.::ترجمه متون تخصصی رشته فناوری اطلاعات::.

R-Quantum

عضو جدید
کاربر ممتاز
Firewall
A firewall is a description of a system (one or more pieces of hardware) that acts as a barrier between two or more network segments. A firewall can be used to provide a barrier between an internal network and the Internet. A firewall can be considered the technical implementation of a security policy. The firewall upholds the security policy of a network when connecting that network to a second network which has a less stringent security policy.
دیوار آتش
یک دیوار آتش یک توصیفی از یک سیستم ( یک یا چند قسمتی از سخت افزار)است که مثل یک سد بین دو یا چند قطعه از شبکه عمل میکند . یک دیوار آتش میتواند بین یک شبکه داخلی و یک اینترنت محدودیتی ایجاد کند . یک دیوار آتش میتواند در تکمیل کردن تکنیک هایی از خط مش امنیت ، تامل کند . دیوار اتش از خط مش امنیت از یک شبکه پشتیبانی میکند زمانیکه با یک شبکه دومی که خط مش امنیتی محدودتری دارد ، ارتباط برقرار میکند.
دوستای عزیز چرا کلمه ***** ها بعد ارسال ***** شد:confused:
 

R-Quantum

عضو جدید
کاربر ممتاز
این سوال منم هست.ولی خجالت کشیدم بپرسم...
دوست خوبم گفتند چو دانی و پرسی خطاست . شاید جواب این سوالمون خیلی راحت باشه و بتونیم یه حدس هایی بزنیم ولی برای اینکه این حدس ها به یقین تبدیل شه ، باید پرسید;)
 

.:Shila:.

عضو جدید
کاربر ممتاز
Cyberwall
A cyberwall is similar in scope to a firewall, but instead of offering perimeter defense filtering between two or more networks, cyberwalls are typically installed on desktop and server systems on the inside network at a corporate site. Cyberwalls provide a defensive barrier to attacks on mission critical systems on internal networks and help “harden” the perating system environment from a network attack. Some cyberwalls also include intrusion detection software to allow the system to detect an attack of specific types in progress and effect some levels of defense against them.

Readers are cautioned that these terms are not always used in a consistent manner in publications which can cause confusion or misconceptions.

سايبروال(ديواره ي سايبر* )
يك سايبروال در هدف مشابه فايروال است، اما به جاي ارائه ف ي ل ت ر دفاع محيطي مابين دو يا چند شبكه ، سايبروالها نوعا روي دسكتاپ و سيستمهاي سرور(خدمتگذار) داخل شبكه در يك سايت متحد نصب ميشوند. سايبروالها يك مانع دفاعي در مقابل حملات روي سيستمهاي با ماموريت بحراني در شبكه هاي داخلي فراهم مي آورد و به مشكل كردن ...:w20: محيط سيستم از يك حمله شبكه اي كمك ميكند. بعضي سايبروالها همچنين شامل نرم افزار كشف نفوذ ميشود تا به سيستم اجازه دهد يك حمله از انواع مشخص را در پيشروي كشف كند و بعضي سطوح دفاع در مقابل آنها را اجرا كند.
خوانندگان هوشيار باشند كه اين عبارات هميشه روش دائمي در انتشارها نيست كه ميتواند باعث گيجي يا تصورات غلط شود.


*سايبر:
يک سرى از کامپيوترهاى بزرگ که توسط شرکت
control data corporation
ساخته شده اند​



 

R-Quantum

عضو جدید
کاربر ممتاز
سلام دوستان گلم . اگه مایل باشید میتونم من بقیه مطالب رو بذارم و دوباره چرخه این تاپیک بچرخه ؟؟؟؟؟
منتنظر انرژی مثبت شما هستم
 

zeost

عضو جدید
سلام دوستان گلم . اگه مایل باشید میتونم من بقیه مطالب رو بذارم و دوباره چرخه این تاپیک بچرخه ؟؟؟؟؟
منتنظر انرژی مثبت شما هستم
این خیلی خوبه ولی جای مهندس کربلایی خیلی خالیه .پس کی می خوان برگردن؟؟
راستی پایه هستین همون مطلب انگلیسی که از اپرا هست رو ترجمه کنیم؟(البته به عنوان زنگ تفریح)چون مطالب واقعا به درد بخوری داره که ما رو با قسمت های مختلف مرورگر اپرا و کارکردشون آشنا می کنه.
 

targol_1985

عضو جدید
در هر حال به نظر من بهتره یه چیزی رو شروع کنیم ، هم اون مطلبی که Zeost میگن خوبه و یا اگه از نظر آقای کربلایی اشکال نداشته باشه کار قبلیمون رو هم می تونیم ادامه بدیم ، آخه این تاپیک حیفه که کار نکنه
در هر حال هر تصمیمی بگیرین ما آماده ایم
 

zeost

عضو جدید
در هر حال به نظر من بهتره یه چیزی رو شروع کنیم ، هم اون مطلبی که Zeost میگن خوبه و یا اگه از نظر آقای کربلایی اشکال نداشته باشه کار قبلیمون رو هم می تونیم ادامه بدیم ، آخه این تاپیک حیفه که کار نکنه
در هر حال هر تصمیمی بگیرین ما آماده ایم
پس قبل از این که ورژن جدید اپرا بیاد و با اجازه مهندس کربلایی و الهام جون شروع کنیم:
[FONT=&quot]
Opera Turbo for fast browsing on slow connections[/FONT]

Opera Turbo uses compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections, for example, when using a crowded Wi-Fi in a cafe or browsing through your mobile phone while commuting.

[FONT=&quot]New visual tabs and sleek design[/FONT]
[FONT=&quot]Opera has always been the pioneer for how to deal with tabs in your browser. In Opera 10, we introduce a resizable tab bar. Drag the handle underneath the tabs to reveal thumbnails of your open Web pages. And, because great features should come in beautiful packages, designer Jon Hicks has created a whole new look for Opera 10.[/FONT]
[FONT=&quot]
Web integration[/FONT]

If you use a Web mail service as your default mail client, you can tell Opera 10 to do the same. Clicking on e-mail addresses or “Send by Mail” in Opera will open the compose page from your Web mail service provider. The same is true with the Feed reader — you can now also add any RSS/atom feed into your favorite online feed reader from within Opera 10.
[FONT=&quot]
Speed Dial your way[/FONT]

[FONT=&quot]You asked for it! Customize your Speed Dial to fit your own needs. Click the Configure Speed Dial button and choose from 4 to 25 favorite Web sites for quick access every time you open a new tab. You can also add a custom background so that you feel right at home.[/FONT]

[FONT=&quot]Resizable search field[/FONT]
Have a clearer view of what you are about to search by simply expanding the size of the search field — because many of life’s questions require more than two words of space.

[FONT=&quot]40% faster engine and cutting-edge Web standards support[/FONT]
We optimized the new Opera Presto 2.2 engine in Opera 10 to be much faster on resource-intensive pages such as Gmail and Facebook. In addition, with an Acid3 100/100 score, Web Fonts support, RGBA/HSLA color and SVG improvements, Opera 10 is ready for the next generation of Web applications.
More new features in Opera 10
[FONT=&quot]
Inline spell checker[/FONT]

Write freely in your Facebook wall, blog, or Web mail. Opera 10 underlines any misspelled words, so you can express yourself without reservation. By using the popular Hunspell dictionary format, you will always have the most complete and updated list of all languages.

[FONT=&quot]Auto-update[/FONT]
Opera 10 makes it easier than ever to stay up-to-date with the latest version. With auto-update you can choose to have completely automatic updates or to be notified when an update is ready for you install. As always with Opera, it is your choice.

[FONT=&quot]E-mail your way[/FONT]
[FONT=&quot]Opera Mail can now send rich text messages including inline images, styled text, links, and/or custom HTML. You can also choose to have messages deleted from your POP server after a preset number of days, so you can keep your Web space under control.[/FONT]

[FONT=&quot] [/FONT][FONT=&quot]Automated Crash Reporting[/FONT]
[FONT=&quot]Opera is designed to restart and recover all your tabs if a crash occurs. But now you can easily send us a crash report to help us continue to make Opera the most stable browser around.[/FONT]

[FONT=&quot]Opera Dragonfly evolved[/FONT]
Our Web developer tools are now even better, allowing you to edit the DOM and inspect HTTP headers.


Many more features
[FONT=&quot]Feed Preview[/FONT]
Preview a Feed by clicking on the feed icon, and you will see it in clean and efficient multiple-column layout. This makes it easier to see a feed’s content before subscribing to it — or even bookmarking it — and to view what's new in a page quickly, without distractions.

Opera Link
[FONT=&quot]Opera Link lets you synchronize data of your choice online, or among different computers and devices. Sync your Speed Dial, Bookmarks, Custom Searches, History and Notes between your work and home computer; take your bookmarks with you on your phone.[/FONT]

[FONT=&quot]Quick Find[/FONT]
Have you ever forgotten the page where you found that great article or that perfect gift? When using Opera, the browser remembers not only the titles and addresses, but also the actual content of the Web pages you visit.

[FONT=&quot]Opera Mail[/FONT]

[FONT=&quot]Opera browser offers an e-mail client designed to optimize your daily e-mail-handling requirements. It is called Opera Mail, and it organizes, indexes and sorts your messages so that you can spend more time doing the real work. Best of all, it is built right into your browser.[/FONT]

[FONT=&quot]Quick and customizable Web search[/FONT]
[FONT=&quot]Get quick access to Google, eBay, Amazon and more with the search field in the upper right corner. Or, for even quicker searching, search directly in the address bar using built-in and customizable keywords. For example, type "w Opera" in the address bar to search for [/FONT]​

[FONT=&quot]“Opera” with Wikipedia. You can also create your own Web search from any search field on the Internet, simply by right clicking on a search field and choosing “Create Search”.[/FONT]
[FONT=&quot]
Speed Dial[/FONT]

Typing addresses for sites you visit frequently is ineffective. Get your favorite Web page with just one click. Speed Dial is a set of visual bookmarks you see when you open a new tab, like a dashboard for your online life. To add a new page, simply click on an empty Speed Dial slot, and Opera will make suggestions based on browsing history and bookmarks.

[FONT=&quot]Mouse gestures[/FONT]
[FONT=&quot]With Opera you can navigate the Web with your mouse. A mouse gesture is performed while clicking and holding the right mouse button and moving the mouse in an easy pattern. Perform movements with the mouse to access well-known functions such as Back, Forward and Open New Tab. As with Opera's keyboard shortcuts, mouse gestures are fully customizable, so you can tailor them any way you want.[/FONT]

[FONT=&quot]Download Manager with BitTorrent[/FONT]
Download files quicker with Opera. Opera starts downloading as soon as you've saved the file, so there's no wasted time. Pause and resume downloads with the push of a button, and choose multiple files to download simultaneously without any fuss. Opera also features built-in support for the social file distribution protocol, BitTorrent, which makes it easy to download Torrent files without the need for a separate application.

[FONT=&quot]Tabs and sessions[/FONT]
Opera is very light on your computer, so it's possible to have many tabs open at once. Drag and drop tabs around to change their order, or get a preview pausing over them with your mouse. You can even save a session of tabs for later, making it easy to pick up where you left off.

[FONT=&quot]Content blocking[/FONT]
[FONT=&quot]Block images, pop-ups, and plug-ins you don't want . Right-click and choose "Block content" to selectively disable annoying elements. To make Web pages load faster, or to avoid[/FONT]

offensive content, temporarily turn off images by pressing the image button. In Opera, smart pop-up blocking is turned on by default.


[FONT=&quot]Zoom and Fit to width[/FONT]
[FONT=&quot]Is it difficult to read the content on a page? Use Opera's Zoom button in the lower right corner to resize Web pages. If the page is too wide for your screen, simply hit "Fit to Width" and Opera will resize the Web page so you avoid horizontal scrolling.[/FONT]

[FONT=&quot]Stay safe with new Fraud Protection and EV[/FONT]
[FONT=&quot]Not all Web pages are what they say they are. In Opera, Fraud Protection is enabled by default, automatically detecting and warning you about fraudulent Web sites. Fraud Protection is powered with phishing information from Netcraft and PhishTank, and Malware protection from TRUSTe. Malware is malicious software hidden throughout the Web. In addition Opera support Extended Validation certificates (EV). This provides added assurance and trust for secure Web sites.[/FONT]

[FONT=&quot]Customize your browser[/FONT]
[FONT=&quot]Opera is easily customizable. Choose among hundreds of skins and setups, add or remove buttons, toolbars, or change the entire layout of the browser. It is easy to do … or undo.[/FONT]

[FONT=&quot]Add a Widget to your life[/FONT]

[FONT=&quot]Widgets are small Web applications (multimedia, news feeds, games and more) that make your desktop experience more fun and useful. Use the Widgets menu to discover new widgets and access your favorites.[/FONT]

 

targol_1985

عضو جدید
Opera Turbo for fast browsing on slow connections
Opera Turbo uses compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections, for example, when using a crowded Wi-Fi in a cafe or browsing through your mobile phone while commuting.


opera Turbo برای جستجوی سریع روی اتصالات سرعت پایین
opera Turbo از تکنولوژی فشرده سازی استفاده می کند که بهبود قابل توجهی را روی سرعت های جستجو از طریق اتصالات پهنای باند محدود فراهم می کند ، برای مثال هنگام استفاده wi-fi در یک کافه شلوغ ویا جستجو از طریق موبایلتان در هنگام سفر
 

.:Shila:.

عضو جدید
کاربر ممتاز
[FONT=&quot]New visual tabs and sleek design[/FONT]
[FONT=&quot]Opera has always been the pioneer for how to deal with tabs in your browser. In Opera 10, we introduce a resizable tab bar. Drag the handle underneath the tabs to reveal thumbnails of your open Web pages. And, because great features should come in beautiful packages, designer Jon Hicks has created a whole new look for Opera 10.

[/FONT]
تبهاي(نوار باريكه) بصري و طراحي براق جديد
اپرا هميشه براي چگونگي سروكار داشتن با تبها در براوزرتان پيشگام بوده است. در اپرا 10، ما يك تب بار قابل تغيير در اندازه را معرفي ميكنيم. گيره زير تب را بكشيد تا كوچكي صفحات وب باز شما معلوم شود. و، براي اينكه خصوصيات بزرگ در بسته هاي زيبا آمده باشد، طراح جان هيكس تماما يك ظاهر جديد براي اپرا 10 ايجاد كرده.
 

zeost

عضو جدید
[FONT=&quot]Web integration[/FONT]
If you use a Web mail service as your default mail client, you can tell Opera 10 to do the same. Clicking on e-mail addresses or “Send by Mail” in Opera will open the compose page from your Web mail service provider. The same is true with the Feed reader — you can now also add any RSS/atom feed into your favorite online feed reader from within Opera 10.
یکپارچگی وب :
اگر شما از یک وب سرویس ایمیل استفاده می کنید، مانند مشتری ایمیل پیش فرضتان ،شما می تونید بگین که همین کار را opera10 انجام بده.در اپرا روی آدرس یا "send by mail" ایمیلتان کلیک کنید ، صفحه ی compose را مطابق مهیا کننده سرویس میل وبتون باز کنید .همان کار صحیح است با feed reader - شما الان همچنین می توانید هر RSS/atom feed داخل feed reader آنلاین مطلوبتون داخل اپرا اضافه کنید.

feed reader یعنی چی؟:que:
 

R-Quantum

عضو جدید
کاربر ممتاز
سلام دوستان گلم . ممنون از انرژی مثبتتون

سلام دوستان گلم . ممنون از انرژی مثبتتون

[FONT=&quot]Speed Dial your way[/FONT]
[FONT=&quot]You asked for it! Customize your Speed Dial to fit your own needs. Click the Configure Speed Dial button and choose from 4 to 25 favorite Web sites for quick access every time you open a new tab. You can also add a custom background so that you feel right at home.[/FONT]
شما به آن نیاز دارید . تغییر دادن سرعت شماره گیری مناسب برای نیازهای شخصی شماست . بروی دکمه ترکیب شماره گیری سریع کلیک کرده وانتخاب از 4 تا 25 وب سایت دلخواه برای دسترسی سریع در هر زمان ، زمانیکه شما یه تب را باز میکنید.
همچنین شما میتوانید یک بک گراند سنتی اضافه کنیدزمانیکه شما در خانه احساس درستی دارید!!!!
این خط آخری رو خودمم متوجه نشدم :redface:
 

R-Quantum

عضو جدید
کاربر ممتاز
یه خرده فارسیم تو ترجمه ضعیف شده

یه خرده فارسیم تو ترجمه ضعیف شده

[FONT=&quot]Resizable search field[/FONT]
Have a clearer view of what you are about to search by simply expanding the size of the search field — because many of life’s questions require more than two words of space.
توسط بسط ساده ای از سایز فیلدهای جستجو شما دید روشنی از آنچه که بدنبال آن هستید خواهید داشت زیرا بسیاری از سوال های حیات به بیش از دو کلمه فضا نیاز دارند.
موفق باشید
 

dream69

عضو جدید
tarjome

tarjome

ba salam va khaste nabashid
man daneshjoye sale dovome reshteye it hastam in term sakhteman dade daram va ketabi ke ostademun moarefi karde be zabane englisi hastesh. mikhastam khahesh konam age emkan dare faghat tamrinaye akhare fasle 3 ta 10 ro ke dar ekhtiyaretun mizaram baram tarjome konid 
(man pdf in ketab ro daram lotfan begin baraye ersalesh chi kar konam? merc)
ba tashakor 
 

کربلایی

مدیر بازنشسته
ba salam va khaste nabashid
man daneshjoye sale dovome reshteye it hastam in term sakhteman dade daram va ketabi ke ostademun moarefi karde be zabane englisi hastesh. mikhastam khahesh konam age emkan dare faghat tamrinaye akhare fasle 3 ta 10 ro ke dar ekhtiyaretun mizaram baram tarjome konid
(man pdf in ketab ro daram lotfan begin baraye ersalesh chi kar konam? merc)
ba tashakor

سلام دوست عزيز، به باشگاه خودتون خوش آمديد
لطفا به قوانين سايت احترام بگذاريد و فقط فارسي تايپ كنيد؛ براي ارسال pdf هم اونو در يه سروري آپلود كنيد و لينك اونو اينجا قرار بديد تا دوستان كمكتونكنند
موفق باشيد
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
6.5 Coding with Better Lattices 201




Table 6.1 Best-known lattices of each of the properties described above.



Dimension
Best quantizer
Densest packing
Kissing distance

1
Z
Z
Z

2
A2
A2
A2

3
A3
A3
D3

4
D4
D4
D4

5
D5
D5
D5

6
E6
E6
E6

7
E7
E7
E7

8
E8
E8
E8






6.5.3 Constructing a Dirty-Paper Code from E8
Once we have chosen a base lattice, , we must decide which vectors to use
for our message-dependent dither, C (m). Intuitively, it is clear that we need to
maximize the distance between any point that represents one message and the
closest point that represents a different message. That is, we want to choose
C (m) such that



Dij=

min
x +C(mi),y +C(mj)

|x − y|

(6.13)



is maximized (when i = j ). By maximizing this distance, we maximize the
amount of noise required to move from the detection region around one code
vector into the detection region for another. More formal justification for this
intuition can be found in Moulin and O’Sullivan [302].
Without loss of generality, we can begin by choosing C (m0) to be the zero
vector, so that + C (m0) = . For the next message, we can choose a vector
C (m1) that is as far from the zero vector as possible, without being closer to
any other vector in . In other words, C (m1) should be the largest-magnitude
vector in the basic Voronoi cell of the lattice. Offsetting the lattice by this vector
will result in a set of points that are as far away from the original lattice as we
can get. There may be additional vectors in the Voronoi cell that have the same
magnitude as C (m1), and these can be used for additional messages.
The vectors we are choosing here are known as the deep holes of the
lattice. Figure 6.8 shows the locations of the deep holes in the two-dimensional
orthogonal (Z2) and hexagonal (A2) lattices. The orthogonal lattice has just one
deep hole, so it can make a good code for only two distinct messages. The
hexagonal lattice has two deep holes, so it can make a good code for three
messages.
It is pointed out in Moulin and O’Sullivan [302] that, for small numbers of
messages, we should choose a lattice that has the right number of deep holes
and no more. Though the orthogonal lattice is clearly inferior to the hexago-
nal one in terms of quantization error, sphere packing, and kissing number, it
is actually better for a two-message (1-bit) code. This is because the distance
to the orthogonal lattice’s single deep hole is 2 ≈ 1.41, whereas the dis-
tance to each of the hexagonal lattice’s two deep holes is (2/3) cos(30)≈ 0.58.
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
CHAPTER 6 Practical Dirty-Paper Codes


















(a)
FIGURE 6.7




















(b)



Sphere packing obtained with (a) orthogonal (Z2) lattice and (b) hexagonal (A2) lattice.


the volume of the lattice’s Voronoi cells. A Voronoi cell around a lattice point
is the set of all vectors that are nearer to that point than to any other point
in the lattice. All Voronoi cells in a lattice have the same shape, so we usu-
ally only concern ourselves with the cell around the zero vector, referred to as
the basic Voronoi cell. To measure the density of sphere packing, we find the
largest sphere that can fit inside one Voronoi cell (the largest sphere we can
pack into the lattice) and divide its volume by the volume of the Voronoi cell.
This tells us the fraction of the total space that will be occupied by packed
spheres.
A third property that is sometimes of interest is the lattice’s kissing number.
This is found by looking at one sphere in the packing and counting the number
of other spheres that just touch it, or “kiss” it. For example, Figure 6.7 shows
that the kissing number for Z2is 4, and the kissing number for A2is 6. Higher
kissing numbers are generally considered to be better.
Not all the properties of every lattice can be calculated. However, the above
values are known for many low-dimensional lattices, and this allows us to iden-
tify the best lattice for a given dimensionality in each of the senses discussed
here—best quantization error, best sphere packing, and highest kissing number.
In addition, for certain dimensions the theoretical best values and the corre-
sponding lattices are known. Table 6.1 shows the best-known lattices according
to each of these properties, in a number of dimensions [84].
Of course, another issue of critical importance in choosing a lattice is
whether we know how to build an efficient quantizer for it. Quantizers for
the root lattices discussed above are easy to implement, but it is very difficult
to implement efficient quantizers for many lattices that are known to have good
theoretical properties.
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
CHAPTER 6 Practical Dirty-Paper Codes


















(a)
FIGURE 6.8




















(b)



Arrangement of deep holes in (a) orthogonal (Z2) lattice and (b) hexagonal (A2) lattice. In
the lower left of each diagram is an illustration of one Voronoi cell, with the vectors that
yield the deep holes.

Of course, the embedding distortion introduced by the hexagonal lattice is
smaller than that of the orthogonal, so we can use a coarser hexagonal lattice,
but the difference is not enough to overcome the distance to the deep holes.
The real advantage that the hexagonal lattice gives us is the availability of three
good code vectors. If we don’t use them all, we are better off with the simpler
lattice.



INVESTIGATION

Watermarking with the E8Lattice
We now provide an example watermarking system, which, like the system
presented in Zhanq and Bosten [467], uses the E8lattice in place of the
orthogonal lattice of E_LATTICE/D_LATTICE. There are several reasons to choose
the E8lattice here. The first two appear in the text above: (1) the E8lattice has
the best properties among known eight-dimensional lattices, and (2) there exists a
simple and efficient quantization algorithm for it.
The third reason for choosing the E8lattice is that we can find 15 deep holes.
As it turns out, the union of the E8lattice and its shifted versions to the 15 deep
holes form a new lattice, . This lattice, , has E8as a sublattice with 16 different
cosets. The pair ( , ) can therefore be used as a dirty-paper lattice for 16
different messages.
System 10: E_E8LATTICE/D_E8LATTICE
The deep holes can be computed as linear combinations of the following four
row vectors [467]:
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
6.5 Coding with Better Lattices 203




0 0 0 −2 −2 −2 2 0



P =1⎢⎢ 1 1 −3 −1 1 −1 −1 −1 ⎥⎥
4 ⎣ 0 2 0 −2 0 0 −2 −2 ⎦.
0 0 2 2 0 2 0 −2

(6.14)



We now have enough to make a DM watermarking system that embeds 4 bits
of information in an eight-dimensional vector. To embed a larger number of bits
into a higher-dimensional vector, we merely divide the vector into groups
of eight dimensions and embed 4 bits into each.
There remains the matter of choosing the dimensions in which we will embed.
We wish to compare the system against E_LATTICE/D_LATTICE, so we need to
embed the same number of bits into each image (345 bits, trellis coded to 1,380
bits, embedded in each 240 × 368 image). As that system embeds 1 coded bit
into each projected dimension, and the E_E8LATTICE/D_E8LATTICE system
embeds half a coded bit into each projected dimension (4 bits into every eight
dimensions), we must project into twice as many dimensions. We will do this by
correlating each 8 × 8 block of the image with two reference marks, wr 0and wr 1,
instead of just one.
Thus, the E_E8LATTICE embedding algorithm proceeds in the following steps:
1. Encode the message into a sequence of coded bits,
mc[1], mc[2], . . . , mc[1380].
2. Divide the cover image, c0, into 1,380 8 × 8 blocks.
3. Correlate each block, ci, with two reference marks, wr 0and wr 1, to obtain a
vector, v0, of length 2,760.
4. Using distortion compensation with parameters ( , ) (see Section 6.4.2) and
an E8lattice, , apply DM to every eight dimensions in v0to embed 4 bits
of mc.
5. Modify each block, ci, of the image to embed the watermark.

The D_E8LATTICE detector performs the following steps:
1. Project the image, cr, into a 2,760-dimensional vector, vr, as in Steps 1–3
of the embedder.
2. For every eight dimensions in vr, try quantizing with the quantizers for all 16
possible 4-bit messages. The quantizer that results in the smallest distortion
indicates these 4 bits of the trellis-coded message.
3. Apply the trellis decoder to obtain the embedded message.

Experiments
In this experiment we chose = 0.7538 and used a scaled version of E8such
that the average per-pixel distortion was equal to 2. We embedded a random
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
6.6 Making Lattice Codes Survive Valumetric Scaling 205




addressed before they can produce robust watermarks: If you multiply the
samples of a watermarked Work by a value even mildly different from 1, a
lattice-based watermark will not survive.
Scaling the sample values in a Work is termed valumetric scaling (in
Chapter 9 we use the term valumetric to distinguish this from geometric scal-
ing, which refers to resampling the Work with a different sampling frequency,
i.e., changing its size). In images, valumetric scaling corresponds to increasing or
decreasing the contrast. In audio, it increases or decreases the volume. As such, it
is a very benign distortion—most observers would not consider it a distortion at
all, in that it usually doesn’t change the perceived quality of the Work.
That valumetric distortion will destroy a lattice-based watermark can be seen
in Figure 6.10. This illustrates what happens to such a mark when it is scaled
by a factor of 0.8. Even though this is a relatively small change, the absolute
change is large enough to move the mark into the detection region of a different
message. Experiments with the E_LATTICE/D_LATTICE system bear this out, as
shown in Figure 6.11. Increasing contrast by a factor of just 1.16, or decreasing
by 0.85, resulted in message error rates above 20%.
In this section, we examine the main approaches that have been proposed
for solving this problem.


6.6.1 Scale-Invariant Marking Spaces
Most authors writing about lattice-based watermarks assume that they are work-
ing in a marking space where all important distortions are manifested, at worst,
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
CHAPTER 6 Practical Dirty-Paper Codes




100
E8lattice



90

80

70

60

50

40

30

20

10

0



















0



















1

Orthogonal lattice

















2 3



















4



















5



















6



















7



















8



















9 10





FIGURE 6.9

Quantity of noise (standard deviation)



Effect of additive white Gaussian noise on E_E8LATTICE/D_E8LATTICE
watermarking system. Results for the E_LATTICE/D_LATTICE system are shown
with a dotted line for comparison.

message in each of 2,000 images (different message in each image) with
E_LATTICE, and ran D_LATTICE to see if it was correctly embedded. This yielded
an embedding effectiveness of 99.35%.
We tested for robustness against additive noise by running the same test we
applied to E_LATTICE/D_LATTICE. The results are shown in Figure 6.9. The
results from E_LATTICE/D_LATTICE are also shown in this figure with a dotted
line. Clearly, the watermarks embedded using the E8lattice outperformed those
embedded with the orthogonal lattice. The median improvement in the magnitude
of noise that watermarks could survive was about 15%.



6.6 MAKING LATTICE CODES SURVIVE VALUMETRIC
SCALING
Lattice codes are simple to implement and give very good robustness against
AWGN distortion. In fact, with the right types of lattices, they can achieve
the full capacity of Costa’s dirty-paper channel [299]. For these reasons, they
have become the method of choice in dirty-paper coding research for many
applications. However, lattice codes have a serious weakness that must be
 

R-Quantum

عضو جدید
کاربر ممتاز
سلام دوست عزیز . میشه بگید چیکار باید کنیم . خوب متون رو ترجمه میکنیم ولی اون عدد ها چیه ؟ قراره انفجاری صورت بگیره !!!!!!! شوخی کردم . اگه توضیح بدی بهتر میتونیم کمکتون کنیم . موفق باشید
 

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
سلام دوست عزیز . میشه بگید چیکار باید کنیم . خوب متون رو ترجمه میکنیم ولی اون عدد ها چیه ؟ قراره انفجاری صورت بگیره !!!!!!! شوخی کردم . اگه توضیح بدی بهتر میتونیم کمکتون کنیم . موفق باشید
والا چي بگم من كپي كردم گذاشتم اينجا شما لطف كنين اگه ميشه برام ترجمه كنين نياز دارم اگه هم نياز باشه من فايلش رو بزارم
 

پیوست ها

  • CHAPTER 6Practical Dirty.doc
    175 کیلوبایت · بازدیدها: 0

ali hamraeiiyan

کاربر حرفه ای
کاربر ممتاز
سلام دوستان حالا که ما تن گذاشتیم سر و کله کسی پیدا نیست باشه اینم از شانس ماست دیگه
حالا یه سه صفحه فارسی میزارم برام به انگلیسی ترجمش کنین خیلی واجبه خدایش من از انگلیسی هیچی حالیم نیست ممنون میشم ترجمه کنین
شرمنده اسکن شده فایل رو براتون گذاشتم
 

پیوست ها

  • aaa.jpg
    aaa.jpg
    23.9 کیلوبایت · بازدیدها: 0
  • bbb.jpg
    bbb.jpg
    21.5 کیلوبایت · بازدیدها: 0

majmaj

عضو جدید
دوستان شرمنده اگر میشه این متن رو برام ترجمه کنید
Back in the days when an Ethernet network meant coaxial cable, it was possible
to connect two computers’ network interface adapters with a Thin Ethernet cable,
thus setting up a simple two-node network. Today, however, the standard for
Ethernet networking is UTP cable, and this generally requires a hub.
 

R-Quantum

عضو جدید
کاربر ممتاز
سلام دوستان حالا که ما تن گذاشتیم سر و کله کسی پیدا نیست باشه اینم از شانس ماست دیگه
حالا یه سه صفحه فارسی میزارم برام به انگلیسی ترجمش کنین خیلی واجبه خدایش من از انگلیسی هیچی حالیم نیست ممنون میشم ترجمه کنین
شرمنده اسکن شده فایل رو براتون گذاشتم
سلام دوست عزیز . ای بابا این چه حرفیه ؟ شما با ترجمه گوگل آشنایی دارید ؟ برید گوگل بعد تایپ کنید translate اونجا هر زبانی هست . چه فارسی به انگلیسی و چه انگلیسی به فارسی .البته انگلیسی به فارسیش یه خرده ویرایش میخواد ولی فارسی به انگلیسیش حرف نداره . برید اونجا و فایل فارسیتون رو آپلود کنید بعد زبانتون رو انگلیسی انتخاب کنید . ادرس لینک http://translate.google.com. موفق باشید
 
آخرین ویرایش:

R-Quantum

عضو جدید
کاربر ممتاز
دوستان شرمنده اگر میشه این متن رو برام ترجمه کنید
Back in the days when an Ethernet network meant coaxial cable, it was possible
to connect two computers’ network interface adapters with a Thin Ethernet cable,
thus setting up a simple two-node network. Today, however, the standard for
Ethernet networking is UTP cable, and this generally requires a hub.

سلام طبق علامت آپسترف کنار واژه کامپیوتر ، برداشت من این بود :
در گذشته زمانیکه یک شبکه اترنت با کابل کواکسیال معنی دار میشد ، این امکانپذیر بود که آداپتورهای رابط شبکه ای دو کامپیوتر توسط یک کابل نازک اترنت با هم در ارتباط باشند ، بدین معنی که تعمیر (واژه بهتر به ذهنم نرسید) دو گره شبکه ساده بود . امروزه هرچند ، کابل UTP برای شبکه اترنت مناسب است و این عموما به هاب نیاز دارد .
آقا علی شما چیکار کردی ؟ کارتون راه افتاد ؟
موفق باشید:gol::gol:
 

majmaj

عضو جدید
دست شما درد نکنه الهام خانوم ولی من منظور این کتاب رو از شبکه اترنت نفهمیدم میشه این اترنت رو بیشتر توضیج بدید
 

R-Quantum

عضو جدید
کاربر ممتاز
سلام . دوست عزیز سوالت رو اینجا تو همون تاپیک خودت بپرس . اونجا بهتر کمکت میکنند . موفق باشی
 
بالا