識別數 的英文怎麼說

中文拼音 [zhìbiéshǔ]
識別數 英文
identification number
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : 數副詞(屢次) frequently; repeatedly
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. In this diploma thesis, the statistic and structural characteristic of musical score image is analyzed and synthesized by relevant technology of image project, pattern recognition, mathematical morphology, software engineering, music knowledge, midi and so on. the concept of direction number has been defined, and then the mathematical morphology theory is used to process musical score image and recognize musical information. specialized direction number algorithms are firstly used to preprocess a musical score image and then recognize stafflines, barlines, pitch, note values, clef, etc. finally the musical information of the musical score image is automatically stored in the midi format

    本文利用圖像處理、模式學形態學、音樂知庫與midi等相關技術,分析與綜合字樂譜圖像的統計與結構特徵,提出了方向等概念,對樂譜圖像進行處理,利用直方圖技術與方向演算法譜線、小節線、符乾等樂譜的主要框架,然後用學形態學理論音高與時值,最後根據這些音樂信息,組合成音樂樂譜信息,並自動轉化成midi格式。
  2. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  3. So the plate - like drawing correcting process can be divided into two stages : absolute errors checking and comparative errors checking absolute errors checking include four modules which were line - weight checking, hatch checking. dimension checking and overlapped line checking comparative errors checking module include drawing compartmentalization, view recognizing, data getting and data compare in this correction system, line - scanning and circle - scanning algorithm, direct graphics element compare algorithm and character compare are used, which simplify the process and reduce difficulties

    相對錯誤檢查包括區域劃分、視圖據提取、據提取等過程。相對錯誤的判斷依據是答案圖。本批改系統採用直線和圓弧掃描演算法,並且結合圖形元素直接比較法和特徵比較法,既簡化了處理過程,又降低了處理難度,比較圓滿地完成了開題報告確立的任務。
  4. Simulations using numerically calculated scattering response based on three thin wire target demonstrate that the method proposed in this paper is surprier to the traditional e - pulse

    基於三種細導線目標值計算散射場的模擬實驗表明,相比于傳統e脈沖能量識別數,本文方法取得了很好的效果。
  5. The thesis describes the detailed procedures of hand - writing data processing, including chinese character dot matrix building and display, vector data storage, chinese character dot matrix compression, transfer protocol and hand - writing chinese character re - building. also, stroke order based hand - writing chinese character recognition method is explored, and characteristic - recognition methods for chinese character with similar stroke order codes and the structure of hand - writing chinese character recognition dictionary are discussed

    第四,設計了服務器端的服務軟體,可以實現據的解碼、重建、筆劃特徵提取、據管理功能;採用了基於筆段筆順編碼和結構特徵的方法並設計了字典的結構,可以有效的提高速度,達到較高的率。
  6. Bioinfomatics, image processing, pattern recognition, data mining

    生命信息科學,字圖像處理,模式據挖掘。
  7. Due to its unsupervised learning ability, clustering has been widely used in numerous applications, such as pattern recognition, image processing, market research and so on

    聚類具有無監督學習能力,被廣泛應用於多個領域中,如模式據分析、圖像處理以及市場調研等。
  8. Some key techniques, such as monitoring and identifying a data package, analyzing a data package, reducing lost package rate have been used in this system

    該系統採用了監聽與識別數據包、分析據包、減小丟包率等關鍵技術。
  9. In the paper, we design a system which can not only recognize container characters on real time but also administrate container transport. the system includes character location module, character recognition module and database module

    本課題在visualc + + 6 . 0編程平臺上開發了一個基於sqlserver2000據庫的集裝箱編號自動及管理軟體系統,包含編號定位、字元據庫功能等三個模塊。
  10. It is an expensive proposition to bring in direct exchange feeds, to develop and maintain the systems that are needed to decode and normalize the various exchange protocols so your application engines can make sense of the data

    採用交易據直接交換是昂貴的,需要開發和維護系統以解碼各種協議,這樣系統才能識別數據。
  11. We study the dealing with of prolog, the recognition of character encoding, the cutting apart of data, the parallel parser and carry on the experiment

    我們研發了序言處理、字元編碼方式據分割、并行解析器,並進行實驗驗證。
  12. After a detail analysis for the traditional e pulse target discrimantion technique, a modified e - pulse energy discrimination numbers is proposed, and its probability distribution characteristic is analyzed

    在此基礎上,針對傳統e脈沖目標方法存在的問題,本文提出了一種改進的e脈沖能量識別數,並分析了改進的能量識別數的概率分佈特性。
  13. Cluster analysis is one of the means of multivate analysis and is widely used in pattern recognition, data mining and decision analysis etc. now the popular clustering algorithm is transitive closure clustering algorithm and fuzzy c means clustering algorithm

    聚類分析是多元統計分析的方法之一,廣泛的應用在模式據挖掘和決策分析等領域。目前常有的聚類演算法有傳遞閉包聚類演算法和fuzzyc - mean演算法。
  14. First of all we discuss the model of information purifying and bring forward the methods of setting up the according fuzzy set and subject function. secondly after analyzing the traditional technology and the strongpoint and the shortcoing of information purifying we improve it combining with the technique of fuzzy mode identifying, data warehouse, cache etc. and we can perpetrate an on - line and synchronous purifying through analyzing the text and picture showing in the pages of network. finally, we choose sql server 2000 to design the url database and delphi, wingate as the tool for system development to develop an efficient system of information purifying which can keep the network consumer especially young student apart from the intrusion of unfriendly information and make the environment of network pure and fine

    本文首先探討了該系統中的信息「凈化」模型,提出了模型中的模糊集及隸屬函的構造方法;然後分析了傳統的信息「凈化」技術及其優缺點,結合模糊模式據倉庫、高速緩存等技術對傳統的信息「凈化」技術進行了改進,改進后的信息「凈化」技術可通過分析正在顯示中的網頁文字、圖片內容,做即時、同步性的網頁內容篩選;最後,利用sqlserver2000設計了url據庫,選擇delphi 、 wingate作為系統開發工摘要具,設計開發了一種高效的網路「凈化」器,使網路用戶尤其是青少年學生遠離非友善信息的侵擾,讓網路環境更加純凈、美好。
  15. Adopt the smart camera of cognex based in u. s. a. ( one of the leading suppliers in machine vision industry

    採用全球機器視覺領導者的美國康耐視的檢測單元,能高速穩定識別數字和條碼,並與據庫據實時對比,確保合格的卡片才能進入下一工序。
  16. Another method is based on the multi - resolution property of the wavelet. because different signal modulation has different characteristics at certain resolution, the specific signal information at different resolution are used a vector of signal features to identify signal modulation by rbf neural network. computer simulations show the methods proposed has good performance even in low snr ratio

    基於小波的多解析度特性,在本文中利用小波分解獲取信號在不同分解水平下的細節信息,將這些細節信息構成特徵向量,由於不同信號類具有不同的細節信息,於是可以將這些特徵向量通過徑向基函( rbf )神經網路進行訓練與識別數字調制信號。
  17. Clustering technique have been applied to a wide range of problems, including pattern cognition, data mining, decision - analyzing and prediction, etc., yet it is imperfect both theoretically and methodologically, even severe fault

    聚類分析雖已廣泛地應用於模式據挖掘、計算機視覺、模糊控制、決策分析和預測等許多領域,但它在理論和方法上仍不完善,甚至還有嚴重的不足之處。
  18. Then, to facilitate error correction, highly accurate word alternatives are suggested by combining speech data with statistical predictive data. as a result, the desired word can be selected with a minimum number of keystrokes

    然後,為方便糾錯,語音識別數據和統計預測據結合在一起,極大地提高了選詞精度,最終以最少的擊鍵次找到想要的單詞。
  19. The back - propagation network is the core part of ahead - propagation network in artificial neural network and is widely applied in many aspects such as function approach, mode distinguishing and data condensation

    Bp網路是人工神經網路中前向網路的核心內容,它在函逼近、模式據壓縮等方面使用非常廣泛。
  20. Data mining is a collection of engineering methods proposed for solving large practical problems of machine learning, pattern recognition, database technology etc. the purpose of data mining is to discover the implicit knowledge or rule, and to help human expert to make decision. frequent pattern mining ( fpm ) and bayesian network learning ( bnl ) are two useful technologies of data mining

    據挖掘技術是解決機器學習、模式據庫技術等各種領域中的大型實際應用問題而提出的一些工程性方法的集合,主要是為了從大型據庫中高效地發現隱含在其中的知或規律,並為人類專家的決策提供支持。
分享友人