden node n, turns on how much n influences any given output node ; and how much that output node itself influences the overall error of the net

    其中d ( n )是隱藏節點n的函數,讓我們來看( 1 ) n對任何給出的輸出有多大影響; ( 2 )輸出本身對網路整體的誤差有多少影響。
  13. Step 2 : hidden nodes calculate their outputs

    第2步:隱藏節點計算它們的輸出
  14. Lastly, it isn t clear how this applies to nets with hidden nodes

    最後,這不一定適用於存在隱藏節點的網路。
  15. For source code recognition, 6 to 8 hidden nodes seem to work very well

    對于源代碼的識別, 6到8個隱藏節點似乎工作得很好。
  16. Limiting ourselves to nets with no hidden nodes, but possibly having more than one output node, let p be an element in a training set, and t be the corresponding target of output node n

    將我們的網路限制為沒有隱藏節點,但是可能會有不止一個的輸出,設p是一組培訓中的一個元素, t ( p , n )是相應的輸出n的目標。
  17. The method hides fingerprint minutiae data in video image, and securely transfers to receiving port

    把指紋的數據到視頻圖像中,並可以安全地傳輸到接收端。
分享友人