未識別的信息 的英文怎麼說

中文拼音 [wèizhìbiédexìn]
未識別的信息 英文
unrecognized information
  • : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  1. With the help of video detection and recognition methods, we can sample real - timely traffic messages, such as traffic flow, road situation and so on, and get the relative information so as to avoid traffic jam before it happens, on the other hand, to real - time traffic breach detection, video detection and recognition methods is also very effective, especially, it can provide strong evidence for traffic policemen

    通過視頻圖象檢測與,可以對道路交通流、路況等實時監視,提取交通流(車流量、車道佔有率、車速等) ,在交通擁擠發生時,及時採取措施、疏導交通、防止交通擁擠發生;另一方面,通過視頻圖象檢測與,還可以實時檢測交通違章現象、違章車輛車牌號碼,為公安交通管理部門提供強有力執法證據。
  2. The segments are called as isochores. so far identification of isochore boundaries is still not solved satisfactorily by bioinformatics methods

    真核生物基因組isochore邊界是生物學尚很好解決問題之一。
  3. Higher capabilities were put forward for detection, identification and anti - interference of torpedo in future naval battle. compared with the narrow - band processing, wide - band processing is a new direction for underwater signal processing for its advantages including abundant information of wide - band echo and little correlation of reverberation

    來海戰對魚雷在探測目標、目標和反對抗能力方面提出了更高要求,而寬頻帶回波號具有攜帶目標量大,混響背景相關性弱,利於檢測、目標等優點,因此自導系統發展方向是寬頻帶自導。
  4. One method was supervised recognition, which was to take advantage of some known information to determine a given sequence whether contained some specific functional elements ; the other way was unsupervised learning, which was to utilize some measures of comparability and some search algorithm to discovery some potential signals in biosequences

    一種是有指導方法,即利用已知判讀一段序列中是否含有某種功能元件;另一種是無指導學習方法,即利用一些相似性指標,通過搜索演算法發現序列中可能蘊含號。
  5. Experiment results show that this method can improve the identification rate of multi - band sar images classification

    該方法通過對分類結果中矛盾和有效處理,可提高多波段sar圖像分類率。
  6. In further research, the following issues must be considered : 1 ) the standardize of corpus ; 2 ) improve the accuracy of chinese words divided syncopation system, handle the different meanings of one word and recognize the words that do not appear in the dictionary ; 3 ) process semantic analysis ; 4 ) dynamically update the training sets fed back by the user ; 5 ) quantitatively analyze the system performance influenced by different factors, use an appropriate model to compare and evaluate the web text classification system ; 6 ) natural language process ; 7 ) distinguish the disguise of sensitive words

    在以後工作中考慮如下問題: 1 )數據集標準化; 2 )分詞系統精度提高,對歧義處理以及登錄詞能力提高: 3 )進行合理語義分析: 4 )利用用戶反饋動態更新訓練集; 5 )定t分析分類器不同要素對分類系統性能影響,使用合適模型來比較和評價分類系統; 6 )自然語言理解問題,如「引用」問題; 7 )對于敏感詞匯偽裝問題。
  7. Today, with the rapid development of information and internet all over the world, information security is extraordinarily important, especially, personal identification technology. because biological feature identification technology has unique stability, uniqueness and convenience, it is applied more and more broadly

    當今社會高度化網路化,安全顯示出前所重要性,身份鑒定技術具有非常重要應用價值,生物特徵技術以其特有穩定性、唯一性和方便性,得到越來越廣泛地應用。
  8. It ignores unrecognized data if possible and fills in missing month, day, and year information with the current time

    如有可能,它將忽略數據,並用當前時間填充缺少年月日
  9. In recent years, the developments of sensors based on photoinduced electron transfer for recognition of cations, anions, biological molecules in many fields and molecular switches based on photoinduced electron transfer as molecular devices for information technology in future were reviewed in details

    綜述了近年來光誘導電子轉移傳感器在生命科學、環境科學、醫學、材料科學等領域內對陽離子、陰離子、生物小分子及光誘導電子轉移分子開關在技術中用於集成化程度更高、體積更小分子器件研究進展。
  10. In the appliance of object identify and scene analysis, we need comprehend the geometry structure relationship. if camera is not calibration how to use the scene ' s information and vanishing points to accomplish it. then we give two algorithms and introduce the range of apply

    在目標和場景分析應用中,我們經常需要了解場景中空間幾何結構關系,如何在攝像機事先標定情況下,利用場景中有關,結合圖像中消失點,獲得場景中相關幾何
  11. ( 2 ) subspace lda algorithm based on fisher linear discriminant this paper introduced subspace lda algorithm based on fisher linear discriminant for the pca - based face recognition algorithm ca n ' t utilize the class information of train data

    ( 2 ) 、基於fisher線性判subspacelda人臉由於pca演算法能有效地利用訓練樣本類,所以引入了基於fisher線性判subspacelda人臉演算法。
  12. Hi order to improve the shipping navigation safety, operating efficiency and the information transmitting capacity on the sea, the international maritime organization and international telecom union confirm that ais ( automobile identifying system ) is the identifying, inspecting and communicating system on the sea in the future

    為了提高船舶航行安全、操作效率以及海上傳輸能力,國際海事組織和國際電聯確定了ais (船舶自動系統, automobileidentifyingsystem )為海上、監測和通系統。
  13. It actively identifies the malicious usage behavior of information system and actively responses to it. the ids ( intrusion detection system ) and ips ( intrusion prevention system ) not only detect and prevent the exterior network ' s intrusion behavior, but also keep watch on and prevent the internal network ' s mistaken operations

    入侵檢測與防禦技術作為新一代網路安全保障技術,它主動地對網路系統中惡意入侵行為進行和響應,不僅檢測和防禦來自外部網路入侵行為,同時也監視和防止內部用戶授權活動和誤操作行為。
  14. As for the way of speaking of the future economy have a lot of grow, such as knowledge economy, new economy, information economy, post - industrial economies, attention economies, network economy, etc., but their foundation is the same, this is computer network, especially internet

    關于來經濟說法有很多種,如知經濟、新經濟、經濟、后工業經濟、注意力經濟、網路經濟等,但他們基礎是相同,這就是計算機網路,特是internet (國際網際網路絡) 。
  15. Given a received communication signal, the objective of modulation recognition is to decide the modulation format and estimate the modulation parameters of the communication signal without any priori knowledge about the signal information content

    給定一段接收號,調制就是在知調制內容前提下,判斷出通調制方式,並估計出相應調制參數。
  16. The residual signals will be gotten from the comparison between the actual and prediction states. use a som neural networks as a classifier to classify characteristics contained in the residuals. so, we can detect whether the traffic incident has happened. this algorithm can detect not only whether the traffic incident has happened but also the level of accidental congestion caused by the traffic incident the second is another freeway traffic incident detection novel algorithm based on art2 neural networks. this algorithm uses the freeway traffic flow model and art2 neural networks as observer and classifier, respectively. the residual signals will be gotten from the comparison between the actual and estimated value of observer. use the art2 neural networks to classify characteristics contained in the residuals. so. we can detect whether the traffic incident has happened. this algorithm can recognize new pattern at the same ti

    第二種是基於ar咒神經網路檢測高速公路交通事件新演算法。該演算法利用高速公路交通流模型和artz神經網路分作觀測器和分類器,觀測器估計數據和實際交通數據進行比較,得到殘差序列;利用artz神經網路對殘差序列進行分類,以區分不同交通狀態下交通,達到檢測交通事件。本演算法不但可以已知交通事件類型,還可以或從出現過交通事件類型,是一個可以邊工作、邊學習檢測系統。
  17. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」特點,並結合來「網運分離」體制改革變化預測,選擇採用與之相適應基於b s體系架構、三層業務分佈、二層數據分佈整體方案,實現業務與數據分離,降低開發與應用過程復雜度和總體成本;對列車運行圖系統數據進行分析,設計符合3nf規范數據e - r關系模型,並著重研究處于分散式系統中列車運行圖數據訪問權限和數據安全問題,提出以視圖模式結合用戶權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統數據安全性;在基於b s架構系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端基於公用數據網路分組交換技術系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統網路安全性能。
  18. Combining the decomposition of the structural stiffness matrix with an identification approach with unknown input, a method of composite inversion is suggested

    通過結構動力矩陣分解並結合作者提出一種在輸入條件下結構物理參數方法,提出了一類復合反演演算法。
  19. To solve the problem of unknown word identification, this paper adopts roles based tagging method. this method can make full use of the context information and transform the problem of unknown word identification to the problem of role sequence tagging

    對于登錄詞,文本採用了基於角色標注登錄詞方法,這種方法能充分利用登錄詞上下文並把登錄詞問題轉化為角色序列標注問題。
  20. Because of inadequate information obtained, difficulty of mount and lowness of dependability, traditional vehicle detection and classification with induction loop or piezoelectricity sensor can not be widely used

    傳統利用環形感應線圈或壓電傳感器等車輛類型,安裝不方便,器件容易損壞,獲取交通比較少,因此能廣泛應用。
分享友人