模擬欺騙 的英文怎麼說
中文拼音 [mónǐqīpiàn]
模擬欺騙
英文
imitative deception- 模 : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
- 擬 : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
- 欺 : 動詞1. (欺騙) deceive; cheat 2. (欺負) bully; take advantage of
- 騙 : 動詞1. (欺騙) deceive; fool; hoodwink 2. (騙取) cheat; swindle
- 模擬 : imitate; simulate; analog; analogy; imitation; simulation模擬艙 boilerplate; 模擬電路 [電學] circ...
- 欺騙 : deceive; cheat; dupe; swindle; humbug; hoodwink; take in; play a trick on sb ; take advantage of ...
-
Spoofing means impersonating someone else to the computer
欺騙意味著模擬其他用戶訪問計算機。First, this paper research and analyze the feature of signal of pulse doppler radar, and the mathematic model of radar is constructed. the several interference methods that narrow - band suppressing interference, range deception interference and velocity deception interference are discussed. and interference ability is evaluated and simulated
研究和分析脈沖多普勒雷達信號特徵,建立了該種雷達的數學模型,並討論對脈沖多普勒雷達的窄帶噪聲壓制式干擾、距離欺騙干擾、速度欺騙干擾等幾種干擾樣式,並進行干擾性能評估和模擬研究。Author simulates original data of single point & multipoint based on the theoretical model of sar echo and processes these data by range - doppler imaging algorithm, likewise carries out deceptional jamming technology with point - target by simulation experiments. in addition, author succeeds in proposing a simpler and feasible method to resolve the location problem of deceptional jamming
根據合成孔徑雷達回波理論模型,模擬了單點和多點目標原始數據並對其成像,同樣通過模擬軟體實驗了點目標欺騙性干擾,並且就欺騙性干擾中的定位問題提出了一種較為簡單可行的解決方案Is to impersonate a user or process in an unauthorized way
「電子欺騙」是指以未經授權的方式模擬用戶或進程。The results of simulation show that the hierarchical optimization functions have stronger deceptive so that the algorithms be pendulous among local optimizations. however the evolutionary mechanism based - on graph models being discussed displays its favorable characteristic of intelligent optimizing, such as to overcome deceptive and explore inherent laws on search space. ( 5 ) a method for designing a model framework of situation awareness for ucays based on object - oriented bayesian networks is presented
模擬結果表明,本文所研究的層次化函數確實具有迷惑性,引導演算法在峰值之間飄忽不定,但即使如此,本文提出的基於圖形模型的智能優化機制依然表現出具有克服問題欺騙性,可探索問題內在規律和智能尋優的良好特性。This dissertation simulates sar point target imaging with range - doppler ( r - d ) algorithm based on analyzing sar imaging theories and algorithms. based that, we analyze the technology of sar active jamming and the methods of jamming effectiveness evaluation, research suppression jamming and deception jamming systemically. and we simulate several jamming modalities of suppression jamming and deception jamming, which proves its validity and correctness. we then use three different methods to evaluate the jamming effectiveness, analyze the result of the simulation
本文在對sar的工作原理及其典型成像演算法分析研究的基礎上,對sar的點目標成像進行了距離-多普勒演算法模擬;在此基礎上,詳細分析了sar的有源干擾技術及干擾效能評估方法,系統的研究了壓制式干擾和欺騙式干擾,實現了多種干擾樣式壓制式干擾和點目標欺騙式干擾的模擬,證明了其有效性和正確性,得出了結論;用多種不同的干擾效能評估方法對壓制式干擾模擬進行了干擾效能評估,分析了所得結果。We proposed an improved simulated annealing algorithm with neighbor function based on self - optimization of scale parameter. furthermore incorporating disaster - modification and the improved annealing into genetic algorithm, an improved genetic - annealing algorithm is proposed. in order to solve the deceptive minimum problem, an improved evolutionary strategy combined with similarity detection and improved mutation operator
提出了鄰域尺度函數自尋優的模擬褪火演算法,結合遺傳演算法,引入災變運算元,提出了改進遺傳模擬褪火演算法;為了解決尋優過程中的最小欺騙問題,我們提出了相似性檢測,結合改進的適應值無關變異運算元,提出了基於相似性檢測和適應值無關變異運算元的進化策略演算法。At the same time, it also realizes interaction among ids, honeypot and firewall. this article also brings forward the embedded honey technology projects, which enhances the network camouflaging effect and increases hacker ' s work remarkably. besides, it sets forth the concept of lan simulation for the first time and mocks every network service to attract the attention of hacker in order to let them attack the dummy net
在863計劃- - -黑客監控系統中,提出了嵌入式honey的技術方案,增強了欺騙效果,顯著的增大了黑客的工作量,進一步提出了局域網模擬的概念,設計和實現了模擬局域網,用一臺或少量幾臺主機模擬出了一個網路,並模擬出了各種網路服務,用以吸引黑客的注意力,誘使黑客攻擊虛擬網。分享友人