棒擊法 的英文怎麼說
中文拼音 [bàngjīfǎ]
棒擊法
英文
stick striking-
Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal
與靜態圖像、視頻等數字水印方法類似,音頻水印的研究主要須解決感知透明性、數據嵌入率、魯棒性、安全性以及實時性等問題。水印演算法的魯棒性對于實際應用來說是至關重要的,它要求數字水印在遭受有意的攻擊或無意的修改後,仍能提供有意義的數據,這一性能對版權保護的應用顯得尤為突出。In order to test the robustness and imperceptivity of the algorithm, simulate experiments are carried out. the experimental results indicate that it is robust to the attack such as mp3 loss compression, low pass filter, resample and so on
對所研究演算法的穩健性和不可感知性進行了模擬實驗,實驗結果表明本章提出的演算法對mp3壓縮、低通濾波、重采樣等攻擊有很強的魯棒性。The wizard of wood, the count of contact,
木棒的魔法師打擊的保證Key keyboard control around mobile, z key shooting end button columns add ice life, pagedown key plus the use of water - ice magic
鍵盤左右鍵控制移動, z鍵射擊, end鍵使用棒棒冰加生命, pagedown鍵使用刨冰加魔法。Test method for measuring moment of inertia and center of percussion of a baseball or softball bat
測量棒球棒或軟球拍的慣性矩和沖擊中心的試驗方法Standard test methods for notched bar impact testing of metallic materials
金屬材料切口試棒沖擊試驗的標準試驗方法In semi - fragile image watermarking algorithm, a robust watermark and a fragile watermark are extracted from the third approximation coefficient of wavelet transform of the original image. the two watermarks are embedded into the third vertical and horizontal detail coefficients. when authenticating image, image can be authenticated correctly and attacked parts can be localized through comparing the original watermarks and extracted watermarks
其中,完全認證方法,利用qr分解的特性把圖像的邊緣信息嵌入到載體圖像中,演算法對各種攻擊都具有很好的敏感性;內容認證方法,從載體圖像中提取出一個脆弱水印和一個魯棒水印,並把它們重新嵌入到載體圖像中,認證時,通過兩個水印在圖像傳輸前後的變化情況來對圖像的保留價值進行評估,並準確定位受攻擊部位。Our experiments show that this method is also robust to gaussian white noise. resampling and smoothing etc. at last, some discussions and conclusions are given
實驗結果顯示,我們的演算法在高斯白噪聲、重采樣、運動光滑等攻擊下有很好的魯棒性。This armor is magically enhanced to turn away bludgeoning weapons such as clubs and maces. damage from those weapons is reduced by 5
拒錘:這類魔法增強的盔甲可以使鈍擊類武器如棍棒以及硬頭錘稍微偏轉。因此此盔甲穿戴者獲得5點鈍擊類傷害的減免。The light of her sunrod revealed another half - dozen githyanki ranged around her : four knights standing close, two or three spellcasters hanging back out of reach
她手中日光棒的光亮暴露了她周圍的一群吉斯揚基:近處有四個騎士,遠處攻擊范圍之外迂迴著兩個或三個施法者。It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。Notched bar tests - method for precision determination of charpy v - notch impact energies for metals
劃痕棒材試驗.第6部分:金屬擺式v劃痕沖擊能量精密測定方法One could be at the batter ' s plate so filled with anxiety that one couldn ' t swing the bat, but usually in the moment of the ball ' s flight, one is wholly absorbed and present to the moment
他可能充滿焦慮的處于擊球手的位置,以致於無法揮動球棒,但是在球的飛行時刻,他被深深的吸引並且僅在此刻存在。It is stated the software and hardware system of the train longitudinal impact detector as well as the method to use " fall - stick " to evaluate the driver ' s operation stability
摘要主要敘述了列車綜向沖擊檢測儀的軟、硬體系統以及目前鐵路系統應用「倒棒」裝置來評定司機操作平穩性的方法。In addition, robustness of the scheme against jpeg lossy compression, image enhancement, noise addition and statistical averaging attacks among others are provided
此外,文中還分析了演算法對jpeg壓縮、圖像增強、加入噪聲及共謀攻擊等操作的魯棒性。The result of simulation implied that this calculation can keep not only the better audio quality, but also has the better robustness for the attacks such as : noise addition, lossy compression, low pass filtering and re - quantization
模擬實驗結果表明本演算法不僅能保持較好的音質,而且對諸如疊加噪聲,有損壓縮,低通濾波,重新采樣等攻擊都具有較好的魯棒性。In order to adapt the scheme to both the color image and the gray image, while embedding the watermarking into the image, the scaling factors are determined by the local luminance feature and texture features of the image. it can improve the embedding strength and the watermarking robustness. from the experimental results, the stego - images are extremely robust to common image processing such as median filter, jpeg compression and denoising after adding the stochastic noises
2 、提出了一種新的基於小波變換和紋理特徵的數字水印演算法,該演算法依據從圖像小波域提取出的紋理特徵來選取水印的嵌入位置,較好地利用了圖像的紋理區域,既能掩蔽較多的噪聲,又能較好地抵抗jpeg壓縮等一般性攻擊,調節了數字水印技術中存在的不可見性與魯棒性之間的矛盾。The experimental results demonstrate that the two proposed video watermarking algorithms have good fidelity and preferably applicability. they are robust to video synchronization attacks such as frame dropping, cut - paste and other common attacks such as noise and compression. they are feasible algorithms
實驗證明,本文提出的兩種演算法有良好的保真度,有較好的普適性,對幀切除、剪切-復制等同步攻擊以及噪聲、壓縮等常規攻擊都有良好的魯棒性,是有較高可行性的演算法。Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. this method need n ' t original image when the watermark is extracting. experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i. e. this method can detect the tampered portions
因此,本文利用小波系數均值來嵌入水印,提出了一種基於小波域的圖像完整性驗證的半脆弱水印演算法,在魯棒性和脆弱性方面達到了很好的平衡,對非惡意攻擊有很強的魯棒性,而對于惡意的篡改操作有很強的識別和定位能力。In order to improve the robustness of digital watermarking for copyright protection, a novel position and method complementary embedding algorithm is proposed, which is based on the analysis of the unbalanced characteristics for different image processing methods
摘要為提高用於版權保護的數字水印的魯棒性,基於圖像小波信號分析方法,分析了各種處理攻擊對圖像小波系數影響的不均衡特性,並根據該特性提出嵌入位置和嵌入方法互補的新穎水印演算法。分享友人