tree network 中文意思是什麼

tree network 解釋
樹型網路
  • tree : n 特里〈姓氏〉。n 1 樹〈主要指喬木,也可指較大的灌木〉。 ★玫瑰可以稱為 bush 也可以稱為 tree 2 木...
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  1. Firstly the patterns of the multifingered hands are detailed, eight patterns are defined. the classical bayes method is used in the classification of pre - grasp of multiple fingers based on three patterns which are grasping, holding and pinching. based on the eight pre - grasp patterns, bp neural network is applied in the classification of the pre - grasp of multifingered hands and gets a good effect. the method solves the shortcoming input sample relying on the propobility density and simplified the un - insititution characters extraction. in this paper, support vector machine ( svm ) and binary - tree with clustering is applied in the classification. this method can solve the slow speed and effect with fewness sample in the classification, achieving a good effect. in this papper, we extract the characters of the regulation object with geometry characters and extact the unregulation object with the image analysis

    此法解決了輸入樣本依賴物體的概率密度的特點,簡化了分類特徵提取的不直觀性。本文還採用了支持向量機( svm )和聚類二叉樹相結合的方法對機器人手預抓取八類模式進行分類,解決了預抓取模式分類訓練速度過慢以及在分類中樣本數量偏少而影響分類效果的問題,得到了較高的正確率。本文對預抓取幾何形狀規則的物體採用直接提取其幾何特徵,對于預抓取幾何形狀不規則的物體採用圖像分析的方法進行特徵提取。
  2. Get 4 right anterolateral femoral flaps and 4 left scapular flaps which were dyed obviously after 3 days, dehydrate by graded ethanol, vitrification and paraffin embeded, horizontally and vertically sliced continuously, thickness is 15, 20 and loojtim respectively, he dyed, observed under microscope. results : ( 1 ) direct cutaneous artery or musculo - cutaneous artery, in the procedure of common integument tissue being shallowed up step by step, continuously sending out branches to deep fascia layer, superficial fascia layer, hypodermis layer, hypopapilla layer and papilla layer to form the five - grade cutaneous microcirculation " blood vessel tree " of the skin blood vessel network that can be identified

    結果門)亙接皮動脈或肌皮動脈,在體被組織逐步淺出的整個行程中,不斷發出分支並分別在深筋膜層、皮下組織(淺筋膜)層、真皮下層、乳頭下層和乳頭層內形成五級具有鑒別特徵的皮膚微循環血管網(血管樹) 。 ( 2 )體被組織靜脈血管網由淺入深分為五層:皮膚乳頭層。乳頭下層、真皮下層、皮下組織層和深筋膜層。
  3. Abstract : the complexity of tree set analysis for network was compared with that of minimum cut set analysis. if was illustrated by an example that the analysis method based on minimum cut set is the best approach for the availability analysis of network

    摘要:對網路分析的樹集分析法與最小割集分析法的復雜性進行了比較,並示例說明以最小割集為基礎進行網路可用性分析是最佳的技術途徑。
  4. The paper introduced the definition and sort and field arrangement and remote monitoring of field sensor ( a new combination of remote monitor and control and network and sensor ). then tried to make use of transfer image to reconstruct tree diameter at breast height through stereo vision, the result was fairy well to realize measure diameter without field survey

    首先對其定義、種類、外業設置及遠程監控操作做了簡單的介紹,然後嘗試利用原野服務器傳回的圖像,通過立體視覺技術重建遠隔地樹木的胸徑,得到了較為滿意的結果,從而實現了不到現地便能夠測量直徑的目的。
  5. This thesis gives a brief account of the basic theories of software engineering and computer graphics, of the data structure of individual component modeling, of the design of the software structure and of the method of realizing software. meanwhile, this thesis put more emphasis on the exploration of the arithmetic of the delaunay triangle network, nurbs curve integration, the filling - in arithmetic of triple - tree, and the arithmetic based on the scan - line arithmetic and the filling - in of complex section

    文章介紹了關于軟體工程學與計算機圖形學的基本理論及其各組件模型的數據結構、軟體結構設計與軟體實現的技術方法,並重點討論了基於約束條件的delaunay三角網格化演算法、 nurbs (非均勻有理b樣條)曲面擬合、三叉樹等值線填充演算法和基於掃描線的復雜剖面填充演算法。
  6. The cloning cdna fragment was extracted from positive clones and sequenced. the results showed that the cdna fragment was 816bp in size, encoding a protein which included 272 amino acids. the sequence homology analysis was carried out via the software blast 2. 0 network service in the four large databases - genbank, embl, ddbj, pdb, which had recorded 1 337 978 nucleotide and protein sequences. the results of the analysis indicated that the nucleotide homologous rates between the rubber tree etr and 15 recorded etrl of other plants ( mango, passion fruit, persia plum, strawberry, grape. . etc ) were 75 % - 80 % ; the protein homologous rates between the rubber tree etrl and these recorded etrl genes were 90 % - 95 %. from the results mentioned above, we could confirm that the cdna of rubber tree etrl had been cloned

    從陽性克隆子中提取克隆片段,經序列測定分析,結果表明,克隆片段的cdna大小為816bp ,編碼的蛋白質包含272個氨基酸。基因序列通過blast2 . 0networkservice軟體對genbank , embl , ddbj , pdb四個大型數據庫中記錄的1337978條核酸和蛋白質序列進行序列相似性檢索,結果表明與芒果、一西番蓮、波斯梅、草毒、葡萄、西洋梨等15種已報道的植物的etrl基因cdnag的同源率為75 88 ;蛋白質氨基酸序列的同源率為90 95 ,表明本研究確實克隆到了橡膠樹etri基因的cdna序列。 4
  7. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  8. Formulization of network attack pattern based on improved attack tree

    基於改進攻擊樹的網路攻擊模式形式化研究
  9. After analyzing the character of risk, i introduce data mining method into risk management, to solve the contradiction between great capacity of data and lack of information, the methods include mathematics statistics and artificial neural network ( ann ). then, i study on the methods of risk management in risk identification, risk evaluation and risk disposal, what is advanced, fault tree analysis method based on fuzzy probability, stochastic simulation method and the topsis method based on interval number all consider the characteristic of risk. finally, i discussed the application of information system ( mis ) in project risk management, and developed a risk management information system

    論文在深入分析了風險特徵之後,將數據挖掘技術引入風險管理,用以解決海量數據與貧乏信息之間的矛盾,所採用的技術有數理統計和人工神經網路( ann )兩種方法;接著,論文對風險識別、風險評價、風險處理中的風險管理方法進行了研究,所提出的基於模糊概率的故障樹技術、隨機模擬技術和基於區間數的topsis方法都體現了風險管理的特點;最後,論文對信息系統( mis )在工程項目風險管理中的應用進行了探討,開發出一個風險管理信息系統。
  10. This thesis explains the necessity of the character recognition technology of the computer at first, describe the meaning in which the handwritten numeral discerns ; pretreatment technology of handwritten numeral recognition, including two value, line segmentation, word segmentation smooth, removing noising, standardization and thinning are discussed two value concretely discusses whole threshold value, some threshold value, dynamic threshold value and utilize space information to carry on threshold, which are several kinds of common method of choosing threshold value, especially utilize space information to carry on threshold value is describe in detail ; adopting to the foundation of thinning based on mathematics morphology, thinning algorithm of serials same and thinning algorithm of protecting shape are discussed ; afterwards, according to principle ' s diagram of the on - line character recognition, by analyzing the structure feature of the handwritten numeral, this thesis has proposed the online recognition te chnology of the free handwritten numeral based on the stroke feature and the online recognition technology of the free handwritten numeral based on the multistage classifying device. detail narrated noise removing, stroke characteristic definition and discernment, distance criterion of whole word match ; then under the foundation of handwritten numeral segmentation, off - line handwritten numeral recognition is researched. especially minimum distance classifying device, tree classifying device and adaptive resonance ( art ) network classifying device is discussed at the same time, believes degree analyses are introduced to integrate a lot of classifying devices ; at the end, the typical application of the handwritten numeral recognition was briefly narrated, its application in extensive data statistics, financial affairs, tax, finance and mail sorting have been explored

    二值化時對整體閾值二值化、局部閾值二值化、動態閾值二值化和利用空間信息進行閾值選取幾種常用的閾值選取方法進行討論,特別對利用空間信息進行閾值選取進行了詳細論述;在對通過對基於數學形態學的細化的基礎上,討論序貫同倫形態細化演算法和保形的快速形態細化演算法;然後依據聯機字元識別原理框圖,分析了手寫數字的結構特點,提出了基於筆劃特徵的任意手寫數字在線識別技術和基於多級分類器任意手寫數字在線識別技術,對其中涉及的筆劃識別前的噪聲處理、筆劃間特徵量的定義及識別、整字匹配的距離準則進行了詳細敘述;繼而在對手寫數字的分割的基礎下對脫機手寫數字識別進行了研究,對基於最小距離分類器字元識別、基於樹分類器的字元識別、基於自適應共振( art )網路的字元識別分別進行了詳細討論,並引入置信度分析將多個分類器進行了混合集成;最後簡單闡述了手寫數字識別的典型應用,對其在大規模數據統計、財務、稅務、金融及郵件分揀中的應用進行了探索。
  11. Simulated results showed that the proposed algorithm is available to construct effectively and quickly, the multicast tree satisfying delay constraint and lowest link cost, with network load balance taken into account to pick out the cheaper idle route

    模擬結果表明,該演算法在考慮網路的負載均衡情況下,選擇鏈路代價較低的空閑路徑,快速、有效地構建滿足時延要求,鏈路代價最小的組播樹。
  12. First, the paper analyzes four basic view pictures, and build up a product - developing - project system, which can be decomposed into a " project - tree " in the upright direction and has " workflow - networks " in the horizonal direction, with its life cycle and management work. then the paper studies the methods of decomposing the " project - tree " and designing the " workflow - network ". finally, the paper studies how to develope such a pdpm infomation system and designs it, and compares the traits of different software srurctures and the new web services technology by the way

    本文首先分析了項目管理的四個基本視圖,在此基礎上建立了「縱向分解成項目樹、橫向具有工作流」的產品開發項目體系,並描述了項目管理的生命周期和管理功能,然後重點探討了項目管理兩個主要功能? ?縱向項目樹分解、橫向工作流規劃的方法或演算法,最後選擇基於web的多層體系結構和支持webservices組件技術的。
  13. In this thesis, load flow algorithm for radial distribution networks is also discussed. a new alternate iterating algorithm is adopted which shows its efficiency in distribution reliability evaluation. a new algorithm of double - - layer tree structure to simplify the complex distribution network is proposed, which is used in fmea to improve the efficiency of distribution reliability evaluation

    根據實際配電網的運行情況,建立了分析其可靠性的統計和預測指標;討論了適用於配電網可靠性分析的潮流計算方法;提出了雙層樹結構的配電網路簡化方法,並應用於故障模式後果分析法中,提高了應用故障模式後果分析法分析配電網可靠性的效率。
  14. Ktr is a dynamic wireless routing protocol based on the tree structure. the complicated topology of wireless network is abstracted to a tree structure in ktr while the dynamic routes are created on the basis of discovery and maintenance of neighbor relationships and mobile users " positions

    協議以無線移動自組織網際網路的兩級網路體系結構為基礎,將復雜多變的無線網路拓撲抽象為核心樹結構,將動態路由的產生建立在對節點的鄰居關系和對移動用戶的位置關系的發現和維護之上。
  15. In order to adapting to the challenge of new military revolution oriented from the information technique, speed up our army information - based construction, the thesis make a design of the conducting and controlling network in the armor mechanization troops. included in the “ group army information - based experiment for military revolution ”, according to the basic regulation of the information processing, the network breaks the original tree - scheme network structure and sets up a principle grid architecture, which realizes the platform of vehicle - to - vehicle, crossing organization or arms of services, and meets the command of synthesizing function unit, integrating system and sharing the information and network construction in the transformation period of army constructing, by the means of obtaining, delivering, processing, utilizing and feed - backing information

    為適應以信息技術為核心的世界新軍事革命的挑戰,加快我軍信息化建設,本課題就適應轉型期的陸軍指揮控制網路建設的需求,在集團軍小型試驗群架構下,對裝甲機械化部隊野戰指揮控制網路進行設計,旨在打破原有的樹型結構,按照信息流程的基本規律,構建一個縱向到單車、橫向跨建制與兵種,具備信息獲取、信息傳輸、信息處理、信息使用和信息反饋功能的原理性區域柵格狀的新型指揮控制網路,實現功能綜合化、系統一體化、信息共享化的要求。
  16. At network layer, an initialization algorithm based polling is researched to establish preliminary connections autonomously. and a genetic algorithm based optimization is used to obtain a routing tree that results in minimum energy consumption

    在網路層的初始化演算法中,研究了基於輪詢的方法來形成網路的最初連接圖,並用基於優化的遺傳演算法來獲得一棵具有最小能量消耗的路由樹。
  17. The method can describe the radar intelligence network survivability quantitatively by applying the radar coefficients, the elements ' survival probability based on some suppositions that the command level and intelligence flow in the radar intelligence network are similar to the tree structure and the elements can only belong to two states, i. e. work normally or lose efficiency wholly

    該方法利用雷達情報網在指揮層次和信息流向呈現樹型的特點,在功能單元的工作狀態上採用「工作正常、完全失效」二態模式評估模型的基礎上,運用雷達效能因子和各功能單元生存概率,給出了雷達情報網生存能力的一個量化描述。
  18. A high effective network intrusion detection system based on tree augmented na ve bayes

    基於樹擴展樸素貝葉斯的高效網路入侵檢測系統
  19. Abstract : in this article an optimization method is applied to de sign open - type distribution networks. graph theory technology is used. its mathem at ical model considers both the investment of constructing lines and the cost of o peration. the main idea is getting the structure of tree network that meets with the technical constraint conditions and at the same time make the annual cost mi nimum. the examples of simulation show that this method is fast and effective

    文摘:將圖論優化技術應用於配電網路的優化設計,提出了一種適合於開式配電網路規劃的優化方法.所建的數學模型綜合考慮了待建線路的投資和運行費用.求解方法是以圖論中的最短路徑問題為基礎,配合以開式網路潮流演算法,並通過可行路徑的合理變換,得出滿足技術約束條件且使年計算費用取極小值的樹狀網路結構
  20. Parallel fast fourier transform algorithm based on binary fat tree network

    一種基於二叉胖樹模型的并行fft演算法
分享友人