signature analysis 中文意思是什麼

signature analysis 解釋
符號差分析
  • signature : n 1 簽名,署名,畫押,蓋章。2 【音樂】記號〈調號或拍子記號〉;【無線電】(廣播節目開始或完畢的)...
  • analysis : n. (pl. -ses )1. 分解,分析;【數學】解析。2. 梗概,要略。3. 〈美國〉用精神分析法治療(= psychoanalysis)。
  1. The analysis showed that the signing capability of the issuing bank can be easily canceled in the electronic cash system and it avoids some problems such as member deletion, coalition attacks in the existing e - cash system with multiple banks based on group signature scheme

    通過分析表明,新方案可方便取消發幣銀行的發幣能力,並克服了現有的基於群簽名的多銀行電子現金系統的群成員刪除難、群成員合夥攻擊等問題。
  2. On the other hand, by meticulous diagnosis functions, such as signature analysis, trend analysis, spectrum analysis, the fault classification, position, severity and trend about the high - pressure getting rid of squama while running can be discovered and forecasted

    另外,該系統的精密診斷功能,包括歷史數據回放分析、趨勢分析、時域分析、頻譜分析,能對水泵的故障類型、部位、嚴重程度以及發展趨勢進行分析和預測。
  3. The thesis analysed the chief technique problems and designed the solution algorithms, proposed measures of the software fault tolerance techniques suitable for the hardware platform of the robotic system on the base of studying the two key techniques - eddi and cfcss. first, the thesis has done the analysis in theory for the chief technique problems including basic block partition, software signature instructions generation, shadow instructions generation and instructions scheduling, proposed the algorithms suitable for the target platform. then, the thesis introduces the design process of the software fault tolerance

    本文在研究了sihft的兩項關鍵技術?復制簽名檢錯技術和軟體簽名控制流檢錯技術的基礎上,針對小型智能飛行機器人系統的硬體平臺,對軟體檢錯技術的關鍵問題進行了分析並給出了解決問題的演算法,提出了適于小型智能飛行機器人硬體平臺的軟體檢錯技術方案。
  4. Besides changing the signature of the program, this tra formation also obfuscates the program, making its manual analysis harder

    這個變換除了改變程序的簽名之外,也混淆了程序,使得對它人工分析更加困難。
  5. Besides changing the signature of the program, this transformation also obfuscates the program, making its manual analysis harder

    這個變換除了改變程序的簽名之外,也混淆了程序,使得對它人工分析更加困難。
  6. The analysis to the responsibility of the note behavior that misappropriates or misuses other ' s true signature

    濫用他人真實簽章的票據行為的責任歸屬分析
  7. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳加密, s / mime端到端加密等的加密機制以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機制。
  8. The seakeeping spectral analysis based on random decrement signature

    基於模矢搜索的船舶系泊評價函數
  9. Abstract : have connected with ir target signature research, this paper deals with the principle and realization for the ir imaging terminal - guidance technology of an air - to - air missile in clutter backgrounds. the radiation signature of clutter earth backgrounds is analyzed, and the comprehensive analysis of the target ir radiation signature types of a military jet fighter as the mainly attacked target for air - to - air missile is gave. also we discusses the extraction and algorithm for target ir signature

    文摘:本文結合對目標紅外特性的研究,論述了在復雜背景條件下空-空彈紅外成像末制導技術的原理和實現,分析了地面背景的輻射和散射的特徵;綜合分析了軍用噴氣式戰斗機作為主要被攻擊對象的紅外輻射特性,並給出了目標紅外特徵提取的多種方法和演算法
  10. Temperature measurement and thermal testing in non - destructive evaluation, research and development, product design validation, quality control, target signature analysis and medical applications

    如在檢測極小或遠距離目標時,通過外加的光學鏡頭使得圖像質量解析度和靈敏度不會損失。
  11. In this paper, a new interference - space - based blind adaptive mmse linear detector and the corresponding tracking algorithm based interference correlation matrix is proposed for mai in cdma wireless celluar communication system. analysis and simulation illustrate that the proposed blind multiuser detector has lower computational complexity, faster convergence and stronger robust with respect to imprecise knowledge of the received signature waveform of user of interest

    圍繞著cdma無線蜂窩移動通信系統中的多址干擾( mai )抵消問題,本論文在現有盲自適應多用戶檢測技術基礎上,提出了一種新的基於干擾空間線性mmse盲自適應多用戶檢測器及其相應的基於干擾自相關矩陣c _ 1跟蹤演算法。
  12. Movement signature analysis

    動作記號分析
  13. Electronics level 1 has been added to the minmatar military career path. this resolves a training glitch, as the minmatar military has been training cadets in signature analysis without training electronics

    電子學1級已經被加入到米瑪塔爾軍事職業的生涯中。這會導致訓練上的問題,因為在學習信號分析學前不需要學習電子學。
  14. The detection algorithms for low snr point target, the ballistic target signature analysis, the dynamical target recognition algorithms on seeker are systematically studied in this thesis. the detection algorithm for the low snr point target in image sequences and its performance is studied

    本文以動能攔截器的探測器接收到的光學序列圖像為處理對象,系統研究了其中的點目標的檢測、特徵分析與提取方法以及識別(威脅程度評估)演算法問題,具體研究內容包括以下三個方面。
  15. The permutation code encryption and its key management and digital signature by rsa contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed

    理論和實驗結果均表明,應用排列碼演算法加密明文數據並結合rsa演算法進行密鑰管理和數字簽名可以得到加密強度很高的安全演算法且演算法的運行速度也很快。
  16. Then, the form digital signature model is analysed and designed on the domain. in the phase of domain analysis, the requirement of form digital signature is abstracted and described, then use case model and activity model are created. in the phase of domain design, based on the method of object / component oriented, object structure model and object behaviour model of form digital signature are created. also the design pattern is used to optimalize the design

    之後,對表單數字簽名模型進行領域需求分析和領域設計.在領域分析階段,對表單數字簽名的需求進行抽象和描述,建立軟體的用例模型和活動模型.在領域設計階段,採用面向對象/構件的方法,建立表單數字簽名的對象結構模型和對象行為模型,並採用設計模式進行優化設計
  17. One counterfeiting signature of the scheme for digital signature and analysis its security

    數字簽名系統的一種偽簽名演算法及其安全性分析
  18. A parallel distributed sequential fusion detection algorithm is also developed for the multi - band target detection problem. the optimized fusion algorithm is determined based on the theory analysis and the experiment ’ s results. the exo - atmospheric ballistic target ’ s optical signature and recognition feature is studied

    針對多波段條件下的目標融合檢測問題,採用并行分散式序貫融合演算法對各通道的檢測結果進行融合處理,並根據理論分析和模擬實驗結果確定了最佳的序貫融合檢測演算法。
  19. Read and analysis for the advanced research papers : fast exponentiation computation, multisignature, proxy signature, threshold signature, group signature, identification authentications, visitor control, multisecret sharing

    閱讀並討論專題論文:快速指數運算、多重簽名、代理簽名、門限簽名、群簽名、身份認證、訪問控制、 (多)秘密共享。
  20. In a sense, the opposite of heuristic analysis in av is not signature scanning, but algorithmic scanning, of which signature scanning is a special case

    在某種意義上,反病毒軟體使用的非啟發式分析方法並不是特徵碼掃描,而是基於演算法的掃描,特徵碼掃描只是其中的特例。
分享友人