未識別的 的英文怎麼說
中文拼音 [wèizhìbiéde]
未識別的
英文
unidentified-
You should give as much information as possible about your location when making an emergency call. if you do not have a global positioning system device you can : identify the number of the nearest distance post on hiking trails
致電求助時,你應盡量提供身處位置的資料;若你並無攜帶任何全球定位系統( gps )器材,而亦未能識別身處位置,則應提供以下資料:With the help of video detection and recognition methods, we can sample real - timely traffic messages, such as traffic flow, road situation and so on, and get the relative information so as to avoid traffic jam before it happens, on the other hand, to real - time traffic breach detection, video detection and recognition methods is also very effective, especially, it can provide strong evidence for traffic policemen
通過視頻圖象的檢測與識別,可以對道路的交通流、路況等實時監視,提取交通流信息(車流量、車道佔有率、車速等) ,在交通擁擠未發生時,及時採取措施、疏導交通、防止交通擁擠發生;另一方面,通過視頻圖象的檢測與識別,還可以實時檢測交通違章現象、識別違章車輛的車牌號碼,為公安交通管理部門提供強有力的執法證據。In character recognition, the distance between the undistorted surface of a document and a specified part of a printed character
在字元識別中,文卷未變形表面與列印字元的指定部分之間的距離。They can then use predications of future volume levels to identify high - cost and low - cost actions
然後他們便可以使用未來產量水平的論斷來識別高成本和低成本的行為。The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory dete ctors. so it takes the advantages of anomaly detection and misuse detection, overcomes the natural shortcoming of them and can identify known intrusion and novel intrusion in computer systems
它同時兼備了異常檢測法和誤用檢測法的優點,克服了兩者固有的缺陷,因此可以識別任何已知或未知的本地主機上的異常行為模式和網路系統中的異常通信模式。Classification is to predict the class label of unknown data with supervisor obtained from experiential data, which is a basic problem in pattern recognitionx machine learning and statistics, as well as in data mining
分類即通過由經驗數據訓練得到的分類器預測未知數據的歸屬,是模式識別、機器學習、統計分析等領域的一個基本問題,也是一種最常見的數據挖掘任務。The essay deeply analyzes the elementary theory of the developing teacher - assess system and points out its intrinsic essence and basic principle, goes into the base in theory which consists of 5 respects and finally makes the comparison between the developing teacher assess and present - day teacher assess. the developing teacher assess system, with the purpose of the promotion, is a kind of formative evaluation which is based on the aim, stresses the process and the timely feedback. it does not consider the result of the assess as the base of prize or reproach. its direction is to face the future, its aim is to promote the all - round development of all staffs, its function is centered on the lead - in, inspiration, development, and its means is the formative teacher evaluation. it pays special attention to the desire of teachers and esteem the requirement of teachers as its motive and power of the assessment. however, the present teacher assess is the closed - ending one whose feature is mainly to stress the daily performance before the evaluation and accordingly judge whether they possess the conditions of being rewarded or reproached
其方向? ?面對未來,目的? ?促進全體教師的發展,功能? ?導向、激勵、發展為主,方式? ?形成性的教師評價制度,在啟動方式上注重教師自己的成就期望,把教師的需要當作評價的動機和力量。而現行的教師評價是終結性評價,其特點主要是面向過去,特別注重教師在評價前的工作表現,並根據教師的工作表現,判斷他們是否已經具備獎勵或處罰的條件。為了全面了解現行教師評價制度存在的問題,做到有的放矢,本研究對濟南市156名高中教師進行了調查,通過分析反映出以下問題: 1 、大多數教師對教師評價認識不清,引不起全體教師的共鳴,容易走過場。That is the task of handwritten character recognition. but the problem is too large and difficult to be solved all
手寫體漢字的識別是尚未攻克的難題,相關的資料有限,在短期內試圖完全解決這一難題是不大可能的。2. nonlinear source term identification problem about a quasilinear parabolic heat equation is investigated. for the given function determined, the existence and the uniqueness of the solution of the state equation are proved and the dependence of the solution of the state equation on the identification parameter is discussed ; then the identifiability is verified ; through choosing suitable basic functions, the above identification problem can be transformed into a constant coefficients identification problem ; and an practical iterative algorithm for solving the identification problem is presented, the feasibility and validity of the algorithm is verified by the numerical experiments
2 、研究一擬線性拋物型熱傳導方程非線性未知源項的識別問題;對于給定識別函數,論證了狀態方程解的存在惟一性、方程解與識別函數的依賴關系和可識別性;通過選取適當的基函數,把對非線性源項的識別轉化成常系數識別問題;給出了實現非線性源項識別的迭代演算法,通過數值實驗證明了演算法的有效性。Intrusion - detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion
入侵探測系統是用來探測計算機系統網路上不尋常的活動,以識別出此活動是不友好的或者未經授權的,以便能夠對此入侵作出響應。If the behavior were to be judged as intellectual property crime, the man who acts as such shoud have the intention infingement and it woud be possible that he can know the illegality of his behavior. this kind of crime have the following 3characters in the objective area. fistly, the action violate the intellectual property law and regulation, secondly the man utlizes others intellectual property law and regulation without being permmited
在個罪客觀方面的特徵的論述中,假冒注冊商標犯罪中是否是「同一種商品」應從消費者識別的角度加以判斷;假冒專利罪中暇冒他人專利」的范圍應該是指未經專利權人許可,為生產、經營目的,用其它產品冒充他人的專利產品,或用其它方法冒充他人的專利方法;在假冒他人注冊商標罪中,如果假冒他人注冊商標的商品同時又是偽劣產品,則一般構成牽連犯。In further research, the following issues must be considered : 1 ) the standardize of corpus ; 2 ) improve the accuracy of chinese words divided syncopation system, handle the different meanings of one word and recognize the words that do not appear in the dictionary ; 3 ) process semantic analysis ; 4 ) dynamically update the training sets fed back by the user ; 5 ) quantitatively analyze the system performance influenced by different factors, use an appropriate model to compare and evaluate the web text classification system ; 6 ) natural language process ; 7 ) distinguish the disguise of sensitive words
在以後的工作中考慮如下問題: 1 )數據集的標準化; 2 )分詞系統精度的提高,對歧義處理以及未登錄詞識別的能力的提高: 3 )進行合理的語義分析: 4 )利用用戶反饋信息動態更新訓練集; 5 )定t分析分類器不同要素對分類系統性能的影響,使用合適的模型來比較和評價分類系統; 6 )自然語言理解問題,如「引用」問題; 7 )對于敏感詞匯偽裝的識別問題。The significance of the research about the unidentified ethnic groups in yunnan
雲南未識別群體研究的族群理論意義Used when the type option sent by the server was not recognized by the client
當客戶端未識別由服務器發送的類型選項時使用。If an element of the list is not recognized as a valid table header cell an
如果列表的某個元素未識別為有效的表標題單元格,則在調用It ignores unrecognized data if possible and fills in missing month, day, and year information with the current time
如有可能,它將忽略未被識別的數據,並用當前時間填充缺少的年月日信息。This recognition method integrates traits of nearest neighbor method and k - neighbor method. its basic principle is to improve recognition reliability with tow additive thresholds. in addition, ternary threshold neighbor recognition method ’ s fast arithmetic based on c - average clustering and huffman tree is put forward
2 .本文在經典統計模式識別方法的基礎上,結合了最近鄰識別法和k近鄰識別法的特點,給出一種三閾值近鄰識別方法,其基本原則是在尋找未知樣本的近鄰時,通過附加閾值的限制,進一步提高識別的可靠性。The self - incompatibility is involved in a signal transduction process resulted from the interaction between ligand and receptor. up to now, some achievements for ligand and receptor have already been made, but the research progress on downstream protein factors is slower than that of upstream components, highlighting the downstream proteins in priority of research. some downstream components have not been isolated, which are similar to the unknown function of those isolated ones
自交不親和反應是一種配體和受體相互識別的信號傳導過程,在這一過程中,對配體和受體的研究已經取得突破性成果,而對下游的磷酸化蛋白研究相對上游受體來說要緩慢得多,所以對信號傳導的下游組分研究顯得尤為重要,特?是下游還有許多未分離到的組分,而分離到的組分其功能還不清楚。Given a received communication signal, the objective of modulation recognition is to decide the modulation format and estimate the modulation parameters of the communication signal without any priori knowledge about the signal information content
給定一段接收的通信信號,調制識別的目的就是在未知調制信息內容的前提下,判斷出通信信號的調制方式,並估計出相應的調制參數。To solve the problem of unknown word identification, this paper adopts roles based tagging method. this method can make full use of the context information and transform the problem of unknown word identification to the problem of role sequence tagging
對于未登錄詞識別,文本採用了基於角色標注的未登錄詞識別方法,這種方法能充分利用未登錄詞的上下文信息並把未登錄詞識別的問題轉化為角色序列的標注問題。分享友人