混合信息結構 的英文怎麼說

中文拼音 [húnxìnjiēgòu]
混合信息結構 英文
mixed information structure
  • : 混形容詞1. (渾濁) muddy; turbid2. (糊塗; 不明事理) foolish; stupid
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 混合 : (攙雜在一起) mix; blend; mingle; admix; mixture; mix up; interfusion; commixture; blending; cre...
  • 結構 : 1 (各組成部分的搭配形式) structure; composition; construction; formation; constitution; fabric;...
  1. According to the situation and the development trend of information system. it analyses the overall structure of information system. it adopts the scheme that combines the c / s ( client / server ) to b / s ( brower / server ). as the result, conciseness and augmentability are reached ; also, technology of software engineering is applied in the design. all the tasks of the several phases of software engineering are shown in the paper, while many examples illustrated. the technology of softwareware engineering will greatly improve the qulity of design

    在現狀和發展趨勢的基礎上,論文分析了系統的總體形式。為了實現系統的現有功能並保證靈活性,在系統模式設計上,論文提出採用了c s和b s相模式。實踐證明,採用這種,在保證系統的簡潔性的同時,大大提高了可擴展性;另外,在系統實現過程中,為提高設計質量,系統將軟體工程的方法貫穿于設計始終。
  2. Combining with the performances of danshan bridge, discussing the methods on the construction controlling and calculation of cable - stayed bridge, this paper raises an efficient construction controlling system, and realizes collecting construction data of the real bridge and technical information. by analyzing on the difference of theoretical calculation and real construction state, the author determines to take self - adapting construction controlling method which uses kalman filter method to identify and adjust construction parameters. by getting rational construction state from forward iteration method, this paper, taking concrete creep effect in consideration, raises a rational scheme to pre - remain deformation and adjust cable force

    丹山橋的特點,通過對斜拉橋施工控制及計算方法的探討,提出了有效的施工控制系統,實現了對實橋施工數據和技術的採集;通過分析理論計算與實際施工狀態的差異,確定了以卡爾曼濾波法作為施工參數識別與調整的自適應施工控制方法;通過正裝迭代法確定其理施工狀態,並考慮凝土的徐變效應,提出了理的預留拱度和索力調整方案。
  3. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的型的,從而能收集到更加全面的;使用了異常檢測技術和誤用檢測技術,採用一種型的,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  4. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方式和適應度函數的造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類數k ,用遺傳聚類演算法的聚類果作為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演算法對完整數據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是隱含并行性和對全局的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  5. This thesis explains the necessity of the character recognition technology of the computer at first, describe the meaning in which the handwritten numeral discerns ; pretreatment technology of handwritten numeral recognition, including two value, line segmentation, word segmentation smooth, removing noising, standardization and thinning are discussed two value concretely discusses whole threshold value, some threshold value, dynamic threshold value and utilize space information to carry on threshold, which are several kinds of common method of choosing threshold value, especially utilize space information to carry on threshold value is describe in detail ; adopting to the foundation of thinning based on mathematics morphology, thinning algorithm of serials same and thinning algorithm of protecting shape are discussed ; afterwards, according to principle ' s diagram of the on - line character recognition, by analyzing the structure feature of the handwritten numeral, this thesis has proposed the online recognition te chnology of the free handwritten numeral based on the stroke feature and the online recognition technology of the free handwritten numeral based on the multistage classifying device. detail narrated noise removing, stroke characteristic definition and discernment, distance criterion of whole word match ; then under the foundation of handwritten numeral segmentation, off - line handwritten numeral recognition is researched. especially minimum distance classifying device, tree classifying device and adaptive resonance ( art ) network classifying device is discussed at the same time, believes degree analyses are introduced to integrate a lot of classifying devices ; at the end, the typical application of the handwritten numeral recognition was briefly narrated, its application in extensive data statistics, financial affairs, tax, finance and mail sorting have been explored

    二值化時對整體閾值二值化、局部閾值二值化、動態閾值二值化和利用空間進行閾值選取幾種常用的閾值選取方法進行討論,特別對利用空間進行閾值選取進行了詳細論述;在對通過對基於數學形態學的細化的基礎上,討論序貫同倫形態細化演算法和保形的快速形態細化演算法;然後依據聯機字元識別原理框圖,分析了手寫數字的特點,提出了基於筆劃特徵的任意手寫數字在線識別技術和基於多級分類器任意手寫數字在線識別技術,對其中涉及的筆劃識別前的噪聲處理、筆劃間特徵量的定義及識別、整字匹配的距離準則進行了詳細敘述;繼而在對手寫數字的分割的基礎下對脫機手寫數字識別進行了研究,對基於最小距離分類器字元識別、基於樹分類器的字元識別、基於自適應共振( art )網路的字元識別分別進行了詳細討論,並引入置度分析將多個分類器進行了集成;最後簡單闡述了手寫數字識別的典型應用,對其在大規模數據統計、財務、稅務、金融及郵件分揀中的應用進行了探索。
  6. This paper discusses some research result related hev energies management system on basis of the development of hybrid electric bus - wg6120hd. the basic structure of hev energies management system is developed. the energies management system includes battery management sub - system ( bms ), engine management sub - system ( ems ), vehicle information sub - system ( vis ), energy regenerated management sub - system ( erms ), generator / electromotor management sub - system ( g / ems ), do some theory researches with test results

    本文動力電動大客車wg6120hd的開發經歷對動力電動汽車多能源控制系統探討了如下研究工作:建立了動力電動汽車多能源控制系統的基本,開發出了蓄電池管理子系統、發動機管理子系統、駕駛員子系統、能量再生控制子系統、發電機電動機管理子系統等組成部分,採集的有關數據對各個子系統從理論方面進行了深入探討,為以後進一步的研發工作打下了基礎、積累了經驗。
  7. Based on the review of gis evolution, the paper introduces a mixed gis framework, from viewpoint of the application level of gis. the mixed gis framework combines webgis and comgis, c / s structure and b / s structure. with this framework, system can offer powerful spatial analysis to advanced users, simple and easy web gui ( graphical user interface ) to normal users

    在簡要回顧地理系統的發展的基礎上,本文從gis應用層次角度,提出了式gis架,該了comgis與webgis , c / s與b / s,能對gis應用層次不同的用戶分別提供強大的空間分析功能與簡單易用的網路用戶界面。
  8. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適電力市場安全傳輸的加密體制,了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系,最後給出了它的運行效果以及進一步可研究和探討的方案。
  9. The readout of a dvd rom disk and of a bd rom disk is simulated. the dependence of the readout data signal of a blue - ray rom disk on the geometry of its information layer ( the slope angle of the pits, in particular ) is analyzed

    利用這種方法,對dvdrom光盤、藍光rom光盤的光學號讀取過程進行了模擬,並研究了光盤層幾何參數(主要是坑的坑角)對讀出光號的影響。
  10. Research and realization of water resource information system based on hybrid software architecture

    基於軟體體系的水資源系統的研究與實現
  11. On the assumption of ignoring the distortion of thickness, this paper determines the rough shape by the geometric modeling method of equal area developing using mixed mesh cell of triangle and quadrangle for the first time, presents the equal area developing arithmetic of quadrangle - triangle. on the virtual geometric symmetry axis, we puts forward the method of determining the developed coordinate of the point on the base band in the development of using regular quadrangle cell, determines the developed shape of internal structure in plane utilizing point - to - point mapping theory. furthermore, we realize the approximate developing of undeveloped - irregular boundary surface using a few triangle cells

    本文型號研製中小曲率機翼整體壁板類零件坯料展開課題,基於板料厚向變形忽略不計的先驗假設,首創四邊形-三角形網格等面積展開的幾何模擬法確定壁板類零件毛坯外形,給出了四邊形-三角形網格等面積展開演算法;提出了虛擬分割線的概念,採用虛擬幾何對稱軸,給出了規整四邊形單元展開基帶上點的計算方法;採用映射原理和求交演算法確定了壁板內部的展開定位。
  12. With rapid development of information science, xml is more and more widely used in every field of the world. and xml database is brought to manage this semi - structural files. according to the definition of xml : db, there are three kinds of xml databases, which are native xml database, xml enabled database and mixed xml database. because the application environment of the xml database is so complicated as legacy rdbms, it faces serious security problems. this paper is mainly on native xml database and its access control

    隨著技術的迅速發展, xml正在各個領域被越來越廣泛的應用,為了有效的管理這種半化的數據, xml數據庫的概念被提出。根據xml : db的定義, xml數據庫可以分為xml本源數據庫、支持xml的數據庫、 xml數據庫。由於xml數據庫和傳統的關系型數據一樣被廣泛的應用在復雜的網路環境中,因此它面臨著同樣嚴重的安全問題。
  13. However, their current status is still far from user ' s satisfaction. lt includes : ( 1 ) the content that search engine returns is a enormous flat bill ( information overloading question ) ; ( 2 ) the items return with search engine are not the content that user requisite in deed ( low precision question ) this paper presents a fuzzy ( soft ) clustering algorithm htsc ( hyperlink - text based soft clustering ) using a mixed similarity metric of document content and inter - document hyperlinks, for clustering web search results from a search engine in order to help users find relevant web information more easily

    這主要表現為: ( 1 )搜索引擎返回的果是一個龐大的平坦的資源清單(即負載問題) ; ( 2 )搜索果中的項並非都是用戶真正需要的資源(即低精度問題) ;論文提出了一種基於文檔文本內容和文檔間超鏈相似度的模糊(軟)聚類演算法htsc 。該演算法可對搜索引擎返回的果進行模糊聚類,以方便用戶從中找到真正需要的
  14. Thus, it is the focus of this paper to build a union and extensible system with dcom, and research an extensible system integrated the tradition control system with the information system consistently

    因此,本文採用控制網路把工業監控系統與網路無縫起來,並利用microsoft的dcom ( distributedcomponentobject )技術建立上層應用。
  15. In this thesis the theory and method of intelligent fault diagnosis for a large turbo - pump fed liquid - propellant rocket engine ( lre ) is innovatively proposed and developed, based on the hybrid reasoning strategy and the hybrid knowledge models including mathematical model, logic model, graphic model and qualitative model. the theory and method are constructed in the way of intelligent modeling technique and creative application of knowledge engineering, and focus on the difficult problems and critical techniques such as the unified treatment of lre knowledge ( experience, facts, rules, graph, system structure, behavior, model knowledge and measured data ), the integration and translation of qualitative and quantitative knowledge, and the knowledge - based intelligent fault diagnosis reasoning methods. firstly, besides the correlation of different knowledge, the concept and the types of lre diagnosis knowledge are systematically described

    本文以某大型泵壓式液體火箭發動機為研究對象,以智能建模技術和知識工程的創造性應用為主要技術手段,圍繞著發動機知識(經驗、事實、規則、圖形、、行為、模型知識與測量數據等)的統一處理技術、定性定量知識的集成與轉化和基於知識的智能故障診斷推理等關鍵技術和難點,創新地研究發展了發動機基於知識模型(數學模型、邏輯模型、圖形模型及定性模型)和推理策略的智能故障診斷理論和方法。
  16. Combined with electric power metering requirement, this paper analyzes several following methods to develop mis : system development life cycle, business system planning, prototyping approach and critical success factors. a new mixed prototyping approach to develop this system is put forward after comparing these methods. at the same time, its process and characteristic are described

    針對電能計量管理業務的需求,本文分析了化生命周期法、企業系統規劃法、原型法、關鍵成功因子法這幾種管理系統的開發方法,在對這幾種開發方法比較以後,提出了適本系統開發的方法-原型法,並對該方法的過程和特點進行了描述。
  17. Information technology - open systems interconnection - conformance testing methodology and framework - the tree and tabular combined notation

    技術.開放式系統互連.一致性測試方法和架.樹狀表格符號表示法
  18. Moreover, this new architecture enable ids to enhance detection capability and adaptability to intricate network environment through self - study and evolution. to achieve better accuracy, the architecture adopts security audit data gathered from both host and network. to enable ids to detect both known and unknown intrusion model, the architecture adopts a blend frame that makes use of both misuse detection approach and anomaly detection approach

    該體系是一種:一方面,該同時利用基於主機和基於網路的數據源,使得ids能收集到更加全面的;另一方面,該同時使用了異常檢測技術和誤用檢測技術,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  19. Secondly, analysis of optimal vehicle scheduling problem is presented with an eye on restrict factors in the distribution management model. through the classification and mathematical description of distribution tasks with heuristic knowledge, an optimal distribution scheduling model based on hierarchy is put forward. satisfactory result is obtained with the adoption of hybrid genetic algorithm constructed of genetic algorithm and heuristic algorithm

    其次是分析配送管理中的車輛優化調度問題,總了配送車輛調度問題中的諸多制約因素,運用啟發式對配送任務進行分類並分別建立數學模型,形成基於層次的配送優化調度模型,採用遺傳演算法啟發式演算法造而成的遺傳演算法對模型求解,得到了滿意的果。
  20. By analyzing customer demand and the characteristics of c / s architecture and b / s architecture, one kind of pdm architecture model is proposed. on one band, b / s applies in selection, browser, services with little interactive which place is dispersed ; on the other hand, to all kind of technical information transparent evoking, edition, processing, output uses c / s pattern

    本文還通過分析c / s體系和b / s體系的特點及其客戶的需求,提出了一種基於c / s和b / s體系的pdm體系模型,一方面對各類技術透明的地調用、編輯、處理、輸出等功能採用c / s模式;另一方面以查詢、瀏覽、地理位置分散、交互較少的服務為主體的應用採用b / s模式。
分享友人