識數方案 的英文怎麼說

中文拼音 [zhìshǔfāngàn]
識數方案 英文
numeracy programme
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (長桌) table; desk 2 (案件) case; law [legal] case 3 (案卷; 記錄)record; file 4 (提...
  • 方案 : scheme; plan; programme; project; proposal; suggestion; formula; scenario; outline
  1. As to the critical technological problems of the interlock control of three - car coke oven - oven number identification, accurate contraposition and data transmission, the author proposes solutions respectively - rfid, three - light positioning device, coke oven controller and radio transmission network. these solutions can ensure accurate identification of the oven number. for example, the deviation of the automatic parking position is within 10mm

    針對三車聯鎖控制環節的關鍵技術:爐號別、精確對正和據通信,本系統採用了射頻別( rfid )裝置、三燈位置檢測裝置、焦車控制器、無線通訊網路等解決,可實現無差錯的爐號別,自動停車定位誤差在10mm以下,通信據可靠等系統要求。
  2. Groupthink occurs when group members become so enamored of seeking concurrence that the norm for consensus overrides the realistic appraisal of alternative courses of action and the full expression of deviant, minority, or unpopular views

    團體迷失發生在團體成員對一致性的過度迷戀,而使共規范凌駕于對各種的實際評估,並使不合常軌、少或不受歡迎的觀點無法被充分表達的現象。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等面;一般性的安全防護措施:存取控制、標和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決,為其在配置、管理和應用面提供了基本的框架。
  4. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證的具體要求,設計了基於指紋別、字簽名及智能卡技術於一體的個人身份認證,並將它在監獄指紋點名管理系統中予以實現。
  5. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監控系統的建設目標和總體的同時,重點闡述了圖像處理、通信與別技術在遠程圖像監控系統中的應用實現,給出了圖像監控系統中的終端接入和框架設計、雲臺解碼控制與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監控系統大部分採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的字圖像壓縮編解碼技術、字圖像傳輸技術,將智能圖像處理與別技術應用於圖像的顯示、調整、跟蹤,克服了一般監控系統要求監控人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  6. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於據挖掘技術的入侵檢測建模,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路據採集系統和網路據預處理的;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路據的特性和入侵檢測領域的知對演算法進行了擴展和改進,挖掘出了網路據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  7. In these years, image measuring has been used in every walk of life gradually. this paper discusses the characteristic, the virtue and the application of digital image measuring. in this paper. after analyzing the practical situation and theory, it has confirmed the project that identify automatically the pointer and the reticle of the pressure gauge with technique of optic photographic system, image process and automatic identification

    近年來,圖像測量逐漸應用到各行各業。本文討論了字圖像測量的特點、優點及應用范圍,結合實際情況和理論分析,確定了利用光學攝像系統和圖像處理、別技術,自動別壓力表的指針和刻線的,解決了壓力表示值的自動檢定問題,研製了一套集計算機、圖像處理和別、自動控制和光學等技術於一體的壓力表示值的自動檢定系統。
  8. A framework for dialectal chinese speech recognition is proposed and studied, in which a relatively small dialectal chinese or in other words chinese influenced by the native dialect speech corpus and dialect - related knowledge are adopted to transform a standard chinese or putonghua, abbreviated as pth speech recognizer into a dialectal chinese speech recognizer

    但在實際中,多人所說的普通話因受其言背景的影響而不十分標準,這大大影響了語音別的性能。一種解決是,對每種言都收集足夠多的語音據然後構造相應的別器,但由於漢語言種類多且差異大,時間和成本都是很高的。
  9. In this thesis hydraulic experimental studies and theoretical analyses on the vortex - flow drop shaft were conduced and the following results were accomplished : ( 1 ) in the model test some hydraulic characteristics including the shape of air core in the center of the drop shaft, the radial distribution of water flow velocity and the distribution of pressure on the wall of the drop shaft were measured under the condition of high water head above 250m and large discharge above 1400m3 / s. ( 2 ) a kind of computational method for the spiral water flow in the air core region of drop shaft was discussed and applied and the results agree the experimental data well. ( 3 ) the total ratio of energy dissipation in the drop shaft can reach 90 % and the energy dissipation in every region was discussed quantitatively

    本文通過試驗研究與理論分析對旋流式豎井泄洪洞應用於高水頭、大泄流量情況時存在的一些水力學問題進行了研究和探討,取得以下主要成果:一、結合小灣工程導流洞改建,對高水頭( 252m ) 、大泄流量( 1400m ~ 3 s )條件下旋流式豎井中的水流運動特徵進行了比較全面的測量,包括空腔形態、徑向流速分佈及井壁壓強等;二、提出了豎井空腔段螺旋水流水力計算法,其計算結果與實測值吻合良好;三、利用試驗與計算結果,對旋流式豎井的消能機理進行了探討,對豎井各部分的消能能力有了總體認;四、對豎井下部消力井的合理井深進行了優化試驗研究,發現消力井合理深度為0 . 9d左右;五、通過試驗研究,歸納出豎井水流總摻氣量估算法,為導流洞排氣的設計提供了參考依據;六、在高水頭、大流量條件下,豎井空腔段下部流速很高,盡管水流螺旋運動引起的離心力可以確保井壁壓強保持正壓,但空化依然較低,因此豎井的空化空蝕始終是工程界關注的重大問題。
  10. The database system facing the selection and cultivation support for cadres in the army supply a decision - making support for cadres ’ appointment and remove by the introduction of advantaging technique of database and the primary mining and analysis of data to realize informative 、 scientifically in the management of cadres in the army, informationalization and scientiztion for military officer management

    通過對建立面向幹部選拔的主題據倉庫,進行聯機分析( olap )和據挖掘( dm ) ,從中提煉出利於分析和決策的綜合信息,獲得大量有用知,為幹部的選拔任用和選擇更加合理的培養提供決策支持。
  11. Through the approach of investigative questionnaire and ability examination, considering both teachers " teaching practice in senior high school and students " need in analyzing and resolving problem, taking the method of fixing the quality and quantity, we make a demonstration research. at last, we draw a conclusion that the 19 manifestations of chemistry ability can be reduced to three levels : the basal level, called repeating thinking, includes distinguishing and judging the chemical fact and relations of quantity in chemical reaction, comparing and summarizing the chemistry fundamental knowledge ; innovative thinking level includes illogical thinking and logical thinking. illogical thinking mainly contains intuition, association and space imagination of micro - particle

    通過調查問卷、能力測試等途徑,結合教師在中學化學的教學實踐和學生在分析、解決問題的實際需要,採用定性與定量結合的法,進行實證研究,得出結論:化學學科能力的19種表現形式歸納為3個層次:最基礎的再造性思維能力層次包括對化學事實和化學反應中量的關系的別和判斷、對化學基礎知的比較概括;以培養創新能力為核心的創造性思維層次包括化學直覺思維、聯想、對微觀粒子的空間想象為主的非邏輯思維和靈活運用已學的化學知通過分析、綜合地解決問題為主的邏輯思維;化學實驗能力層次是化學學科能力的最高層次,它以思維能力為基礎,集中體現了化學教學的基本特徵,實驗能力層次包括:選用實驗法和設計實驗,對實驗的評價,研究和處理實驗事實、資料、據,發現規律,表達實驗及其結果,最終解決問題的能力和發散思維。
  12. Salg support the travels pass through the nat of multi media communication based on sip, can relizd most of the sip terminal and servers automatically, and it also support the basic end to end communication based on sip. it is a effective and low cost solution to end to end sip communication based on sip

    ? . ? sip會話,能自動別大多sip終端客戶和服務器,支持基本的基於slp的ip網路上的端到端通信,是一個有效的低成本的基於linux的sip的端到端通信的解決
  13. Combining with the performances of danshan bridge, discussing the methods on the construction controlling and calculation of cable - stayed bridge, this paper raises an efficient construction controlling system, and realizes collecting construction data of the real bridge and technical information. by analyzing on the difference of theoretical calculation and real construction state, the author determines to take self - adapting construction controlling method which uses kalman filter method to identify and adjust construction parameters. by getting rational construction state from forward iteration method, this paper, taking concrete creep effect in consideration, raises a rational scheme to pre - remain deformation and adjust cable force

    結合丹山橋的結構特點,通過對斜拉橋施工控制及結構計算法的探討,提出了有效的施工控制系統,實現了對實橋施工據和技術信息的採集;通過分析理論計算與實際施工狀態的差異,確定了以卡爾曼濾波法作為施工參別與調整的自適應施工控制法;通過正裝迭代法確定其合理施工狀態,並考慮混凝土的徐變效應,提出了合理的預留拱度和索力調整
  14. In this paper, ansys data model and corresponding physical model are built in simple concrete beam based on the theory and method of structure diagnosis and made a experiment, in order to examine the diagnosis ability of diagnosis theory, many kinds of diagnosis designs are put forward

    本文建立了簡支鋼筋混凝土梁的ansys值模型和相應的物理模型,並基於振動模態測試理論和法,在試驗室進行了結構損傷試驗。為了檢驗各種診傷理論對結構損傷的位置、損傷程度的別能力,設計了多組損傷模擬
  15. As an experiment of basic course in electronic technology, the project is based on domination principle of digital music player and integrates with the elementary application of multiplexer, flip - flop, counter and rom, which enables students to comprehend these knowledge fully along with acquaintance of technical application and promotes systematic understanding of basic notions, course content and advances the transformation from knowledge to ability

    作為字電子技術基礎課程的實驗內容,該設計以字音樂播放的控制原理為切入點,結合了據選擇器、觸發器、計器和只讀存儲器的基本應用,使學生在充分理解這些知點的同時了解一些工程應用背景,以形成對課程內容、基礎概念的系統認,促進知向能力的轉化。
  16. Certain principles and strategies should be followed in order to solve the intellectual property issues involved in digital library development

    摘要字圖書館建設中涉及的知產權問題及其解決,需要遵循一定的原則和策略。
  17. The first part of the paper is designing the testing project for grounding resistance and insulation resistance in a new way. using 16bits ad converter with programmable control amplifier replaced the way which used changing resistance to change measure range. lt is not only improved testing precision and develop the system expediently, but also reduced the area of the circuit boardwith the new way. in order to make the electric implement safety testing system have upstanding expansibility, the software and hardware of the system adopted the modularization design. adopted mcu atmegal28 as a master mcu which control mmi, realtime clock and communication with slaver mcu. atemga8 as the slaver mcu to realize testing function. so it is easy to add or reduce the testing project. the testing implement system has been developed successfully, and the comments for the system is that it has high precision, high expansibility and easy maintain. but considering the electric implement system should have intelligence and humanity abi lity. so this paper bring forward a scheme of electric equipment safety testing embedded system with speech control. after introduce the basic theory of speech recognition, the paper expatiate the characters of this system. the system is a noise conditon, not special people, small glossary, insulation word system. with these characters design the speech recognition as fellow. utilizing cross zero ratio and short energy to ensure jumping - off point and end point ; adopting mfcc as the character parameters of speech recognition ; the character parameters than be recognized by dtw. in order to ensure the credibility of this project, first realized by matlab in computer

    在介紹了語音別的基本原理后,闡述了本系統的特點:本系統是一個噪聲環境下非特定人、小詞匯量、孤立詞的語音別系統。根據本系統的這些特點設計了如下語音:利用過零率和短時能量相結合的式確定語音端點;採用mel頻率倒譜系( mfcc )作為語音別的特徵參;得到的特徵參最後通過動態時間規整( dtw )的模式法進行別。為了確保本系統實現的可靠性,首先通過計算機利用matlab軟體來模擬,在演算法模擬實現后又進一步增加環境的復雜性:加上較大的環境噪聲、突發性的噪聲等,再通過修改參、修改參考模板、兩級別等各種提高語音別精度的法來提廣東工業大學工學碩士學位論文高別率。
  18. A project of authentication based on fingerprint feature data is studied : in this project, the first step is to sample the fingerprint of people and extraction its feature data through secugen hamster ( which is a kind of fingerprint sample device ), then embed the fingerprint feature data into the image ( both 256 gray - scale images and 24 bit color images ). during the identification course, match the fingerprint feature data sampling from the secugen hamster with that of picked

    研究了一種基於指紋特徵據水印演算法的身份:結合secugen系列指紋儀,將採集的指紋圖像進行特徵提取,最後將指紋特徵信息嵌入到宿主圖像( 256色或24位彩色圖像) 。在別過程中,將採集的指紋信息和從圖像中提取的指紋特徵信息進行比對,如果比對成功,則可以確認其身份合法,否則,就是非法者。
  19. The scheme of target recognition based on gray model is set up. gm ( 1, 1 ) and gm ( 1, n ) of target noise are also set up. the method of target recognition, which takes gray model parameter as features, is put forward after their models and the characteristic of model parameter are deeply analyzed and researched

    設計了基於灰色模型的目標,分別建立了目標聲場通過特性的gm ( 1 , 1 )模型和gm ( 1 , n )模型,並對其模型及模型參的特點進行了深入的分析和研究,提出以灰色模型參為特徵量進行目標別的法。
  20. Furthermore, good compression effectivity is presented in application to compression of pd gray intensity images. according to the research on difference degree between computational values of fractal features extracted from decoded pd images and that from original images, it is shown elementarily that the proposed method is effective for application in pd pattern auto - recognition system. ( 4 ) this paper brings forward pd pattern auto - recognition project based on the above recognition features and fractal compression of pd gray intensity images and designs the classifier with back - propagation neural network ( bpnn )

    ( 3 )研究了局部放電灰度圖像的四叉樹分形圖像壓縮法,通過模擬實驗證明採用本文演算法能夠獲得一定的圖像壓縮比,在局部放電灰度圖像壓縮應用中顯示了良好的壓縮效果,進一步研究了局部放電解碼圖像的別結果與原始圖像之結果的差異程度,研究結果初步表明該法應用於局部放電模式自動別系統中是有效的; ( 4 )研究了基於局部放電解碼圖像的bpnn法及,通過分析對解碼圖像的別效果,驗證了設計的系統模式的有效性,同時表明該能夠滿足實地局部放電模式自動別和遠程據通訊及自動別的需要。
分享友人