抽取屬性 的英文怎麼說

中文拼音 [chōuzhǔxìng]
抽取屬性 英文
extract attributes
  • : 動詞1 (把夾在中間的東西拉出; 提取) take out (from in between) 2 (從全部里取出一部分; 騰出) ...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : 屬名詞1 (類別) category 2 [生物學] (生物分類系統上所用的等級之一) genus 3 (家屬; 親屬) fami...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 抽取 : abstract
  1. Consequently, an excess number of otherwise normal pregnancies would be recommended to undergo definitive testing to ensure as many downs syndrome fetuses could be detected prenatally. however, conventional definitive genetic testing employs invasive methods, such as amniocentesis to obtain fetal tissue for testing, thus carrying a risk to the fetus

    但傳統的基因測試,例如羊膜穿刺術(俗稱羊胎水)入侵診斷方法,即是要用針穿過母體進入子宮,胎兒細胞,會為孕婦帶來一定的風險(例如流產) 。
  2. Consisting of the protracting graph of hydrogen - like atom ' s angle distributing, computer simulation of the symmetry of molecular orbital and chemical reaction mechanism, showing the molecular point group and symmetry element, computer simulation of molecular vibration, bravias ' s crystal lattice and their transforming, extracting of plane periodic lattice, extracting of solid periodic lattice, close packing of isometrical pellet and the structure of simple mental substance, close packing of unequal pellet and crystal structure of representative ionic crystal, computer simulation of phase analysis by x - ray diffraction

    內容包括類氫原子角度分布圖的繪制,分子軌道對稱和反應機理的微機模擬,分子點群和對稱元素顯示,分子振動運動的微機模擬,布拉維晶格和晶格轉化,平面點陣,立體點陣,等徑網球的密堆積和金單質結構,不等徑圓球密堆積和典型離子晶體結構, x射線多晶衍射的微機模擬十個子模塊。
  3. Results of data analyses showed that the high achievement women have standard body mass index of2l. 58, do not exercise much, do not have high level of caffeine consumption, and rarely smoke

    資料分析的結果顯示,受測的191位女專業人員與企業主管的平均身高為160 . 20公分,體重為55 . 41公斤,肥胖度指標為21 . 58 ,標準身材;不重視運動、咖啡因平均攝量低及只有少數人有煙習慣。
  4. To configure the table to have one column with a header labeled " name ", we must extract the table widget from the table viewer, create a table column widget as a child of the table, and set some properties for it, as shown in listing 11

    要配置表使其包含一列且列首標簽為「 name 」 ,必須從表查看器表窗口構件,將表的列這一窗口構件作為表的子元素來創建,並給它設置一些,如清單11中所示。
  5. The fuzzy division of the character lattice image can overcome the stroke position influence to the feature extraction. the fuzzy direction feature combines the fuzzy image division with the fuzzy direction property feature, which describes the stroke direction property of single edge point

    通過對字元點陣圖像的模糊劃分,克服筆畫位置對特徵的影響;用模糊方向特徵描述單個邊緣點筆畫方向;模糊方向特徵是圖像的模糊劃分和邊緣點的模糊方向特徵的結合。
  6. Secondly, to extract learning samples from the madm problem, an approach to estimate the utility functions for attributes is presented

    其次,提出了基於效用函數估計的學習樣本構造方法,從決策問題本身學習樣本。
  7. Abstract : an identification model of taste signals is developed based on fuzzy neural networks. the data compression and feature extraction of the sampled taste signals obtained using taste sensors are implemented employing wavelet transformation. fuzzy neural networks are used to identify the taste signals. the training of network weights and the optimization of membership functions are conducted employing genetic algorithms. the data processing and fuzzy identification of mixed acid and sweet taste signals are realized. simulated experimental results show that it is feasible and effective to introduce fuzzy neural networks into the fuzzy identification of taste signals

    文摘:文中提出了一種基於模糊神經網路方法的味覺信號識別模型,利用小波變換實現了對傳感器所採集的味覺信號進行數據壓縮及特徵,以模糊神經網路作為味覺信號的識別工具,並利用遺傳演算法訓練網路權值、優化隸度函數.文中實現了對酸、甜復合味覺信號的數據處理和模糊識別.實驗結果表明了將模糊神經網路引入到味覺信號模糊識別的可行和有效
  8. Now there are two basic target recognition strategies, such as processing from bottom to top, which is called data - driving method, and processing from top to bottom, which is called knowledge - driving method. the former begins with low layer processing for example, general segmentation, label and feature extraction, then judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model. the latter firstly brings forward a hypothesis on probably existed feature, secondly proceeds with purposeful segmentation, label and feature extraction, lastly judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model

    目標識別在工農業生產、國防建設中具有極其重要的地位,目前目標識別的演算法常用的有兩種,一種是由下而上的數據驅動型策略,即不管目標於何種類型,一律先對原圖像進行一股的分割、標記和特徵等低層次處理,然後將每個帶標記的已分割區域的特徵矢量與目標模型相匹配;另一種是由上而下的知識驅動型策略,即先對圖像中可能存在的特徵提出假設,根據假設進行有目的地分割、標記和特徵,在此基礎上與目標模型進行精確匹配。
  9. This subject combines object - oriented technology and abstracts the characteristic data of the simulator as the parameter control to encapsulate these abstract data into operational aircraft target according to object - oriented principle in order to realize c + + mechanism that have adopted, and construct the class that draws target of aircraft through data element, element parameterization, element attributes and the parameterizations of element attributes

    本課題採結合面向對象技術,提飛行模擬器的特徵數據作為參數控制,將這些象的數據依據面向對象原理封裝為可操作的飛行器對象,實現上採用c + +的類( class )機制,通過數據的圖元化、圖元的參數化、圖元的化、圖元的參數化構造飛行器對象繪制類。
  10. The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding

    主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和了相關的免疫機制,構造了一種免疫agent ,並利用動態模糊邏輯對其非空心智狀態進行了描述; ( 3 )給出了agent之間基於心智的通信方式; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia非自體識別模型和多tia協商非自體識別模型; ( 6 )將該安全模式在計算機病毒檢測中進行了應用,實現了一個簡單的基於二進制編碼的計算機病毒檢測模擬系統。
  11. Sampling procedures for inspection by attributes - part 3 : skip - lot sampling procedures ; identical with iso 2859 - 3 : 1991

    檢驗用樣程序.第3部分:箕斗式樣程序;等同
  12. The web hyperlink extraction techniques aims to extract the href value of < a > label in the source codes of the web, according to the need of the consumers

    網頁鏈接的是指將網頁源代碼中的< a >標簽的href值按照用戶的需求提出來。
分享友人