模擬欺騙 的英文怎麼說

中文拼音 [piàn]
模擬欺騙 英文
imitative deception
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : 動詞1. (欺騙) deceive; cheat 2. (欺負) bully; take advantage of
  • : 動詞1. (欺騙) deceive; fool; hoodwink 2. (騙取) cheat; swindle
  • 模擬 : imitate; simulate; analog; analogy; imitation; simulation模擬艙 boilerplate; 模擬電路 [電學] circ...
  • 欺騙 : deceive; cheat; dupe; swindle; humbug; hoodwink; take in; play a trick on sb ; take advantage of ...
  1. Spoofing means impersonating someone else to the computer

    意味著其他用戶訪問計算機。
  2. First, this paper research and analyze the feature of signal of pulse doppler radar, and the mathematic model of radar is constructed. the several interference methods that narrow - band suppressing interference, range deception interference and velocity deception interference are discussed. and interference ability is evaluated and simulated

    研究和分析脈沖多普勒雷達信號特徵,建立了該種雷達的數學型,並討論對脈沖多普勒雷達的窄帶噪聲壓制式干擾、距離干擾、速度干擾等幾種干擾樣式,並進行干擾性能評估和研究。
  3. Author simulates original data of single point & multipoint based on the theoretical model of sar echo and processes these data by range - doppler imaging algorithm, likewise carries out deceptional jamming technology with point - target by simulation experiments. in addition, author succeeds in proposing a simpler and feasible method to resolve the location problem of deceptional jamming

    根據合成孔徑雷達回波理論型,了單點和多點目標原始數據並對其成像,同樣通過軟體實驗了點目標性干擾,並且就性干擾中的定位問題提出了一種較為簡單可行的解決方案
  4. Is to impersonate a user or process in an unauthorized way

    「電子」是指以未經授權的方式用戶或進程。
  5. The results of simulation show that the hierarchical optimization functions have stronger deceptive so that the algorithms be pendulous among local optimizations. however the evolutionary mechanism based - on graph models being discussed displays its favorable characteristic of intelligent optimizing, such as to overcome deceptive and explore inherent laws on search space. ( 5 ) a method for designing a model framework of situation awareness for ucays based on object - oriented bayesian networks is presented

    結果表明,本文所研究的層次化函數確實具有迷惑性,引導演算法在峰值之間飄忽不定,但即使如此,本文提出的基於圖形型的智能優化機制依然表現出具有克服問題性,可探索問題內在規律和智能尋優的良好特性。
  6. This dissertation simulates sar point target imaging with range - doppler ( r - d ) algorithm based on analyzing sar imaging theories and algorithms. based that, we analyze the technology of sar active jamming and the methods of jamming effectiveness evaluation, research suppression jamming and deception jamming systemically. and we simulate several jamming modalities of suppression jamming and deception jamming, which proves its validity and correctness. we then use three different methods to evaluate the jamming effectiveness, analyze the result of the simulation

    本文在對sar的工作原理及其典型成像演算法分析研究的基礎上,對sar的點目標成像進行了距離-多普勒演算法;在此基礎上,詳細分析了sar的有源干擾技術及干擾效能評估方法,系統的研究了壓制式干擾和式干擾,實現了多種干擾樣式壓制式干擾和點目標式干擾的,證明了其有效性和正確性,得出了結論;用多種不同的干擾效能評估方法對壓制式干擾進行了干擾效能評估,分析了所得結果。
  7. We proposed an improved simulated annealing algorithm with neighbor function based on self - optimization of scale parameter. furthermore incorporating disaster - modification and the improved annealing into genetic algorithm, an improved genetic - annealing algorithm is proposed. in order to solve the deceptive minimum problem, an improved evolutionary strategy combined with similarity detection and improved mutation operator

    提出了鄰域尺度函數自尋優的褪火演算法,結合遺傳演算法,引入災變運算元,提出了改進遺傳褪火演算法;為了解決尋優過程中的最小問題,我們提出了相似性檢測,結合改進的適應值無關變異運算元,提出了基於相似性檢測和適應值無關變異運算元的進化策略演算法。
  8. At the same time, it also realizes interaction among ids, honeypot and firewall. this article also brings forward the embedded honey technology projects, which enhances the network camouflaging effect and increases hacker ' s work remarkably. besides, it sets forth the concept of lan simulation for the first time and mocks every network service to attract the attention of hacker in order to let them attack the dummy net

    在863計劃- - -黑客監控系統中,提出了嵌入式honey的技術方案,增強了效果,顯著的增大了黑客的工作量,進一步提出了局域網的概念,設計和實現了局域網,用一臺或少量幾臺主機出了一個網路,並出了各種網路服務,用以吸引黑客的注意力,誘使黑客攻擊虛網。
分享友人