未識別的 的英文怎麼說

中文拼音 [wèizhìbiéde]
未識別的 英文
unidentified
  • : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : 4次方是 The fourth power of 2 is direction
  1. You should give as much information as possible about your location when making an emergency call. if you do not have a global positioning system device you can : identify the number of the nearest distance post on hiking trails

    致電求助時,你應盡量提供身處位置資料;若你並無攜帶任何全球定位系統( gps )器材,而亦身處位置,則應提供以下資料:
  2. With the help of video detection and recognition methods, we can sample real - timely traffic messages, such as traffic flow, road situation and so on, and get the relative information so as to avoid traffic jam before it happens, on the other hand, to real - time traffic breach detection, video detection and recognition methods is also very effective, especially, it can provide strong evidence for traffic policemen

    通過視頻圖象檢測與,可以對道路交通流、路況等實時監視,提取交通流信息(車流量、車道佔有率、車速等) ,在交通擁擠發生時,及時採取措施、疏導交通、防止交通擁擠發生;另一方面,通過視頻圖象檢測與,還可以實時檢測交通違章現象、違章車輛車牌號碼,為公安交通管理部門提供強有力執法證據。
  3. In character recognition, the distance between the undistorted surface of a document and a specified part of a printed character

    在字元中,文卷變形表面與列印字元指定部分之間距離。
  4. They can then use predications of future volume levels to identify high - cost and low - cost actions

    然後他們便可以使用來產量水平論斷來高成本和低成本行為。
  5. The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory dete ctors. so it takes the advantages of anomaly detection and misuse detection, overcomes the natural shortcoming of them and can identify known intrusion and novel intrusion in computer systems

    它同時兼備了異常檢測法和誤用檢測法優點,克服了兩者固有缺陷,因此可以任何已知或本地主機上異常行為模式和網路系統中異常通信模式。
  6. Classification is to predict the class label of unknown data with supervisor obtained from experiential data, which is a basic problem in pattern recognitionx machine learning and statistics, as well as in data mining

    分類即通過由經驗數據訓練得到分類器預測知數據歸屬,是模式、機器學習、統計分析等領域一個基本問題,也是一種最常見數據挖掘任務。
  7. The essay deeply analyzes the elementary theory of the developing teacher - assess system and points out its intrinsic essence and basic principle, goes into the base in theory which consists of 5 respects and finally makes the comparison between the developing teacher assess and present - day teacher assess. the developing teacher assess system, with the purpose of the promotion, is a kind of formative evaluation which is based on the aim, stresses the process and the timely feedback. it does not consider the result of the assess as the base of prize or reproach. its direction is to face the future, its aim is to promote the all - round development of all staffs, its function is centered on the lead - in, inspiration, development, and its means is the formative teacher evaluation. it pays special attention to the desire of teachers and esteem the requirement of teachers as its motive and power of the assessment. however, the present teacher assess is the closed - ending one whose feature is mainly to stress the daily performance before the evaluation and accordingly judge whether they possess the conditions of being rewarded or reproached

    其方向? ?面對來,目? ?促進全體教師發展,功能? ?導向、激勵、發展為主,方式? ?形成性教師評價制度,在啟動方式上注重教師自己成就期望,把教師需要當作評價動機和力量。而現行教師評價是終結性評價,其特點主要是面向過去,特注重教師在評價前工作表現,並根據教師工作表現,判斷他們是否已經具備獎勵或處罰條件。為了全面了解現行教師評價制度存在問題,做到有放矢,本研究對濟南市156名高中教師進行了調查,通過分析反映出以下問題: 1 、大多數教師對教師評價認不清,引不起全體教師共鳴,容易走過場。
  8. That is the task of handwritten character recognition. but the problem is too large and difficult to be solved all

    手寫體漢字是尚攻克難題,相關資料有限,在短期內試圖完全解決這一難題是不大可能
  9. 2. nonlinear source term identification problem about a quasilinear parabolic heat equation is investigated. for the given function determined, the existence and the uniqueness of the solution of the state equation are proved and the dependence of the solution of the state equation on the identification parameter is discussed ; then the identifiability is verified ; through choosing suitable basic functions, the above identification problem can be transformed into a constant coefficients identification problem ; and an practical iterative algorithm for solving the identification problem is presented, the feasibility and validity of the algorithm is verified by the numerical experiments

    2 、研究一擬線性拋物型熱傳導方程非線性知源項問題;對于給定函數,論證了狀態方程解存在惟一性、方程解與函數依賴關系和可性;通過選取適當基函數,把對非線性源項轉化成常系數問題;給出了實現非線性源項迭代演算法,通過數值實驗證明了演算法有效性。
  10. Intrusion - detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion

    入侵探測系統是用來探測計算機系統網路上不尋常活動,以出此活動是不友好或者經授權,以便能夠對此入侵作出響應。
  11. If the behavior were to be judged as intellectual property crime, the man who acts as such shoud have the intention infingement and it woud be possible that he can know the illegality of his behavior. this kind of crime have the following 3characters in the objective area. fistly, the action violate the intellectual property law and regulation, secondly the man utlizes others intellectual property law and regulation without being permmited

    在個罪客觀方面特徵論述中,假冒注冊商標犯罪中是否是「同一種商品」應從消費者角度加以判斷;假冒專利罪中暇冒他人專利」范圍應該是指經專利權人許可,為生產、經營目,用其它產品冒充他人專利產品,或用其它方法冒充他人專利方法;在假冒他人注冊商標罪中,如果假冒他人注冊商標商品同時又是偽劣產品,則一般構成牽連犯。
  12. In further research, the following issues must be considered : 1 ) the standardize of corpus ; 2 ) improve the accuracy of chinese words divided syncopation system, handle the different meanings of one word and recognize the words that do not appear in the dictionary ; 3 ) process semantic analysis ; 4 ) dynamically update the training sets fed back by the user ; 5 ) quantitatively analyze the system performance influenced by different factors, use an appropriate model to compare and evaluate the web text classification system ; 6 ) natural language process ; 7 ) distinguish the disguise of sensitive words

    在以後工作中考慮如下問題: 1 )數據集標準化; 2 )分詞系統精度提高,對歧義處理以及登錄詞能力提高: 3 )進行合理語義分析: 4 )利用用戶反饋信息動態更新訓練集; 5 )定t分析分類器不同要素對分類系統性能影響,使用合適模型來比較和評價分類系統; 6 )自然語言理解問題,如「引用」問題; 7 )對于敏感詞匯偽裝問題。
  13. The significance of the research about the unidentified ethnic groups in yunnan

    雲南群體研究族群理論意義
  14. Used when the type option sent by the server was not recognized by the client

    當客戶端由服務器發送類型選項時使用。
  15. If an element of the list is not recognized as a valid table header cell an

    如果列表某個元素為有效表標題單元格,則在調用
  16. It ignores unrecognized data if possible and fills in missing month, day, and year information with the current time

    如有可能,它將忽略數據,並用當前時間填充缺少年月日信息。
  17. This recognition method integrates traits of nearest neighbor method and k - neighbor method. its basic principle is to improve recognition reliability with tow additive thresholds. in addition, ternary threshold neighbor recognition method ’ s fast arithmetic based on c - average clustering and huffman tree is put forward

    2 .本文在經典統計模式方法基礎上,結合了最近鄰法和k近鄰特點,給出一種三閾值近鄰方法,其基本原則是在尋找知樣本近鄰時,通過附加閾值限制,進一步提高可靠性。
  18. The self - incompatibility is involved in a signal transduction process resulted from the interaction between ligand and receptor. up to now, some achievements for ligand and receptor have already been made, but the research progress on downstream protein factors is slower than that of upstream components, highlighting the downstream proteins in priority of research. some downstream components have not been isolated, which are similar to the unknown function of those isolated ones

    自交不親和反應是一種配體和受體相互信號傳導過程,在這一過程中,對配體和受體研究已經取得突破性成果,而對下游磷酸化蛋白研究相對上游受體來說要緩慢得多,所以對信號傳導下游組分研究顯得尤為重要,特?是下游還有許多分離到組分,而分離到組分其功能還不清楚。
  19. Given a received communication signal, the objective of modulation recognition is to decide the modulation format and estimate the modulation parameters of the communication signal without any priori knowledge about the signal information content

    給定一段接收通信信號,調制就是在知調制信息內容前提下,判斷出通信信號調制方式,並估計出相應調制參數。
  20. To solve the problem of unknown word identification, this paper adopts roles based tagging method. this method can make full use of the context information and transform the problem of unknown word identification to the problem of role sequence tagging

    對于登錄詞,文本採用了基於角色標注登錄詞方法,這種方法能充分利用登錄詞上下文信息並把登錄詞問題轉化為角色序列標注問題。
分享友人