未識別的信息 的英文怎麼說
中文拼音 [wèizhìbiédexìnxī]
未識別的信息
英文
unrecognized information- 未 : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
- 識 : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
- 別 : 別動詞[方言] (改變) change (sb. 's opinion)
- 的 : 4次方是 The fourth power of 2 is direction
- 息 : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
-
With the help of video detection and recognition methods, we can sample real - timely traffic messages, such as traffic flow, road situation and so on, and get the relative information so as to avoid traffic jam before it happens, on the other hand, to real - time traffic breach detection, video detection and recognition methods is also very effective, especially, it can provide strong evidence for traffic policemen
通過視頻圖象的檢測與識別,可以對道路的交通流、路況等實時監視,提取交通流信息(車流量、車道佔有率、車速等) ,在交通擁擠未發生時,及時採取措施、疏導交通、防止交通擁擠發生;另一方面,通過視頻圖象的檢測與識別,還可以實時檢測交通違章現象、識別違章車輛的車牌號碼,為公安交通管理部門提供強有力的執法證據。The segments are called as isochores. so far identification of isochore boundaries is still not solved satisfactorily by bioinformatics methods
識別真核生物基因組的isochore邊界是生物信息學尚未很好解決的問題之一。Higher capabilities were put forward for detection, identification and anti - interference of torpedo in future naval battle. compared with the narrow - band processing, wide - band processing is a new direction for underwater signal processing for its advantages including abundant information of wide - band echo and little correlation of reverberation
未來海戰對魚雷在探測目標、識別目標和反對抗能力方面提出了更高的要求,而寬頻帶回波信號具有攜帶目標信息量大,混響背景相關性弱,利於檢測、識別目標等優點,因此自導系統發展的方向是寬頻帶自導。One method was supervised recognition, which was to take advantage of some known information to determine a given sequence whether contained some specific functional elements ; the other way was unsupervised learning, which was to utilize some measures of comparability and some search algorithm to discovery some potential signals in biosequences
一種是有指導的識別方法,即利用已知的信息判讀一段未知的序列中是否含有某種功能元件;另一種是無指導的學習方法,即利用一些相似性指標,通過搜索演算法發現序列中可能蘊含的信號。Experiment results show that this method can improve the identification rate of multi - band sar images classification
該方法通過對分類結果中矛盾和未知信息的有效處理,可提高多波段sar圖像分類的識別率。In further research, the following issues must be considered : 1 ) the standardize of corpus ; 2 ) improve the accuracy of chinese words divided syncopation system, handle the different meanings of one word and recognize the words that do not appear in the dictionary ; 3 ) process semantic analysis ; 4 ) dynamically update the training sets fed back by the user ; 5 ) quantitatively analyze the system performance influenced by different factors, use an appropriate model to compare and evaluate the web text classification system ; 6 ) natural language process ; 7 ) distinguish the disguise of sensitive words
在以後的工作中考慮如下問題: 1 )數據集的標準化; 2 )分詞系統精度的提高,對歧義處理以及未登錄詞識別的能力的提高: 3 )進行合理的語義分析: 4 )利用用戶反饋信息動態更新訓練集; 5 )定t分析分類器不同要素對分類系統性能的影響,使用合適的模型來比較和評價分類系統; 6 )自然語言理解問題,如「引用」問題; 7 )對于敏感詞匯偽裝的識別問題。Today, with the rapid development of information and internet all over the world, information security is extraordinarily important, especially, personal identification technology. because biological feature identification technology has unique stability, uniqueness and convenience, it is applied more and more broadly
當今社會高度信息化網路化,信息安全顯示出前所未有的重要性,身份鑒定技術具有非常重要的應用價值,生物特徵識別技術以其特有的穩定性、唯一性和方便性,得到越來越廣泛地應用。It ignores unrecognized data if possible and fills in missing month, day, and year information with the current time
如有可能,它將忽略未被識別的數據,並用當前時間填充缺少的年月日信息。In recent years, the developments of sensors based on photoinduced electron transfer for recognition of cations, anions, biological molecules in many fields and molecular switches based on photoinduced electron transfer as molecular devices for information technology in future were reviewed in details
綜述了近年來光誘導電子轉移傳感器在生命科學、環境科學、醫學、材料科學等領域內對陽離子、陰離子、生物小分子的識別及光誘導電子轉移分子開關在未來信息技術中用於集成化程度更高、體積更小的分子器件的研究進展。In the appliance of object identify and scene analysis, we need comprehend the geometry structure relationship. if camera is not calibration how to use the scene ' s information and vanishing points to accomplish it. then we give two algorithms and introduce the range of apply
在目標識別和場景分析的應用中,我們經常需要了解場景中的空間幾何結構關系,如何在攝像機未事先標定的情況下,利用場景中的有關信息,結合圖像中的消失點,獲得場景中相關幾何信息。( 2 ) subspace lda algorithm based on fisher linear discriminant this paper introduced subspace lda algorithm based on fisher linear discriminant for the pca - based face recognition algorithm ca n ' t utilize the class information of train data
( 2 ) 、基於fisher線性判別的subspacelda人臉識別由於pca演算法未能有效地利用訓練樣本類別信息,所以引入了基於fisher線性判別的subspacelda人臉識別演算法。Hi order to improve the shipping navigation safety, operating efficiency and the information transmitting capacity on the sea, the international maritime organization and international telecom union confirm that ais ( automobile identifying system ) is the identifying, inspecting and communicating system on the sea in the future
為了提高船舶航行安全、操作效率以及海上信息傳輸能力,國際海事組織和國際電聯確定了ais (船舶自動識別系統, automobileidentifyingsystem )為未來的海上識別、監測和通信系統。It actively identifies the malicious usage behavior of information system and actively responses to it. the ids ( intrusion detection system ) and ips ( intrusion prevention system ) not only detect and prevent the exterior network ' s intrusion behavior, but also keep watch on and prevent the internal network ' s mistaken operations
入侵檢測與防禦技術作為新一代的網路信息安全保障技術,它主動地對網路信息系統中的惡意入侵行為進行識別和響應,不僅檢測和防禦來自外部網路的入侵行為,同時也監視和防止內部用戶的未授權活動和誤操作行為。As for the way of speaking of the future economy have a lot of grow, such as knowledge economy, new economy, information economy, post - industrial economies, attention economies, network economy, etc., but their foundation is the same, this is computer network, especially internet
關于未來經濟的說法有很多種,如知識經濟、新經濟、信息經濟、后工業經濟、注意力經濟、網路經濟等,但他們的基礎是相同的,這就是計算機網路,特別是internet (國際網際網路絡) 。Given a received communication signal, the objective of modulation recognition is to decide the modulation format and estimate the modulation parameters of the communication signal without any priori knowledge about the signal information content
給定一段接收的通信信號,調制識別的目的就是在未知調制信息內容的前提下,判斷出通信信號的調制方式,並估計出相應的調制參數。The residual signals will be gotten from the comparison between the actual and prediction states. use a som neural networks as a classifier to classify characteristics contained in the residuals. so, we can detect whether the traffic incident has happened. this algorithm can detect not only whether the traffic incident has happened but also the level of accidental congestion caused by the traffic incident the second is another freeway traffic incident detection novel algorithm based on art2 neural networks. this algorithm uses the freeway traffic flow model and art2 neural networks as observer and classifier, respectively. the residual signals will be gotten from the comparison between the actual and estimated value of observer. use the art2 neural networks to classify characteristics contained in the residuals. so. we can detect whether the traffic incident has happened. this algorithm can recognize new pattern at the same ti
第二種是基於ar咒神經網路的檢測高速公路交通事件的新演算法。該演算法利用高速公路交通流模型和artz神經網路分別作觀測器和分類器,觀測器估計的數據和實際交通數據進行比較,得到殘差序列;利用artz神經網路對殘差序列進行分類,以區分不同交通狀態下的交通信息,達到檢測交通事件的目的。本演算法不但可以識別已知的交通事件類型,還可以識別未知的或從未出現過的交通事件類型,是一個可以邊工作、邊學習的檢測系統。The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety
論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。Combining the decomposition of the structural stiffness matrix with an identification approach with unknown input, a method of composite inversion is suggested
通過結構動力矩陣的分解並結合作者提出的一種在輸入信息未知的條件下識別結構物理參數的方法,提出了一類復合反演演算法。To solve the problem of unknown word identification, this paper adopts roles based tagging method. this method can make full use of the context information and transform the problem of unknown word identification to the problem of role sequence tagging
對于未登錄詞識別,文本採用了基於角色標注的未登錄詞識別方法,這種方法能充分利用未登錄詞的上下文信息並把未登錄詞識別的問題轉化為角色序列的標注問題。Because of inadequate information obtained, difficulty of mount and lowness of dependability, traditional vehicle detection and classification with induction loop or piezoelectricity sensor can not be widely used
傳統的利用環形感應線圈或壓電傳感器等識別車輛類型,安裝不方便,器件容易損壞,獲取的交通信息比較少,因此未能廣泛應用。分享友人