visual attack 中文意思是什麼

visual attack 解釋
目視攻擊
  • visual : adj. 1. 視覺的,觀看的;視力的。2. 看得見的。3. 光學的。4. 形象化的。adv. -ly (the visually impaired 〈委婉語〉盲人;視力很差的人)。
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Finally, the thesis developed 3d animation flight simulation platform for helicopter using opengl in visual c + +. and the 3d terrain and helicopter model are constructed. the simulation of two typical maneuver ( s maneuver flight and bopup - bopdown ) and terrain following shows that the fight control system of attack helicopter is improved by the realistic optical impact

    本文最後在vc環境下用opengl開發了直升機三維動畫模擬平臺,構造了三維地形和直升機模型,模擬了直升機做蛇形機動、急躍升急躍降、地形跟隨等機動飛行,通過逼真的視覺效果驗證了飛控系統的正確性。
  2. Visual attack games - 4455 miniclip games

    槍林彈雨出擊小游戲- 4399小游戲
  3. Then according to system simulation technology, the overall air - to - ground attack simulation plan is made with the thought of models and layers. after that, the mathematical models of main parts in the simulation are made such as aircraft body, propulsive system, flight control system, fire control system, bomb and air - to - ground missile. on the basis of these mathematical models, using the object - oriented design methodology, a set of air - to - ground attack real - time visual simulation software is developed. this software can be used to aid aircraft design, research of air - to - ground attack tactics and flight training

    本文首先介紹了現代戰爭中空對地攻擊的技術裝備及其特點,計算機模擬技術的發展以及面向對象的軟體設計思想;而後使用系統模擬技術,依據分層、模塊化設計思想,制定了空對地攻擊模擬系統總體設計方案;之後根據目前技術狀況,建立了戰斗機機體、推進系統、飛控系統、火控系統、航空炸彈、空地導彈等子系統數學模型;在此基礎上,利用面向對象的軟體設計思想,在基於pc的平臺上開發了一套對地攻擊視景模擬軟體,實現了戰斗機對地攻擊實時視景模擬。
  4. Comparing with the image watermarking, the audio watermarking have a few characteristics : 1. comparing with the visual media, audio frequency signal has less sampling points at every time interval. 2. owing to human audition systems, it is more sensitive than human vision systems, therefore, it is more trouble to realize the imperceptibility of audition compared to the vision systems. 3. to stick up to the cut attack, embedded watermark should keep synchronization. 4. because of the bigger memory payload of audio frequency signal, the initial audio frequency signal must be removed during the extract in order to protect the maneuverability of project

    數字水印技術是近幾年來學術界興起的一個前沿研究領域,提高演算法的魯棒性、安全性、實用性是數字水印的研究方向。本文提出的基於可視密碼術的小波域下量化系數的魯棒性音頻數字水印方案,其優點在於利用小波變換的多解析度特性在保證水印魯棒性的同時使水印對原始音頻信號的影響達到最小,採用量化系數的方法嵌入水印信息實現了盲水印,提高水印的工程應用價值。
  5. 4455 visual attack games

    更多同類游戲
  6. Visual attack games

    抗擊倭寇小游戲
  7. Referring to the theory of the modern air - combat, the thesis discusses the process of beyond visual range air combat about “ air - to - surface precise attack ” ; according to the optimal strategy, studies respectively the four key techniques, which are multi - target sorting, multi - aircraft cooperative air - combat and the optimization of proportional navigation of the fighter and the technique of the associated attack and defend of group fighters

    借鑒現代空戰理論,對「空對面精確打擊」中的超視距作戰過程進行了系統論述,對超視距空戰中的四個關鍵技術多目標排序、多機協同空戰,機群聯合攻防及戰機導引律的優化分別進行了研究。
  8. Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. this method need n ' t original image when the watermark is extracting. experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i. e. this method can detect the tampered portions

    因此,本文利用小波系數均值來嵌入水印,提出了一種基於小波域的圖像完整性驗證的半脆弱水印演算法,在魯棒性和脆弱性方面達到了很好的平衡,對非惡意攻擊有很強的魯棒性,而對于惡意的篡改操作有很強的識別和定位能力。
  9. In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented

    在信息隱藏的性能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知性能評價準則,指出針對信息隱藏的性能評價不能單純從視覺特性出發,提出從信息隱藏的數據特性和感知特性出發,結合局部特性來考察失真誤差的變化的思想,並據此提出基於局部區域誤差統計分佈和視覺掩模方法評價信息隱藏性能的方法。
  10. Aiming at the scheduling of multi targets attacking in beyond visual range air combat, on the base of multiple attribute decision making, a synthetically dominant index method is proposed to sorting of multi - targets attack

    摘要針對未來超視距空戰條件下的多目標攻擊排序問題,以多屬性決策理論為基礎,提出了一種多目標攻擊排序的綜合優勢指數模型。
分享友人