因此可以用实际的性能数据来选择一种算法评估方法,以改善项目评估结果和项目计划。
Then, a selected algorithmic method can be configured using actual achieved performance data, and reapplied to improve the project estimate and the project plan.
为此本文对红外图像算法进行了研究,并设计了非制冷红外成像系统的图像算法评估系统。
In this paper, the evaluating system of imaging algorithm for uncooled infrared thermal imaging system was designed.
基于AT R支撑平台的ATR系统开发时可以进行算法评估和算法选择,在新的算法出现时不需要对平台进行修改。
Based on ATR platform, development of ATR system implements algorithm choosing and evaluation, while new algorithm appear, no modify the platform.
ATR算法评估领域常用的评估指标为正确识别率ACC,但ACC自身存在诸多缺陷,仅用ACC指标评估结论具有一定的盲目性和误导性。
The most commonly used evaluation measure in the domain of Automatic Target Recognition(ATR) algorithm evaluation is Accuracy(ACC), however, the ACC measure has many defects.
我们的评估:虽然必须维护用于生成不同数据格式的算法,但是实际的数据只需表示一次。
In our evaluation: While the algorithms to generate the various data formats must be maintained, the actual data need only be represented a single time.
基本上,精确的预测和评估要求一套现有的算法,或者一个拥有有限数目的明确步骤的分步解决问题的程序。
Basically, accurate prediction and estimation requires the existence of an algorithm, or a step-by-step problem solving procedure with a finite number of well defined steps.
瓦格纳和阿尔金使用互赖理论和博弈论来开发算法,评估在特殊场景下欺骗的价值。
Wagner and Arkin used interdependence theory and game theory to develop algorithms that tested the value of deception in a specific situation.
我使用了ordered - permit - override算法,因此将按照策略中规定的顺序评估规则。
I have used the ordered-permit-override algorithm, so the rules are evaluated in the order in which they are specified in the policy.
使用IBMRational产品的从业人员可是采用诸如npv和IRR的技术来评估软件的经济价值,采用基于COCOMOII的算法来评估工作量。
Practitioners using IBM Rational products can apply techniques such as NPV and IRR to assess software economic value and a COCOMO II-based algorithm to assess effort.
这个原理的一个推论是,一种学习算法永远不会对它训练集的结果进行评估,因为对于一种未知的事例而言,没有证据表明算法具有概括它们的能力。
A corollary of this principle is that a learning algorithm should never be evaluated for its results in the training set because this shows no evidence of an ability to generalize to unseen instances.
因此很多算法方法都面向费用评估。
Therefore, many algorithmic methods are geared for cost estimation.
很明显,敏捷社区比较偏向基于专家经验的评估,而不是基于算法的方法。当然它不能全部排除使用功能点分析。
It is clear that the Agile community gives preference to expertise-based estimation techniques over algorithmic methods; however, it does not fully exclude using FP-based analysis.
有意思的是,神经网络是一种对学习型评估的进化,算法经过训练后其行为就像是一个人类专家。
It is interesting to note that Neural Networks is an evolution of learning-oriented estimation, in which the method algorithm is trained to behave like a human expert.
因此,评估备用产品或算法时,不仅仅要对它们表现出的吞吐量进行基准测试,还要测量它们对内存的影响。
So, when evaluating alternative products or algorithms, benchmark not just their apparent throughput but also their memory impact.
该系统不仅可以用来评价多目标跟踪算法在电子战条件下的性能,而且也可以用来评估雷达网在复杂电子战条件下的综合性能。
The system can not only evaluate the performance of multi target track algorithm in EW environment, but also evaluate the integrate performance of netted radar in complex EW environment.
本文提出将模型论、仿真算法和仿真可信度评估理论作为系统仿真学科的基础理论的观点。
In this paper, the author presented the viewpoint that System simulation is based on model theory, simulation algorithms and simulation credibility evaluation theory.
利用粗集理论处理的主要问题包括:数据简化、数据相关性的发现、数据意义的评估、由数据产生决策算法等。
The Rough Set Theory can handle such problems as data reduction, data mining, the evaluation of attribute importance, the formation of decision algorithm etc.
使用这样的数据集可以模拟用户的行为进而评估算法的效率。
Utilizing such datasets allows to simulate the users' behavior and to evaluate algorithms efficiency.
这些算法模型具有很强的实用性,能为建立高效和功能强大的计算机评估系统提供参考。
These algorithms should have stronger practicability and give references when we are building effective and powerful computer evaluation system.
而且其算法可以每隔6周在云层等气象条件允许的情况下对星球上的每个点位自动进行重新评估。
And its algorithms automatically reassess every spot on the planet every six weeks, cloud (of the meteorological sort) permitting.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
利用该算法构建了威胁等级评估模型,并进行了实例计算。
The Threat Level Assessment model is built using this algorithm.
伦敦大学学院和谢菲尔德大学的计算机科学家开发了一套算法,该算法不仅可以评估法律证据,还能权衡道德考量。
Computer scientists at University College London and the University of Sheffield developed an algorithm which can not only weigh up legal evidence, but also moral considerations.
该方法的缺点在于离线实验只能评测一个很狭窄的数据集切面,主要是关于算法预测或者评估的准确性。
The downside is that off-line experiments can evaluate a narrow set of aspects, primarily about algorithms prediction or recommendation accuracy.
该方法同样适用于对多目标跟踪算法的性能进行评估。
This method can also be applicable to evaluate the performance of other algorithms in multi-target tracking.
因此,操作者(或算法)有机会评估性能和修正各周期的操作条件。
So the operator (or algorithm) has the opportunity to evaluate performance and update operating conditions between cycles.
提出了一种基于二叉树模型的配电网可靠性评估算法。
A reliability evaluation algorithm for distribution network based on binary tree is proposed.
声音转换实验评估了声调码本映射算法的性能。
Voice conversion experiments are performed to evaluate the tone codebook mapping algorithm.
给出一种基于概率统计的地震事件公报评估算法。
A seismic event bulletin evaluation algorithm based on probability analysis was proposed.
给出一种基于概率统计的地震事件公报评估算法。
A seismic event bulletin evaluation algorithm based on probability analysis was proposed.
应用推荐