數字碼 的英文怎麼說

中文拼音 [shǔ]
數字碼 英文
digital code
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  1. Every telephone number also has an area code

    在美國和加拿大,電話號通常是7個
  2. Each direction has an associated number, which you use in java coding

    每個方向有一個相關聯的,您在java編中將使用這個
  3. Also designed this part of correspondences procedure process and procedure codes. the thesis takes a simple introduction about the data transmission on base band

    論文對據基帶傳輸編做了簡單介紹,闡述了基帶信號的型選擇的原則。
  4. Seismic signals are stored digitally in binary code.

    地震信號是以二進制編形式儲存的。
  5. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密技術的進出口及使用的控制,第六章介紹了簽名的概念及原理,並以bolero為例介紹了簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  6. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    簽名是通過某種密運算生成一系列符號及代組成電子密進行簽名,來代替書寫簽名或印章,確認簽名者的身份、據來源和完整性,防止據被竊取、篡改和破壞,從而達到保護據的目的。
  7. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子簽名立法始於1995年的猶他州,該州法案只限於調整使用密簽名。之後,其他州也開始了簽名立法活動,但第二個進行此種立法的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立法從「集中於簽名的具體技術法律轉向廣泛調整各種電子簽名的一般技術法律。 」
  8. The whole system is made up with industry pc, ccd camera, video compress card, de - code machine

    系統為利用工控機、 ccd攝像機、視頻壓縮卡、解器構成的以計算機為核心的監控系統。
  9. The contents adds the to code the system ". the colloquy dvd sees the arithmetic figure to add the project. only the that the dvd that css admit to broadcast the to can just break password see data

    「內容加密編系統」 。正式的dvd視頻加密方案。僅css許可的dvd播放器才可以破譯視頻據的密
  10. Test signals for digitally encoded colour television system

    彩色電視系統用測試信號
  11. One of the highest total connectivity rating in the region based on a cumulative penetration rate of main lines, mobile subscribers, integrated services digital network isdn subscribers and community antenna television catv and digital subscriber line accounts

    就主要電話線路行動電話用戶綜合業務網路isdn用戶有線電視和用戶線路dsl帳戶的累計滲透率而言,香港是區內電訊總容量最大的地方之一
  12. The digital signature based on elliptic curve crypt system

    基於橢圓曲線密體制的簽名
  13. Digital color code dcc

  14. Book numbers are added to the store or deleted by a numerical keyboard.

    圖書號可以通過鍵盤加入存儲器內,或者刪掉。
  15. The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively

    介紹了混沌學的發展過程和意義,闡述了通信系統的一般要求和混沌在保密通信中的應用潛力,綜述了國內外現有的混沌保密通信方法,其中包括:混沌擴頻通信,混沌鍵控,混沌參調制,混沌掩蓋,混沌數字碼分多址等五大類,指出了各自存在的問題和發展方向。
  16. This paper discusses the work that we have done about the ( cd ) 2ma ( chaotic digital code - division multiple access ) communication system, whose performance is desirable

    本文論述了我們在研究性能優良的混沌數字碼分多址通信系統方面所做的工作。
  17. The detection perfermance of envelope detector and square - law detector is analyzed, and acquisition performance of non - correlate detector is studied later. the result is important to analysis direct long - cycle pn code acquistion

    分析了採用包絡檢測器及採用平方律檢測器數字碼環檢測特性,以平方律檢測器為例分析其捕獲特性。
  18. Finally, we carry out the theoretic analysis on the whole communication system. by comparing the simulation analysis results with m - sequence and gold sequence, we further validate the good performance of the ( cd ) 2ma communication system

    最後,對整個通信系統的性能和模擬據結果進行了分析,並與傳統的小m擴頻序列、 gold擴頻序列進行了比較,進一步驗證了混沌數字碼分多址通信系統的優良性能。
  19. The data of the simulation and the result of the theoretic analysis show that the ( cd ) 2ma communication system introduced in this paper appears to have good anti - interference abilities, low ber, ideal secure properties, great capacity and can be practiced in a simple manner, so it has a very high value of application and a very good developing prospect

    理論分析結果和模擬據顯示,本文給出的混沌數字碼分多址通信系統具有抗干擾能力強、誤率低、用戶容量大、保密性好、易於實現的優點,確實具有很高的應用價值和良好的發展前景。
  20. So the chaotic sequence can indeed serve as spreading address code in spreading communication. after discussing the communication theory of cdma, we propose the model of the ( cd ) 2ma communication system and utilize the simulation tools of matlab simulink to propose the ( cd ) 2ma simulation system according to this model

    在論述了分多址通信原理的基礎上,給出了混沌數字碼分多址( ( cd ) ~ 2ma )通信系統的模型,並依據此模型使用matlabsimulink模擬工具給出了混沌數字碼分多址通信系統的可視化模擬系統。
分享友人