隱藏特性 的英文怎麼說
中文拼音 [yǐnzàngtèxìng]
隱藏特性
英文
hidden attribute- 隱 : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
- 藏 : storing placedepositorydeposit
- 特 : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 隱藏 : hide; conceal; remain under cover; go into hiding
- 特性 : characteristic(s); character; performance; features; properties; behaviour; response; character...
-
Digital watermarking algorithm based on wavelet transform, making use of relative frequency equability feature of low - frequency that comes from image ' s mra decomposing and according to size between insert point value and its region mean value, is that two - value watermarking is hid in insert point
基於小波變換的數字水印演算法充分利用了圖像經過多分辨分解后低頻圖像的頻率相對平穩特性,並依據嵌入點值與其區域均值的大小,將二維二值水印信息隱藏到嵌入點。But it was not until the 19th century that mathematicians such as evariste galois, an unhappy french genius, discovered symmetries hidden in the solutions to mathematical equations
但直到19世紀數學家們才發現隱藏在數學方程解法中的對稱性,其中包括鬱郁寡歡的法國數學天才艾瓦里斯特?伽羅瓦。On the methodological bases of simpatico comprehension and positive rational criticism, this thesis combs and explains liang shuming ' s ideas of ultimate concern from multi - dimensions, especially from the three perspectives of confucianism, buddhism and taoism, analyzing his related practical activities and investigating the reasons for forming his ideas such as the influences of families, times, and social cultural traditions. thus, the ideas of ultimate concern of " the last confucian " and his latent worrying mentality are showed clearly, and his hard train of thought for pursuing for the confucian ideas, that is, the inside integrated personality and the outside activities reforming society, was returned to original condition
本文以同情的理解和(積極意義上)理性的批判為方法論依據,對梁漱溟終極關懷思想,特別是從儒釋道三方面資源進行了多角度梳理和闡釋,並系統分析了他的關實踐活動,考察了其思想形成的原因? ?包括家庭、時代、社會文化傳統等方面的影響,從而凸顯出這位「最後的儒家」的終極關懷及隱藏在背後的憂患意識,還原了他追求儒家「內聖外王」的艱難心路歷程。According to thoth, the divine language form represented in the alphabet of the ark, is contained within the matrix of this greater archangelic flame script
根據透特的解釋,神性語言形態排列表現在聖經方舟字母表裡,就隱藏在更高尚的大天使光芒卷能量矩陣裏面。Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho - acoustic model, it is shown that : there is an improvement on imperceptibility according to human auditory masking effect
闡述了信息隱藏技術和隱寫技術的重要概念、基本理論以及廣闊的應用前景。分析了將語音信號作為宿主載體信號的可行性,參考心理聲學模型的特性,得出結論:基於人耳聽覺掩蔽效應的隱寫演算法,在隱蔽性上有很大的提高。This module - level scoping provides a degree of abstraction data hiding that lets you restrict visibility of the database to a specific module
此模塊級范圍提供了一個抽象級別(數據隱藏) ,允許您限制數據庫對特定模塊的可見性。For the purposes of our example, accept the default feature properties and click the feature properties button again to hide the feature properties section
出於我們的例子的目的,接受默認的特性屬性,並再次單擊feature properties按鈕來隱藏feature properties部分。To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character
接著對信息隱藏技術的兩個重要分支隱寫術與數字水印技術,闡述其各自特點及異同點,針對二者在不可見性上的共同要求,從利於圖像自身的特性增強掩密效果的思路出發,提出先用聚類分析的方法(本文採用了k -均值演算法)對圖像的像素點進行分類以充分發掘圖像自然的內在特性,再結合嵌入演算法的信息隱藏策略。The hk dvd version is a two disc package, with disc one featuring the film two endings are included but the alternate ending destroys the consistency of the movie a lot and is not recommended ! and disc two containing all the bonus materials. easter egg can be found on disc 2 by tapping down the cursor until the english film title
無間道的dvd是雙碟裝,碟一是本片包括兩個結局,但大陸版的結局草草收場,而且破壞了全片劇情的統一性,不值一看,碟二是特別收錄,有製作特輯花絮music video等,另外還有隱藏的復活蛋收錄,只需在目錄不停向下按,直到指標移到左邊的infernal affairs英文片名,按下確定便會發現有八分鐘的ng片段。As a matter of fact, the long - term deflation reflects the defects existing in the present pattern of resource distribution in china. most of the medium - small sized state - owned enterprises cannot realize the optimum resource distribution, which is caused by the fact that they are not the principal parts in resource distribution - - firm, for the nature of a firm is determined by the its unique means of resource distribution. inside the firm, it is the authority that distributes the resource
豈路是:一、通貨緊縮的長期存在實際上反映出了中國引資源配置格局隱藏著缺陷,即絕大多數國有中小企業無法實現資源的優化配置,原印在於他們根本就個足其l f意義上的資源配置主體? ?公司,因為公司的性質根本地取決於它配發資源的獨特方式,即在公司內部是權力這種方式在調配著各種要素資源。Providing " hidden " administrative features or " raw " interfaces that savvy attackers could penetrate can easily backfire
假設機智的攻擊者可能洞察的「隱藏的」管理特性或「原始」介面可能很容易起反作用。Formatting features indent elements, based on nesting, or hide element content so you can restrict the view to specific areas
格式化特性基於嵌套來縮進元素,或者隱藏元素內容,因此可以將視圖限制在特定區域。Through the research of spoken language in chinese, the thesis explores the metaphorical features in daily communication. the metaphor expressions contribute to the vividness and connotation
摘要通過對漢語口語的研究發現日常交際中的隱喻特點,反映了它作為人類基本的認知活動具有普遍性。它可以將表達變得形象生動,言簡意賅,隱藏內涵。After analyzing the two roi coding methods of jpeg2000 standard, their shortcoming is pointed out, and then a novel roi image coding method with utilizing information hiding technique is proposed. in this scheme, some coded information of the background is embedded into the redundant bits of the roi coefficients. the relative quality of rois and background can be adjusted by changing the quantity of embedded information
感興趣區編碼是jpeg2000標準所提供的一項重要特性,本文對標準中規定的兩種感興趣區編碼方法進行了分析,指出其不足之處,而後創造性地提出利用信息隱藏技術來對其進行補充,將部分背景區的編碼信息隱藏在感興趣區系數的冗餘位,通過控制嵌入量可以調節感興趣區和背景區的相對質量。The model, in this case, is the high - level language program - which, like all useful models, hides irrelevant detail about the idiosyncrasies of the underlying computing technology such as internal word size, the numbers of accumulators and index registers, the type of alu, and so on
這種情況下,模式就是這個高級語言程序,它就像所有有用的模式那樣,隱藏了潛在的計算技術特性上的相關細節(比如內存字元大小,累加器的個數,索引寄存器, alu算術邏輯單元類型等等) 。The central theme of kaluza - klein theory remains : the physical laws that we see depend on the geometry of hidden extra dimensions
卡魯扎?克萊恩理論的中心思想仍保留著:我們可見的物理定律取決于隱藏的額外維度之幾何特性。Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work
本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。In spatial domain, according to the characteristics of hvs ( human visual system ), we introduce several approachs based on images " deviation, images " flatness measurement, fuzzy classification, and an approach based on difference matrix as well
在空間域內,利用人的視覺特性,我們提出了基於圖象方差、圖象平坦測度、模糊分類的隱藏演算法,同時提出了基於差值矩陣的信息隱藏。According to the feature of the human vision, we present the hiding methods based on image variance, image flatness measurement and fuzzy classification, respectively. and the techniques based on relationship between pixels, difference matrix and cryptography are also given. two hiding methods, backup hiding and camouflage hiding, are proposed too
在空間域內,利用人的視覺特性,本文提出了基於圖象方差、圖象平坦測度和基於模糊分類的隱藏演算法,同時提出了基於關系、基於差值矩陣和基於密碼演算法的隱藏方法,並提出了備份隱藏和偽裝隱藏兩種隱藏方案。In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented
在信息隱藏的性能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知性能評價準則,指出針對信息隱藏的性能評價不能單純從視覺特性出發,提出從信息隱藏的數據特性和感知特性出發,結合局部特性來考察失真誤差的變化的思想,並據此提出基於局部區域誤差統計分佈和視覺掩模方法評價信息隱藏性能的方法。分享友人