英语人>网络例句>signatures 相关的网络例句
signatures相关的网络例句

查询词典 signatures

与 signatures 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this dissertation, based on the extraction of meaningful polarization information, the polarimetric speckle reduction, polarimetric contrast enhancement, polarimetric classification and ship detection in polarimetric SAR images are systemically studied. During the study, some new concepts and methods are introduced, which are supported by the application to measured Pol-SAR data. The innovations of this dissertation are as follows: 1 A simplified schem is proposed to reduce the complexity of scattering-model-based speckle filtering. 2 Extend the expression of polarimetric correlation coefficient to help distinguishing targets. In addition, introduce the quantized parameters of polarimetric signature so as to show the differentiae in quantity in co-polar power, cross-polar power and shapes of polarization signatures among targets. 3 Define a new parameter of difference degree between targets, which can be used for express the difference between both coherent and distributed scatters.

论文在较系统的研究目标特征量提取方法和特征量所包含的物理意义的基础上,对极化SAR图像降斑、极化对比增强、极化SAR图像分类以及极化SAR图像中海上舰船目标检测等方面进行了研究,并提出了一些新的概念和方法,对实测数据的处理结果表明,这些新的概念和方法对于极化SAR信息处理是有效的,本文的主要创新成果包括以下方面: 1)针对基于预分类的MMSE极化降斑方法实现过程非常复杂的问题,提出了简化方案,并验证了方案的有效性; 2)扩展了极化相关系数的表示方法,这种扩展增强了极化相关系数对目标的区分效果;另外还提出了极化特征图量化参数,可以从量上表征不同目标间相同极化和交叉极化的回波功率差异和极化特征图形状差异; 3)定义了目标间的差异度参数,它不仅可以用于描述相干目标,还可以用于描述分布目标的差别程度。

One is based on the photoelectricity diffusibility reflection theory. In this method, an expensive photoelectricity sensor is laid closely with the signatures which are lightened by red LEDs. It will be judged by the analog reflection value from the detected area whether the signature is good or not. The other method uses the complex electronic image processing technology to identify some content in the signature.

一是采用光电扩散反射原理,利用特制的光传感器,在和书帖密切接触的情况下,以红色LED作为投光源照射书帖,根据检查区域内的反射光的强弱模拟量大小进行判别;二是使用复杂的电子图像识别技术,针对书帖中部分内容作图像识别。

The full text has a overview of smart card technology and information security knowledge, focused on the respects of two classic DES and RSA key system, authentication technology, massage digest,, digital signatures.

全文对系统涉及的智能卡技术及信息安全知识作了简要说明,重点介绍了DES和RSA两种经典密钥体制、认证技术、消息摘要、数字签名。

The information to be placed in each title block of a drawing include: drawing number, drawing size, scale, weight, sheet number and number of sheets, drawing title and signatures of persons preparing, checking and approving the drawing.

每张图纸的图标栏内容包括:图号、图纸尺寸、比例、重量、张号和张数、图标、以及图纸的制图、校对、批准人的签字。

Z,Y6bI|8O'G0puq 186 The information to be placed in each title block of a drawing include: drawing number, drawing size, scale, weight, sheet number and number of sheets, drawing title and signatures of persons preparing, checking and approving the drawing.

D|Xv\dYsC 每张图纸的图标栏内容包括:图号、图纸尺寸、比例、重量、张号和张数、图标、以及图纸的制图、校对、批准人的签字。

This text aims at the upper reaches of Ganjiang River in the southern Jiangxi Province as the research object, analyzes the distribution and fractionation of dissolved Rare Earth Element in the water, and discusses the origins of the water DREE signatures.

其中利用VG Axiom高分辨多接受双聚焦等离子体质谱仪测定了水体中溶解态稀土元素的含量,文中按照水体化学特征的差异性将采样区划分为四个次一级的区域(支流A区、支流B区、支流C区和干流D区),并分别讨论了各区中稀土元素的地球化学特征。

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

The research of the elliptic curve applied to special signatures is only at start.

因此,深入研究椭圆曲线数字签名及其在特殊签名中的应用,具有深远的意义。

The term "uninterrupted series" used in the preceding paragraph refers to the sequential consistency in the signatures or seals by the endorser and the endorsee in the transfer of negotiable instruments.

前款所称背书连续,是指在票据转让中,转让汇票的背书人与受让汇票的被背书人在汇票上的签章依次前后衔接。

In this mode we are using the passive EOS sensor which tracks heat and optical signatures

在这种模式下我们在使用EOS探测器被动跟踪热与光的信号。

第4/23页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。