hidden information 中文意思是什麼

hidden information 解釋
隱藏資訊
  • hidden : adj 隱藏的;秘密的;神秘的。 A hidden danger 隱患。 A hidden meaning 言外之意。 A hidden micropho...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安機關專門組織開展了重點網際網路單位信息網路安全大檢查,共檢查重點網際網路信息服務單位2627家,下發網路安全隱患整改通知書104份,還對託管主機和虛擬空間出租安全治理進行整治,對4家問題突出的網際網路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  2. The laboratory has proposed several speaker recognition methods involving computational auditory models, modular neural networks, gaussian mixed models, hidden markov models, and implemented a recognition framework combining semantic and voiceprint information

    實驗室提出了基於聽覺計算模型、模塊化神經網路、高斯混合模型、隱馬爾科夫模型等說話人識別方法,以及結合語義和聲紋信息的說話人識別框架。
  3. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機非話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需解決的重要問題。
  4. The dna microarray is capable of profiling the expression levels of many genes simultaneously, and is a promising technology for the elucidation of gene interactions. and how to extract the regulatory information hidden in the millions of data points that result from the microarray experiments has become a problem that researchers are eager to resolve

    基因晶元( genechip , microarray )作為一種高通量的檢測方法,可以同時測量成千上萬個基因的表達水平,已成為后基因組時代研究基因間相互作用的一個有力的工具,如何從晶元實驗產生的表達數據中揭示出其所蘊含的豐富的調控信息是研究者都渴望解決的問題。
  5. Especially, the module of students ’ grade analysis only does such simple things as statistics analysis or data sorting. as a result, a great deal of useful information hidden in mass data can ’ t be utilized efficiently

    尤其是其中的學生成績分析模塊,往往只有簡單的一些功能,而隱藏在海量數據中的大量有用信息不能得到有效地利用。
  6. With accelerating pace of science development, the demands on capability of large - scale information analysis are increasing. data mining is the process through which we can extract hidden but useful knowledge from half - backed, noising, fuzzy and random data sets

    數據挖掘( datamining )就是從大量的、不完全的、有噪聲的、模糊的、隨機的數據中,提取隱含在其中的、人們事先不知道的、但又是潛在有用的信息和知識的過程。
  7. The thermal sensor in front of the sculpture, capable of reading tiny temperature changes, senses the amount of heat on its surface and transmits the signal to the controller hidden underneath. the controller then changes the colour of the led neon tubes according to the information it receives from the heat sensor

    前方的指示牌有一個熱能感應器,它能測量出輕微的溫度轉變,透過轉接器的幫助,將發光二極體( led )的顏色轉變。當溫度越高, led的顏色便會由藍轉紅。
  8. Next, this paper introduces four kinds of hidden information security trouble existed in network media by detailed cases, which is, false and harmful information spreading ; consequent taking place of network leakage of confidential information ; the overflow of computer virus ; and hacker attack and network information campaigns

    網路媒體作為一個新生事物,針對網路媒體的法律法規的相對滯后,大眾對網路媒體概念也相對模糊混亂,這也使網路媒體面臨的安全問題得不到足夠的重視,缺乏相應的解決方法。
  9. The course is structured around three " themes for acquiring advantage in games " : commitment / strategic moves, exploiting hidden information, and limited rationality

    本課程圍繞3個在博弈中獲得優勢的主題安排:承諾/戰略遷移,發掘隱藏的信息,有限合理性。
  10. A research on incentive mechanism of learning hidden information in vertical communication

    縱向溝通中隱性信息獲取的激勵兼容機制研究
  11. The paper thinks content analysis is quantitative, more objective and systematic analysis method, possesses advantages of structural research, non - contact research, semi - quantitative research, combined by quantity and quality, can reveal the hidden information of documents, is more economical analysis method. third, content analysis research connects with library science, information science and so on

    本文認為內容分析法是數量化的分析、較為客觀和系統的分析方法,具有結構化研究、非接觸性研究、定量與定性結合的半定量研究的優點,能揭示文獻的隱性內容,是較經濟的分析方法。
  12. Thus, the improvement in financial transparency can timely and completely disclose the hidden information, ease the problems from informative asymmetry, eliminate the state of low effectiveness and disorder from converse choice and moral risk, and then advance the effectiveness of capital market

    提高上市公司財務透明度,迫使隱藏的信息得以及時、充分的公開,可以有效緩解信息不對稱的狀況,從而消除逆向選擇和道德風險等問題帶來的低效無序狀況,提高資本市場的有效性。
  13. Research on extracting and restoring hidden information in information data stream

    信息流中的隱形信息提取和還原技術研究
  14. Detection of hidden information in digital images by bit sliced plane correlation analysis

    用於圖像信息隱藏檢測的位平面相關分析法
  15. A hiding information algorithm of adaptive multiple plane - bit based on space domain was proposed, which has low computing complexity and large hidden information capacity

    摘要提出了一種基於空間域的自適應多平面位的信息隱藏演算法,該演算法計算復雜度低,信息隱藏量大。
  16. Furthermore, three fourier storage schemes were proposed for practical anti - counterfeiting : ( 1 ) store black - white digital images with hidden information made by image coding method, ( 2 ) store several images on the same spot with reference beams of different directions ( peristeophic multiplexing ), ( 3 ) store a serious of given images recorded closely ( space multiplexing ). three different fourier holograms were recorded on photoresist plates following the above three schemes using the optimized recording conditions obtained in the first part of this study work. the reconstructed images form the holograms showed some special anti - counterfeit effects

    此外,本課題還研究了傅里葉全息存儲在防偽上的實際應用,提出了三種防偽存儲方案: ( 1 )運用圖像編碼方案,存儲了具有隱藏信息的編碼黑白二值圖像; ( 2 )運用旋轉復用方案,在同一存儲點用不同方向的參考光存儲了多幅圖像; ( 3 )運用空間復用技術,在一定區域內緊靠著記錄一系列特定圖像的傅里葉全息圖。
  17. This paper profoundly analyzes the concrete reasons that cause the hidden information security trouble in network media, and from the view of network media managers and employees, it puts forwards four detailed proposals which can strengthen the information security construction of network media

    安全管理制度的建立與實施,是實現計算機信息系統安全的重要保證。它包括:安全管理人員的教育培訓、制度的落實、職責的檢查等方面的內容。
  18. The photoresist is used as recording materials to take the master of embossing hologram, it has the advantage of easily replicate. besides dcg is used because it is an transparent phase recording medium, the information can not be observed before development, so it can be used in the hidden information carry

    另外採用dcg作為記錄材料是因為它是一種透明位相材料,存儲后在未用異丙醇處理前是完全透明的,可作為隱型信息存儲加密攜帶,在需要時處理出重要信息。
  19. The research on the information hidding include the information hidding technique and analysis technique of the hidden information. the major content of the hidding technique is seek to the algorithm that insert the secret information into the host information

    信息隱藏的研究分為隱藏技術和隱藏分析技術,信息隱藏技術的研究內容主要是尋求向載體對象中添加嵌入信息的演算法。
  20. Singularity analysis is one of the most promising new approaches for extracting hidden information from noise. singularity spectrum is a statistical method to show global singularities distributions in noise

    在對實測信號分析中,也發現該方法得到的多分形奇異譜比功率譜更能充分刻畫噪聲
分享友人