棒擊法 的英文怎麼說

中文拼音 [bàng]
棒擊法 英文
stick striking
  • : Ⅰ名詞(棍子) stick; staff; club; cudgel Ⅱ形容詞[口語] (強; 高; 好) strong; excellent; good
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal

    與靜態圖像、視頻等數字水印方類似,音頻水印的研究主要須解決感知透明性、數據嵌入率、魯性、安全性以及實時性等問題。水印演算的魯性對于實際應用來說是至關重要的,它要求數字水印在遭受有意的攻或無意的修改後,仍能提供有意義的數據,這一性能對版權保護的應用顯得尤為突出。
  2. In order to test the robustness and imperceptivity of the algorithm, simulate experiments are carried out. the experimental results indicate that it is robust to the attack such as mp3 loss compression, low pass filter, resample and so on

    對所研究演算的穩健性和不可感知性進行了模擬實驗,實驗結果表明本章提出的演算對mp3壓縮、低通濾波、重采樣等攻有很強的魯性。
  3. The wizard of wood, the count of contact,

    的魔師打的保證
  4. Key keyboard control around mobile, z key shooting end button columns add ice life, pagedown key plus the use of water - ice magic

    鍵盤左右鍵控制移動, z鍵射, end鍵使用冰加生命, pagedown鍵使用刨冰加魔
  5. Test method for measuring moment of inertia and center of percussion of a baseball or softball bat

    測量或軟球拍的慣性矩和沖中心的試驗方
  6. Standard test methods for notched bar impact testing of metallic materials

    金屬材料切口試試驗的標準試驗方
  7. In semi - fragile image watermarking algorithm, a robust watermark and a fragile watermark are extracted from the third approximation coefficient of wavelet transform of the original image. the two watermarks are embedded into the third vertical and horizontal detail coefficients. when authenticating image, image can be authenticated correctly and attacked parts can be localized through comparing the original watermarks and extracted watermarks

    其中,完全認證方,利用qr分解的特性把圖像的邊緣信息嵌入到載體圖像中,演算對各種攻都具有很好的敏感性;內容認證方,從載體圖像中提取出一個脆弱水印和一個魯水印,並把它們重新嵌入到載體圖像中,認證時,通過兩個水印在圖像傳輸前後的變化情況來對圖像的保留價值進行評估,並準確定位受攻部位。
  8. Our experiments show that this method is also robust to gaussian white noise. resampling and smoothing etc. at last, some discussions and conclusions are given

    實驗結果顯示,我們的演算在高斯白噪聲、重采樣、運動光滑等攻下有很好的魯性。
  9. This armor is magically enhanced to turn away bludgeoning weapons such as clubs and maces. damage from those weapons is reduced by 5

    拒錘:這類魔增強的盔甲可以使鈍類武器如棍以及硬頭錘稍微偏轉。因此此盔甲穿戴者獲得5點鈍類傷害的減免。
  10. The light of her sunrod revealed another half - dozen githyanki ranged around her : four knights standing close, two or three spellcasters hanging back out of reach

    她手中日光的光亮暴露了她周圍的一群吉斯揚基:近處有四個騎士,遠處攻范圍之外迂迴著兩個或三個施者。
  11. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算的基礎上,著重研究了代數方編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯的傳送和重構方,是dos攻過程中的反向追蹤問題的一種新的解決方; ddos陷阱作為反向追蹤的工具,引誘攻者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻體系結構;基於源的ddos防禦方作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻和限制速率終止來自源的攻;基於向後倒推的防禦ddos的路由機制把ddos攻看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  12. Notched bar tests - method for precision determination of charpy v - notch impact energies for metals

    劃痕材試驗.第6部分:金屬擺式v劃痕沖能量精密測定方
  13. One could be at the batter ' s plate so filled with anxiety that one couldn ' t swing the bat, but usually in the moment of the ball ' s flight, one is wholly absorbed and present to the moment

    他可能充滿焦慮的處于球手的位置,以致於無揮動球,但是在球的飛行時刻,他被深深的吸引並且僅在此刻存在。
  14. It is stated the software and hardware system of the train longitudinal impact detector as well as the method to use " fall - stick " to evaluate the driver ' s operation stability

    摘要主要敘述了列車綜向沖檢測儀的軟、硬體系統以及目前鐵路系統應用「倒」裝置來評定司機操作平穩性的方
  15. In addition, robustness of the scheme against jpeg lossy compression, image enhancement, noise addition and statistical averaging attacks among others are provided

    此外,文中還分析了演算對jpeg壓縮、圖像增強、加入噪聲及共謀攻等操作的魯性。
  16. The result of simulation implied that this calculation can keep not only the better audio quality, but also has the better robustness for the attacks such as : noise addition, lossy compression, low pass filtering and re - quantization

    模擬實驗結果表明本演算不僅能保持較好的音質,而且對諸如疊加噪聲,有損壓縮,低通濾波,重新采樣等攻都具有較好的魯性。
  17. In order to adapt the scheme to both the color image and the gray image, while embedding the watermarking into the image, the scaling factors are determined by the local luminance feature and texture features of the image. it can improve the embedding strength and the watermarking robustness. from the experimental results, the stego - images are extremely robust to common image processing such as median filter, jpeg compression and denoising after adding the stochastic noises

    2 、提出了一種新的基於小波變換和紋理特徵的數字水印演算,該演算依據從圖像小波域提取出的紋理特徵來選取水印的嵌入位置,較好地利用了圖像的紋理區域,既能掩蔽較多的噪聲,又能較好地抵抗jpeg壓縮等一般性攻,調節了數字水印技術中存在的不可見性與魯性之間的矛盾。
  18. The experimental results demonstrate that the two proposed video watermarking algorithms have good fidelity and preferably applicability. they are robust to video synchronization attacks such as frame dropping, cut - paste and other common attacks such as noise and compression. they are feasible algorithms

    實驗證明,本文提出的兩種演算有良好的保真度,有較好的普適性,對幀切除、剪切-復制等同步攻以及噪聲、壓縮等常規攻都有良好的魯性,是有較高可行性的演算
  19. Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. this method need n ' t original image when the watermark is extracting. experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i. e. this method can detect the tampered portions

    因此,本文利用小波系數均值來嵌入水印,提出了一種基於小波域的圖像完整性驗證的半脆弱水印演算,在魯性和脆弱性方面達到了很好的平衡,對非惡意攻有很強的魯性,而對于惡意的篡改操作有很強的識別和定位能力。
  20. In order to improve the robustness of digital watermarking for copyright protection, a novel position and method complementary embedding algorithm is proposed, which is based on the analysis of the unbalanced characteristics for different image processing methods

    摘要為提高用於版權保護的數字水印的魯性,基於圖像小波信號分析方,分析了各種處理攻對圖像小波系數影響的不均衡特性,並根據該特性提出嵌入位置和嵌入方互補的新穎水印演算
分享友人