对于源代码的识别,6到8个隐藏节点似乎工作得很好。
For source code recognition, 6 to 8 hidden nodes seem to work very well.
同时,系统也解决了隐藏节点和暴露节点问题。
Moreover, the hided and the exposed nodes were be avoided by the system.
您还可以构建使用隐藏节点的群集,如果您真的真的需要。
You also could build clusters that use hidden nodes if you really really need to.
这个程序有一个包,它能够根据实际文件推断出需要多少输入节点(计算在内的和期望的),选择隐藏节点的数目是一个诀窍。
The program has a wrapper that deduces how many input nodes (count and target) are needed, based on the actual input file. Choosing the number of hidden nodes is trickier.
在自组网的匿名通信中,节点通常用伪身份来代替节点的真实身份进行通信并不断变更伪身份,从而达到隐藏节点真实身份的目的。
In order to hide the identities in anonymous communication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.
其中d(n)是隐藏节点 n 的函数,让我们来看(1)n 对任何给出的输出节点有多大影响;(2)输出节点本身对网络整体的误差有多少影响。
where d(n) for a hidden node n, turns on (1) how much n influences any given output node; and (2) how much that output node itself influences the overall error of the net.
如果节点不是相关的,那么通常会隐藏任何关联的控件。
When a node is not relevant, any associated controls customarily will be hidden.
SSI中间件隐藏了访问分散在节点间的资源(文件、内存、CPU)的复杂性。
SSI middleware hides the complexity of how we access resources (files, memory, CPU) scattered among the nodes.
您应当可以单击展开和收缩hello节点,这样可以显示或隐藏其子节点。
You should be able to click to expand and contract the Hello node, which shows or hides its children nodes.
使用pull方法则无法知道节点究竟位于输入层、隐藏层还是输出层。
With the pull methodology, individual nodes have no way of knowing if they are in the input, hidden, or output layer.
再将各个输入层节点的输出 提供给6 个隐藏层节点,这些隐藏层节点将依次提供给3 个输出接点。
The output of each input layer node is fed to each of six hidden-layer nodes, which in turn feed three output nodes.
只有当你的程序修改一个在场景图中隐藏很深或者经由用户交互式而被选择的节点的时候,问题才会比较复杂。
The problem becomes more complex if your application modifies a node that is buried deep within a scene graph or selected interactively by a user.
一个对象的父节点被隐藏,这个节点也会被隐藏。
Any object that is parented to the object that is hidden will also be hidden.
此外,退火的鲁棒学习算法,提出这些隐藏的节点参数以及SVR - NN的权重的调整。
Furthermore, an annealing robust learning algorithm is presented to adjust these hidden node parameters as well as the weights of the SVR-NN.
渲染树中为每个需要显示的DOM树节点存放至少一个节点(隐藏DOM元素在渲染树中没有对应节点)。
The render tree has at least one node for every node of the DOM tree that needs to be displayed (hidden DOM elements don't have a corresponding node in the render tree).
移动IP是支持IP网络移动性的标准,当移动主机(节点)在不同的ip子网之间移动时,它通过隐藏ip地址的变换提供移动时无缝的切换。
Mobile IP is now the standard for supporting mobility in IP networks. It provides seamless mobility by hiding the change of IPaddress when a mobile host moves between IP subnets.
我知道你可以设置节点只有明确的连接,以及有隐藏的节点等。
I do know that you can setup nodes to have explicit connections only as well as have hidden nodes, etc.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
KK型圆钢管搭接节点,搭接处隐藏焊缝焊接与否的问题,现行钢结构设计规范(GB50017-2003)未作明确要求。
The question whether hidden weld in unstiffened overlapped CHS KK-joints is welded or not is not clearly metioned in current code for design of steel structures(GB50017-2003).
KK型圆钢管搭接节点,搭接处隐藏焊缝焊接与否的问题,现行钢结构设计规范(GB50017-2003)未作明确要求。
The question whether hidden weld in unstiffened overlapped CHS KK-joints is welded or not is not clearly metioned in current code for design of steel structures(GB50017-2003).
应用推荐