frequency database 中文意思是什麼

frequency database 解釋
頻率基本數據
  • frequency : n. 1. 屢次,頻仍,頻繁。2. (脈搏等的)次數,出現率;頻度;【物理學】頻率,周率。
  1. Firstly, we study the construction of emotion - speech template database, and analyze the common features such as pitch, energy and formant. after choosing the useful features by using fuzzy entropy effectiveness analysis, we get better performance with the application of neural network. in addition, we propose some more efficient features such as speech rate, pitch slope, mel - frequency cepstral coefficients and its transient parameters, and design a processing model based on vector quantization for cepstral features to fusing different features

    本文首先介紹了情感語音數據庫的建立情況,然後研究了基音頻率、振幅能量和共振峰等目前常用的情感特徵在語音情感識別中的作用,並且通過一種基於模糊熵的特徵有效性分析方法進行了有效特徵的篩選,應用人工神經網路建立了初步的語音情感識別模型,經過實驗發現特徵篩選后系統的識別效果有著一定程度的提高。
  2. In fact, the knowledge database is an experiential specialist system, which includes library classification, thesaurus, concordance of class number with descriptor, synonymous dictionary, keywords lists, stop - words lists, etc. after determining the indexing data of web pages, the method of weighted word frequency, which combined with statistical algorithms, is adopted to exercise the subject indexing of chinese web pages

    在確定網頁基本信息標引源的基礎上,中文網頁主題標引運用了基於詞頻的統計加權法;通過與分類號?主題詞對應庫主題詞串的詞面相似度計算,進一步完成中文網頁的賦號標引,即分類標引。
  3. The whole thesis consists of three parts. firstly, we establish the meteorological disaster database of jilin province and deduce the statistic frequency of the main meteorological disaster on the base of choosed meteorological disaster index. the spatial distribution law and time variation of drought, flood and low temperature cold damage are concluded with the gis technology

    全文主要由三部分組成:首先,在選擇氣象災害指標的基礎上,建立了吉林省氣象災害數據庫,統計主要農業氣象災害的發生頻率,然後利用gis技術得到吉林省旱澇、低溫冷害的空間分佈規律和時間變化。
  4. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  5. However, the farther analysis in the paper indicates that the strategy of parameter configuration in current connection pool technique is static state with 1 - order enactment while initializes connection pool without self - optimized adjustment according as the variety of application demand, the operation results of high use frequency database are not cached and users visit the same database independently. the multi - propose connection strategy cannot control the database operation for the same transaction and cannot ensure the acid attribute, etc. in according with the defections mentioned above, the service technique of self - optimized connection pool is presented in this paper and the composing structure for self - optimized connection pool is designed, then, some strategy in dynamic parameters adjustment, transaction management and data cache for connection pool is improved

    然而,通過本文的研究分析,現有數據庫連接池技術的參數配置策略是靜態的,連接池初始化時進行一次設定,不能根據應用需求的變化而動態調整;連接池的核心管理機制中,沒有對使用頻率較高的數據庫操作結果進行緩存,多個用戶依然各自獨立地完成相同的數據庫訪問;使用的連接復用策略無法控制屬于同一個事務的多個數據庫操作,不能保證事務的acid屬性等。
  6. The synchronization and replication is also an essential technology of mobile database. comparing trade distributed database environment, mobile computing environment has characteristics of high frequency disconnection, network condition diversity, network communications dissymmetry and so on

    移動計算環境與傳統的分散式計算環境相比有頻繁的斷接性、網路條件的多樣性以及網路通信的非對稱性等特點,這些特點使得傳統的分散式數據庫技術不能有效支持移動計算環境。
  7. On base of studying domestic and foreign theories and methods for evaluations of st achievements, this thesis analyze 10 methods for evaluations of st achievements, such as application frequency statistics, delphi, literature research and application relevance analysis, etc. by studying and analyzing the work of technology planning bureau, transport ministry between 1991 and 2000, and the evaluation items for the achievement identification, acceptance and check - up which were taken by transportation technology department, the author come up with some methods, which are scientific, standard and quantified, for evaluating transportation st, that is, in accordance with the transportation st achievement management and achievement precise database within eighth five and ninth five, and with the statistic analysis such as research contents, professional classification, intensity input, achievement characteristics, field distribution, characteristics of department undertaken, st talents characteristics, award inf ormation, characteristics and regularity of transportation st achievements, problems that are still existed and countermeasure are forwarded ; according to the requirement of evaluations system of the transportation st achievement, the principle and methods for the system designation are given, and the constitution of the system are provided ; in order to improving the scientific organization and management of our national transportation st achievements, many subjects are under discussion, including institution for evaluation of st achievement, valuation organization, standard for evaluation technology, database for consulting transportation experts and how to simplify the procedure of transportation st achievement, etc.

    本論文在對國內外科技成果評價理論、方法廣泛調查基礎上,研究分析了諸如應用頻次統計法、德爾菲( delphi )法、文獻調研法、應用相關分析法等10種科技成果評價的方法,通過對1991至2000年交通部科技計劃所實施情況,由交通科技主管部門組織進行了成果鑒定、驗收和評審等成果評價的項目的分析,提出了本人對交通行業對科技成果進行科學、規范和定量地評價的方法,即:在建立「八五」 、 「九五」交通科技成果管理及成果簡要數據庫的基礎上,通過對研究內容、專業分類、投入強度、成果屬性、地域分佈、承擔單位屬性、科研人員屬性和獲獎情況等諸多方面進行統計分析,研究了交通科技成果的特點和規律,提出了存在的問題和對策;從建立交通科技成果評價指標體系的要求上,具體提出了交通科技成果評價指標體系設計原則與方法探討了交通行業科技成果評價指標體系的構成及權重確立等問題;從加強我國交通行業科技成果評價的科學化組織與管理出發,探討了如何建立科技成果評價制度、評價機構、統一的評價技術標準和交通行業專家咨詢數據庫以及如何簡化交通科技成果評審形式等問題。
  8. For the data with quantitative attribute, several unsupervised discretization methods of continuous features are discussed. three simple boolean discretization methods ( equal width, equal frequency and cluster ) and fuzzy discretization are simulated based on a real population statistical database

    隨后針對數據庫中的模擬量屬性,分析了非監督定量屬性離散化的幾種方法,在一個統計數據庫基礎上模擬研究了分別基於等寬、等頻和聚類的布爾型分段離散化方法和模糊離散化方法。
  9. As the frequency of data query is far more than that of data update, the model processes the data query and update separately and applies the main memory database technology in the data query model, which improves the efficiency of simultaneous data accessing

    在該體系結構中,針對數據查詢遠多於數據更新的特點,將數據存取分為數據查詢與數據維護兩個獨立模塊,同時將內存數據庫技術應用於數據存取中間件的查詢模塊,從而提高了多用戶並發訪問速度。
  10. The database of hospital information sysytem ( his ) is specialized by its large input / output datas, frequency data delete / update / insert and it requires the database to process the datas with efficiency, timely and accuracy

    醫院信息系統( his )數據庫具有高吞吐量,數據刪除更新插入操作頻繁,數據繁雜寵大,且要求能高效、及時、準確進行數據處理的特點。
  11. It takes spatial data cache technology to establish the large capacity cache area for the backstage database, and to cushion customers ’ visiting request to the database, so as to reduce the frequency of the server access. in this way, the searching efficiency of the database system shall be improved

    利用空間數據緩存技術,為后臺數據庫設置大容量的緩存區,用於緩沖客戶對數據庫的訪問請求,減少對服務器訪問次數,從而提高數據庫系統的檢索效率。
  12. 2. 768 * 576 pixels and 24 bit real time dynamic and static pictures can be captured by a special medical video card. the number and quality of the pictures captured can be controlled by the frame frequency, size of the documents enacted. owing to the image real time compress technology, real time record can be long time, documents transcribed can be re - screened randomly, operation database can be created automatically, normative operation reports can be printed freely

    2 、通過一塊專有的圖像採集卡可以捕獲768 * 576象素解析度的真彩實時動態和靜態圖像;可通過設定捕捉頻率、幀數、文件大小來控制所捕獲圖像的數量和質量;由於採用運動圖像實時壓縮技術,可以長時間實時錄像,同時能任意回放錄制的文件;自動生成手術數據庫,能隨意列印規范的手術報告單。
  13. Second, using the method of wavelet - transform, extract the stable second - low frequency wavelet coefficient, build face database. third, for the sake of eliminating the correlations between entities of the image vector and extracting character - vector, which keeps the main class - information and can be used to rebuild original image, the principal component analysis ( pca ) was used

    對人臉庫進行主成份分析,此方法根據人臉圖像整體的灰度相關性來提取特徵向量,所提取出的特徵向量保留了原圖像空間中的主要分類信息,並能在均方誤差最小的意義上重建原圖像。
  14. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  15. With the strict requirement analysis, the inspecting system of atm video frequency machine includes there parts : the flat roof application, database, communication application

    系統達到了及時反映各atm視頻監控機的modem 、硬盤、視頻卡、視頻鏡頭的實時狀態。
  16. This paper is focused on images watermarking algorithms. watermark casting operates in frequency domain, embeds pseudo - random sequence of real number in selected coefficients without image degradation. a blind watermark retrieval technique that can detect the embedded watermark without resorting the original image is proposed, so that the proposed techniques represents a major improvements to those relying on the comparison between the watermarked and original image, which is not practical for a huge image database

    本文主要研究針對圖像水印系統的演算法研究,採用偽隨機序列作為水印信號,利用變換域系數作為水印的載體,在不降低圖像質量的前提下達到嵌入水印的目的,在恢復水印的過程中無需原始圖像的參與,相比較那些需要利用原始圖像恢復數據的系統,文中所提出的方案更具有實用性。
  17. In this model, a local voice server is used to compound voice, broadcast voice, receive dual tone multi frequency ( dtmf ) code and perform concurrent working ; in the meantime, some mature internet technologies such as routing, virtual private network ( vpn ) along with thread technology are also used to carry out valid, reliable access to remote database

    在這個模型中,用本地的語音服務器進行語音的合成與播放、接收雙音多頻碼和實現并行工作,同時利用internet中成熟的路由及安全加密等技術對異地數據庫進行有效和可靠的訪問,以獲得語音服務所需要的數據。
  18. With the rapid prevalence and explosive development of internet, there have been many new applications such as the network conferencing, the update of distributed database, distributed database exploitation, cscw, etc, transmitting information of these applications will deal with not only the point to point way but also the ones that will be much of the video frequency and sound frequency, this produces new challenges for traditional routing selection mechanism

    隨著internet的迅速普及和爆炸性發展,在網路上產生了許多新的應用,如網路會議、分散式資源發現、分散式數據庫開發等,這些應用不再是簡單的點對點的文本信息傳輸,而是一般需要傳輸大量的音頻、視頻等多媒體信息,這就對傳統的路由選擇機制提出了新的挑戰。
  19. This project mainly introduces the research and the design of the ethernet - based communication radio - frequency identification ( rfid ) application system. and it also analyzes and designs the radio frequency communication signal, the tcp / ip principles, the information security, the practical way to design the circuit hardware, the practice of software engineering and the application of database management systems, in which it also suggests some new thought for the practical application

    本畢業設計主要是對基於以太網傳輸的射頻識別( rfid )應用系統進行研究和設計,並對射頻通信信號, tcp ip網路,信息安全,硬體開發,軟體工程,數據庫應用等進行分析和設計並提出一些結合實際應用的新思路。
  20. Cbir ( content - based image retrieval ) which becoming more and more important technique in large image database organization and management is the combine of the image retrieval and traditional multimedia information retrieval. it approximately can be divided into many aspect, shape - based retrieval, color - based retrieval, texture - based retrieval, and so on. wavelet analysis is the widely used time - frequency tool

    基於內容的的圖像檢索技術cbir ( content - basedimageretrieval )是圖像處理技術和傳統的多媒體信息檢索方法結合的結果,是近年來檢索領域內的研究熱點,大致可以分成基於形狀、顏色、紋理等圖像特徵的檢索。
分享友人