隱藏策略 的英文怎麼說

中文拼音 [yǐnzànglüè]
隱藏策略 英文
hiding strategy
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : storing placedepositorydeposit
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 隱藏 : hide; conceal; remain under cover; go into hiding
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. On the basis of the study on the speech coder algorithms, paper describe an advanced method of developing dsp system software, and as the guidlines, we developed the programme of whole decoder unit. paper stress on analysis of the ecu in decoder unit. aiming at amr algorithms disadvantage of angularity of synthetical speech, paper study on the specutral extrapolation which apply to extrapolate reflect coefficient of track model to make error conceal processing of amr. at last paper analyze existing echo cancellation algorithms using on mobile communication system

    在此基礎上,描述了一種較為先進的大型dsp系統程序開發,並以此為指導思想,以美國ti公司c6000dsp開發平臺開發出了整個amr解碼器單元的系統程序。論文對amr解碼器的誤碼處理單元進行了重點分析,針對原有演算法合成語音自然度不好的缺點,論文研究了將譜外推法應用到amr演算法中外推出聲道模型反射系數參數進行誤碼消除處理。
  2. Each strategy is depicted in detail and followed with experiment result. finally the paper gives out a mutual hiding strategy, which is based on interested region

    最後,在基於感興趣區域的隱藏策略方面,本文提出了一種互動式的信息方法,並給出實驗結果。
  3. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息技術的兩個重要分支寫術與數字水印技術,闡述其各自特點及異同點,針對二者在不可見性上的共同要求,從利於圖像自身的特性增強掩密效果的思路出發,提出先用聚類分析的方法(本文採用了k -均值演算法)對圖像的像素點進行分類以充分發掘圖像自然的內在特性,再結合嵌入演算法的信息隱藏策略
  4. Based on the classification of images, this paper gives out four digital image steganography techniques which have good conceal effect, including low - three - bits hiding strategy, odd - even of hypo - low bit hiding strategy, deviation of adjacent - field hiding strategy and self - adaptive deviation of adjacent - field hiding strategy. on digital watermarking aspect, this paper gives two blind watermarking strategies which have good conceal effect and high robustness, they are single - watermarking strategy based on minimal - value exchanging and multi - watermarking strategy which hides the same watermark copy on the different parts of an image

    在對圖像進行了分類的基礎上,本文給出了四個具有較好掩密效果的數字圖像,包括低三位隱藏策略、次低位奇偶、鄰域方差和自適應鄰域方差;在數字水印方面,提出兩個掩密效果好且魯棒性較高的數字圖像盲水印,分別為基於最小值交換法的單一水印和嵌入同一水印多個副本的多水印
  5. Still, i want to point out that the major medium - term financial targets set by the budget involve high strategic risks. these targets include the projected rate of investment return, land premia, the scope for downward adjustment in civil servant salaries, and the rate of economic growth

    但我覺得仍然要提出的,就是中期的主要財政指標,仍處處性高風險,這些包括投資回報率、賣地收入、公務員減薪幅度、經濟增長的速度。
  6. First it analyze the existing information hiding techniques. with the reference to the literature read, it gives a brief statement on the advantage and disadvantage of each hiding technique, from airspace technique to transform - space technique, from dct to dwt, followed by the statement of sameness and difference between the two main branches ? ? steganography and watermarking

    首先對國內外已有的技術、隱藏策略作了較為詳盡的分析,從空域技術到變換域技術,從dct變換到dwt變換,結合所閱讀到的文獻,對各隱藏策略的特點及優缺點進行了簡要的總結。
  7. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制,以及xml的專有訪問控制的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對在正常訪問中的潛在安全威脅進行報警和日誌。
  8. This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic

    通過對現有商務文檔安全傳輸的研究和對比后,本文提出將橢圓曲線密碼體制與圖像結合,利用ecc在相同安全強度下密鑰長度短的特點在一定程度上解決這一矛盾,同時達到安全性和蔽性的結合,能在一定程度上解決第三方的攻擊。
  9. Based on the laplacian distribution model of dct coefficients, we deduce a theoretical relationship between the scaling parameter in some typical watermarking algorithms and the degradation of watermarked images

    研究了圖象信息技術中普遍關注的幾個典型性能的定量評估方法,得到了相應的演算法參數調節和攻擊規避準測。
分享友人