tampered 中文意思是什麼

tampered 解釋
干擾
  1. The security extended even to the food; they had replaced the caterer lest our food be tampered with.

    保安措施甚到涉及於食物:撤換了承辦筵席的人,以防他在食物里做手腳。
  2. In our country, curriculum content is determined by two culture context, namely two " pour " ( pour to face the western science rationalism to negate the traditional chinese culture completely ; pour to materialism but devaluates to suppress mentalism ), which have resulted in the fact that students have no chances to get to all - sided and right knowledge. in curriculum organization, there is a lack of " embodiment " process, tampered with the student to mastery and application to knowledge, and knowledge devaluated

    兩大文化理念即兩個「一邊倒」 (倒向西方科學理性主義全盤否定中國傳統文化;倒向唯物主義貶抑唯心主義)或知識觀影響了我國對課程知識的選擇,造成課程內容沒有給學生提供全面的正確的知識;在課程組織上,則缺少「具體化」的環節,從而影響了學生對知識的掌握與應用,影響了知識價值的發揮。
  3. Data erasure will be activated if the chip is tampered with mechanically, electrically or electronically

    假如晶片受機械、電力或電子方式干擾,資料會被刪除。
  4. Have you tampered with this tape in any way

    你有否從任何方面篡改過這盒磁帶?
  5. Residents of chestnuthill township had suspected for several days that a bear was in their midst after they saw their trash cans tampered with. but it was n ' t until two children happened upon the bear on sunday that its exact whereabouts became clear

    據美聯社12月5日報道,近些天來,切斯納特希爾鄉的居民們發現自家垃圾桶有被翻動的痕跡,因此懷疑有熊在鄉里游蕩。
  6. As a result, the multimedia products may be illegally copied or maliciously tampered in the distribution process, which can infringe the copyrights and decrease the reliabilities of the original products

    因此,多媒體作品在流通環節很可能會被非法拷貝或篡改,這不但會侵犯作品的版權而且還會降低作品的可信度。
  7. A. verifying that signed data has not been tampered with

    A .驗證已簽名的數據尚未被篡改
  8. Control can be tampered with by a malicious user

    控制項相關聯的url可能會被用戶惡意篡改。
  9. Then there was a dispute about who saw the dead boys last in life, and many claimed that dismal distinction, and offered evidences, more or less tampered with by the witness ; and when it was ultimately decided who did see the departed last, and exchanged the last words with them, the lucky parties took upon themselves a sort of sacred importance, and were gaped at and envied by all the rest

    接著他們就誰最後看見那些失蹤的孩子展開一場爭論。許多孩子真是苦中作樂,爭著搶頭功,並且提出了一些證據,被證人添油加醋地說了一番。最後公布結果時,那些被認為是最後看到過死者並和他們講了話的幸運者便擺出一副了不起的樣子,其餘的人則張著嘴望著他們,羨慕得不得了。
  10. A limits the sounding of alarms installed in premises to no more than 15 minutes ; and requires all vehicle alarms not to sound unless the vehicle is being tampered with and the alarm will not sound for more than 5 minutes after being triggered

    A規定安裝在樓宇內的防盜警鐘,不得響鬧超過15分鐘及b除非車輛確實受到干擾,否則所有車輛防盜警報器一律不得響鬧,而響鬧時間亦不得超過5分鐘。
  11. This sounds wonderful and often is insane. for the scientists have not as a rule taken any interest whatsoever in the taste of the things they ' ve tampered with

    這聽起來妙不可言而常常是極其愚蠢的。因為通常這些科學家在鼓搗這些東西的時候對它們的味道會變得如何絲毫不感興趣。
  12. Pressure relief valves should be tested periodically to ensure that the product has not been affected by corrosive water conditions and to ensure that the valve and discharge piping have not been altered or tampered with

    壓力安全閥應該定期進行測試,以確保安全閥不會受到腐蝕性水環境的影響,確保安全閥和排泄管道不被篡改或損壞。
  13. Warning : reinspection of t & p relief valve : temperature and pressure relief valves should be inspected at least once every three years by a licensed plumbing contractor or authorized inspection agency, to ensure that the product has not been affected by corrosive water conditions and to ensure that the valve and discharge line have not been altered or tampered with illegally

    警告:重新檢查溫度壓力安全閥:溫度壓力安全閥每年應該由有資格證書的管道承包商或經過批準的檢查機構來至少檢查一次,以確保這種產品不會受到腐蝕性水的影響,確保閥門和排泄管道不會被不合理的更換或損壞。
  14. The fbi says it doesn ' t appear the information on the laptop has been tampered with

    Fbi表示手提中的信息沒有被損壞的跡象。
  15. On the one hand, the combination of information techenology with governmant management, finance, public service, education, medical treatment, traditional business brings a big new market ; on the other hand, although the computerization brings high efficiency and friendly service, it also brings the threat, risk and duty. the information on web is often to be wiretapped, to be tampered or to be destroyed. all kinds of network attack programs are to be diffused

    一方面,信息技術與政府管理、金融、公共服務、教育、醫療和傳統商務的結合帶來了一個巨大的新市場;另一方面,信息化在帶來高效率和友好服務的同時,也帶來了威脅、風險和責任,網上信息被竊、被篡改、被破壞的事件時有發生,各種網路攻擊程序的廣泛傳播更使人們憂心忡忡。
  16. The statistical analysis of gompertz distribution base on tampered failure rate model under progressive stress accelerated life testing

    分佈下雙應力定時截尾恆加試驗無失效數據的統計分析
  17. A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key

    在發送方和接收方共享機密密鑰的前提下,基於哈希的消息驗證代碼( hmac )可用於確定通過不安全通道發送的消息是否已被篡改。
  18. This method has many advantages compared to the latter and is testified by many images. ( 2 ) because fractal coding has the characteristic of high compression ratio, this thesis designed a spatial self - embedding watermarking technique. after self - embedding, it can detect any changes to a watermarked image as well as localizing the areas that have been tampered

    ( 2 )鑒于分形圖像壓縮具有很高的壓縮比且重構圖像效果好的優點,本文利用分形壓縮實現了一種空域自嵌入水印演算法,不但能對篡改區域進行有效定位,而且具有修復功能。
  19. If possible try to recover portions of the image that have been tampered without accessing the original image. in the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication - fragile watermarks, semi - fragile watermarks, and self - embedding watermarks. the research of this thesis mainly includes self - embedding and semi - fragile watermarks

    目前用於數字圖像完整性驗證及自修復的數字水印方案主要有完全脆弱性水印、半脆弱性水印、自嵌入水印等,本文主要研究自嵌入及半脆弱數字水印,分別從空域及變換域角度詳細分析當前國內外現有的各種演算法,指出其不足之處,並提出了相應的改進演算法,實驗結果表明本文演算法的有效性與實用性。
  20. It is also possible to recover portions of the image which have been tampered. experiments on real images verify the effectiveness of the proposed technique. ( 3 ) since the current self - embedding watermarking techniques are too fragile to resist noise or jpeg compression, we proposed a self - embedding method based on jpeg images which plays an important role in current internet environment

    ( 3 )由於現有的空域自嵌入水印演算法大多數是對位圖圖像嵌入水印,在抗jpeg壓縮方面顯得過于脆弱,因此本文實現了一種直接對jpeg圖像進行自嵌入的數字水印演算法,具有檢測篡改及修復功能,對于當今網路時代來講具有重要意義。
分享友人