碼分制 的英文怎麼說
中文拼音 [mǎfēnzhì]
碼分制
英文
code division system-
Cryptology is the core of the information security. modern cryptograph divides into the public key system and the private key system
密碼學是信息安全技術的核心,現代密碼體制分為公鑰體制和私鑰體制兩大類。The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques
本文首先對pki體系的底層技術進行深入研究,重點分析了非對稱密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。There is a professional showroom in our shenzhen office adn we can provide the fastest handlooms and sample yardages service. we use american four pount as our fabric standard, all of our fabrics must pass aatcc test before shipping
我們均有專業的面料展廳和提供最快的打板服務,面料大樣由100碼起定,全部採用美國4分制全程驗貨。There is a professional showroom in our shenzhen office and we can provide the fastest handlooms and sample yardages service. we take american four point as our fabric standard, all of our fabrics must pass aatcc test before shipping
我們均有專業的面料展廳和提供最快的打板服務,面料大樣由100碼起定,全部採用美國4分制全程驗貨。Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images
本論文在設計圖像監控系統的建設目標和總體方案的同時,重點闡述了圖像處理、通信與識別技術在遠程圖像監控系統中的應用實現,給出了圖像監控系統中的終端接入和框架設計、雲臺解碼控制與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監控系統大部分採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解碼技術、數字圖像傳輸技術,將智能圖像處理與識別技術應用於圖像的顯示、調整、跟蹤,克服了一般監控系統要求監控人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。Adaptive differential pulse code modulation adpcm
自適應差分脈沖編碼調制Adaptive differential pulse code modulation
自適應差分脈沖編碼調制Differential pulse code modulation
差分脈沖編碼調制差分脈碼調制Essential technical specification of afis part 4 : coding regulation for afis product
指紋自動識別系統基礎技術規范.第4部分:指紋自動識別系統產品代碼編制原則Visual basic now provides a mechanism to allow the integrated development environment to separate generated code from your authored code into separate source files
Visual basic現在提供了一種機制,允許集成開發環境( ide )將生成的代碼與您編寫的代碼分隔開,保存到單獨的源文件中。Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5
主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa
本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method
圍繞這兩個方面的問題,本文首先討論了如何構造安全的橢圓曲線密碼體制和橢圓曲線密碼體制的應用;然後重點分析了橢圓曲線上數乘運算的快速實現,並結合interleavingexponentiation演算法和冪分割的思想,提出一種計算固定點數乘的快速演算法,該演算法的計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。Rules for classification of geographical names and code representation
地名分類與類別代碼編制規則Two kinds of key distribution schemes based on fibonacci - lucas sequences
序列的兩種公鑰分配密碼體制Direct sequence - code divition multiple access ( ds - cdma ) technology is achieved easily and used widely at present its receiver capability is confined by two factors, one of which is the multiple access interference ( mai ) which makes the capacity low, another of which is the near - far problem
直接序列擴頻-碼分多址( ds - cdma )技術是最易實現、也是目前應用最廣的一種方式,它的接收性能受到兩個主要的限制:一個是多址干擾造成的性能下降;另一個則是遠近效應問題。This thesis analyzed the error performance of mfsk and mpsk modulator in hf with optimal receiver, studied the shortcoming and strongpoint of several typical short - wave data transmission systems and their performance over fading and intersymbol interference channels. the theory and key technical of adaptive modem is discussed. in the last, an efficient modulation scheme - block coded modulation is introduced into hf radio systems to improve the efficiency of hf data transmission, this paper also proposes a hf data transmission system scheme composed of a block coded modulator and a decision feedback type adaptive equalizer
本文在對短波數傳兩種常見調制方式fsk及psk最佳解調性能分析的基礎上,討論了幾種採用典型調制技術的短波數傳系統(如時頻調制、多進制頻移鍵控慢跳頻、 chess系統)原理、優缺點以及抗衰落和抗符號間干擾的性能;分析了自適應串列數傳系統抗短波通道衰落和多徑干擾的原理、關鍵技術;在本文的最後引入一種有望解決短波數傳系統低效率狀況的調制方式bcm -分組編碼調制,給出了一個採用bcm技術與自適應均衡技術相結合的短波數傳系統方案,並通過計算機模擬進行了初部驗證。Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals
由於目前尚未有對長pn碼調制信號進行檢測和參數估計的研究,而長碼調制較好的保密性能以及抑制部分符號間干擾的優點,使其在軍事通信中有著較好的應用前景,因而此部分工作具有重要的意義。Adpcm digital circuit multiplication equipment using adpcm and dsi
使用自適應差分脈沖編碼調制The classification and the principle of coding for mail route
郵路分類與代碼編制規則分享友人