由圖可知 的英文怎麼說

中文拼音 [yóuzhī]
由圖可知 英文
as the chart show
  • : causereason
  • : Ⅰ名詞1 (繪畫表現出的形象; 圖畫) picture; chart; drawing; map 2 (計劃) plan; scheme; attempt 3...
  • : Ⅰ動詞1 (知道) know; realize; be aware of 2 (使知道) inform; notify; tell 3 (舊指主管) admin...
  1. The emphasis of this thesis is studying the methods of bit allocations of digital image compression based on wavelet transform and managing to minimizing the overall distortion. we know from the rate - distortion theory that the aim is gainable

    率失真理論我們道,對于給定的碼率,以找到一種比特分配演算法對小波變換后的各個子帶進行比特分配,使重建像的失真達到最小。
  2. When we had done this, we came back to our castle, and there i fell to work for my man friday ; and first of all, i gave him a pair of linnen drawers, which i had out of the poor gunners chest i mention d, and which i found in the wreck ; and which with a little alteration fitted him very well ; then i made him a jerkin of goat s - skin, as well as my skill would allow ; and i was now grown a tollerable good taylor ; and i gave him a cap, which i had made of a hare - skin, very convenient, and fashionable enough ; and thus he was cloath d for the present, tollerably well ; and was mighty well pleas d to see himself almost as well cloath d as his master : it is true, he went awkardly in these things at first ; wearing the drawers was very awkard to him, and the sleeves of the wastcoat gall d his shoulders, and the inside of his arms ; but a little easing them where he com plain d they hurt him, and using himself to them, at length he took to them very well

    這不得使我經常想到,上帝對世事的安排,自有其天意,在其對自己所創造的萬物的治理中,一方面他剝奪了世界上許多生物的才幹和良,另一方面,他照樣賦予他們與我們文明人同樣的能力,同樣的理性,同樣的感情,同樣的善心和責任感,也賦予他們同樣的嫉惡如仇的心理他們與我們一樣道感恩報,誠懇待人,忠貞不渝,相互為善。而且,當上帝給他們機會表現這些才幹和良時,他們和我們一樣,立即把上帝賦予他們的才幹和良發揮出來做各種好事,甚至以說比我們自己發揮得更充分。對此,我不能不感到驚訝。
  3. Although it has been possible to infer from the goods and services actually produced what manufactures and servicing trades thought their customers wanted , only a study of relevant personal documents written by actual consumers will provide a precise picture of who wanted what

    盡管有能從實際製造的商品和服務中製造商和服務業認為他們的顧客所需要的是什麼,但只有對實際顧客撰寫的相關的個人文件進行一番研究,方能提供一幅精確的畫,藉以說明"什麼樣的人"需要什麼樣的東西。
  4. In this article, firstly the background of the textile trade conflicts within sino - us or sino - euro are introduced, thus learn that how to discern and dodge the foreign trade risks, how to choose the appropriate investment projects have already become one of the most important questions for exporting companies on foreign trade affairs well - known as high investment and high risk. so the main text makes a risk analysis qualitatively and quantitatively on a textile - exporting trading company from three angles of statistic 、 game theory and portfolio theory, which is the main content that we studied. firstly, the statistic article adopts data of the transaction closing price of the textile clothing index in shenzhen stock exchange at the end of each quarter as well as several other kinds of data reflecting the macro - economic changes, performs an empirical analysis of these data according to the theory of co - integration test 、 granger cause test and impulse response function of time series in economitric, and learn that the impact to ti is more obvious by the economic index reflecting local commodity price level and economic prosperity degree home and abroad, as well as the impact degree and the time lag degree, and knows the macro - economic risks faced by textile business enterprises ; after that by the game theory angle we analyze exactly the managing risks faced by one textile export corporation named beauty. from the game expansion chart the system arrangement between censor ways by exportation goal countries and exporting strategies by the exporting enterprises has been analyzed. involving the benefit assignment between them both the limited rounds and infinite rounds negotiations of cooperation games have been studied, and then country responsibility and the enterprise managing risks on foreign trade affairs and so on have been analyzed exactly ; in order to realize the investment multiplication in the certain degree to disperse the risk, the

    本文首先介紹了中美、中歐紡織品貿易爭端的來龍去脈,在涉外貿易這種以高投入、高風險著稱的行業里,如何甄別和規避外貿風險、如何選擇合適的投資項目已經成為外貿企業的首要問題。因此,正文分別從統計學、博弈論和投資組合三種角度對涉外紡織品貿易公司風險進行了定性和定量的分析,這也是本文的主要研究內容。首先,統計學篇選取了深圳證券交易所行業分類指數?紡織服裝指數( ti )每一季度末的交易收盤價和若干種反映宏觀經濟變化的指標,利用計量經濟學中時間序列的協整檢驗、 granger因果檢驗和脈沖反應函數等理論做實證分析,從而得反映國內物價水平和國內外經濟景氣程度的經濟指標對紡織板塊上市值的沖擊比較明顯,且沖擊程度和時滯度,進而分析出涉外紡織企業所面臨的宏觀經濟風險;接著,從博弈論的角度具體分析一家紡織品出口公司( beauty )的外貿活動所面臨的各種經營風險,該篇從博弈擴展入手,分析了出口目的國審查方式與本企業出口策略之間的制度安排;並圍繞雙方的利益分配,研究了有限回合和無限回合合作談判博弈,然後具體論述了國家責任和企業涉外經營風險等問題;在一定程度上為了實現投資多元化來分散風險的目的,投資組合篇從經典的markowitz模型著手,在一些特定條件的限制下,給出了一個相應的投資組合模型。
  5. The feasibility of decomposition of transition firing sequence, the application of them in the detecting lfs and the reverse course of decomposition - synthesis are discussed. they provide theoretic basis for our algorithm in the field of petri net. supported by the above, two main part is included in the algorithm : at first, x is transacted according to the following method in order to get a set of xb named as basic vector of x which is the firing count vector of a directed path without circle if md is reached from m0 in the rg ( m0 )

    在變遷序列分解的指導思想下,我們的演算法主要通過以下兩步工作完成: ( 1 )首先對給出的已條件中滿足狀態方程的n維非負整數向量進行處理,得到一組x的基礎向量x _ b ,使得在petri網的達標識中,若存在一條m _ o到m _ d的有向無環路,則x _ b為這樣的路上變遷引發序列的發生數向量。
  6. Due to the indeterminacy of the source text and the inaccessibility of the author ' s intention, the translator has to interpret the source text with the interference of his pre - understanding

    於文學文本具有一定的未定性,原文本作者的意不完全,因此,譯者不避免地要運用自己的前理解對原文本進行解讀。
  7. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的組當中,即使某一組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未的。
  8. Because of the complex of image background, the uncertainty of plate position and image quality, the location of plates is not satisfied. therefore, the study on the algorithm of license plate location is always the hotspot problem. this paper is mostly studying on license plate localization and character segmentation in lpr system

    車牌照的定位與分割是該系統的關鍵步驟之一,像場景的復雜性以及車牌位置和像質量的不性,牌照定位分割系統一直都未能做到令人滿意的程度,所以車牌照的定位分割演算法一直是該領域的研究熱點。
  9. When the conditions for the non - voluntary license cease to exit and do not arise again, the intellectual property administrative authority under the state council shall terminate, upon examination, the decision on the non - voluntary license for the exploitation of the layout - design at the request by the holder of right of the layout - design

    非自願許的理消除並不再發生時,國務院識產權行政部門應當根據布設計權利人的請求,經審查後作出終止使用布設計非自願許的決定。
  10. When a cluster of particles is immersed in a uniform electric field, the particles are coupled together due to the mutual interaction among them. this interaction causes the dipole moment of the cluster to be dependent upon the spatial arrangement and relative permittivity of the particles and upon the cluster size. in this work, we attempt to estimate the dipole moment of finite cubic arrays of particles, in terms of that of particle chains which has been known. we assume that a chain may be replaced by a single equivalent sphere with the same dipole moment. with replacing the chain by equivalent sphere, a cluster is simplified to a planar array, and this planar array is simplified to a chain, then the dipole moment is obtained. numerical calculations are performed. it is found that our results are acceptable

    置於均勻電場中的一簇球形顆粒,於其內部的相互作用而耦合在一起.這致使簇的感應偶極矩與簇的幾何結構,大小以及顆粒的介電常數等參量有關.試通過已的鏈的偶極矩確定任意大小長方結構的簇的偶極矩.假定顆粒鏈以被具有同樣偶極矩的一個等效介質球代替,並將具有空間結構的顆粒簇處理成面結構簇,再將面結構簡化成一個顆粒鏈,從而確定簇的偶極矩.在這一過程中,通過不斷增加等效球的尺寸,將顆粒間的相互作用包含在簇的偶極矩中.數值分析了立方結構簇的偶極矩,結果是接受的
  11. Consulting about foreign study, the research showed that the speed of firing can be improved by modifying the machanism of the automatic, and at the same time two problems must be solved, one is that more mechanisms should act at the same time to reduce the time of the whole actions of automatic mechanisms, the other is that the time of each mechanism ' s action should be reduced. the time can be reduced by several ways. the first one is to reduce the mass of mechanism, the second one is to increase the force applied on the mechanism and reduce the resistance, the third one is to shorten the working distance, the fourth one is to give abstention and cushion to mechanism before action ends. this thesis includes the following topics : discussion of the theory of the automatic and shell - swing design, establish the kinematic and dynamic models of the main structures in automatic and perform the corresponding mechanical analysis, set up a compendious cyclical diagram for the automatic ; the computer simulation to the navy gun ' s firing parts

    現有艦炮自動機循環,制約射速提高的幾個因素是:後座、復進佔用的時間較長,約占總循環時間的三分之一;供彈機的動作單獨佔用循環時間,且較長;輸彈機的輸彈時間較長;各機構動作重疊少;參考國內外的研究情況,本文提出了在採用改進完善現有自動機機構來提高射速時,必須考慮以下兩點: ( 1 ) 、力求在同一時間內能使更多的機構參與工作,並處理好各動作之間的銜接(即介面技術) ,以便縮短整個自動機的動作循環時間。
  12. Analytical work should therefore come first as it is a fundamentally important stage for designers and town planners in producing layout plans

    ,設計師和城市規劃師在擬備發展藍時,最優先和重要的是分析工作。
  13. The reached conclusion shows that no matter how advanced the programming language is, if the real computer is based on the model of " turing machine ", the ability of the program will always be limited, i. e. there are many undecidable programs

    得出的結論:無論程序設計語言如何進步,只要最終的實際計算機是基於靈機模型,則程序的功能總具有局限性,即存在大量不判定的程序。
  14. Abstract : when a cluster of particles is immersed in a uniform electric field, the particles are coupled together due to the mutual interaction among them. this interaction causes the dipole moment of the cluster to be dependent upon the spatial arrangement and relative permittivity of the particles and upon the cluster size. in this work, we attempt to estimate the dipole moment of finite cubic arrays of particles, in terms of that of particle chains which has been known. we assume that a chain may be replaced by a single equivalent sphere with the same dipole moment. with replacing the chain by equivalent sphere, a cluster is simplified to a planar array, and this planar array is simplified to a chain, then the dipole moment is obtained. numerical calculations are performed. it is found that our results are acceptable

    文摘:置於均勻電場中的一簇球形顆粒,於其內部的相互作用而耦合在一起.這致使簇的感應偶極矩與簇的幾何結構,大小以及顆粒的介電常數等參量有關.試通過已的鏈的偶極矩確定任意大小長方結構的簇的偶極矩.假定顆粒鏈以被具有同樣偶極矩的一個等效介質球代替,並將具有空間結構的顆粒簇處理成面結構簇,再將面結構簡化成一個顆粒鏈,從而確定簇的偶極矩.在這一過程中,通過不斷增加等效球的尺寸,將顆粒間的相互作用包含在簇的偶極矩中.數值分析了立方結構簇的偶極矩,結果是接受的
  15. The system is compose of modules which form superior to subaltern and can be extended easily, so it is a good data resource for user to get the land resource dynamic movement information in qian county experiment area this system has integrity ability of data manage, it can carry through update and edit of data at any moment, it has main functions such as : browse and record attribute data, look over and graph manage of spatial database, graph edit, query and search of database, renew correlation export intellective

    該系統從上而下的模塊結構組成,擴充性強,是用戶獲取乾縣試區土地資源動態信息的良好數據源。系統數據處理功能完整,隨時進行數據的更新與編輯,主要功能包括:屬性數據的瀏覽與錄入、空間數據庫的查看與形處理、數據庫編輯、數據庫的查詢與搜索、相關專家識的補充。
  16. Second, a limited rate algorithm for picture downsampling was improved, and the realization process was deduced in detail. the simulation results of different algorithms and theoretic deducing showed that this algorithm had relatively higher psnr and lower computation cost

    接著,改進了一種受限比例像下采樣演算法,詳細推導了其實現過程,不同演算法的模擬結果和理論分析,該演算法具有較高的信噪比和較低的運算復雜度。
  17. Now there are two basic target recognition strategies, such as processing from bottom to top, which is called data - driving method, and processing from top to bottom, which is called knowledge - driving method. the former begins with low layer processing for example, general segmentation, label and feature extraction, then judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model. the latter firstly brings forward a hypothesis on probably existed feature, secondly proceeds with purposeful segmentation, label and feature extraction, lastly judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model

    目標識別在工農業生產、國防建設中具有極其重要的地位,目前目標識別的演算法常用的有兩種,一種是下而上的數據驅動型策略,即不管目標屬於何種類型,一律先對原像進行一股性的分割、標記和特徵抽取等低層次處理,然後將每個帶標記的已分割區域的特徵矢量與目標模型相匹配;另一種是上而下的識驅動型策略,即先對像中能存在的特徵提出假設,根據假設進行有目的地分割、標記和特徵抽取,在此基礎上與目標模型進行精確匹配。
  18. The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent. the robust watermark required the authentication centre to extract the watermark. at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively

    雖然本文對該模型提出的演算法並沒有具體實現,但是,在同一幅像中嵌入魯棒水印與易損水印的雙水印技術,以及採用的非對稱密鑰體制即在水印嵌入過程與水印檢測過程中使用了一對不同的密鑰,為人們提供一個新的思路:於易損水印只需通過信任第三方提取,對用戶是「見」的,因此根據需要嵌入不同的信息,多方利用;魯棒水印的提取需要認證中心提取,同時認證中心對商家身份進行的零識驗證,體現了密碼學的認證思想,更能解決版權糾紛的所有權問題。
分享友人