隱數法 的英文怎麼說

中文拼音 [yǐnshǔ]
隱數法 英文
implicit enumeration
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. On the basis of the study on the speech coder algorithms, paper describe an advanced method of developing dsp system software, and as the guidlines, we developed the programme of whole decoder unit. paper stress on analysis of the ecu in decoder unit. aiming at amr algorithms disadvantage of angularity of synthetical speech, paper study on the specutral extrapolation which apply to extrapolate reflect coefficient of track model to make error conceal processing of amr. at last paper analyze existing echo cancellation algorithms using on mobile communication system

    在此基礎上,描述了一種較為先進的大型dsp系統程序開發策略,並以此為指導思想,以美國ti公司c6000dsp開發平臺開發出了整個amr解碼器單元的系統程序。論文對amr解碼器的誤碼藏處理單元進行了重點分析,針對原有演算合成語音自然度不好的缺點,論文研究了將譜外推應用到amr演算中外推出聲道模型反射系進行誤碼消除處理。
  2. In algorithms, classification algorithms are divided into two cases : one for known statistical distribution model and the other for unknown statistical distribution model. four classification algorithms, the bata - prime statistic model fusing quadratic gamma classifier, based on sar image rcs reconstruction and space position mode, on the mixed double hint layers rbfn ( mdhrbfn ) model and on the self - adapt fuzzy rbfn ( afrbfn ) model, are derived. the problems, including how to further improving the class ratio of the bayes decision, decreasing the dependence on the statistical model and directly providing the adapted algorithm with samples, are solved

    提出了基於徑向基函神經網路( rbfn )的雙層混合網路( mdhrbfn )模型,解決了標準神經網路在具體sar圖像地物分類中分類類別目不夠和分類精度差的問題;提出了基於模糊推理系統的自適應模糊rbfn分類( afrbfn )模型,兼顧通用性與精確性,增強人機交互能力,進一步提高了演算分類率。
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關律問題作了論述;第七章首先論述了電子提單對有效性的律需求,然後結合國內和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立對電子證據的律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  4. In this thesis, used thermocouple to sense the temperature in the space of the hearth, attributed the thermocouple based on calorifics and scientific arithmetic, acquired data by data acquiring card, processed data according to the demand of setting up temperature model and drawing graphics and then caculated the coordinates of isothermal points and normals of isothermal facets, ascertained the order of connecting points and the model of construct, drawed the isothermal facet of temperature field with opengl at last

    通過據採集板卡進行據採集並與計算機介面進行據處理。然後,將處理后特殊點的溫度據依據marchingcubes演算建立學模型求取等溫面上的點的坐標及各點的向量等。最後,確定計算的三維坐標點的連接順序和拓撲模型,利用opengl進行等溫面的繪制、消和模式變換等工作。
  5. Firstly, second harmonic component ratio and dead angles of two phase inrush ' s dispersion in three - phase transformes are acted as input variable. secondly, the method applies improved algorithm based on the original algorithm of multi - layer forward back propagation network, that is to say, adding last variational effect of weight value and bias value to this time and making use of variable learning rate. at the same time, this method also adopts dynamic form in the number of hidden floor node

    首先,文中將三相變壓器兩相涌流差流的二次諧波含量比和間斷角作為網路的輸入變量;其次,利用對原有bp網路訓練演算基礎上的改進型演算(即在計算本次權值和閾值的變化時增加上一次權值和閾值變化的影響以及採用變學習率,與此同時含層神經元個採用動態形式) ,通過樣本訓練使網路結構模型達到最優。
  6. On an object destructor syntax in c and c

    (在c #和c + +中為析構函)可提供式控制。
  7. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  8. Digital watermarking algorithm based on wavelet transform, making use of relative frequency equability feature of low - frequency that comes from image ' s mra decomposing and according to size between insert point value and its region mean value, is that two - value watermarking is hid in insert point

    基於小波變換的字水印演算充分利用了圖像經過多分辨分解后低頻圖像的頻率相對平穩特性,並依據嵌入點值與其區域均值的大小,將二維二值水印信息藏到嵌入點。
  9. Study on numerical simulation of faultage of seepage in underground project with latent complex - material element method

    地下工程滲流斷層值模擬的式復合材料單元研究
  10. This thesis tries to update the cmdsr system to achieve the characters below : real - time, better robust, higher recognition rate, non - special - man. considering the disadvantages of traditional improved spectrum subtraction speech enhancement, this thesis proposes the theory of fuzzy spectrum subtraction based on the fuzzy theory and improved spectrum subtraction speech enhancement ; as for the difficulties of detecting the endpoint of speech signal, the thesis gives the table of initial and the improved parameters, with which we can confirm the endpoints of mandarin digit speech ; the thesis puts forward two - level digit real - time speech recognition system, the first level is based on discrete hidden markov model which is linear predictive coding cepstrum ( lpcc ) and difference linear predictive coding cepstrum ( dlpcc ), the second level is based on formant parameters ; as for the realization of hardware, the thesis depicts the realization of every part of cmdsr based on the tms320vc5402 in detail ; as for the development of software, the thesis gives the software design flow chart of cmdsr, simulates the basic theory with matlab language and gives the simulation results

    針對傳統的「改進譜相減語音增強」參設定單一、環境適應能力差的缺點,提出了一種利用模糊理論和「改進的譜相減」結合的「模糊譜相減語音增強」 ;針對語音信號端點檢測困難的特點,通過matlab模擬試驗,給出了能夠準確確定碼語音端點的初始和改進參表;提出了利用基於線性預測編碼倒譜參和差分線性預測編碼倒譜參相結合的離散含馬爾可夫模型進行第一級識別、利用共振峰參進行第二級識別的兩級漢語碼語音識別系統,在保證系統實時性的同時,實現連接漢語碼語音識別系統識別率的提高;在硬體實現上,詳細闡述了基於tms320vc5402的連接漢語碼語音識別系統各部分硬體設計;在軟體開發上,給出了連接漢語碼語音識別的軟體設計各部分的流程圖,並對各部分進行了matlab模擬,並給出了模擬結果。
  11. We deduce frondose algorithm of three layers bp neural networks which is used in common, and discuss several important issues in designing neural networks which is used to forecast, for example, number of hidden layer, nerve cell number of hidden layer, epoch of learning, embryonic power value, decision of node number about input and outputo at the same time, this dissertation sums up things that conventional bp algorithm is improved on considering disadvantages of it

    3推導了常用的三層bp神經網路具體演算,討論了實際預測應用中神經網路設計方面的幾個重要問題,如層神經元、訓練次、初始權值、輸入節點以及輸出節點的確定。同時,針對傳統bp演算存在的各種各樣的缺點,文中綜述了對其改進的情況。
  12. But it was not until the 19th century that mathematicians such as evariste galois, an unhappy french genius, discovered symmetries hidden in the solutions to mathematical equations

    但直到19世紀學家們才發現藏在學方程解中的對稱性,其中包括鬱郁寡歡的學天才艾瓦里斯特?伽羅瓦。
  13. An empirical analysis is made with the population data of the us cities to verify the theory and models developed in this paper, which will contribute to reconcile the apparent difference between the hierarchical step - like frequency distribution of city sizes suggested by central place theory and the smooth curve reflected by the work on the rank - size rule

    多重zipf維模型不僅可以有效地統一中心地的等級階梯與位序-規模則反映的連續分佈,而且可以揭示城市體系演化的更多信息和則。以美國城市體系1998年的據為實證對象,給出了城市規模分佈的多分維
  14. A separated - parameter method is proposed to calibrate the structure parameter. a vanishing line method is proposed to calibrate the normal vector of light plane and invariability of cross - ratio is proposed to calibrate the baseline length

    並提出一種參分離的方對傳感器進行了標定,採用消標定激光平面的矢量,利用交比不變原理標定激光平面的基線長度。
  15. A non - grid hydrodynamic numerical model is established by using the moving particle semi - implicit ( mps ) method to investigating the possibility of the model in the research of the hydrodynamics of the coastal structures under the action of water movement

    摘要運用一種移動粒子半建立無網格水流值模型,探討該模型在結構物水動力特性研究中的可能性。
  16. It is reali zed that the invisible part of the object can be shadowed, using the max imum or minimum enveloping rectangle method and the counter of points of intersection method, etc. ( 3 ) the boolean operation between integrity or unintegrity bodys is supplied

    分析並討論了形體產生藏線、藏面的原因,利用了最大最小外包矩形、交點記等,實現了任意形體的消演算。 ( 3 )完成了形體間的正則、非正則布爾運算。
  17. Some notes on the differential method and the parameter method and the singular solution

    求解一階微分方程的微分與參及奇解注記
  18. The numerical simulation is an effective method. the main task of this dissertation is to establish a hydrodynamic and pollutant transport model, and to simulate the tide field and concentration field of hakata bay : ( 1 ) dispersing the long - wave equation on interlaced grid by adi method, a two - dimension hydrodynamic model is established to simulate the tidal flow in hakata bay under the effects of m _ 2, s _ 2, o _ 1, k _ 1 tide

    本文的主要工作是建立一個深度平均的二維水動力及污染物擴散輸移的值模型,並對一實際海灣的潮流場及濃度場進行值模擬: ( 1 )用深度平均淺水波動方程為控制方程,採用迎風adi有限差分方(交替方向)在矩形交錯網格上離散潮波方程,建立了一個二維潮流值模型。
  19. " data privacy laws in the u. s. are subject - matter specific, " gelman said

    「在美國是一種特別的主題條例。 」
  20. A better desired ventilation form is acquired by comparing the three efficiency values. on the basis of recently materials collected in the field at home and abroad, this paper adopts two - equation turbulence model by analysis and comparison, and sets up mathematical model to study three - dimentional indoor turbulent flow. control - volume method and power - law scheme is used to discrete these differential equations. according to semi - implicit method for pressure - linked equations ( simple algorithm ), author writes a general program in c language for simulation of the velocity profile, temperature and pollution concentration distributions of indoor airflow, and the writing, the debugging and the running of the program. all are completed in microsoft visual c + + 6. 0 environment

    在收集國內外在這一領域內的大量資料的基礎上,通過分析與比較,採用了k -雙方程模型來研究室內氣流的濃度分佈,建立了描寫穩態的三維紊流室內氣流濃度分佈的學模型,採用控制容積和冪函分佈方案來離散微分方程組,按壓力藕合方程的半( simple )演算,用c語言編寫了計算室內氣流流場和溫度場、濃度場的通用程序,並在microsoftvisualc + + 6 . 0環境下對程序進行編制、調試與運行,並對調試工作做了探討與分析。
分享友人