隱藏分析 的英文怎麼說

中文拼音 [yǐnzàngfēn]
隱藏分析 英文
steganalysis
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : storing placedepositorydeposit
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  • 隱藏 : hide; conceal; remain under cover; go into hiding
  1. On the basis of the study on the speech coder algorithms, paper describe an advanced method of developing dsp system software, and as the guidlines, we developed the programme of whole decoder unit. paper stress on analysis of the ecu in decoder unit. aiming at amr algorithms disadvantage of angularity of synthetical speech, paper study on the specutral extrapolation which apply to extrapolate reflect coefficient of track model to make error conceal processing of amr. at last paper analyze existing echo cancellation algorithms using on mobile communication system

    在此基礎上,描述了一種較為先進的大型dsp系統程序開發策略,並以此為指導思想,以美國ti公司c6000dsp開發平臺開發出了整個amr解碼器單元的系統程序。論文對amr解碼器的誤碼處理單元進行了重點,針對原有演算法合成語音自然度不好的缺點,論文研究了將譜外推法應用到amr演算法中外推出聲道模型反射系數參數進行誤碼消除處理。
  2. This paper seeks the political ethic and national culture thoughts hiding behind body and language by analyzing the imbroglio of body and language

    本文通過對身體與語言的相互「糅合」的,努力探尋在身體與語言背後的政治倫理和民族文化思維。
  3. Only by reading between the lines can one follow the unsparing analysis beneath the imperturbable surface.

    只有從字里行間體會言外之意,讀者才能理解在不動聲色的表面底下著的毫不留情的
  4. The second part analyze the direct causes of enron ' s abrupt collapse and probes into the set up of special purpose entities of hiding debts and counterfeit increase of income and profits, which received wide criticism from the investors, and the relevant transactions which caused the financial crisis of the company and resulted in the sharp shrink of its stock price and degradation of credit to junk bond

    內容涉及被投資者普遍指責的用於債務、虛增收入及利潤的特殊目的實體的搭建,以及觸發安然公司債務危機並由此導致其股價巨幅縮水、信用等級被降至垃圾級的關聯交易。第三部從安然的發展戰略、企業文化、公司治理結構等方面安然失敗的深層次原因。
  5. On the methodological bases of simpatico comprehension and positive rational criticism, this thesis combs and explains liang shuming ' s ideas of ultimate concern from multi - dimensions, especially from the three perspectives of confucianism, buddhism and taoism, analyzing his related practical activities and investigating the reasons for forming his ideas such as the influences of families, times, and social cultural traditions. thus, the ideas of ultimate concern of " the last confucian " and his latent worrying mentality are showed clearly, and his hard train of thought for pursuing for the confucian ideas, that is, the inside integrated personality and the outside activities reforming society, was returned to original condition

    本文以同情的理解和(積極意義上)理性的批判為方法論依據,對梁漱溟終極關懷思想,特別是從儒釋道三方面資源進行了多角度梳理和闡釋,並系統了他的關實踐活動,考察了其思想形成的原因? ?包括家庭、時代、社會文化傳統等方面的影響,從而凸顯出這位「最後的儒家」的終極關懷及在背後的憂患意識,還原了他追求儒家「內聖外王」的艱難心路歷程。
  6. In the angle of interest rate risk management, the thesis advanced that the interest rate risk embedded in the financial instruments can be identificated and measured by market value analysis, and the risk can be controlled in sufferable extent of bank by some technology instruments, which will assure the bank will get stable income in the fluctuated market environment

    論文從利率風險管理的角度出發,提出利用市值對銀行金融工具中所的利率風險加以鑒別和測量,並通過一定的技術工具將風險控制在銀行可承受的范圍之內,從而確保銀行在波動的市場環境中獲得穩定的收入。
  7. In succession, this paper depict data mining which according to enterprise ' s operation object, explore and analyze a lot of enterprise ' s data to hint hidden, unbeknown or known business rule

    它是按企業既定業務目標,對大量的企業數據進行探索和,提示的、未知的或驗證已知的商業規律,且進一步將其模式化的數據處理方法。
  8. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入,包括地址空間和路由的隔離、mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  9. Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho - acoustic model, it is shown that : there is an improvement on imperceptibility according to human auditory masking effect

    闡述了信息技術和寫技術的重要概念、基本理論以及廣闊的應用前景。了將語音信號作為宿主載體信號的可行性,參考心理聲學模型的特性,得出結論:基於人耳聽覺掩蔽效應的寫演算法,在蔽性上有很大的提高。
  10. It meets the needs of solution designers and business analysts, providing a higher level of abstraction that conceals differences between implementation technologies, yet enables business accountability

    它滿足了解決方案設計人員和業務人員的需要,提供了更高級別的抽象來實現技術之間的差異,同時還提高了業務可靠性。
  11. This article is mainly about such phenomenon of " gender identity " that appeared in the female to themselves and the male society to the female

    本文主要論述了女性對自身以及男性社會對女性的「性別認同」現象,並其背後的根源所在。
  12. Especially, the module of students ’ grade analysis only does such simple things as statistics analysis or data sorting. as a result, a great deal of useful information hidden in mass data can ’ t be utilized efficiently

    尤其是其中的學生成績模塊,往往只有簡單的一些功能,而在海量數據中的大量有用信息不能得到有效地利用。
  13. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息技術的兩個重要寫術與數字水印技術,闡述其各自特點及異同點,針對二者在不可見性上的共同要求,從利於圖像自身的特性增強掩密效果的思路出發,提出先用聚類的方法(本文採用了k -均值演算法)對圖像的像素點進行類以充發掘圖像自然的內在特性,再結合嵌入演算法的信息策略。
  14. The analysis of the concealing technology of trojan - horse

    特洛伊木馬程序技術
  15. In this paper, the ecology environmental information system based on gis, gave up the traditional method and stepped out a new pace in translating from the traditional management of statistic data to the management of spatial data in this way, the system can construct the ecology environment management and decision making on the base of the joint of spatial data and attribute data

    使生態環境管理與決策建立在空間數據與屬性數據結合的基礎上,通過空間數據與屬性數據的結合,進一步進行空間,挖掘在數據背後的信息,通過gis可視化的功能使信息及空間的結果以各種直觀圖形、圖表、多媒體的方面顯示出來,並可以進一步通過網路進行生態環境信息共享。
  16. A standard genetic analysis used to determine evolutionary lineages shows that they have kept something else long hidden : winged species evolved from wingless ancestors, whose own ancestors were winged. “ to our knowledge, this is the first example of a complex feature being lost and later recovered in an evolutionary lineage, ” write michael f

    一項用於決定演化譜系的標準基因法證實,竹節蟲還保有其他已久的秘密:有翅竹節蟲是由無翅竹節蟲演化而來的,而無翅竹節蟲的祖先原本就有翅膀。
  17. It is reali zed that the invisible part of the object can be shadowed, using the max imum or minimum enveloping rectangle method and the counter of points of intersection method, etc. ( 3 ) the boolean operation between integrity or unintegrity bodys is supplied

    並討論了形體產生線、面的原因,利用了最大最小外包矩形法、交點記數法等,實現了任意形體的消演算法。 ( 3 )完成了形體間的正則、非正則布爾運算。
  18. Give precise criterions and descriptions of some important concepts and disposals of data - hiding technique such as cover, stego - object, hiding information, data embedding, data extraction, stego - key, stego - analysis, insensibility, covert communication, digital watermarking, robustness and etc. then propose a general mathematical model of data hiding which cover most models proposed in other papers and establish the basis for further theory analysis

    本論文獨立完成的主要成果有: ( 1 )對信息技術中的一些重要概念和處理給出了準確的規范和描述,主要有秘載體、秘對象、秘密信息、數據嵌入、數據提取、秘密鑰、、不可感知性、秘通信、數字水印、魯棒性等。
  19. A new method for blind image steganalysis

    新的唯秘密載體信息隱藏分析方法
  20. The research on the information hidding include the information hidding technique and analysis technique of the hidden information. the major content of the hidding technique is seek to the algorithm that insert the secret information into the host information

    信息的研究技術和隱藏分析技術,信息技術的研究內容主要是尋求向載體對象中添加嵌入信息的演算法。
分享友人