统计算法 meaning in English
statistical algorithm
Examples
- Gridding statistical arithmetic of quantitative parameters of geological structure
地质构造量化指标的网格化统计算法研究 - All of the algorithms which are currently used , such as artificial intelligence method , rule algorithm , statistical algorithms , can ' t be successful on processing natural languages in various forms
目前常用的人工智能方法、规则算法和统计算法,都无法成功地处理形式千变万化的自然语言。 - Image difference operation is applied to video images taken with image capture device , then statistical computation is performed to judge whether there is vehicle violating the regulations , and corresponding measures are taken
由摄像头获取的视频图像经计算机进行图像差分运算,结合统计算法由计算机根据所得数据判断监测区域是否有违章车辆出现并作出相应的处理。 - The statistic of wavelet transform coefficient algorithm can solve the periodic noise , high - energy noise and some non - gauss noise simply and effectively ; bi - spectrum can acquire more information from the original signal than power - spectrum , detect more information except from range and restrain the gauss noise . short - time speech signal can be considered as stationary and with periodic non - gauss signal , so we can make use of bi - spectrum to obtain the speech character and separate the speech and noise and detect morse telegraph signal ; complex number spectrum variance algorithm is put forward based on the deeply observing speech data , it is a new algorithm , experiment show that it is simple , effective
统计算法在解决周期信号、高能噪声和高斯信号方面有独特之处,能简单有效提取以上噪声的特征;双谱能够提供比功率谱更多的有用信息,有效地检测信号幅度之外的其它信息,并能有效抑制高斯噪声,短时语音信号一般认为是平稳且有一定的周期性的非高斯信号,因而可以利用双谱来提取语音信号特性并实现信噪分离;复数谱方差算法是在对语音信号进行深入观察和分析的基础上而提出来的一种全新的语音特征提取方法,此方法简单而有效的提取了语音、噪声的特征以及检测莫尔斯信号,基于实验表明,该算法取得了很好的效果。 - Firstly it uses data mining and statistic algorithms to detect dos attacks , and then determines the feature of attack flows , lastly uses various defense methods to weaken or eliminate the effect of attacks . the system ensures that when the network or victim systems are being attacked , they can continue to serve legitimate users
它利用数据挖掘和统计算法等检测技术检测dos攻击,确定攻击流量的特征,并采取多种防御措施来削弱和消除攻击流量对网络和系统的影响,确保在攻击发生的情况下,仍能为合法用户提供服务。