通信保密 的英文怎麼說

中文拼音 [tōngxìnbǎo]
通信保密 英文
communication secrecy
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 通信 : communication; communicate by letter; correspond
  1. The high - power semiconductor quantum well ( qw ) laser is a kind of luminescence device with superior performance, it has longe - lived, low threshold current density, high efficiency, high luminosity and excellent monochromatic, coherence, directionality, etc. the high - power semiconductor laser is widely applied to the fields, such as military, industrial machining, communication, information processing, medical treatment, etc. the material ' s epitaxy is the foundation of the whole laser ' s fabricating, and it has important influence on the optics and electricity performance about the laser

    大功率半導體量子阱激光器是一種性能優越的發光器件,具有壽命長、閾值電流度低、效率高、亮度高以及良好的單色性、相干性、方向性等特點,廣泛應用於軍事、工業加工、息處理、醫療健等領域。材料的外延生長是整個激光器器件製作的基礎,對器件的光學和電學性能有著重要的影響,生長不出優質的材料體系,獲得高性能的器件就無從談起,因此,材料的外延生長便成為了整個半導體激光器製作過程之中的重中之重。
  2. The test model of random phasic signal and its application in the mobile privacy radio system

    隨機相位號檢測模型及其在移動通信保密系統中的應用
  3. The development of chaos synchronization makes it realizable to use chaos for secret communication

    混飩同步問題的提出掀起了混飩在方面應用研究的熱潮。
  4. In those studying works, nano - composites of polymer were prepared for electromagnetic screening and transparent in military electronic units 、 apparatus 、 weapon equipments, electronic cabinets, to keep communications secrets for important offices 、 laboratory, designing technologic routes of inorganic nanoparticle / nano - composites of polymer, nano - stannum oxide, nano - indium stannum oxide were prepared

    本課題的研究針對軍用電子元器件、部件、武器裝備、方艙、通信保密、重要辦公室、實驗室需要透明同時防電磁波泄露的需求,採取無機/高分子納米復合技術路線,研製納米氧化錫、氧化銦錫/丙烯酸酯類聚合物納米復合材料。
  5. China information security

    息安全與通信保密
  6. Traditional laser iff has poor security because of low frequency of laser beam coded pulse. this can be greatly improved when the pulses are modulated by continuous wave laser, but the power of this laser beam output is so low that it ’ s difficult to be detected and received by laser warning subsystem

    傳統的激光敵我識別器激光編碼脈沖頻率低,通信保密性差,使用連續波激光器經調制后激光編碼脈沖頻率高,性好,但輸出激光功率較低,難以達到激光告警分機探測接收的要求。
  7. Acsa allied communications security agency

    盟軍通信保密
  8. Ecpa electronic communications privacy act

    電子通信保密
  9. With the coming of information age, we rely more heavily on cryptography to ensure the security of communication

    隨著息時代的到來,人們對通信保密的要求越來越高。
  10. The approach has definite theoretical significance, and has better practical values for information, communication and network security

    本研究具有一定的理論意義,它對于息安全、通信保密以及網路安全具有較好的實際意義。
  11. Moreover, this algorithm can be implemented very easily in software, and has a good prospect in the fields of secret communication and information security

    此外,本演算法還特別易於軟體實現,在通信保密息安全領域具有良好的實際應用前景。
  12. With the rapid development of information and communication technology, people attach more importance to the information & correspondence security, especially to network security

    隨著息與技術的飛速發展,息安全、通信保密尤其是網路安全日益受到了人們的重視。
  13. With the rapid development of it and computer technology, information and communication securities become more important. quantum communication is one of the most important technologies, which is the combination of quantum mechanics and cryptography

    隨著息技術的飛速發展,息安全與通信保密日益重要與突出。量子訊是量子力學和碼技術相結合的產物,是當今的熱點技術之一。
  14. Nevertheless, quantum cryptography, which is based on quantum physics, has been proved to be an effective technique for secure key distribution

    然而,基於量子物理原理的量子碼學已被證明是鑰安全分配的有效手段。
  15. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路數據傳輸安全主要解決在網路環境下用戶之間身份驗證、數據加傳輸以及實現數字簽名三個方面問題:用戶身份驗證證了的源點和目的點的正確性;數據加傳輸證了數據在網路的中間節點不會泄露;數字簽名可以證發送息的一方不能對自己發送過的息進行否認。
  16. Being the first application of quantum physics, quantum key distribution ( qkd ) has been developed very fast experimentally in recent years. it would impact thoroughly the existing secure communication, especially in military affairs, e - banking and so on

    量子鑰分發上的實驗已經得到巨大進展,預計很快能投入應用,在軍事、電子銀行等方面將有廣泛的應用前景。
  17. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信保密專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -鑰自動產生和分配、被動式和主動式鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用息傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消息安全網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  18. At the mean time, the building of the system is the fastest and the best convenience. the scdma making use of radio connection technology of scdma have advantage of high radio frequency ratio, good secrecy and long distance of transport under lower transmitter frequency

    Scdma無線接入系統採用同步碼分多址( scdma )無線接入技術,具有無線頻譜利用率高、通信保密性好和低發射功率下較遠的距離等技術優勢,是一種優秀的無線接入技術。
  19. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、、數據護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,過對綿陽市電子政務息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  20. The spread spectrum technology has got wide usage upon communications, telemetry, and orientation because of its strong anti - interference ability, low probability of being intercepted and captured, strong discrimination ability, outstanding multi - access communication ability, and excellent secrecy

    直擴技術由於具有很強的抗干擾能力、很低的被截獲概率、很高的距離鑒別力、良好的碼分多址能力和很好的通信保密性等特性,在軍事民用和遙測、定位領域得到了廣泛的應用。
分享友人