它解决了现有输电线除冰方法影响用电户生产、生活,减少输电线寿命和存在安全隐 患的问题。
The device prevents infection of the prior power line ice removal method on production and daily life, reduction of power line life and potential safety hazard.
这种安全保险装置,可以弥补结构硅酮胶存在老化问题的不足,消除隐框玻璃幕墙所存在的安全隐患。
The safety device can make up the insufficiency of the aging problem of structural silicone adhesive and eliminate the existing safety hazards of the glass curtain wall with a concealed frame.
对于安全实现,既有显式需求,也有隐式需求。
For security implementations there are both explicit and implicit requirements.
有了安全性插件之后,就可以改变这种行为,从而禁止隐式连接。
With plug-ins you can change this behavior so that implicit connections are not allowed.
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
所以,大家要提防着不安全的隐端,别让它危害到你,让自己永远与安全作伴。
So, we should beware of the unsafe hidden side, don't let it hurt you, let oneself forever and security company.
隐写术是信息安全领域一门新兴的技术。
Steganography is a new technology in the field of information security.
你们现在可以安全的回归光与爱的怀抱了。” —土八该隐。
而信息安全的一个重要分支:隐写术的研究正越来越受到重视。
The study of steganography as one important branch of information security attracts more concerns than before.
视频数字隐写具有隐藏容量大的优点,但是通常在获得隐藏容量的同时,却忽视了安全性。
Video steganography has the advantage of large embedding capacity, but the security is usually neglected when obtain the capacity.
隐通道分析是研究高安全性计算机系统不可回避的问题。
Covert channel analysis is an inevitable problem of high security computer system research.
实验结果表明,通过该方法,直方图的实际失真达到了理论的最小值,从而提高了隐写的安全性。
Experimental results show that using the method advanced here, the practical abnormality of histogram is theoretically minimum, and the security of steganography is consequently improved.
开发具有B2安全级及以上的数据库管理系统必须对存储隐通道进行审计。
To develop a database management system at or above B2 level, we must audit the use of covert storage channels.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
隐孢子虫和贾第鞭毛虫是两种严重危害水质安全的病原性原生动物。
Cryptosporidium and Giardia axe two common species of pathogenic protozoan, seriously endangering the water quality.
实验结果表明,用该方案隐写所得到含密图像不仅在质量上优于其对应的JPEG压缩版本的质量,而且具有一定的抗分析安全性。
Experimental results show that the presented scheme can gain a stego-image which is superior to its JPEG version in quality, and possesses a capability of withstanding the statistical analysis.
从水印的通信模型建立,水印的相关检测模型,到信息隐藏容量分析,隐写术的安全性理论,详细介绍了水印的相关理论;
Theories related to watermark are introduced in detail, including communication model, related detection model, hiding information capacity analysis and security of steganography.
随着网络音频文件的广泛传播,以及信息安全领域面临的严峻形势,音频隐写技术已经受到越来越多的关注。
With widely disseminating of network audio document and the serious situation in the information security field, the audio steganography have been under more and more attention.
作为信息安全技术的一个重要分支,隐写和隐写分析目前已成为信息技术领域的一大研究热点。
Now, as an important branch of information security, steganography and steganalysis become a hot spot of information technique field.
因此,研究隐写分析技术对国家信息安全具有重要意义。
Therefore, the research on steganalysis is very important to national communication security.
信息隐藏安全性研究可用以指导隐写算法设计,对信息隐藏来讲具有重要的意义。
The research on security of data hiding can be used as guidance to design a steganography or enhance the statistical imperceptibility of an information hiding system.
一般情况下,隐式转换运算符应当从不引发异常并且从不丢失信息,以便可以在程序员不知晓的情况下安全使用它们。
In general, implicit conversion operators should never throw exceptions and never lose information so that they can be used safely without the programmer's awareness.
一般情况下,隐式转换运算符应当从不引发异常并且从不丢失信息,以便可以在程序员不知晓的情况下安全使用它们。
In general, implicit conversion operators should never throw exceptions and never lose information so that they can be used safely without the programmer's awareness.
应用推荐