隱藏特性 的英文怎麼說

中文拼音 [yǐnzàngxìng]
隱藏特性 英文
hidden attribute
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : storing placedepositorydeposit
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 隱藏 : hide; conceal; remain under cover; go into hiding
  • 特性 : characteristic(s); character; performance; features; properties; behaviour; response; character...
  1. Digital watermarking algorithm based on wavelet transform, making use of relative frequency equability feature of low - frequency that comes from image ' s mra decomposing and according to size between insert point value and its region mean value, is that two - value watermarking is hid in insert point

    基於小波變換的數字水印演算法充分利用了圖像經過多分辨分解后低頻圖像的頻率相對平穩,並依據嵌入點值與其區域均值的大小,將二維二值水印信息到嵌入點。
  2. But it was not until the 19th century that mathematicians such as evariste galois, an unhappy french genius, discovered symmetries hidden in the solutions to mathematical equations

    但直到19世紀數學家們才發現在數學方程解法中的對稱,其中包括鬱郁寡歡的法國數學天才艾瓦里斯?伽羅瓦。
  3. On the methodological bases of simpatico comprehension and positive rational criticism, this thesis combs and explains liang shuming ' s ideas of ultimate concern from multi - dimensions, especially from the three perspectives of confucianism, buddhism and taoism, analyzing his related practical activities and investigating the reasons for forming his ideas such as the influences of families, times, and social cultural traditions. thus, the ideas of ultimate concern of " the last confucian " and his latent worrying mentality are showed clearly, and his hard train of thought for pursuing for the confucian ideas, that is, the inside integrated personality and the outside activities reforming society, was returned to original condition

    本文以同情的理解和(積極意義上)理的批判為方法論依據,對梁漱溟終極關懷思想,別是從儒釋道三方面資源進行了多角度梳理和闡釋,並系統分析了他的關實踐活動,考察了其思想形成的原因? ?包括家庭、時代、社會文化傳統等方面的影響,從而凸顯出這位「最後的儒家」的終極關懷及在背後的憂患意識,還原了他追求儒家「內聖外王」的艱難心路歷程。
  4. According to thoth, the divine language form represented in the alphabet of the ark, is contained within the matrix of this greater archangelic flame script

    根據透的解釋,神語言形態排列表現在聖經方舟字母表裡,就在更高尚的大天使光芒卷能量矩陣裏面。
  5. Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho - acoustic model, it is shown that : there is an improvement on imperceptibility according to human auditory masking effect

    闡述了信息技術和寫技術的重要概念、基本理論以及廣闊的應用前景。分析了將語音信號作為宿主載體信號的可行,參考心理聲學模型的,得出結論:基於人耳聽覺掩蔽效應的寫演算法,在上有很大的提高。
  6. This module - level scoping provides a degree of abstraction data hiding that lets you restrict visibility of the database to a specific module

    此模塊級范圍提供了一個抽象級別(數據) ,允許您限制數據庫對定模塊的可見
  7. For the purposes of our example, accept the default feature properties and click the feature properties button again to hide the feature properties section

    出於我們的例子的目的,接受默認的,並再次單擊feature properties按鈕來feature properties部分。
  8. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息技術的兩個重要分支寫術與數字水印技術,闡述其各自點及異同點,針對二者在不可見上的共同要求,從利於圖像自身的增強掩密效果的思路出發,提出先用聚類分析的方法(本文採用了k -均值演算法)對圖像的像素點進行分類以充分發掘圖像自然的內在,再結合嵌入演算法的信息策略。
  9. The hk dvd version is a two disc package, with disc one featuring the film two endings are included but the alternate ending destroys the consistency of the movie a lot and is not recommended ! and disc two containing all the bonus materials. easter egg can be found on disc 2 by tapping down the cursor until the english film title

    無間道的dvd是雙碟裝,碟一是本片包括兩個結局,但大陸版的結局草草收場,而且破壞了全片劇情的統一,不值一看,碟二是別收錄,有製作輯花絮music video等,另外還有的復活蛋收錄,只需在目錄不停向下按,直到指標移到左邊的infernal affairs英文片名,按下確定便會發現有八分鐘的ng片段。
  10. As a matter of fact, the long - term deflation reflects the defects existing in the present pattern of resource distribution in china. most of the medium - small sized state - owned enterprises cannot realize the optimum resource distribution, which is caused by the fact that they are not the principal parts in resource distribution - - firm, for the nature of a firm is determined by the its unique means of resource distribution. inside the firm, it is the authority that distributes the resource

    豈路是:一、通貨緊縮的長期存在實際上反映出了中國引資源配置格局著缺陷,即絕大多數國有中小企業無法實現資源的優化配置,原印在於他們根本就個足其l f意義上的資源配置主體? ?公司,因為公司的質根本地取決於它配發資源的獨方式,即在公司內部是權力這種方式在調配著各種要素資源。
  11. Providing " hidden " administrative features or " raw " interfaces that savvy attackers could penetrate can easily backfire

    假設機智的攻擊者可能洞察的「的」管理或「原始」介面可能很容易起反作用。
  12. Formatting features indent elements, based on nesting, or hide element content so you can restrict the view to specific areas

    格式化基於嵌套來縮進元素,或者元素內容,因此可以將視圖限制在定區域。
  13. Through the research of spoken language in chinese, the thesis explores the metaphorical features in daily communication. the metaphor expressions contribute to the vividness and connotation

    摘要通過對漢語口語的研究發現日常交際中的點,反映了它作為人類基本的認知活動具有普遍。它可以將表達變得形象生動,言簡意賅,內涵。
  14. After analyzing the two roi coding methods of jpeg2000 standard, their shortcoming is pointed out, and then a novel roi image coding method with utilizing information hiding technique is proposed. in this scheme, some coded information of the background is embedded into the redundant bits of the roi coefficients. the relative quality of rois and background can be adjusted by changing the quantity of embedded information

    感興趣區編碼是jpeg2000標準所提供的一項重要,本文對標準中規定的兩種感興趣區編碼方法進行了分析,指出其不足之處,而後創造地提出利用信息技術來對其進行補充,將部分背景區的編碼信息在感興趣區系數的冗餘位,通過控制嵌入量可以調節感興趣區和背景區的相對質量。
  15. The model, in this case, is the high - level language program - which, like all useful models, hides irrelevant detail about the idiosyncrasies of the underlying computing technology such as internal word size, the numbers of accumulators and index registers, the type of alu, and so on

    這種情況下,模式就是這個高級語言程序,它就像所有有用的模式那樣,了潛在的計算技術上的相關細節(比如內存字元大小,累加器的個數,索引寄存器, alu算術邏輯單元類型等等) 。
  16. The central theme of kaluza - klein theory remains : the physical laws that we see depend on the geometry of hidden extra dimensions

    卡魯扎?克萊恩理論的中心思想仍保留著:我們可見的物理定律取決于的額外維度之幾何
  17. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁這一徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對在正常訪問中的潛在安全威脅進行報警和日誌。
  18. In spatial domain, according to the characteristics of hvs ( human visual system ), we introduce several approachs based on images " deviation, images " flatness measurement, fuzzy classification, and an approach based on difference matrix as well

    在空間域內,利用人的視覺,我們提出了基於圖象方差、圖象平坦測度、模糊分類的演算法,同時提出了基於差值矩陣的信息
  19. According to the feature of the human vision, we present the hiding methods based on image variance, image flatness measurement and fuzzy classification, respectively. and the techniques based on relationship between pixels, difference matrix and cryptography are also given. two hiding methods, backup hiding and camouflage hiding, are proposed too

    在空間域內,利用人的視覺,本文提出了基於圖象方差、圖象平坦測度和基於模糊分類的演算法,同時提出了基於關系、基於差值矩陣和基於密碼演算法的方法,並提出了備份和偽裝兩種方案。
  20. In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented

    在信息能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知能評價準則,指出針對信息能評價不能單純從視覺出發,提出從信息的數據和感知出發,結合局部來考察失真誤差的變化的思想,並據此提出基於局部區域誤差統計分佈和視覺掩模方法評價信息能的方法。
分享友人