tracing the original 中文意思是什麼

tracing the original 解釋
原稿(國畫)色描
  • tracing : n. 追蹤,追溯,追查;描摹,映寫,復寫;摹圖;映寫圖,透寫物;示蹤,顯跡;【物理學】線路圖尋跡;自動儀表的記錄圖像。
  • the : 〈代表用法〉…那樣的東西,…那種東西。1 〈用單數普通名詞代表它的一類時(所謂代表的單數)〉 (a) 〈...
  • original : adj 1 原始的,固有的,本來的;最初的,初期的。2 原物的,原本的,原文的,原圖的。3 獨創的,創造性...
  1. The second approach used for traitor tracing, combines cepstrum features with spread spectrum theory. no original image but the key is required for watermarking extraction

    第二種演算法可用於非法源跟蹤,它將倒譜特性與擴頻通信理論相結合,水印提取時只需要密鑰而不需要原始圖像。
  2. When tracing is enabled, message queuing sends a report message to the message queuing report queue each time the original message enters or leaves a message queuing server

    如果啟用了跟蹤,每當原始消息進入或離開消息隊列服務器時,消息隊列都將報告消息發送到消息隊列報告隊列。
  3. Abstract : it will be helpful for analyzing, understanding and grasping the soft structure and its course of fire control computer by tracing the execute address of the computer software, thus meaningful to patching up the original software

    文摘:應用通用技術研製完成了程序存儲器板系統執行地址跟蹤系統,可以在不對火控系統產生任何影響的前提下,跟蹤並記錄下火控系統在進入不同工作狀態時以及進入后火控計算機軟體執行的地址。
  4. Results show that, this method could reduce the computational cost to 1 / 3 of original by decreasing the true and all - over tracing times

    結果表明,該方法通過減少真實、遍歷式追蹤的次數,能將普通徑跡法射線追蹤過程的計算量減少到原來的1 / 3左右。
  5. After tracing the original definition of monopoly and its past legacies, the dissertation justifies that the concept of monopoly comes from the unwritten law of england. after several hundreds of years, the concept evolves from a franchise granted by the king to a manifold notions including monopolist, the market structure of monopoly, the monopolistic situation and behaviors and so on

    通過壟斷原生意義、壟斷的歷史傳統的研究,展現了壟斷從英國習慣法中產生,經歷幾百年的發展,從特指國王授予的特許權含義,發展為包含壟斷者、壟斷市場結構、壟斷狀態、壟斷行為等多種含義的概念演化歷程。
  6. On magic realism and the construction of original creation in the literature of tracing back to ancestor and the literature of nationalities

    論魔幻現實主義與尋根文學民族文學獨創性的建構
  7. Meanwhile according to the intrusion tolerance system, we present three methods to detect dns spoofing attack, and then three techniques are given to identify the bogus packets or the right ones. two original attack tracing methods are also proposed

    在容侵體系中本文針對dns欺騙攻擊提出了三種攻擊檢測手段、三種攻擊過濾方法,以及兩種新的反向追蹤的方案,為防護平臺的建立提供了理論基礎。
分享友人