隱蔽數據 的英文怎麼說

中文拼音 [yǐnshǔ]
隱蔽數據 英文
blinded data
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ動詞(遮擋; 遮蔽; 蒙蔽) cover; block; hide; shelter; spread over Ⅱ名詞(姓氏) a surname
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 隱蔽 : take cover; seek cover; hide; conceal; shelter
  • 數據 : data; record; information
  1. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息藏是信息安全領域中的一項新興技術,主要有字水印和字密寫兩大分支,分別用於多媒體的版權保護和通信。
  2. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採用式安裝方式在需要控制的敏感地區的isp 、局域網、網吧以及上網主機上安裝,對進出的網路進行採集,然後將採集的實時發送至電子郵件監控中心,電子郵件監控中心對這些中的pop3 、 smtp以及web - mail電子郵件信息進行分析還原、口令截獲、歸類及報警,並根情況對客戶端的工作狀態、過濾條件、軟體更新等進行控制操作,從而實現了對高速網路( 100mbps以上) 、 10000個監控節點以上網路的實時有效監控。
  3. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    鏈路層的設計中針對水下聲通道的特點,對于介質訪問控制協議採用了maca協議,它使用rts - cts控制報文握手機制來解決uan中的終端、暴露終端以及功率控制問題。
  4. Watermarking can be used to unobtrusively embed data such as copyright information or unique identification numbers into a. net application without impacting its runtime behavior

    水印處理可用來將版權信息或唯一標識號之類的地嵌入. net應用程序,而又不會影響其在運行時的行為。
  5. Watermarking can be used to unobtrusively embed data such as copyright information or unique identification numbers into your. net application without impacting its runtime behavior

    水印處理可用來將版權信息或唯一標識號之類的地嵌入. net應用程序,而不會影響其在運行時的行為。
  6. Data whose meaning is concealed from unauthorized users

    對于非授權用戶其意義是
  7. A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers

    閾下通道是指在基於公鑰密碼技術的字簽名、認證等應用密碼體制的輸出密碼中建立起來的一種通道,除指定的接收者外,任何其他人均不知道密碼中是否有閾下消息存在。
  8. Based on this, also described is the measurement method and request of the main antenna parameters, and carrying on the tests of antenna model, real antenna test and the flight - test, and studying and analyzing the data of all tests in the end

    在此基礎上,還闡述了天線主要參測試方法和相關要求,並進行了式天線縮比模型的地面測試試驗,全尺寸天線地面試驗及飛行試驗,最後對試驗進行了研究和分析。
  9. Experimental relationships between geophysical characteristic parameter and pressure, temperature, porosity, depth are built. they are basic data for subtle trap study

    建立了地球物理特徵參與溫度、壓力、孔隙度、埋深等的實驗關系式,為油氣藏的研究提供了基礎
  10. Regarding international organizations, the uncitral has constituted a series legal documents regulating e - commerce including " uni tral model law on electronic commerce ", eu has also constitute d such legal documents as " the action program of eu e - commerce ", which becomes the framework of the e - commerce activities in europe

    電子商務即電子交易,是以電文形式來生成、儲存或傳遞商業貿易信息的一種現代貿易手段,其突出特點是採用電子形式進行信息的流通和交換。相對于傳統交易的有形化,證的唯一性,電子商務具有性,易修改性,虛擬化等特徵。
  11. We use polyinstance to eliminate the covert signal channel in the multilevel secure database, so we must change the traditional relational data modal

    本文引入了多實例以解決多級庫中的信號通道,因此必須對傳統的關系模型進行根本變革。
  12. With the occurene of new application, the development of network technology and prompting popularity, database is faced with many new problems and challenge, one of which is that the alteration of operating environment bring a series of proplems. at present, database oprerationg environments are not integrated system of single database but distributed environment based on network. therefore, it has academic and realistic requirement that how to implement integrated questions of distrubited system, arrive at centralized management and share with data, meanwhile make the area disperse hindered by system

    隨著新應用的出現、網路技術的發展以及www的迅速普及,庫在理論和實踐方面都面臨著許多新問題和新挑戰,這其中的一個問題就是庫運行環境的變化所帶來的一系列問題。現在庫的運行環境已不是單個庫的集中系統而是聯網的的分散式環境,因而,如何在分佈環境下實現分散式庫的集成問題,既達到對的集中管理和共享,又能使地域的分散性被系統起來,所有這些具有理論和現實的要求。
  13. ( 7 ) the warships bearings - only passive location system and its engineering implement is researched, the operation flow and methods of over - the - horizon concealed missile attack using single and multi - warship bearings - only passive location system is presented. the direction finding data calibration and pretreatment based on uniform speed straight movement are also studied

    7進行了艦艇純方位無源定位系統及其工程實現方法的研究,給出了應用單艦和多艦純方位無源定位系統引導反艦導彈實施超視距攻擊的方法和作戰流程,研究了基於勻速直線運動的測向校準處理方法和測向方位角的預處理方法。
  14. Cryptic watermarking means secret information can be hidden in public data as watermark, so observer and monitor system can not be conscious of existence of secret information, then we can realize cryptic communication and secrecy storage

    水印是指將秘密信息作水印藏在公開的非機密的,使觀察者和監測系統無法察覺秘密信息的存在,從而實現通信和保密儲存。
分享友人