搜索代理 的英文怎麼說

中文拼音 [sōusuǒdài]
搜索代理 英文
search agent
  • : 動詞1. (尋找) collect; gather2. (搜查) search; ransack
  • : Ⅰ名詞1 (大繩子; 大鏈子) a large rope 2 (姓氏) a surname Ⅱ動詞1 (搜尋; 尋找) search 2 (要; ...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 搜索 : 1 (仔細尋找) search for; ferret about; hunt for; scout around 2 [電子學] hunting; scan; [控] in...
  1. The procedure functions in the compare between partial image of dynamic collection and corresponding image of the airscape. in chapter 5, basing on the analysis of correlative theory of digital image, we introduce the improved fasted - down algorithm and simulative anneal algorithm, which applies to nn calculation, an d bring forward the unique and effective means, correlative original value evaluation. basing on the combination of correlative arithmetic, a stable, high - speed and exact correlative arithmetic is formed, which makes it possible to apply computer vision detection of single - needle quilting in industrial production

    本文展開研究並取得一定成效:構建了基於pci總線的微機實時圖像採集系統;在採集的布料總圖(鳥瞰圖)的基礎上,通過數字圖像的數字濾波、圖像增強、邊緣檢測等處,提取布料圖像的邊緣,對輪廓的矢量化的象素點進行,得到相應的圖案矢量圖,從而確定絎縫的加工軌跡,生成加工指令;在進給加工過程中,主計算機對動態局部圖像與總圖(鳥瞰圖)的對應部分進行圖像相關的匹配計算,應用數字圖像論,結合神經網路計算的改進最速下降法和模擬退火演算法,提出獨特而有效的相關迭初始值賦值方法,形成穩定、高速和準確的相關運算,實現單針絎縫視覺測量和自動控制。
  2. Based on the real situation of submarine and antisubmarine warfare ( asw ), according to the classical design theory of transducer or transducer array, a sonar will be researched and made, which has the feature of more wider bandwidth, more lower operating frequency, more lager radiation acoustic power, more farther operating distance, more higher researching efficiency and more higher directive accuracy

    本文根據現潛戰和反潛戰( asw )的實際情況,按照經典的換能器和基陣的設計論,研製聲吶,旨在擴展其頻帶寬度、降低其工作頻率、增大其發射功率、擴大其作用距離以及提高其效率和定向準確度。
  3. Thirdly, from the idea of locally linear approximate, another tangent - plane algorithm is presented for the distance between the convex nurbs surfaces. the critical step is the construction of the support mapping by gjk and lc to search for nearest points, and emphases are laid on dealing with isotropic cases and choosing initial iterated points. it is also proved that no isotropism during iteration would take place if initial iterated points are positive points

    切平面法是運用gjk和lc構造支撐映射的原而設計的一個近點對的迭法,著重給出了迷向情況的處和初始迭點的選取方法,並證明了只要將初始迭點取為陽點,就不會出現迷向情況。
  4. According to the project of adaptive multi - rate speech coding ( amr ) being put forward by the third generation group of the mobile communication, this paper takes the principle of the speech arithmetic as the base, studies the technologies including the source controlled rate, voice activity detector, comfort noise and the error concealment unit in amr, discusses its the characteristic of adaptation and analyses its performances particularly. amr c codes are researched carefully through the modules being divided into and debugged under the tms320c54x provided by the ti corporation, and optimized in selecting the method of c code embedded assembler codes and simplified in the search codebook combining with the theory of speech coding, which are based on the realization about theory and practice of the optimization of amr speech coding

    從自適應多碼率語音編碼演算法的c碼出發,對它進行模塊劃分後作了系統分析,將其在vc下調試通過,進一步在ti公司提供的tms320c54x環境中進行調試,結合語音編碼論,對演算法進行優化,採用了在c碼中嵌入匯編和簡化自適應碼本和固定碼本的方法,部分地提高了c碼效率,為實現自適應多碼率語音編碼的優化奠定了論和實踐基礎。
  5. We can use optimal search theory to solve this problem. optimal search theory is a subject developed during the world wide war ii. the optimal search problem involves computing how resources can be allocated so as to maximize the probability of detection, or to minimize the comsumption of resources used

    最優論是二戰期間發展起來的一門學科,最優論要解決的核心問題就是在總資源有限的情況下,如何分配資源使得成功到目標的可能性最大或花費的價最小。
  6. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息web計算環境下的空間信息安全性問題基於metadata的空間信息web集成方案與智能空間引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  7. Google inc. nasdaq : goog, creator of the award - winning search engine, and china enterprise, a leading brand in it application services for businesses, today jointly announced a partnership whereby ce will become the first company authorized to sell google adwordsr advertisements in china

    全球著名的網路引擎開發商google公司與中國國內最大的it應用服務運營商中企動力今天聯合宣布,中企動力成為google在中國的首家正式授權合作伴,銷售google adwords關鍵詞廣告服務。
  8. Code snippets manager dialog box, click search online

    在「碼段管器」對話框中單擊「聯機」 。
  9. The some fire control system is an advanced multi - senor short range air defense system, which integrated both x and ka bands searching and tracking radars, laser range finder, combined the control computer of subsystem with the master computer, and applied the technology of data fusion

    摘要某火控系統集兩個頻率波段的雷達、跟蹤雷達和電視跟蹤器、激光測距機於一體,分系統控制處計算機與系統主計算機相結合,採用了數據融合技術,是一部多傳感器集成的現化防空系統,具有性能好、反應時間快、抗干擾能力強、自動化程度高、使用性能好等特點。
  10. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異常記錄以一定的形式顯示出來或通知管人員,交給管人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據論的推策略和示例學習方法,替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過及時判斷,及時阻斷非法訪問,比事後得人工處更有意義。
  11. " china has 100 million internet users and mobile phone users is the amount of three times the figure, since the 100 million internet users could create such a big internet search market. 300 million cell phone users have a reason to be three times the market, " ma zhaode clearly understand that, as the 3g ( third generation mobile communication technology ) business of the day draws nearer, the mobile telecommunication network applications, service began gradually warming, the time has not to be missed

    「中國有1億網民,手機用戶量是這個數字的3倍,既然1億網民可以造就這么大的網際網路的市場, 3億手機用戶有由可以產生3倍的市場」 ,馬昭德清醒地認識到,隨著3g (第三移動通信技術)商用化的日益臨近,移動通訊網路的應用、服務開始逐步升溫,時機已不容錯過。
  12. The fourth part introduces the main technology that is needed in the design of the personalized search engine system. the technology includes intelligent agent, conception retrieval technology, user interests digging technology, web mining, information push technology and xml

    第四部分介紹了實現個性化引擎系統所需要的主要技術,包括智能agent技術、概念檢技術、用戶興趣挖掘技術、網路信息挖掘技術、信息推送技術和xml技術。
  13. The search algorithm makes use of rewritting rules to get a set of equivalent b _ schemas, utilize the cost model to estimate the cost of each b _ schema and iterative search the min - cost b _ schema

    引入一種演算法進行優化處。該演算法利用改寫規則得到一組等價的b _ schema集合,對b _ schema進行價估計、比較,迭得到價最小的b _ schema 。
  14. At last the paper uses fully learning data according celts, constructs theory and methord of implementing system. the theory has two aspects : gives imprecise learning methords using rules when sequencing initially, such as introducing, narrating emphases and so on ; during the process of learning, we construct a fuzzy evaluating model using the data of scores, learning time and browsing times, and adjust scores with learning objects. then we can inference more precice learning strategy based on the result of evaluation, such as searching previous knowledge units, learning current knowledge units repeatly

    該原主要體現在兩個方面:一是在初始編列時,根據規則的匹配與調用可以實現較為粗略的教學方法指導,如一般性介紹、重點講述等;二是在過程導學當中,針對最具表性的測驗成績、學習時間、瀏覽次數的學習效果和行為,結合學習者的預期學習目標等因素進行適當的成績調整、時間改進等處,並運用模糊綜合評判的方法對學習者實施有效評價,以推出在學習過程中較為細化的教學建議,如前驅知識單元、重新學習當前知識單元等。
  15. The main research work of dissertation can be concluded as follows : 1. two kinds of hybrid strategies of genetic algorithms and tabu search are discussed systematically in this paper. the idea of tabu search is introduced to improve crossover operator and mutation operator of genetic algorithms for the first strategy, while tabu search is executed to a certain proportional selected individuals in the population after genetic evolution of every generation for the second strategy

    本文的主要研究成果概括如下: 1 .論文比較系統地探討了遺傳演算法和禁忌演算法的兩種混合策略:第一種是利用禁忌的思想來改進遺傳演算法的交叉運算元和變異運算元;第二種是對每中交叉變異后得到的新種群中的一定比例的個體進行禁忌
  16. Spidering agents are notified that certain foaf files aren t encrypted for them, and the agents can then ignore those files

    搜索代理得到沒有為它們加密某些foaf文件的通知,於是可以忽略那些文件。
  17. Some use them to keep a close watch on the demand for their line of work or gather information on compensation to arm themselves when negotiating for a raise

    有些人利用它們(搜索代理)密切關注本行業的需求,或集有關補償信息,為增薪談判作好準備。
  18. To study the intelligentization of search tools for network education resources and provide personalized information service of intelligent agent system for students, the design and implementation of a personalized intelligent agent search engine is proposed based on the concept network and intelligent search agent technology under the background of current network education resource environment

    摘要為研究網路教育資源工具的智能化,並為學生提供個性化信息服務的智能系統,以當前網路教育資源環境為背景,基於「概念網」和「智能搜索代理」技術,提出面向網路教育的個性化智能引擎的設計和實現方法。
  19. In this paper, we elaborate an intelligent search agent working on the internet, introduce the conception of ontology into the agent, make use of ability of ontology to describe semantic knowledge, set up a simple model of information agent using ontology to standardize the user ' s requests, analyze the results returned by the search agent and study the user ' s interests in order to let the information agent to retrieve information for users without requests

    本文對因特網上的智能agent作了比較深入的研究,將本體引入到智能信息agent中來,利用本體對語義知識描述的特長,在某個領域內建立一個簡單的本體實例,用來規範本體的查詢請求、分析處搜索代理返回的結果、學習用戶的興趣愛好,使其能自主的為用戶查找用戶感興趣的信息。
  20. The author bring forward meta search engine model mysearch, it mainly comprises user interface agent, search agent and search database

    作者提出了一個元引擎模型mysearch ,它包括了用戶界面,檢,查詢數據庫這三個部分。
分享友人