自嵌入文法 的英文怎麼說

中文拼音 [qiànwén]
自嵌入文法 英文
self-embedding grammar
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : 嵌名詞(用於地名) a word used in place name
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 文法 : grammar文法學 grammar
  1. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息隱藏技術的兩個重要分支隱寫術與數字水印技術,闡述其各特點及異同點,針對二者在不可見性上的共同要求,從利於圖像身的特性增強掩密效果的思路出發,提出先用聚類分析的方(本採用了k -均值演算)對圖像的像素點進行分類以充分發掘圖像然的內在特性,再結合演算的信息隱藏策略。
  2. Based on the classification of images, this paper gives out four digital image steganography techniques which have good conceal effect, including low - three - bits hiding strategy, odd - even of hypo - low bit hiding strategy, deviation of adjacent - field hiding strategy and self - adaptive deviation of adjacent - field hiding strategy. on digital watermarking aspect, this paper gives two blind watermarking strategies which have good conceal effect and high robustness, they are single - watermarking strategy based on minimal - value exchanging and multi - watermarking strategy which hides the same watermark copy on the different parts of an image

    在對圖像進行了分類的基礎上,本給出了四個具有較好掩密效果的數字圖像隱寫策略,包括低三位隱藏策略、次低位奇偶策略、鄰域方差策略和適應鄰域方差策略;在數字水印方面,提出兩個掩密效果好且魯棒性較高的數字圖像盲水印策略,分別為基於最小值交換的單一水印策略和同一水印多個副本的多水印策略。
  3. It takes use of pseudo - random technology, dynamic adaptive technology, multi - channel technology, random position embed technology and so no. so the digital watermarking can resist the physical process of printing and scanning. at the same time, the watermark is binary image which includes a great deal of information, such as personal id, secret information, even a piece of map

    特別針對印刷和掃描給數字圖像帶來的誤差的問題,設計了一種新的水印演算,綜合運用了偽隨機處理技術、動態適應技術、不同應用選擇不用頻帶處理技術、隨機位置技術、多通道等技術,使得本所設計的水印演算能夠抵抗印刷和掃描的物理轉換過程,同時本所設計的水印是二值圖像,能夠承載大量的信息,例如個人id 、機密信息、商標標識,甚至可以是一幅地圖。
  4. On the basis of researching pid control and its self - tuning methods, fuzzy self - adaptive pid control methods, the transplantation and software development of embedded real - time operation system and other aspects, a temperature control system is designed and tested for the die bonder

    在研究pid控制及其整定方、模糊適應pid控制方式實時操作系統c os -的移植和軟體開發等方面的基礎上,設計了粘片機的溫控系統。
  5. This method has many advantages compared to the latter and is testified by many images. ( 2 ) because fractal coding has the characteristic of high compression ratio, this thesis designed a spatial self - embedding watermarking technique. after self - embedding, it can detect any changes to a watermarked image as well as localizing the areas that have been tampered

    ( 2 )鑒于分形圖像壓縮具有很高的壓縮比且重構圖像效果好的優點,本利用分形壓縮實現了一種空域水印演算,不但能對篡改區域進行有效定位,而且具有修復功能。
  6. If possible try to recover portions of the image that have been tampered without accessing the original image. in the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication - fragile watermarks, semi - fragile watermarks, and self - embedding watermarks. the research of this thesis mainly includes self - embedding and semi - fragile watermarks

    目前用於數字圖像完整性驗證及修復的數字水印方案主要有完全脆弱性水印、半脆弱性水印、水印等,本主要研究及半脆弱數字水印,分別從空域及變換域角度詳細分析當前國內外現有的各種演算,指出其不足之處,並提出了相應的改進演算,實驗結果表明本演算的有效性與實用性。
  7. We propose several watermarking techniques after analyzing other watermarking methods detailedly. the main contributions can be summarized as following : ( 1 ) based on previous work, we proposed an improved spatial self - embedding watermarking technique. we save the quantized dct coefficients using group encoding while not using bit matrix which restricts saving bit length of each dct coefficient

    的創新之處總結如下: ( 1 )提出了一種改進的具有修復功能的空域水印演算,利用分組編碼保存量化后的dct系數,改善了修復效果,克服了以往使用位圖矩陣的不足,具有通用性與實用性。
  8. It is also possible to recover portions of the image which have been tampered. experiments on real images verify the effectiveness of the proposed technique. ( 3 ) since the current self - embedding watermarking techniques are too fragile to resist noise or jpeg compression, we proposed a self - embedding method based on jpeg images which plays an important role in current internet environment

    ( 3 )由於現有的空域水印演算大多數是對位圖圖像水印,在抗jpeg壓縮方面顯得過于脆弱,因此本實現了一種直接對jpeg圖像進行的數字水印演算,具有檢測篡改及修復功能,對于當今網路時代來講具有重要意義。
  9. This dissertation is supported by the following projects : national foundation for science research on the theory of sub - deep micro and super high speed multimedia chip design " ( no. 6987601 0 ) national foundation for high technology research & development " interface of vlsi ip core and related design technology " ( 863 - soc - y - 3 - 1 ) a - national r & d programs for key technologies for the 9th five - year plan research on high level language description and embedded technology for mcu " ( 97 - 758 - 01 - 53 - 08 ) national foundation for the ministry of education, prc " research on the optimal theory and methodology of soc software / hardware integration co - design and co - verification " ( moe [ 2001 ] 215 ) national foundation for science and technology publication " design of interface circuit for computer with verilog " [ ( 99 ) - f - l - 011 ] a deep research on system level design methodology of 1c and the design technology of mcu - ip and interface ip are made in this dissertation. the main work and achievements are as follows : 1 building block principle and the building block component maximum principle are brought forward based on the research of developing history of ic design

    基於以下科研項目撰寫:國家然科學基金「深亞微米超高速多媒體晶元設計理論的研究」 ( 69876010 )國家863計劃「超大規模集成電路ip核介面及相關設計技術」 ( 863 - soc - y - 3 - 1 )國家「九五」重點科技攻關「 mcu高層語言描述及其技術研究」 ( 97 - 758 - 01 - 53 - 08 )國家教育部「 soc軟硬體集成協同設計和驗證優化理論和方研究」 (教技司[ 2001 ] 215 )國家科技學術著作出版基金「 verilog與pc機介面電路設計」 ( 99 - f - 1 - 011 )論的主要工作和取得的成果如下: 1 、在研究集成電路設計方學發展歷史的基礎上,提出了設計的積木化原則和積木元件最大化原則。
  10. In this dissertation, we have made one embedded family cleaning robot which is a collaborate project developed by hit ( harbin institute of technology university ) between hit and longchang company, guangdong province as the instance. we make a specific and roundly introduction about the specific development of embedded software for the cleaning robot. two important algorithms have been proposed, the internal spiral coverage algorithm based on grid - map and auto - docking and recharging algorithm

    以與廣東龍昌公司的合作開發項目的式家庭清掃機器人為例,全面而重點地介紹了針對實物機器人的式軟體開發,提出了基於柵格地圖表示方的內螺旋覆蓋演算主對接充電演算,並對兩個演算進行了全面深的探討。
  11. Combining the practice, this paper at first analysed the basic requirements of embedded system software and the features of software anti - interference, then presented some kinds of effective methods for software anti - interference such as technologies of software engineering and fault sell - diagnosis in software etc

    結合實殘,章分析了式系統軟體的基本要求及軟體抗干擾的特點,並從軟體工程開發方和故障診斷技術等方面提出了若干行之有效的軟體抗干擾技術。
  12. It is used all of this to form a utility automatic test system. aiming at needs of the applications, the thesis introduce the uav wireless data link system and it ' s test target firstly, and then introduce the knowledge of the automatic test system

    中針對實際應用的需要,首先分析了無人機數據鏈性能指標的測試方,然後介紹了動測試系統的知識,最後將無人機數據鏈性能指標動測試系統的判決準則中,組建出無人機數據鏈動測試系統。
  13. Through careful analysis of the computer - related technologies, i find out some relatively advanced technologies for the development of information management of intellectualized odf. also in this process, i find out some ways to solve some problems in the system. first, to sample, analyze, process, store and communicate data through the automatic operation of single chip micyoco used in the module for supervision of power in the optic fiber

    通過對相關計算機技術的研究,得出了開發智能光配線架管理信息系統較為理想的計算機技術,並對它們提出解決的方:一、在光功率監控模塊中採用單片機作動控制,完成數據的采樣、分析、處理、存儲、通信;二、採用delphi6 . 0完成管理信息系統( mis )的開發;三、採用c / s數據庫結構,以microsoftsqlsever2000作為數據庫引擎;四、通過mapinfo公司提供的mapx組件到delphi中,以delphi作為開發語言完成地理信息系統( gis )的開發,同時完成mis和gis的無縫連接。
  14. From the view point of the foundation of dft ( which includes the testable measure of gate - level circuits, the testable and controllable measure of functional - level, the flow and methodology of dft and so on ), the author introduce some common testing technology such as scan and bist in modern times. especially the boundary scan technology has been widely adopted in the dft of vlsi. with the special controller, the testing vector could be scanned to the corresponding ports of inner cores from the testing input ports, and the response could also be shifted to the testing output ports

    從可測性設計的基礎理論出發(包括門級電路的可測性測度、功能級上的可測性和可控性、可測性設計的流程和方等) ,介紹了現代常用的可測性技術,比如:掃描技術、內測試技術等,特別是邊緣掃描技術已經廣泛地應用到vlsi的可測性設計之中,它通過特定的控制器,從相應的測試輸埠將測試向量掃描至芯核所對應的管腳,再將結果從相應的測試輸出埠掃出。
  15. Based on the svs characteristic analysis of image matrix, a visually recognizable binary image watermark is embedded into maximal singular value coefficient in block - based svd transform domain of the cover image. here we brought forward two primary schemes : one need original signal and the other is blind ( without the original cover ). experimental results show that our schemes can extract reliable copy of the hidden watermark from images that have been significantly degraded or altered through several common geometric distortions and signal processing operations

    基於圖像矩陣的svd奇異值分解特性分析,提出了在新的svd變換域中進行的數字水印演算,水印信息到分塊變換的最大奇異值分量系數中,應用混沌變換加密和空域置換,改善了空域性能,安全性高;利用圖像分塊矩陣的奇異值分解穩定性好的特點,採用圖像內容適應方計算水印的強度,增強了演算的穩健性;採用二值圖像作為有意義水印進行和檢測,水印在感知上是可視的。
  16. Developing the device driver under embedded linux operating system is the complicated but highly significant, it asks developing personnel to possess fixed theory foundation and plenty of experience. this paper introduced the general architecture of the embedded communication platform and studied the methods of developing the embedded system software under the embedded linux operating system on this communication platform, studied the debug technology of embedded linux software. this paper designed and realized the driver of i2c interface of embedded linux operating system and design user ' s application of i2c interface on the communication platform, the design has been also realized the driver of the ethernet interface of embedded linux operating system

    介紹了行研製開發的式通信平臺的總體結構,總結了在該通信平臺上基於式linux操作系統進行軟體開發的方,具體研究了軟體開發環境的構建方式linux下的軟體調試技術;通過對linux下的設備驅動程序原理的分析,總結了不同類型的設備驅動程序的設計思想與實現方;在此平臺上設計並實現了基於式linux操作系統的i ~ 2c總線介面的驅動;設計了通信平臺上i ~ 2c介面的用戶應用程序;設計、實現了基於式linux操作系統的以太網介面的驅動。
  17. Firstly, this paper discusses the working principle of the insulated monitoring device of rsj820 secondary ac circuit, and introduces the basic model structure of xc68hc912dg128 microcontrollers. secondly, it expatiates several evolution arithmetic of rapid speed and the several feasible schemes of software optimization in the nested real time system, and design a programming structure which use the multitask idea. at the same time, it brings forward the ideology of the software hiberarchy structure and the hardware modularization

    首先論述了rsj820二次交流迴路絕緣監測裝置的工作原理;介紹了xc68hc912dg128微控制器的的基本模塊結構;闡述了常用的幾種快速開方演算式實時系統軟體優化的幾種可行的方案;設計了在動裝置中使用多任務思想的一種程序結構;提出了動裝置開發中的軟體層次結構和硬體模塊化的思想方;介紹了rsj820中使用的正弦波發生方案和採取的抗干擾措施;經過現場試運行,表明了rsj820達到了設計目的,能滿足實際運行需要。
  18. First, a kind of user defined structure be applied to realize the message transformation. the next, faced with the problem of information security, this thesis puts forward exerting the encryption algorithm to set in the bottom function of middleware. finally, the paper sums up the complexion of implementation and also proposes the improving suggestions to the application service platform. at present, application service platform has been used in bank system and the result is comfortable

    以某銀行湖北省分行的應用服務平臺的設計及實現為背景,結合中間件技術提出了應用服務平臺的結構模型和整體框架,在應用服務平臺的具體設計實現方面,本針對報轉換和信息安全展開了討論,首先對于報轉換設計了一種定義結構實現報的轉換方,其次對于平臺的安全性方面提出了運用傳統的加密函數到中間件的底層函數中,從而實現對平臺傳輸數據的加密,最後對應用服務平臺的設計實現情況進行總結,同時提出了進一步改善建議。
分享友人