碼分制 的英文怎麼說

中文拼音 [fēnzhì]
碼分制 英文
code division system
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  1. Cryptology is the core of the information security. modern cryptograph divides into the public key system and the private key system

    學是信息安全技術的核心,現代密為公鑰體和私鑰體兩大類。
  2. The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques

    本文首先對pki體系的底層技術進行深入研究,重點析了非對稱密橢圓曲線密,並將它與其他密技術進行了比較。
  3. There is a professional showroom in our shenzhen office adn we can provide the fastest handlooms and sample yardages service. we use american four pount as our fabric standard, all of our fabrics must pass aatcc test before shipping

    我們均有專業的面料展廳和提供最快的打板服務,面料大樣由100起定,全部採用美國4全程驗貨。
  4. There is a professional showroom in our shenzhen office and we can provide the fastest handlooms and sample yardages service. we take american four point as our fabric standard, all of our fabrics must pass aatcc test before shipping

    我們均有專業的面料展廳和提供最快的打板服務,面料大樣由100起定,全部採用美國4全程驗貨。
  5. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監控系統的建設目標和總體方案的同時,重點闡述了圖像處理、通信與識別技術在遠程圖像監控系統中的應用實現,給出了圖像監控系統中的終端接入和框架設計、雲臺解與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監控系統大部採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解技術、數字圖像傳輸技術,將智能圖像處理與識別技術應用於圖像的顯示、調整、跟蹤,克服了一般監控系統要求監控人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  6. Adaptive differential pulse code modulation adpcm

    自適應差脈沖編調
  7. Adaptive differential pulse code modulation

    自適應差脈沖編調
  8. Differential pulse code modulation

    脈沖編調調
  9. Essential technical specification of afis part 4 : coding regulation for afis product

    指紋自動識別系統基礎技術規范.第4部:指紋自動識別系統產品代原則
  10. Visual basic now provides a mechanism to allow the integrated development environment to separate generated code from your authored code into separate source files

    Visual basic現在提供了一種機,允許集成開發環境( ide )將生成的代與您編寫的代隔開,保存到單獨的源文件中。
  11. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了析。
  12. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並析了橢圓曲線密的優點及研究現狀;其次研究了橢圓曲線密的基本理論;第三,析了橢圓曲線密的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密;第七,實現了兩條安全橢圓曲線上的橢圓曲線密,包括ecdh , eces , ecdsa 。
  13. Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method

    圍繞這兩個方面的問題,本文首先討論了如何構造安全的橢圓曲線密和橢圓曲線密的應用;然後重點析了橢圓曲線上數乘運算的快速實現,並結合interleavingexponentiation演算法和冪割的思想,提出一種計算固定點數乘的快速演算法,該演算法的計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。
  14. Rules for classification of geographical names and code representation

    地名類與類別代規則
  15. Two kinds of key distribution schemes based on fibonacci - lucas sequences

    序列的兩種公鑰配密
  16. Direct sequence - code divition multiple access ( ds - cdma ) technology is achieved easily and used widely at present its receiver capability is confined by two factors, one of which is the multiple access interference ( mai ) which makes the capacity low, another of which is the near - far problem

    直接序列擴頻-多址( ds - cdma )技術是最易實現、也是目前應用最廣的一種方式,它的接收性能受到兩個主要的限:一個是多址干擾造成的性能下降;另一個則是遠近效應問題。
  17. This thesis analyzed the error performance of mfsk and mpsk modulator in hf with optimal receiver, studied the shortcoming and strongpoint of several typical short - wave data transmission systems and their performance over fading and intersymbol interference channels. the theory and key technical of adaptive modem is discussed. in the last, an efficient modulation scheme - block coded modulation is introduced into hf radio systems to improve the efficiency of hf data transmission, this paper also proposes a hf data transmission system scheme composed of a block coded modulator and a decision feedback type adaptive equalizer

    本文在對短波數傳兩種常見調方式fsk及psk最佳解調性能析的基礎上,討論了幾種採用典型調技術的短波數傳系統(如時頻調、多進頻移鍵控慢跳頻、 chess系統)原理、優缺點以及抗衰落和抗符號間干擾的性能;析了自適應串列數傳系統抗短波通道衰落和多徑干擾的原理、關鍵技術;在本文的最後引入一種有望解決短波數傳系統低效率狀況的調方式bcm -組編調,給出了一個採用bcm技術與自適應均衡技術相結合的短波數傳系統方案,並通過計算機模擬進行了初部驗證。
  18. Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals

    由於目前尚未有對長pn調信號進行檢測和參數估計的研究,而長調較好的保密性能以及抑符號間干擾的優點,使其在軍事通信中有著較好的應用前景,因而此部工作具有重要的意義。
  19. Adpcm digital circuit multiplication equipment using adpcm and dsi

    使用自適應差脈沖編調
  20. The classification and the principle of coding for mail route

    郵路類與代規則
分享友人