computational techniques 中文意思是什麼

computational techniques 解釋
計算技巧
  1. Besides, of the several algorithms those have been proposed in the literature for solving the transportation problem, previous computational results indicated that the primal algorithm ( modi method ) is more efficient, so we have compared the amedv versus the modi method. because very little experimentation was carried out on algorithmic techniques used in the codes of amedv, we have also performed a number of runs that test the overall solution time as the number of significant digits in each of the parameters is varied

    因為元素判別值分配法是運輸問題引發出的求解新方法,並且階石法是目前解運輸問題的較快速解法,所以特別針對運輸問題通過若干組有代表性的檢驗數據進行數值測試,在實際問題中對比元素判別值分配法與階石法的演算法執行時間,研究兩對演算法執行效率上的差別,並分析差別產生的原因。
  2. Advanced theoretical - computational techniques combined with the power of computers provide an understanding of nanosized materials at the atomic scale with an unprecedented level of detail and accuracy, enabling nanosized material design and property prediction to realize

    摘要先進的理論和計算技術結合計算機的威力,提供了在原子層次上了解納米材料及其演化過程細節的可能性,具有無先例的準確性,使納米材料設計和性能預測成為可能。
  3. ( 4 ) to raise the computational accuracy and efficiency, we have designed a self - adaptive space grid that can guarantee mass conservation and energy conservation, and have also developed the techniques for the time stepsize automatically varying

    ( 4 )設計了保持質量和能量守恆的自適應空間網格,發展了自動改變時間步長的技術,使之能夠更好地保證計算精度,提高計算效率。
  4. Aiming at higher computational accuracy, the unstructured hybrid mesh and the distributed parallel computation are used in 3d complex flow field simulation, the combination of these two techniques often causes difficulties in data structure and sub - domain definition because of the non - unification of mesh elements

    在三維復雜外形的流場計算中,為了得到較高的計算效率及保證數值模擬的準確性,經常要採用混合網格及并行計算技術。
  5. Continuous and categorical versions of the generalized association plot, statistical learning methods and nonlinear dimension reduction techniques, and latent class models will be integrated into a platform by combining clever computational algorithms and flexible statistical models

    並將聯合應用精巧的計演算法則與靈活的統計模型,來整合連續型與類別型資料的兩種廣義相關圖、機器統計學習與非線性降維法、以及潛在類別模型等於同一平臺。
  6. Computational fluid dynamics ( cfd ) techniques are used to study and understand fluid behavior in tunnels. by simulating complex specific operational cases, we can educe velocity or flux distribution in tunnel under different ventilation and resistance situation and determine the favorable operational procedures of the erlang mountain tunnel ventilation in a fire case. comparison has been made between a simulation and experiment for some cases in order to prove the cfd model is powerful, so that enables the study of cases for which experimental data is not available

    採用本文將隧道內的氣流看成是理想流體的一維恆定流動,通過對二郎山特長公路隧道半橫向通風系統建立隧道內的空氣動力學模型,利用計算機進行數值分析與計算,得出發生火災時,不同通風阻力條件下隧道中的風速分佈及流量分佈,並通過實驗室隧道模型實驗進行驗證與修正,依據研究結果給出了二郎山半橫向通風隧道的火災控制方案,從而解決了二郎山公路隧道通風對火災的控制問題,同時為半橫向通風公路隧道的火災通風提供科學的方法。
  7. Then, several efficient algorithms are presented using computational geometric techniques

    利用計算幾何的方法,給出了相應的演算法。
  8. This paper first suggests how a metaphor is understood and then presents a survey of current computational approaches, in terms of their linguistic historical roots, underlying foundations, methods and techniques currently used, advantages, limitations, and future trends. a comparison between metaphors in english and chinese languages is also introduced because compared with development in english language chinese metaphor computation is just at its starting stage. so a separate summarization of current progress made in chinese metaphor computation is presented

    論文第一大部分,首先對比人類隱喻理解的過程總結出隱喻機器理解研究應該分成相互關聯的三個階段來進行:第一個階段是隱喻的識別,即辨別出隱喻並同時辨別出構成隱喻的各相關成分,如本體喻體相似性等第二個階段是隱喻的分析,即構建本體到喻體的相似關系的映射或邏輯分析系統第三個階段是隱喻意義的解析,即推出隱喻的真實含義。
  9. The dissertation mainly aims at applying several active machine learning strategies to intrusion detection and systematically studies signal analysis techniques of intrusion detection based on statistical learning theory ( slt ), symbol inductive learning theory and genetic learning method. meanwhile, performance comparison and evaluation among intrusion detection techniques based on different machine learning strategies are presented according to computational learning theory and statistical hypothesis test methodology. intrusion detection is regarded as a pattern recognition problem in term of statistical learning theory ; i

    本文的主要工作是將目前幾種有生命力的機器學習策略應用於入侵檢測技術中,論文從入侵檢測的不同視角出發,系統深入地研究了統計學習理論、基於符號的歸納學習理論和遺傳學習方法在入侵檢測信號分析中的應用技術,並在可能近似正確( pac )學習框架下,利用計算學習理論和統計假設檢驗方法對基於不同機器學習策略的入侵檢測方法進行了性能比較和評估。
  10. In this paper, the numerical techniques and computational methods for limit analyses and shakedown analyses of soil structures and foundations are systematically investigated and then are employed to the assessment of the safety of the non - homogeneous foundations and the offshore platform foundations. in this dissertation, the computational method which combines elasto - plastic analysis with melan ' s theorem is developed and then applied to evaluate limit load and shakedown load of soil structures. elasto - plastic analyses are performed to obtain elasto - plastic stress field and elastic stress field

    在巖土工程領域,飽和粘土的安定現象與飽和砂土的液化早已為人所知,但是安定性理論及其分析在工程實際中並沒用受到足夠的重視,在這方面的探索研究也極為有限,這與土體穩定性評價中廣泛應用極限分析方法極不協調,而在海洋平臺地基等實際工程中安定性問題又顯得十分重要。
  11. Resource management is one of the key techniques of computational grid

    資源管理是計算網格的關鍵技術之一。
  12. Simulation results also show that the computational toad of this proposed algorithm is lower than standard svm and lssvm algorithms. finally, simulation results show that soft sensors based on this algorithm have much better predictive ability than those constructed by using traditional soft sensor modeling techniques, such as rbf neural network and bp neural network etc. 4

    實例分析表明,採用這種演算法建立的模型具有比傳統技術(如bp網路和rbf網路等)更好的預估效果,同時新演算法的實時性與標準svm和標準lssvm演算法相比也有一定改進。
  13. Camera model is established above all. some methods of camera calibration, the epipolar geometry constrain and various computational techniques of fundamental matrix are systematically analyzed and compared in this thesis. we present a camera calibration algorithm by viewing a plane using reprojection

    論文首先建立了攝像機模型,分析比較了幾種不同的攝像機定標方法、極線幾何約束關系和基礎矩陣的多種計算方法,提出了一種結構再投影平面模板攝像機標定演算法。
  14. Extensions to web service techniques for integrating jini into a service - oriented architecture for the grid. in computational science - iccs 2003 part 3, published by springer verlag as lecture notes on computer science, vol

    同時,為了給分佈實時嵌入式應用提供服務質量保證, starbus orb被進一步擴展成實時容錯和異步消息等qos orb 。
  15. This paper goes into the researching status of this question and points out meagerness of applying various resource management techniques in using now into computational grid

    本文深入地分析了計算網格資源管理的研究現狀,指出了當前各種實際使用的資源管理技術用於計算網格系統的不足之處。
  16. Data mining is defined as the nontrivial extraction of implicit, previously unknown, and potentially useful information from data or known as knowledge - discovery in databases ( kdd ). to do this, data mining uses computational techniques from statistics, machine learning and pattern recognition such as discriminate analysis, regression method, mathematical programming, decision tree, k - nearest neighbor, artificial neural network etc. although many positive attempts are done, the development and application of personal credit assessment model in chinese bank industry is still in its infancy

    數據挖掘是20世紀90年代後期人工智慧和數據庫領域興起的一種數據處理和知識發現( kdd )理論,是從大量的、不完全的、有噪聲的、模糊的和隨機的實際應用數據中,提取隱含在其中的信息和知識的過程。對數據進行分類和預測是數據挖掘的主要功能。數據挖掘用於信用評估的優勢主要在於: ( 1 )能處理和修正實際數據問題,演算法模型具有自檢
  17. The objective of this short course is to introduce the frontiers in systems neuroscience, from experimental and computational techniques to newest discoveries in this field

    本課程將著重介紹系統神經科學研究的前沿,包括實驗技術、數據分析和計算工具以及該領域的最新發現。
  18. New conducting polymer materials together with advanced microelectronics and computational techniques have enabled the development of a new range of chemical sensors capable of mimicking some aspects of the biological system

    新的傳導聚合材料結合先進的微電子和計算技術,已經使能模仿生物系統某些方面的一個新的化學傳感器領域得到了發展。
  19. Despite their great potential and advantages in theory, practical techniques and computational tools with triangular b - splines are less - developed

    它可以表達定義在平面上非規則三角形參數域中的任意復雜的幾何形狀。
  20. Abstract : two computational techniques for inverse fight dynamics, namely derivation - iteration and integration - iteration techniques, are investigated. the application of inverse dynamics to determine control power requirements for post - stall maneuvering is researched, and a maneuvering flight trajectory based algorithm is provided, which lays a numerical foundation for simplifying design criteria for post - stall aircraft. with the model of inverse dynamics employed, a flight control mode for the outermost loop of the control system, named maneuver generator, is designed to follow desired complicated maneuvering flight trajectories. an example of rapid heading - reversal maneuver and other numerical simulations show the feasibility of the algorithm and the design idea

    文摘:考察了求解輸入類飛行逆動力學問題的微分-迭代與積分-迭代演算法;探討了利用逆動力學確定過失速機動操縱效能要求問題,這構成了進一步提出過失速機動飛機設計簡化判據的數值基礎;利用逆動力學設計機動發生模塊進行飛控系統的最外環控制,以便跟蹤期望的復雜機動軌跡.飛機最速反向示例及其它數值模擬結果表明設計思想與演算法是可行的
分享友人