• Meanwhile, analyze the experimental result, do attack experiment use natural soil, air-dry soil, stoving soil and preparation seil, observe the difference.

    同时,对试验结果进行分析采用天然土、风干土烘干土、制备进行击实试验,以观察试验结果的区别。

    youdao

  • Experiment verifies that this algorithm, depending on the foundation of not reducing the quality of video, can resist multiple disturbance and attack, and have good stability and robust.

    实验证明视频数字水印算法降低视频质量基础上,能够抵抗多种干扰攻击具有良好稳定性棒性,并验证了以上分析。

    youdao

  • Experiment results show that this algorithm can restore distortion caused by global and local or no-linear geometrical attack, and it is practical and effective.

    实验结果表明算法可以全局局部非线性几何攻击恢复失真实用有效的。

    youdao

  • The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.

    基于NLANR追踪网络流量模拟攻击数据实验证实原型系统有效性

    youdao

  • And the simulation experiment also indicates that the model can not only detect multi-step attacks but also forecast the next attack.

    最后,通过模拟实验说明模型的有效性,用它不仅检测复合攻击能预测攻击者将要采取的攻击行为。

    youdao

  • The aerodynamic drag of different models at zero angle of attack in the experiment is calculated using the simplified procedure.

    实验不同模型空气动力阻力采用简化方法来计算的;

    youdao

  • The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.

    灰度图像中的数字水印中,空间方法只能在LSB(最低有效位)的局限性同时实验表明常规攻击具有好的识别能力

    youdao

  • According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.

    科学连线报道近日美国科学家进行首次模拟电脑黑客攻击人类大脑的实验。

    youdao

  • Theoretical analysis and simulated experiment show that, the scheme has excellent performances against attacks, in particular statistical attack, differential attack and chosen plain image attack.

    理论分析仿真实验表明,本文提出的算法具有较高的安全性能特别是统计攻击差分攻击和选择明文攻击能力方面具有很好的攻击性能。

    youdao

  • In the experiment for measuring bullet attitude, this measurement system can accomplish real-time measuring small bullet Angle of attack and velocity parameter.

    实际弹丸飞行姿态测试试验中,测试系统可以较好的完成实时测试弹丸速度参数任务。

    youdao

  • The experiment results prove that this arithmetic is of better invisibility, robustness and anti-attack.

    试验结果证明算法具有好的不可见性鲁棒性和抗攻击性。

    youdao

  • The results of antioxidation experiment showed that MLE was strong scavenging hydroxyl-radical agent, which was capable of scavenging hydroxyl-radical effectively and putting off its attack.

    氧化实验结果表明,桑叶提取物能有效地清除自由基延迟羟自由基攻击,的羟自由基清除

    youdao

  • At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.

    最后仿真实验模拟了现实环境恶意用户攻击过程,测试信誉模型防御SPIT攻击的性能情况

    youdao

  • The results of experiment proved that this algorithm is invisible, can efficiently against linear stretching attack, and has better robustness to crop, rotation, noise or filter attack.

    实验结果表明算法具有较好的不可感知性可以有效抵抗线性拉伸攻击并且对于剪切旋转噪声滤波等攻击都具有较强的棒性。

    youdao

  • And an off-line simulation experiment shows that it can improve the prediction ability of the IDS, and reduce the false alert and find the potential attack.

    实验证明算法提高网络预警能力减少了对报的响应,发现分析引擎漏报情况。

    youdao

  • According to the experiment result, the Arithmetic is invisible and robust enough against JPEG2000 compression attack.

    实验证明算法有很好的透明性,对于JPEG2000压缩攻击有较高的稳健性

    youdao

  • The experimental model and equipment are designed, and the low speed wind tunnel experiment at high angles of attack is made.

    设计模型实验装置进行大迎低速风洞实验

    youdao

  • Experiment results show that the proposed method can efficiently remove the redundant edges and nods in the attack graphs, consequently decreases the scale of the attack graphs.

    实验结果表明方法能够有效地去除攻击余的边节点,从而降低攻击图规模

    youdao

  • The experiment result shows that the synchronization method can synchronize the detector with the watermark perfectly and that the watermark is robust to affine transformation attack.

    实验表明,使用方法地恢复图像,有效地同步水印检测器水印信号,从而使水印仿射变换攻击具有鲁棒性。

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

  • The final results of experiment prove that the frequency hopping pattern based on this function is good in uniformity, so the system has high complexity and strong anti-attack features.

    最后通过实例说明了由函数产生图案具有良好均匀性从而系统具有强的隐蔽性抗破译性。

    youdao

  • Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.

    理论分析仿真实验表明算法具有较高安全保密性能攻击性能。

    youdao

  • The experiment shows that this arithmetic is robust to traditional filtering, compression, cutting and noise attack.

    实验表明算法传统滤波压缩剪切噪声攻击具有较好的鲁棒性

    youdao

  • The experiment shows that this arithmetic is robust to traditional filtering, compression, cutting and noise attack.

    实验表明算法传统滤波压缩剪切噪声攻击具有较好的鲁棒性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定