spurious connection initialization - Übersetzung nach russisch
DICLIB.COM
KI-basierte Sprachtools
Geben Sie ein Wort oder eine Phrase in einer beliebigen Sprache ein 👆
Sprache:     

Übersetzung und Analyse von Wörtern durch künstliche Intelligenz

Auf dieser Seite erhalten Sie eine detaillierte Analyse eines Wortes oder einer Phrase mithilfe der besten heute verfügbaren Technologie der künstlichen Intelligenz:

  • wie das Wort verwendet wird
  • Häufigkeit der Nutzung
  • es wird häufiger in mündlicher oder schriftlicher Rede verwendet
  • Wortübersetzungsoptionen
  • Anwendungsbeispiele (mehrere Phrasen mit Übersetzung)
  • Etymologie

spurious connection initialization - Übersetzung nach russisch

AMOUNT OF CIPHERTEXT NEEDED TO UNAMBIGUOUSLY BREAK AN ENCRYPTION SYSTEM
Spurious key

spurious connection initialization      
инициирование ложного соединения
spurious correlation         
MATHEMATICAL RELATIONSHIP IN WHICH TWO OR MORE EVENTS OR VARIABLES ARE ASSOCIATED BUT NOT CAUSALLY RELATED, DUE TO EITHER COINCIDENCE OR THE PRESENCE OF A CERTAIN THIRD, UNSEEN FACTOR
Joint effect; Nonspuriousness; Non-spuriousness; Third Variable Problem; Fallacy of causation; Spurious correlation; Specious correlation
фальшивая корреляция; корреляция между двумя переменными при отсутствии причинной связи между ними.
joint effect         
MATHEMATICAL RELATIONSHIP IN WHICH TWO OR MORE EVENTS OR VARIABLES ARE ASSOCIATED BUT NOT CAUSALLY RELATED, DUE TO EITHER COINCIDENCE OR THE PRESENCE OF A CERTAIN THIRD, UNSEEN FACTOR
Joint effect; Nonspuriousness; Non-spuriousness; Third Variable Problem; Fallacy of causation; Spurious correlation; Specious correlation

общая лексика

сочетанное действие

Definition

Spurious
·adj Not legitimate; bastard; as, spurious issue.
II. Spurious ·adj Not proceeding from the true source, or from the source pretended; not genuine; false; adulterate.

Wikipedia

Unicity distance

In cryptography, unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force attack. That is, after trying every possible key, there should be just one decipherment that makes sense, i.e. expected amount of ciphertext needed to determine the key completely, assuming the underlying message has redundancy.

Claude Shannon defined the unicity distance in his 1949 paper "Communication Theory of Secrecy Systems".

Consider an attack on the ciphertext string "WNAIW" encrypted using a Vigenère cipher with a five letter key. Conceivably, this string could be deciphered into any other string—RIVER and WATER are both possibilities for certain keys. This is a general rule of cryptanalysis: with no additional information it is impossible to decode this message.

Of course, even in this case, only a certain number of five letter keys will result in English words. Trying all possible keys we will not only get RIVER and WATER, but SXOOS and KHDOP as well. The number of "working" keys will likely be very much smaller than the set of all possible keys. The problem is knowing which of these "working" keys is the right one; the rest are spurious.

Übersetzung von &#39spurious connection initialization&#39 in Russisch