隱域性 的英文怎麼說

中文拼音 [yǐnxìng]
隱域性 英文
intrazonality
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  1. Cryptic species have been found in a wide range of marine organisms ; with majority of them are benthic invertebrates. in contrast, marine holoplanktons are thought to have lower diversity and slow speciation due to their strong dispersal potential. this paper reviewed studies on cryptic species and speciation in marine holoplankton. based on findings in 38 studied taxa, it was concluded that : 1 ) cryptic species are pervasive in marine holoplankton, suggesting holoplankton speciation was more active than previously thought ; 2 ) current morphospecies diversity is untenable to reflect true species diversity in marine holoplankton ; 3 ) geographic isolation may facilitate cryptic speciation of marine holoplankton. however, contribution of allopatric speciation is still questionable ; 4 ) ecological speciation may be the prevailing speciation mode in marine holoplankton. cryptic speciation in marine holoplankton is paradoxical, because rapid speciation under strong gene flow is countertuitive. solution of this paradox will help us gain deep insights of marine speciation and biodivesity

    種廣泛存在於各類海洋生物中,尤其是底棲無脊椎動物.然而,海洋終生浮游生物由於具有較強的擴散能力,往往被視為生物多樣低、物種形成慢.本文就海洋終生浮游生物種與物種形成的研究作一綜述.基於研究的38個種類,結果表明: 1 )海洋終生浮游生物普遍存在種,其物種形成要比想象得快; 2 )由於引種的廣泛存在,形態種生物多樣無法反映海洋終生浮游生物真正的物種多樣; 3 )地理隔離有助於海洋終生浮游生物種的形成,但異物種形成的作用仍值得商榷; 4 )生態物種形成很可能是海洋終生浮游生物物種形成的主流模式.海洋終生浮游生物強基因流下快速的物種形成有悖于生物進化常理,解決該悖論將有助於我們對海洋物種形成和生物多樣的理解
  2. Digital watermarking algorithm based on wavelet transform, making use of relative frequency equability feature of low - frequency that comes from image ' s mra decomposing and according to size between insert point value and its region mean value, is that two - value watermarking is hid in insert point

    基於小波變換的數字水印演算法充分利用了圖像經過多分辨分解后低頻圖像的頻率相對平穩特,並依據嵌入點值與其區均值的大小,將二維二值水印信息藏到嵌入點。
  3. However geological information is fully recorded in the remote sensing image, which made it possible for the choosing of this area as a dissection point to extract complex structural information of orogenic belt in west china. taking fully advantage of multi - band image richly bearing concealed geological information in combination with remote sensing analysis and structure analysis, to anatomy the supracrustal composition and structure of orogenic belt with the regional linear structures and their partitioned block and schistous geological masses as the macro - frame ( in corresponding to structure units and structure segments ) and with the rock masses, structure - rock assemblages, line - featured and belt - featured structures as well as penetrative and non - penetrative foliation ( primary stratum and trans position layering ) and folds as the texture and structure elements. the methods of how to distinguish granulite > ductile - shear zone, imposed fold, different deformed belts -

    因而,本文選擇這一地區作為我國西部地區從遙感圖像上提取造山帶復雜結構構造信息的解剖區,充分利用遙感圖像多波段反映物質屬的特點和圖像處理提取含信息的優勢,採用遙感解析?構造解析相結合的研究方法,以區線狀構造及由它劃分的塊狀、片狀地質體為宏觀骨架(對應于構造解析劃分的構造單元、構造均勻區段) ,以地質體中的巖石巖體、構造巖石組合,線狀、帶狀構造,透入、非透入面狀(原始層理、新生面理)和褶皺等構造作為用於解析的結構構造要素,進行造山帶表殼組成和結構構造解析研究。
  4. Stegnoraphy are widely used in many domains. the very challenging problem, which has n ' t been paid enough attention, is data hiding in binary images

    信息藏技術已在多個領獲得應用,但研究較少、具挑戰的工作是二值圖像的信息藏。
  5. Based on the classification of images, this paper gives out four digital image steganography techniques which have good conceal effect, including low - three - bits hiding strategy, odd - even of hypo - low bit hiding strategy, deviation of adjacent - field hiding strategy and self - adaptive deviation of adjacent - field hiding strategy. on digital watermarking aspect, this paper gives two blind watermarking strategies which have good conceal effect and high robustness, they are single - watermarking strategy based on minimal - value exchanging and multi - watermarking strategy which hides the same watermark copy on the different parts of an image

    在對圖像進行了分類的基礎上,本文給出了四個具有較好掩密效果的數字圖像寫策略,包括低三位藏策略、次低位奇偶策略、鄰方差策略和自適應鄰方差策略;在數字水印方面,提出兩個掩密效果好且魯棒較高的數字圖像盲水印策略,分別為基於最小值交換法的單一水印策略和嵌入同一水印多個副本的多水印策略。
  6. In the research realm of the target identify, an important topic is to minish the laser radar cross section of the space target for target stealth. the laser radar probes a target is based on the target under the laser, the space and time distribute characteristic of the strength ? polarization and phasic of the laser scattering etc. to identify a target

    在目標識別研究領有一個重要的課題是減小空間目標的激光雷達散射截面便於目標身。激光雷達探測目標是根據目標在激光照射下,激光散射的強度、偏振和相位等的空間和時間分佈特徵來識別目標,目標表面粗糙度是影響目標激光散射特的重要影響因素。
  7. By taking advantages of epipolar line features and depth discontinuities in reference 中國科學院 軟件 研究所 博士 學位 論文 基于 圖 象 的 快速 繪制 技術 的 研究 images , an efficient inverse wmping algorithm is pfoposed in chapter 3 for gcnerating nagcs of novel views by combining multiple eference images 帆 enhm different vie 呷 oints because continuous segnents determi 。 d by pairs ofedge pixels at co 。 spending epipolar lines are order kept , only pairs of edge pixels in the reference 渝 明 e e necess 叨 口 cowute to obtain generalized disparity of all points in the desired image as a result , sighficant acceleraion could be made in the endering pfo 比 鴕 two accelerating techiq 此 s e presented in this algori 山 mb accelerate the hole illing process his algorithm extends the reference images rom projection of single col : ii ’ ected surface in previously developed nvnverse w 出 下 er to ima 驢 s captured rom complex scene in chapter 4 , an 《 dent ibr method is prese 庇 仙 y takn ull 訕 antage of 呷 bies c 咖 the method can simulate the 3d details on sllri : ace of object successfully he 。 叩 proach , called rered ature mopmp consists of two pans at fst , an origi 。 ltexture with orthogonal displacements per pixel is deco 啊 osed into a series of new t6 刀 mfcs with each 他 lug a given displacement per pixel , called ae , ea atures , or lt hen hese lt e used to render the novel view by conventional texture mapping d avoid gaps n the endered hlla 驢 , some phels are to be interpolated nd extended in the 廠 kaccoding to the depth differe eee between two neighbor pixels in the original texture as these ltlt fc … e much storage nd therefore much time is equired to install ltlt into the text ’ ufc buffec an 舊 thod is pfoposed to co 呷 fcss the ltlt , nd the cottcspondingfclldering method is given experimental esults show that the new method is efficient , especially n rendering those objects with a smaller depth rnge compared withtheir size , such as relief surfaces of building

    與己有的三維變換方法相比較,該方法不但成功地填補了由於投影區擴張而產生的第一類空洞,而且成功地填補了由於空間深度非連續物體相互遮擋而產生的第二類空洞,從而方便地實現了虛擬環境中的漫遊;基於物體表面深度的連續,本文提出了一個位移預測方法? ?此方法可以從單幅參考圖象獲得逆映射過程中所需要的目標圖象的位移信息,從而大大提高了演算法的效率:與通常的正向映射演算法相比,此演算法克服了多幅參考圖象所帶來的計算量成倍增長等問題,而且誤差較小。 2 )基於極線幾何的快速逆映射演算法。利用參考圖象的邊界信息與含的遮擋關系,以及極線幾何的質,本文第三章提出了一個基於極線幾何的快速3 『一中國科學院軟體研究所博士學位論文基於圖象的快速繪制技術的研究逆映射演算法,從多幅參考圖象精確合成當前視點目標圖象。
  8. In order to improve generalization capability of feedforward neural networks, the convinced networks generalization domain should be guaranteed to be close to networks input domain as maximal intrinsic error of networks output and maximal samples error are reduced by increasing hidden neurons in number in the progress of networks learning, otherwise generalization capability of feedforward neural networks is likely to be decreased

    為了提高網路的泛化能,從理論上分析指出,在網路學習過程中通過增加含層神經元來降低網路最大固有誤差和最大樣本誤差的同時,要求確保網路泛化定義盡可能接近網路輸入定義,否則將有可能降低網路的泛化能。
  9. With the integer wavelet transform to the original image we apply a general hid means in wavelet domain for all kinds of files especially for the executable files and text files. the result shows that we can get an invisible image

    本文為可執行文件與文本文件及其他各種格式的文件提供了一種通用的小波藏方式,採用整數小波變換對原始圖像進行處理,實驗結果表明,可以達到較好的不可見
  10. Then, based on the theory of discrete fourier transform, discrete cosine transform and discrete wavelet transform, two invisible image watermarking schemes in transform domain are proposed, one is circular symmetric spread spectrum digital image watermarking based on chaotic sequences, the other is the hybrid image watermarking based on wavelet decomposition and discrete cosine transform. finally, the good performance of the two algorithms is verified by some common image processing and attack experiments

    在分析了dft 、 dct 、 dwt的理論與演算法的基礎上,提出了兩種基於變換的圖像形水印方案? ?基於混沌序列的圓對稱擴頻水印方案和基於小波分解和餘弦變換結合的水印方案,並通過一些常見的圖像處理及攻擊實驗驗證了這兩種演算法生成水印的能。
  11. At the beginning of 60 years, laser radar whose primary function is to measure distance appeared. developping for nearly half century, laser rader have been widely applied in many areas, especially in military application because of its particular merits such as high angle - solution, high - speed - solution, high - ditance - solution, nice - anti - jamming ability and good consealment. recently, in iraq war, the precision control and guide weapons depend on laser radar techniques embodied their powerful abilities. the laser radar technique is a very important part in u s military system

    歷經半個多世紀以來,激光雷達以其高角解析度,高速度解析度,高距離解析度,強抗干擾能力,好的,以及出色的全天候工作能力在很多技術領尤其是軍事領中得到廣泛的應用。最近的伊拉克戰爭中,以激光雷達為依託的精確制導武器顯示出了其強大的作戰能力,激光雷達技術在美軍作戰系統中扮演著重要的角色。
  12. Through the non - locality of the quantum entanglement, teleportation schemes of arbitrary two - particle and three - particle states are proposed

    通過量子糾纏的非局,提出了實現任意二粒子和三粒子量子態的形傳送的方案。
  13. The mutation, contrast and heterogeneity of ecological interface between oasis and desert ecosystem increased. rare natural or non - regional mosaic of patch show obvious sensitivity to spatial scale, the change ratios of theirs area and perimeter are greater than large patch

    同時通過測度敏感檢驗,表明在尺度變換中,稀少的自然或隱域性斑塊鑲嵌體對空間尺度敏感大,面積、周長等變化率大於大斑塊,隨尺度中度干擾則合併成較大的斑塊,隨尺度強烈干擾或隔離加強后最先消失。
  14. It ’ s an autonomic working manner not depending on external information. it has the character of security and immunity to the outside interference such as weather and electron so is widely used in the field of spaceflight and aviation

    它是一種自主的工作方式,不依賴于外界的信息,好,不受氣候、電子等外界因素的影響,因此廣泛的應用於航空航天等領
  15. Civil air defense alarm system was a system to dispense antiaircraft alarm sig - nal, hand hostile air attack informational communication to urbanite at wartime. it is a particular informational communication system of the civil air defense depart - ment, and can not be taken place. at the development trend of digitaliza - tion, unitization, integration of civil air defense communication, the civil air defense alarm system is developing too, for adaptation to the require of both future war and peaceful dual, and enhancing civil air defense communication system ' s directing automation. in recent years, development of different kinds of communication technology infuses new clearly energy into communication, especially spread spectrum communication, because of its strongly interference - free feature, invisibility best, realizable code division multiple access and antimultipath wane and so on merit, gets extensive use at wireless region ; the corresponding spread spectrum chips emerge as the times and get boom, which provides advantag e to realization of the circuit of spread spectrum communication. at the same time, in company with the advance of electronics level, the single chip microcomputer has a great development, world renowned chip manufacturer pushout respective products one after another, the kinds of which are too many to statiste

    在人防通信的數字化、一體化、綜合化必然的發展趨勢下,人防警報系統也不斷發展,以適應未來戰爭和和平時期的雙重需要,提高人防通信系統指揮自動化。近年來,各種通信技術的發展給通信注入了活力,擴頻通信更因其抗干擾能力強、好、可實現碼分多址和抗多徑衰落等優點在無線領得到了廣泛應用;其相應擴頻處理晶元應運而生並得到迅速發展,這為擴頻通信的電路實現提供便利。同時隨著微電子工藝水平的提高,單片微型計算機有了飛躍發展,世界上著名的集成電路晶元製造商紛紛推出各自的產品,單片機型號之多,已達到難以統計的地步。
  16. A culture - sensitive comparison is any comparison that explicitly or implicitly uses a

    區分區的比較是顯式或式使用
  17. In this thesis, the preparation and measurement of bell states of two particles are introduced. a scheme for teleportation an arbitrary three - particle state is proposed, which is possible to extend for teleporting an arbitrary n - particle state. in terms of the basic logic gates, the quantum logic circuit for teleporting a qubit and an arbitrary two - particle state are also presented

    本文從量子糾纏的非局的討論出發,給出了兩體糾纏的四個正交完備基及其測量方法,從未知量子態的形傳送的基本原理出發,討論了三粒子任意量子態的形傳送過程,並討論了推廣到多粒子任意量子態的形傳送的可能
  18. Unlike the implicit example previously, you do not need to maintain a resource file for each. aspx page ; instead, you can maintain a single series of files for each language or culture you support

    與前面介紹的式示例不同,您無需為每個. aspx頁維護一個資源文件;相反,您可為支持的每種語言或區維護一系列文件。
  19. In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented

    在信息藏的能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知能評價準則,指出針對信息藏的能評價不能單純從視覺特出發,提出從信息藏的數據特和感知特出發,結合局部特來考察失真誤差的變化的思想,並據此提出基於局部區誤差統計分佈和視覺掩模方法評價信息能的方法。
  20. Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity

    如果將某程序集添加到跳過驗證列表中,則惡意的程序集可以通過使用該程序集的完全限定程序集名稱來藏身份,完全限定程序集名稱由程序集名稱、版本、區和公鑰標記組成。
分享友人