code key 中文意思是什麼

code key 解釋
代碼鍵
  • code : n 1 法典;法規。2 規則,準則;(社會、階級等的)慣例,習俗,制度。3 (電)碼,代碼,密碼,暗碼;...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  2. After elaborating the principle of an 802. lib key modulation scheme - complementary code keying ( cck ), this paper proposes and realizes a hardware circuit solution of 802. 11b pcmcia wlan interface card, which can reliably offer a maximal 11mbps data rate and freely switch within 14 working channels in 2. 4ghz frequency band

    接著在詳細闡述了802 . 11b協議核心調制技術?互補碼鍵控( cck )的原理的基礎上,本文提出並實現了一種峰值傳輸速率為11mbps的802 . 11bpcmcia高速無線網卡的硬體電路設計方案,在2 . 4ghz頻段該網卡可在14個工作通道上自動切換,實現高速突發數據的可靠傳輸。
  3. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監控系統的建設目標和總體方案的同時,重點闡述了圖像處理、通信與識別技術在遠程圖像監控系統中的應用實現,給出了圖像監控系統中的終端接入和框架設計、雲臺解碼控制與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監控系統大部分採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解碼技術、數字圖像傳輸技術,將智能圖像處理與識別技術應用於圖像的顯示、調整、跟蹤,克服了一般監控系統要求監控人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  4. 2. press set key at five sec is unlash after display p - s, here display s number is code, if function is going to recompose, please number was 18 first, again press set key is come into function set. it can automatism backing out up to snuff work, if it is dont press set key or code is error

    2按set鍵5s直至顯示p - s後放開,此時顯示的數值為密碼,若要修改儀表功能,請把數字修改成88 ,再按set鍵,即進入功能設置,如果不按set鍵或密碼錯誤,則自動返回正常控制測量。
  5. Turbo codes represent the new code structures, which consist of pccc ( parallel serially convolutional code ) and sccc ( serially concatenated convolutional code ). in this paper, the background of turbo codes are firstly introduced, which includes the base principle of error correction code 、 block code and convolutional code ; the principle of turbo code and the iterative decoding is secondly expanded ; the key decoding algorithm : a revised map algorithm and iterative decoding theory are detailed ; then, a new turbo code structure : hccc ( hybrid concatenated convolutional code ) is presented, and the capacity of this code method is analyzed, the average capacity upper bound is derived ; at last, this code is simulated on awgn ( additive white gaussian noise ) channel and rayleigh fading channel

    本文首先介紹了turbo碼的背景知識,包括差錯控制的基本原理、分組碼和卷積碼;然後闡述了turbo碼的基本原理,包括turbo編譯碼器結構及迭代譯碼原理;較為詳細地描述了關鍵的譯碼演算法: ?種改進的最大后驗概率( map )譯碼演算法及迭代譯碼演算法;提出了一種新的turbo碼結構:混合turbo碼(混合級聯卷積碼) ;並用編碼性能聯合界分析方法對混合turbo碼進行了性能分析,得出了其平均性能上界;並在高斯白噪聲通道和瑞利衰落通道上分別作了一些應用研究及計算機模擬實驗。
  6. This paper investigates the key technology of the ds - cdma system - psendonoise ( pn ) code acquisition technology. various pn code acquisition scheme has been introduced here

    本文對ds - cdma系統中的關鍵技術?擴頻序列的捕獲?進行了深入的研究,介紹了擴頻序列的多種捕獲方案。
  7. The encryption key itself is the most vulnerable component of any code ; enigma stymied the efforts of the greatest code breakers of europe and america, including alan turing, and was never actually broken

    相反,大多數以這種方法保護的系統無法執行一次足夠的安全性審查;有一些事情是公開的,它允許您從用戶那裡獲得免費的安全性忠告。
  8. Code v algorithms are a key and dominant technology in the design of the microlithographic lenses that permit the imaging of ultra - fine lines on computer chips ? a necessary ingredient in the continuing improvement of computer speeds

    Code v演算法在設計微影成像鏡頭方面是一個關鍵的和主要的技術,微影成像鏡頭允許在計算機晶元上作超精細線成像?這在計算機速度的持續改進中是一個必然的組分。
  9. In this dissertation, the researches on the application of cdma in fiber - optic communication systems have been reviewed, and several key techniques in the application are proposed with theoretical analysis. in traditional researches and applications of the hfc cdma communication system, the gold sequence was used as the users " address code. in this paper, we analyze the characteristics of the m sequence in detail

    本文突破了以往在hfc系統中使用cdma擴頻技術通信時,通常都採用gold序列來作為地址碼的慣例,分析和提出了在hfc的特定環境中,使用同一m序列在某時刻具有的不同相移序列,來構成一個小區的地址編碼,能夠達到多用戶通信時比使用gold序列進行通信具有更好的相關特性。
  10. While the key of embedded system software is embedded operation system ; one of the main works in os application is to write the hal ( hardware abstraction layer ) code. two open source code embedded operation system - uc / os and embedded linux were analyzed in this paper

    文中作者以broadcom主板為硬體平臺(基於motorola通信處理晶元mpc850 )對兩種公開源代碼的操作系統uc os和嵌入式linux進行了研究與應用設計,其中的關鍵步驟是編寫硬體抽象層介面程序。
  11. The operation requires all sets of keys and the key card code

    此操作需要所有鑰匙和鑰匙卡號碼。
  12. A separate personal identification number key code

    第二層:獨立的個人識別號碼
  13. Property which combines the key code and modifier

    屬性(它組合鍵代碼和修改鍵) 。
  14. Enter the key code, and click submit order

    輸入個人識別號碼,然後按遞交。
  15. I ' m at the vault. i need that key code

    我到金庫了,我需要密碼
  16. To combine a key with alt, precede the key code with

    若要將一個鍵與alt組合,請在該鍵代碼之前加上
  17. Class using the specified enable flag and machine authentication code key modifier

    使用指定的啟用標志和計算機驗證代碼( mac )鍵修飾符初始化
  18. In addition, a hash is created from the data using a machine authentication code key

    此外,會使用計算機驗證代碼( mac )密鑰從數據中創建一個哈希。
  19. Therein lies the problem : if you send the code key through the internet prior to setting up encryption, it is sent as plain text - and can be easily intercepted by anyone trying to eavesdrop on transactions

    模糊代碼以產生一個模糊的二進制甚至會有更大幫助。這些技術要求潛在的攻擊者擁有比在他們需要實際破壞您系統時更多的技巧,這通常是一件好事。
  20. The emphasis of the paper is to present a solution to security problems in wlan, which is based on the fundamental topological structure of infrastructure. the design includes four main modules : data encryption, data integrality code, key management and authentication

    該方案基於有中心的無線局域網拓撲結構,包含了數據加密、數據完整性認證、密鑰管理和身份認證等四個基本模塊。
分享友人