英语人>网络例句>in recognition of 相关的网络例句
in recognition of相关的网络例句

查询词典 in recognition of

与 in recognition of 相关的网络例句 [注:此内容来源于网络,仅供参考]

Creative point 3. Engrafting fuzzy recognition theory with information security theory, on the basis of elliptic curve cryptographic algorithm in information security theory, this paper presents t'-order iteration encryption, t-order iteration decryption algorithm of fuzzy recognition and authentication.

创新点3。将模糊识别理论与信息安全理论相互嫁接,相互交叉,以信息安全理论中的椭圆曲线加密算法为依据,提出模糊识别的t-阶迭代加密,t-阶迭代解密算法和对加密者的认证。

This paper inflects the statue of the intangible assets and the real condition of the accounting procedures of the intangible assets in the high-tech enterprise. Through the comparison of the recognition and measurement of intangible assets, then respectively discusses the characteristics, classification, identification, and measurement, according to the characteristics of the high-tech enterprise. The thesis puts more emphasis on the recognition and measurement of intangible assets, the choice of the measurement, and the subsequent measurement, makes some suggestions concerning these problems.

本文揭示了无形资产在高新企业中所处的地位以及目前高新企业无形资产的会计处理的现实状况;随后,本文通过比较国内外对无形资产的确认与计量的不同规定,针对高新企业的特点,分别对无形资产的性质、分类、确认、计量等问题进行了论述,着重阐述了高新企业无形资产的确认、计量属性的选择以及后续计量的问题,并对此提出了改进的建议。

Recognition and analysis of human faces can be widely used in such fields as personal identification recognition, safety inspection, human-computer interaction, expression analysis, lip-reading, etc.

人脸的识别和分析可以广泛应用在个人身份识别、安检、人机交互、表情分析、唇读等应用中。

Lip-reading is used for capturing information of a speaker through his/her lips movement. this technology is wildly used in speech recognition 、 ID recognition 、 Human-Computer intelligent interface and Multimedia system.

唇读技术可以通过说话人的口型运动特征对说话人的信息进行捕获,该技术被广泛应用于语音识别、身份识别、人机智能接口以及多媒体系统等领域。

At the same time, chaotic pseudo-random sequences generator based on nonlinear dynamic filter security model are constructed to select the frequency hopping points for NDFT, improving the overall system security. 3、Aiming at replay attack of networks in the remote speaker recognition systems and distributed databases speaker recognition systems, a time-stamp watermarking method is brought, which quantizes magnitude coefficients of NDFT. The time-stamp watermarking is embedded into the user's voice sample/voice characteristic information to resist on the replay attack.

同时该类算法采用以非线性动力学滤波器为基础的伪随机序列发生器构造跳频序列来选择频率变换点集合,有效提高了系统的安全性。3、针对远程说话人识别系统以及数据库分布式说话人识别系统存在易受网络重放攻击的缺陷,本文给出一种基于非均匀傅立叶变换的&时间戳&水印量化算法,通过把时间戳水印嵌入待识别用户的语音样本/语音特征信息中,可以有效解决此类缺陷。

A module of target recognition is set up and algorithm of data pretreatment and target recognition is discussed in detail. The detailed content is as follows.Firstly, this paper introduces the theory and output signal expression of a passive millimeter wave detector, based on the theory of an AC all-power radiometer.

全文的内容如下:首先,结合交流全功率辐射计的工作原理介绍了被动毫米波探测器的工作原理及输出信号表达式,并推导建立了探测器输出信号的数学理论模型,用计算机进行了波形模拟。

The biomimetic pattern recognition makes recognition from the views of "matter cognition" instead of "matter classification", which analyzes and cognizes the high dimensional geometrical distribution that consists of the sample sets in the high dimensional feature space. It provides the theoretic basis of building the neural network based on high dimensional theory.

仿生模式识别从&认识&而不是&区分&的角度来进行模式识别,是对学习样本的全体在特征空间中形成的复杂几何体&形状&的分析和&认识&,为用高维空间理论建立识别神经网络提供了理论基础。

Most work about musical score recognition is based on MIDI format file; however, most musical data are stored in audio frequency format. Therefore, this paper discussed a musical score recognition method from WAV format file including solo music signal, adopted the Discrete Cosine Transform combined with energy, and presented a principle of least derived notes.

大多数乐谱识别工作都是在MIDI格式文件下进行的,而音乐数据大多采用音频格式存储,为此讨论一种从WAV音频文件的独奏乐曲信号中识别出乐谱的方法。

Aiming at the attributes of the high speed of cigarette package moving and strong noise in the field environment, the thesis carries out a dynamic imaging mode of random outer trigger and obtains the cigarette package images with high quality and high precision. The median filtering, image segmentation and other techniques of image pre-processing are applied to the character images, and the techniques of pattern recognition are employed to recognize the characters. The thesis optimizes and improves the recognition algorithm to satisfy the requirements of high speed real-time processing system. The whole system can online inspect and take statistics the print quality of the forgery-proof symbols on the outer packing of cigarette, achieving good results.

针对在线打印防伪字符过程中烟包运动速度高、现场环境干扰多等特点,设计了随机外触发动态成像方式,获得了定位精确、画面清晰的烟包图像;运用中值滤波、图像分割等图像处理技术对待识别的字符图像进行了预处理,并运用模式识别技术对字符进行识别;对分析识别算法进行了优化和改进,满足了系统的高速实时处理要求,完成了对烟包外包装防伪字符打印质量的在线检测和数据统计,取得了良好的检测效果。

This paper discussed recognition algorithms for analyzing document image of information card based on optical mark recognition, and proposed a new information card fill-in method.

阐述了基于图像识别的信息填涂卡文档图像标记阅读机中的识别算法,并提出一种新的信息卡填写方式。

第64/100页 首页 < ... 60 61 62 63 64 65 66 67 68 ... > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。