助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   常规攻击 的翻译结果: 查询用时:0.016秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
武器工业与军事技术
更多类别查询

图标索引 历史查询
 

常规攻击
相关语句
  conventional attack
     Evaluation of surface ship survivability under conventional attack
     常规攻击下的水面舰艇生存能力评定
短句来源
  normal attack
     The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.
     在灰度图像中的数字水印中,空间域方法只能用在LSB(最低有效位)的局限性,同时,实验表明对常规攻击具有较好的识别能力.
短句来源
  conventional attacking
     An Analysis of Conventional Attacking Schemes by Worms
     蠕虫病毒的常规攻击手法分析
短句来源
  “常规攻击”译为未确定词的双语例句
     For traditional attacks such as JPEG compression,added noise and filtering,the similarities are all above 0.95.
     对JPEG压缩,噪声,滤波等常规攻击,提取水印的相似度均在0.95以上.
短句来源
     Experimental results show that the algorithm has more embedding capacity and robust to common attacks and geometric distortion.
     实验结果表明该算法有较大的嵌入容量,对常规攻击和几何攻击都具有较强的鲁棒性。
短句来源
     Experimental results show its robustness to rotation,scaling,combined attacks,as well as common attackes such as JPEG compression and added noise.
     实验结果表明,GWPZM算法能够抵抗旋转、缩放攻击、二者组合攻击以及JPEG压缩、噪声等常规攻击
短句来源

 

查询“常规攻击”译词为其他词的双语例句

     

    查询“常规攻击”译词为用户自定义的双语例句

        我想查看译文中含有:的双语例句
    例句
    为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
      conventional attack
    A small conventional attack submarine with a turnradius of 120 meters and a speed acceleration of 0.05 meters per square second is used in his paper.
          
    Another step was to reduce the vulnerability of USAFE's bases to conventional attack.
          
    Robustness tests were carried out with six types of conventional attack listed in Table 1.
          
    Since the logging host does not respond to that IP address, no conventional attack can succeed.
          
      normal attack
    Due to its small size and simple nature, PrettyPark appears to have no unutilized capabilities in its normal attack vector.
          
    It means that the 3 method is practical for monitoring traffic, especially online, when traffic is normally distributed in normal/attack scenarios.
          


    In this paper, we presented the methed of digital watermark of space domain in color image.The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.

    提出了数字水印在彩色图像中的空间域方法.在灰度图像中的数字水印中,空间域方法只能用在LSB(最低有效位)的局限性,同时,实验表明对常规攻击具有较好的识别能力.

    AM sequence is a key content of the password of the sequence. It can produce pseudo-random sequence with good characteristic of cryptography.The principle is clear and the method of implementation is very simple.But the linear complexity is relatively low and easy to calculate the little multinomial by B-M algorithm and decodes finally.This article includes the thought of variational period,makes pseudo-random sequence having several little multinomials and its period constantly changes.This method is effective...

    AM sequence is a key content of the password of the sequence. It can produce pseudo-random sequence with good characteristic of cryptography.The principle is clear and the method of implementation is very simple.But the linear complexity is relatively low and easy to calculate the little multinomial by B-M algorithm and decodes finally.This article includes the thought of variational period,makes pseudo-random sequence having several little multinomials and its period constantly changes.This method is effective to resist various kinds of routine attack.

    m序列是序列密码的核心内容,可以生产具有良好密码学特性的伪随机码,原理明确,实现方法简单。但常规型m序列,由于线性复杂性较低,容易由B-M等算法推出极小多项式,最终破译。主要引入变周期型m序列的思想,使这种m序列有多个极小多项式,其周期可不断地变化,有效地抵抗各种常规攻击方式。

    The algorithm resilient geometric distortion is an important research direction in copyright protection. This paper proposes an image watermark algorithm based on discrete Fourier transform (DFT) and singular value decomposition (SVD) because of the good property of DFT amplitude matrix and the characteristic of SVD that it is stabilization to geometric distortion such as rotation, scale and translation. Experimental results show that the algorithm has more embedding capacity and robust to common attacks and...

    The algorithm resilient geometric distortion is an important research direction in copyright protection. This paper proposes an image watermark algorithm based on discrete Fourier transform (DFT) and singular value decomposition (SVD) because of the good property of DFT amplitude matrix and the characteristic of SVD that it is stabilization to geometric distortion such as rotation, scale and translation. Experimental results show that the algorithm has more embedding capacity and robust to common attacks and geometric distortion.

    抗几何攻击水印算法是版权保护领域的一个重要的研究方向。根据离散傅立叶变换幅度谱矩阵的性质,以及矩阵奇异值分解对旋转、缩放和平移等几何攻击具有稳定性的特点,提出了一种基于离散傅立叶变换和奇异值分解的抗几何攻击图像水印算法。实验结果表明该算法有较大的嵌入容量,对常规攻击和几何攻击都具有较强的鲁棒性。

     
    << 更多相关文摘    
    图标索引 相关查询

     


     
    CNKI小工具
    在英文学术搜索中查有关常规攻击的内容
    在知识搜索中查有关常规攻击的内容
    在数字搜索中查有关常规攻击的内容
    在概念知识元中查有关常规攻击的内容
    在学术趋势中查有关常规攻击的内容
     
     

    CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
    版权图标  2008 CNKI-中国知网
    京ICP证040431号 互联网出版许可证 新出网证(京)字008号
    北京市公安局海淀分局 备案号:110 1081725
    版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社