數碼相機信息 的英文怎麼說

中文拼音 [shǔxiāngxìn]
數碼相機信息 英文
camera info
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
  • : machineengine
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 數碼 : numerical code; digit; figure
  • 相機 : watch for an opportunity camera
  1. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編方案,將字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨位加密變換,得到原的加密灰度圖;通過4f光學系統計算模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、據庫系統安全、計算病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Because color isochromatic fringes appear in the stress model based on a plane polariscope in white light, we studied the problems systematically by a digital camera as image inputting device, digital image processing technique and bp artificial neural network. based on the work that has been reported before, a technique named five - step color phase shifting technique ( fcpst ) to acquire single isoclinics is presented

    根據白光入射時應力模型在偏振儀光學系統中的等色線條紋是彩色的特點,本論文採用彩色作為據採集與輸入設備,結合彩色圖像處理和bp神經網路等新技術,對上述兩個難題進行了系統的研究,獲得以下成果:在綜合前人工作的基礎上,提出獲得全場單純的等傾角圖的五步彩色移法。
  4. The detailed opinion of the enterprise vobis microcomputer aktiengesellschaft has pertinent information on electronic computers and on notebooks. moreover, high - resolution digital cameras and monitors and / or mobile phone are offered

    (英)拾音器、傳感器、電視發射管、撿拾、投影、放映是我們文件中的一部分,請您電話垂詢更多
  5. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系是魯棒性非常好的參,因而選擇色度dc系作為水印載體,同時,採用可變的步長選擇部分系,保證了水印的隱形性;在嵌入水印時,本文採用水印「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印子塊是對獨立的嵌入視頻中的每一對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印,使水印的健壯性得到提高;此外,為了提高水印的安全性,在嵌入水印時,根據用戶輸入的id號和密,利用本文構造的混沌系統產生的混沌序列對水印進行變換,同時,對每一水印比特的嵌入位置也採用了偽隨序列進行調整,這樣,未授權用戶不能提取水印,也難以擦除其中的水印,因為嵌入的位置是未知的。
  6. After taking pictures by verified digital camera, the luminosi1 and color information are taken to imitate the effect of urban lighting design, to display the current and future effect of lighting for the scene and thus optimize the urban lighting design plan to meet the demand of energy - conservation and beautifying the urban night scene

    建議了一種新穎的場景模擬方法,即通過已標定好的拍攝場景后,提取光度和色度,對城市照明設計的效果進行模擬,顯示被研究場景的現在、將來的照明效果,從而可以進一步優化城市照明設計方案,達到節能和美化城市夜景的目的。
  7. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限域上邏輯函的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯函的反演公式;給出了有限域上隨變量聯合分佈的分解式,並利用隨變量聯合分佈的分解式對有限域上邏輯函的密性質進行了研究;給出了有限域上邏輯函應素域上向量邏輯函的關系,探討了它們之間密性質的聯系,如平衡性,關免疫性,擴散性,線性結構以及非線性度等;討論了有限域上邏輯函各類線性結構之間的關系,並給出了任意點都是線性結構的邏輯函的全部構造,由此引出了有限域上的「泛仿射函」的概念;考察了有限域上邏輯函的退化性與線性結構的關系、退化性與chrestenson譜支集的關系;給出了有限域邏輯函非線性度的定義,利用有限域上邏輯函的非線性度與應素域上向量邏輯函非線性度的關系,考察了有限域上邏輯函的非線性度與線性結構的關系;利用有限域上邏輯函工程大學博士學位論文應素域上向量邏輯函的關系,揭示了有限域上的廣義bent函應素域上的廣義bent函的關系,以及有限域上的完全非線性函應素域上向量廣義bent函之間的關系;給出了任意有限域上任意。
  8. This study has proved that it was feasible that common dc and uav were combined to construct a miniature aerial rs system. after geometrical correcting, the high - resolution rs images from the uav rs system were as good as the images of satellite or aerial photogrammetry. the miniature uav rs system is a new technique that could be used to quickly acquire images of small region with low - costs

    徽型無人移以曉空遙感系統及其影像幾何糾正研究本研究結果證呢,將普通和無人結合構成微型無人航空遙感系統,在技術上是可行的,其獲取的高分辮率遙感影像經幾何纖正處理后可與載人航空攝彩、國外高分辮率成像衛星嶺影像資料墉美,是一項低成本、快逮解決小區城可見光、紅外等遙感源問題的可行技術
  9. Frequency code is not uniformity distribution and keeps to a probability distribution function defined by the spectral characteristics of the target of interest. the phase code is equally duality pseudo - random sequence and used to reduced the sidelobes of the signal correlation function. and the mismatch - phase sequence is corresponding with the frequency sequence one by one

    而頻率編為不均勻分佈,由所觀測目標的頻譜提取出概率密度函決定頻率編序列的分佈;位編為二元的偽隨序列,採取均勻的二,消減同頻脈沖帶來的過高的關函的旁瓣;而失配位為與頻率編一一對應于各子脈沖中。
  10. The designing scheme of this image monitoring network adopt the designing idea of the integration modularize. with the server as its kernel, the network introduces the photography theory of the digital camera and combines the technologies of high speed single - chip computer ( w77e58 ), fpga, high speed cmos image sensor, dot - matrix photo lcd and high speed network transmission. moreover it overcomes some problems of the digital camera in the image monitoring application such as without the network interface, transmission distance shorter and unable to control the information, and establishes a technology foundation for the further application of the techniques mentioned above in this development

    本套圖像監測網路的設計方案採用集成模塊化的設計思想,以服務器為核心,藉助攝像原理,融合高速單片w77e58技術、 fpga技術、高速cmos圖像傳感器技術、點陣圖形液晶和高速網路傳輸等技術,克服了在圖像監測應用中不帶網路介面、傳輸距離較近和不能受控等問題,為本研究方向對以上各種使用技術的進一步應用奠定了技術基礎。
  11. The target is that it begins with the information of the graph ( based on pdm ) used to directly depict parts, being supported by the currency cad / cam system, receiving the producing information by interact with manual, matching the cutter with expert system, building the data of the cutter location ( cl ) by account, finishing the optimising arrangement, creating the nc program for the numerical control system of the fms - ii of sheet metal by the post system, automatically processing the produce by the nc machine tool according to the cl, and then realizing the opening integration of the system of cad / cam system of the fms - ii for sheet metal, basing on pdm

    為了解決這些問題,需要重新開發fms -的cad cam系統,目標就是從基於pdm下的通用cad系統提供的圖形直接描述零件開始,人工交互方式輸入加工,由專家系統的推理實現自動配模,經計算產生刀位文件,優化排料后,再針對鈑金fms -的控系統,後置處理生成應的控加工程序,床根據加工程序代自動完成加工,從而實現鈑金fms -的cad cam系統基於pdm下的開放集成。
  12. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代方法編反向追蹤的方案,該方案把追蹤重構問題當作多項式重構問題,使用代理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者自己成功與所需的傀儡主通話,令人服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  13. For the image acquisition of optical scan mode, normally, ccd image sensor is used to capture image, but in our system, due to the system request of micromation and high integration, cmos image sensor is adopted as the image collection device, and then the thesis gives a interface circuit between the chip and dsp and a control solution of image collection ; toward the information storage in our solution, dsp is directly linked to usb host chip and it is the dsp that accomplishes the processing of usb protocol and interface control so as to reduce the cost, minimize product cubage and consequently meet the requirement of system micromation ; at the same time, the thesis probes preliminarily into usb otg ( on - the - go ) technology, which offers an approach between embedded machines including pda, mobile phone, printer, digital camera and so on ; in addition, some attempts on the other application area with tms320vc5402 which was commonly used to voice processing and static image processing are done, for example, to arrange the chip to control lcd module directly

    在圖像的光電掃描輸入上,傳統方案大部分採用ccd型圖像傳感器,而在本方案中,根據系統微型化、高集成的特點,使用了cmos圖像傳感器作為攝像器件,並且設計了該晶元與dsp的一種介面電路以及圖像採集控制方案;在存儲上,本方案採用dsp直接與usbhost晶元連接,由dsp處理usb協議和介面,從而降低了系統成本、縮小了產品體積,滿足了系統微型化的要求;同時本論文也對usb - otg技術進行了初步探討,利用此項技術,不再需要計算作為主,就能實現在pda 、移動電話、印表等嵌入式應用之間直接互聯通;另外也對廣泛用於語音處理和靜態圖像處理的tms320vc5402其它方面的應用進行了嘗試,比如直接控制液晶顯示器等。
  14. Device requirements included digital camera, pda, mobile phone, mp3, handheld pc, pocket pc, smart phone, ia etc. for sdhc logo only. add : 69 kecheng road erlang jiulongpo district chongqing, china

    可廣泛應用於pda手mp3播放器便攜式電腦掌上電腦智能手家電系統等裝置,只適用於有sdhc logo的設備
  15. Further, digital signatures generated by this class of certificate are only to be used to acknowledge the receipt of electronic messages in transactions which are not related to or connected with the payment of money on - line or the making of any investment on - line or the conferring on - line of any financial benefit on any person or persons or entities of whatsoever nature and under no circumstances are digital signatures generated by these certificates to be used to acknowledge the receipt of messages sent in connection with the negotiation or conclusion of a contract or any legally binding agreement

    此外,此類證書產生之簽署只可用作認收電子,並只可用於與聯付款或聯投資無關或不連或不會聯為任何人士或實體帶來任何性質之財務利益之交易。不論任何情況,此等證書產生之簽署均不得用作認收與洽商或訂定合約或任何具法律效力之協議有關而傳送之電子
  16. With ccd digital camera and optical microscope, color printing micro - dot image rgb data information can be got, then adopt the digital image processing and pattern recognition techniques to recognize the color patterns of pixels in the micro - dot images, at the same time, the color separation and area coverage can be retrieved

    分色系統藉助ccd和光學顯微鏡等設備,獲取彩色印品顯微網點圖像的rgb的色彩;而後採用字圖像處理和模式識別技術對網點圖像中各像素進行顏色模式識別,最終得到各單色網點圖像的分色結果以及各色網點面積率。
  17. Applications include digital camera, pda, mobile phone, mp3, handheld pc, pocket pc, smart phone, ia etc. add : 69 kecheng road erlang jiulongpo district chongqing, china

    可廣泛應用於個人字助理手mp3播放器便攜式電腦掌上電腦智能手家電系統等裝置
  18. Device requirements included digital camera, pda, mobile phone, mp3, handheld pc, pocket pc, smart phone, ia etc. add : 69 kecheng road erlang jiulongpo district chongqing, china

    可廣泛應用於個人字助理手mp3播放器便攜式電腦掌上電腦智能手家電系統等裝置
  19. Based on computer vision principles, a new 3d digitizing system is developed in this paper using a digital camera and cars " models can be constructed only by photography

    本文基於計算視覺原理,利用,設計了一套轎車車型快速字化系統,通過對轎車模擬模型的旋轉、攝像來獲取車身的3d
  20. Although encrypted optical holographic storage such as double random phase encoding and encrypted orthogonal phase encoding have been validated to be correct, but they can apply only one pace of encryption, which can not meet the need of encrypting the very inportant informations

    雖然光全加密技術如雙隨位編和正交位編技術在理論和實驗上都已得到驗證,但它們都有一個缺點就是只能對據進行一重加密。這對于保密一些非常重要的是不能滿足需求的。
分享友人