追算分析 的英文怎麼說

中文拼音 [zhuīsuànfēn]
追算分析 英文
hindcast analysis
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  1. An automated de - noising algorithm based on the energy of wavelet packet not donoho ' s threshold algorithm is established. a gear feature vibration signal extraction method using the wavelet packet energy is proposed, which can separate gear meshing vibration, noise vibration and gear fault vibration signal from the original gearbox case vibration signal. basis pursuit ( bp ) algorithm is introduced into the filed of mechanical signal de - noising and feature extraction for the first time

    第三章擺脫了donoho的閾值消噪思想,從能量的角度建立了基於小波包的自動消噪演法;提出基於小波包能量佈的齒輪故障特徵信號提取方法,可以將齒輪嚙合振動信號、干擾振動信號以及故障沖擊振動信號從原始齒輪振動信號中離出來;首次將基蹤消噪演法引入到機械故障信號的消噪與特徵提取上,通過對齒輪故障信號的消噪,表明了它的有效性,並對影響該方法實際應用效果的因素進行了全面的,同時也指出了該方法存在的局限性。
  2. In order to satisfy the new requirement of the police on arresting criminals by on - line information, we took deep research in the recognition of human ' s frontal face, and did lots of experiments in the period of automatic face locating and feature extracting. in this dissertation we proposed a new adaptable two - step face locating algorithm, which combined hbel algorithm and ellipse - model matching algorithm, and men we use eigen - region analysis ( era ) to extract feature

    本文以公安系統的網上逃為研究背景,著重對人臉正面圖像的靜態匹配做了深入探討,在人臉自動定位和人臉特徵提取方面做了大量的實驗與工作,並獨創性地提出了自適應的二級人臉定位演法( hbel演法+橢圓模板匹配演法) ,使用基於特徵區域的來提取人臉特徵進行識別。
  3. A novel algorithm for decomposing any signal into a linear expansion of elementary functions with a redundant dictionary is proposed

    摘要在總結浮點數編碼和格雷碼編碼各自特點的基礎上,提出了一種用浮點數和格雷碼混合編碼的遺傳演法來實現匹配蹤演法。
  4. It also calculates theoretically the minimal time interval between two trains in quasi - moving - block signaling system and recommends approximate values for the length of coded digit track circuit. the rapid development of urban rail transit demands a deep understanding on the features of track circuit

    在此基礎上,針對當前應用廣泛的基於數字軌道電路的準移動閉塞atc系統進行了重點,詳細討論了數字軌道電路的原理、準移動閉塞系統的列控方式等內容,並對準移動閉塞下的最小列車蹤間隔時間進行了理論計,給出了數字軌道電路長度的推薦值。
  5. Accurate stray light analysis is made by " advanced " monte - carlo technique. in order to make the calculation coincident with statistical rules, it needs establishing a 3 - d model with real physical property and tracing enough number of light rays

    精確的雜光還得「改進」的蒙特-卡洛法,它需要跡足夠多數量的光線,建立的三維模型的物理特性與實際符合,才能獲得符合統計規律的計結果。
  6. The dissertation concludes all kinds of main character in the state of power theft through these stealing power means, puts forwards all kinds of countermeasure against power theft, at the same time, calculates the loss electric energy

    從理論上了各類竊電方法引起的電壓、電流和功率因素變化,從而提出了檢測竊電方法和竊電判據,為迅速準確判斷竊電行為和電量提供了理論保證。
  7. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  8. The paper mainly discusses the tracking, building, filling and labeling of isolines etc. from the point of view of algorithm. finally it describe the application of isoline analyzing system that developed by myself in anfas project, which is presided over by eu ( european commission )

    本文主要從演法的角度討論了等值線的蹤與生成,以及等值線的填充,等值線的標注等內容。最後描述了本人開發的等值線系統在歐盟主持的anfas項目(水災和決策支持的數據融合)中的應用。
  9. Meanwhile, in 3d - scene, some functions of spatial analysis and interactive operations have been realized. and, a testing application system of 3dcm is developed, which includes tin model construction, the creation of contour, spatial coordinate query, section - cutting, measuring distance and area, 3d visualization and operation about topography and building etc. the purpose of developing testing system is to demonstrate the correctness of 3dcm based on the visualization. finally, the result of the testing and 3dgis research direction is put forward to investigate generally

    另外,在三維模型的可視化場景中,實現了一些3dgis的交互操作和空間功能,結合論文的目標,開發了一個實驗系統,對三維城市的建模方法進行了論證,實現了dem模型的快速構建及等高線的蹤和地圖幅,實現了三維城市模型的可視化,在可視化的基礎上實現了部空間交互操作和空間,如:空間坐標查詢、斷面切割、距離和面積量、建築物屬性查詢、三維動態漫遊等。
  10. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向蹤問題,從四個方面對其解決方案進行了研究:在比較幾種反向蹤演法的基礎上,著重研究了代數方法編碼反向蹤信息的方案,該方案把蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向蹤問題的一種新的解決方法; ddos陷阱作為反向蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  11. At the same time, as more and more radio sources have been set up, electromagnetic pollution in urban area becomes more serious, which is harmful to people ' s healthy and communication system so it is necessary to simulate the electromagnetic propagation in urban area by computer being an approximate hf method in evaluating em scattering , the complex ray method ( crm ) is valuable in actual applications , mainly benefited from its simple physical model , convenient mathematical formulation and computational efficiency, especially with the scenes of scattering from complex objects based on the condition mentioned above, a hybrid ray model of the urban area electromagnetic wave propagation prediction was established with the foundation of ray tracing theory and complex ray theory

    復射線技術作為一種求解波場問題的高頻近似方法,由於其具有物理模型簡單、數學處理方便、計效率高等優點,在復雜的目標散射特性等應用領域中有著重要的應用價值。基於以上的情況,本文在射線蹤理論和復射線理論的基礎上,為城區環境建立了混合射線預測模型。本文採用橢圓模型對已有的射線蹤方法進行加速,並將復射線理論應用到城區環境電波傳播預測中,提出新的預測方法混合射線方法。
  12. Firstly, the calculation methods of lighting optics, such as ray tracing method, monte carlo method and flux transmission method, are discussed, further more the characteristic and the application field are anatomized and compared, consequently the flux transmission method is selected as the main method of computational simulation software of photometric characteristic of headlamps for vehicle

    本文首先對常用的光線蹤演法、蒙特卡羅方法和光通轉移法等照明光學的計方法進行了討論,比較了各種計方法的特點和適用范圍,選擇了光通轉移法作為汽車前照燈反射鏡配光性能的模擬計的主要演法。
  13. Based on the gathered data, especially displacement data, statistically analyzing and feed back according to various empirical methods, theoretical norm and fem computation are conducted so as to grasp the rules of deformation and stress of ground and structure, assess the stability of ground and structure as well as determine reasonable support time and parameters, ultimately achieve safety without compromised safety

    根據獲取的量測信息,尤其是位移信息進行統計,依照各種經驗方法和極限應變準則,以及有限元計綜合進行反饋,把握重疊隧道採用先上後下多臺階開挖工法時圍巖和隧道結構的變形和受力規律,確認圍巖和隧道結構的穩定性,確定合理的支護時機和支護參數,保證施工安全的基礎上求經濟性。
  14. This thesis introduces firstly the intrusion detection technology and its present situation and future development. the analysis summarizes the characteristics of several typical algorithms to current intrusion tracing technology, and afterwards makes a contrast to their different performance. the packet - marking algorithm is taken as key research content in this thesis

    本文首先入侵檢測技術及其研究現狀和發展趨勢,總結當前入侵蹤技術的幾種典型演法特點,並對其性能進行對比,將數據包標記演法作為本文的重點研究內容。
  15. Nowadays the casma system has become an advanced tool for male sterility in modern andrology and reproductive laboratory. at first the system structures and the analysis theories are described in details

    所以計機輔助已經成為現代生殖實驗室中對男性不孕癥診斷和人工授精樣本優選的先進手段和求目標。
  16. Later on, after elaborating the disadvantages of the old methods in detecting and recognizing moving objects, a series of corresponding approaches are proposed, such as grid scan, local tracking bug and dynamic window in object tracing to reduce the huge data needed to be processed, maximum and minimum for selecting a proper segmentation threshold and improved conversion from rgb model to hsv and so on to decrease the influence of inhomogeneous lighting and the color noise, a bilinear interpolation in each quadrant to eliminate the bad effect on the recognition precise because of the distortions of the camera. after that, much emphasis is given on application study in pattern recognition with a feed - forward neural network. both the basic bp algorithm and improved bp algorithm in the study process are described in detail, and the later is used to quicken convergence speed and improve validity of the network

    然後,和闡明了傳統的運動目標檢測方法的不足,並在此基礎上結合研究中的實際實驗環境,提出了一系列解決方法,包括針對降低龐大數據量而提出的網格掃描、局部「跟蟲」蹤和動態窗口掃描等目標檢測方法,針對實驗環境中光照不均和顏色干擾提出基於人機交互的最大最小值閾值選取方法和引入改進的rgb模型到hsv模型的轉換方法,為消除圖像畸變對識別精度的惡劣影響而採用的通過控制點進行雙線性插值進行畸變校正的方法;緊接著,概述了神經網路的發展歷史和幾種常用神經網路模型的特點,重點研究了前饋型神經網路在模式識別中的應用問題,詳細闡述了基本的bp演法和學習過程中bp演法的改進,從而使網路收斂速度更快,解決問題更有效,並在此基礎上,設計了一個基於bp神經網路的運動目標識別系統,給出了實驗結果。
  17. ( 2 ) a information weighting model based on the methods of pca and new ppa is presented. the combined model is set up on the principle of optimization. owing to the predominance of dealing with nonlinearity and uncertainty of wuirn net, the back - analysis model of information weighting is established by use of experts " ability of harmonization

    ( 2 )研究了主成法及新型投影蹤演法,建立信息賦權的正模型,並在最優化準則下,建立了信息賦權整合模型;基於偏差單元遞歸神經網路的處理大壩監測中非線性和不明確性等問題的獨特優勢,憑借專家對指標權重的協調能力,建立了指標信息賦權的反模型。
  18. It is showed by numerical calculation that the waves amplify becomes great and the width of waves becomes narrow after the collision or chase of two solitary gravitational waves. the results indicate that the nonlinear interaction between the gravitational waves may be one of the causes for outbreak of severe convective weather. furthermore, by comparing once shear with second shear, we find that it is easier to breaking up or energy dispersion for the solitary gravitational waves by the nonlinear action when the distributing of basic flow is once shear

    引入實際基本氣流,別討論了具有垂直一次切變和二次切變流時兩個非線性重力波相互作用的數值計過程,得到兩個重力波波包相遇或相都會使波包的振幅增加、波寬變窄;進一步表明,有高空急流存在的條件下,非線性重力波的相互作用更易使波包破碎、能量頻散,激發強對流天氣的形成。
分享友人