Meanwhile, analyze the experimental result, do attack experiment use natural soil, air-dry soil, stoving soil and preparation seil, observe the difference.
同时,对试验结果进行了分析,土样采用天然土、风干土、烘干土、制备土进行击实试验,以观察试验结果的区别。
Experiment verifies that this algorithm, depending on the foundation of not reducing the quality of video, can resist multiple disturbance and attack, and have good stability and robust.
实验证明,该视频数字水印算法在不降低视频质量的基础上,能够抵抗多种干扰和攻击,具有良好的稳定性和鲁棒性,并验证了以上分析。
Experiment results show that this algorithm can restore distortion caused by global and local or no-linear geometrical attack, and it is practical and effective.
实验结果表明,该算法可以从全局和局部或非线性几何攻击中恢复失真,是实用和有效的。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
And the simulation experiment also indicates that the model can not only detect multi-step attacks but also forecast the next attack.
最后,通过模拟实验说明了本模型的有效性,用它不仅能检测出复合攻击,还能预测攻击者将要采取的攻击行为。
The aerodynamic drag of different models at zero angle of attack in the experiment is calculated using the simplified procedure.
在零攻角实验时不同模型的空气动力阻力是采用简化方法来计算的;
The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.
在灰度图像中的数字水印中,空间域方法只能用在LSB(最低有效位)的局限性,同时,实验表明对常规攻击具有较好的识别能力。
According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.
据科学连线网报道,近日美国科学家进行了首次模拟电脑黑客攻击人类大脑的实验。
Theoretical analysis and simulated experiment show that, the scheme has excellent performances against attacks, in particular statistical attack, differential attack and chosen plain image attack.
理论分析和仿真实验表明,本文提出的算法具有较高的安全性能,特别是在统计攻击、差分攻击和选择明文攻击能力方面具有很好的抗攻击性能。
In the experiment for measuring bullet attitude, this measurement system can accomplish real-time measuring small bullet Angle of attack and velocity parameter.
在实际弹丸飞行姿态测试试验中,该测试系统可以较好的完成实时测试小弹丸攻角和速度参数的任务。
The experiment results prove that this arithmetic is of better invisibility, robustness and anti-attack.
试验结果证明该算法具有较好的不可见性,鲁棒性和抗攻击性。
The results of antioxidation experiment showed that MLE was strong scavenging hydroxyl-radical agent, which was capable of scavenging hydroxyl-radical effectively and putting off its attack.
抗氧化实验结果表明,桑叶提取物能有效地清除羟自由基和延迟羟自由基攻击,是强的羟自由基清除剂。
At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.
最后,在仿真实验中模拟了现实环境中恶意用户的攻击过程,来测试该信誉模型防御SPIT攻击的性能情况。
The results of experiment proved that this algorithm is invisible, can efficiently against linear stretching attack, and has better robustness to crop, rotation, noise or filter attack.
实验结果表明,该算法具有较好的不可感知性,可以有效抵抗线性拉伸攻击,并且对于剪切、旋转、噪声,滤波等攻击都具有较强的鲁棒性。
And an off-line simulation experiment shows that it can improve the prediction ability of the IDS, and reduce the false alert and find the potential attack.
实验证明该算法提高了网络的预警能力,减少了对误报的响应,并能发现分析引擎的漏报情况。
According to the experiment result, the Arithmetic is invisible and robust enough against JPEG2000 compression attack.
实验证明该算法有很好的透明性,对于JPEG2000压缩攻击有较高的稳健性。
The experimental model and equipment are designed, and the low speed wind tunnel experiment at high angles of attack is made.
设计了模型和实验装置,进行了大迎角低速风洞实验。
Experiment results show that the proposed method can efficiently remove the redundant edges and nods in the attack graphs, consequently decreases the scale of the attack graphs.
实验结果表明,该方法能够有效地去除攻击图中冗余的边和节点,从而降低了攻击图的规模。
The experiment result shows that the synchronization method can synchronize the detector with the watermark perfectly and that the watermark is robust to affine transformation attack.
实验表明,使用该方法能较好地恢复图像,有效地同步水印检测器与水印信号,从而使水印对仿射变换攻击具有鲁棒性。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
The final results of experiment prove that the frequency hopping pattern based on this function is good in uniformity, so the system has high complexity and strong anti-attack features.
最后通过实例说明了由该函数产生的跳频图案具有良好的均匀性,从而系统具有较强的隐蔽性和抗破译性。
Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.
理论分析和仿真实验表明,该算法具有较高的安全保密性能和抗攻击性能。
The experiment shows that this arithmetic is robust to traditional filtering, compression, cutting and noise attack.
实验表明,该算法对传统的滤波、压缩、剪切和噪声攻击具有较好的鲁棒性。
The experiment shows that this arithmetic is robust to traditional filtering, compression, cutting and noise attack.
实验表明,该算法对传统的滤波、压缩、剪切和噪声攻击具有较好的鲁棒性。
应用推荐