通信密碼 的英文怎麼說

中文拼音 [tōngxìn]
通信密碼 英文
signal code
  • : 通量詞(用於動作)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 通信 : communication; communicate by letter; correspond
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了息加技術以及各國立法對技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used

    3 、對數據安全性起決定作用的加模塊所採用的加演算法進行了深入的分析,綜合加性能和實現的復雜度的考慮,採用了流的加演算法。
  3. This article elaborated the code technology in the correspondence application, discussed in the discrete signal code process function, as well as code technology security use and error correction function

    摘要本文論述了編技術在中的應用,討論了離散號的編過程中的作用,以及編技術的保用途和糾錯功能。
  4. Now it is used in cryptography and corrspording field, specially, men study wiretap channel of type ii with maintain secrecy corresponding

    它在領域有著重要的應用,特別是在研究第二竊道( wire - tapchanneloftype )時它與保有關。
  5. Uestc is in charge of the tdd downlink that bases on fpga. low density parity - check ( ldpc ) codes were first discovered by gallager in the early 1960s and recently have been rediscovered and generalized

    度奇偶校驗( ldpc )是由gallager在1962年首先提出的一種糾錯,在沉寂了多年之後,最近又重新成為技術研究的熱點。
  6. Low density parity - check ( ldpc ) codes were first discovered by gallager in the early 1960s and recently have been rediscovered and generalized. this class of codes decoded with soft - in soft - out ( siso ) iterative decoding performs amazingly well

    度奇偶校驗( ldpc )是由gallager在1962年首先提出的一種糾錯,在沉寂了多年之後,最近又重新成為技術研究的熱點。
  7. Chuang, isaac l., lieven m. k. vandersypen, xinlan zhou, debbie w. leung, and seth lloyd. " experimental realization of a quantum algorithm. " nature 393 ( 1998 ) : 6681

    量子息> , 《物理世界》雜志1998年3月號35 ? 57頁其中有很多有名的文章,介紹了有關量子息的許多東西其中包括:量子,量子,量子計算以及與之相關的改進方法。
  8. Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution

    量子術是一種實現秘的新方法,它利用單光子的量子性質,藉助量子鑰分配協議可實現數據傳輸的可證性安全。
  9. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma技術以其高抗干擾能力、高容量、高保性等技術優勢在第三代移動系統中被廣泛應用,然而在高速數據業務中,嚴重的間干擾和符號間干擾會導致系統性能明顯下降。
  10. Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals

    由於目前尚未有對長pn調制號進行檢測和參數估計的研究,而長調制較好的保性能以及抑制部分符號間干擾的優點,使其在軍事中有著較好的應用前景,因而此部分工作具有重要的意義。
  11. Traditional laser iff has poor security because of low frequency of laser beam coded pulse. this can be greatly improved when the pulses are modulated by continuous wave laser, but the power of this laser beam output is so low that it ’ s difficult to be detected and received by laser warning subsystem

    傳統的激光敵我識別器激光編脈沖頻率低,性差,使用連續波激光器經調制后激光編脈沖頻率高,保性好,但輸出激光功率較低,難以達到激光告警分機探測接收的要求。
  12. The technology of the text digital watermark is a cross marginal subject which relates to researches of cryptography, graphics, science of vision, chinese information processing, image processing, communications, and information security, etc and is a very new research direction in theory at present

    文本數字水印技術是一個涉及學、圖形學、視覺科學、中文息處理、圖像處理、息安全等學科的交叉邊緣科學,目前在理論上是很新的一個研究方向。
  13. This is an important thing to keep in mind when using the " anonymous proxy " services available across the internet : how well can you trust them since you re sending usernames and passwords through their systems

    在使用internet上的「匿名代理」時,記得這一點尤其重要:您正在過它們的系統來發送用戶名和,怎樣才能相它們呢?
  14. With the rapid development of it and computer technology, information and communication securities become more important. quantum communication is one of the most important technologies, which is the combination of quantum mechanics and cryptography

    隨著息技術的飛速發展,息安全與日益重要與突出。量子訊是量子力學和技術相結合的產物,是當今的熱點技術之一。
  15. Therefore, blys, its receptor or related antagonists may find medical utility in the treatment of b cell disorders associated with autoimmunity, neoplasia, or immunodeficiency syndromes. in this study, epo signal peptide sequence and hsblys gene were linked by soe method. the fusion product was cloned into eukaryotic plasmids. pcdna3, pcdna3. 1, pefneo, respectively. meanwhile, the epo signal peptide sequence was mutated so as to form a restriction enzyme cut site : bin i. thus the recombinant plasmid can be used as secreting plasmid expressing other gene

    本實驗過3 』端互補,進行引物延伸合成epo號肽序列:號肽和hsblys基因採用重疊延伸拼接法形成融合基因;融合基因分別插入pcdna3 . 0 、 pcdna3 . 1 、 pefneo真核載體:引物延伸合成號肽時,利用亮氨酸同義,將號肽基因的倒數第二個突變,在重組載體上的號肽序列之後,形成bln酶切位點,使三種載體成為分泌表達載體。
  16. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字封,這些代主要完成電子郵件的加,把想打開封而沒有正確數字鑰的入侵者擋在外面,數字封主要由或軟體演算法加的代組成,運載著能正確讓接收方識別發送方身份的數字簽名。
  17. In this paper, the application of spin chain in the quantum information processing is introduced, including the application in quantum cryptography, teleportation and quantum computation. spin chain can be used as quantum channel to transport quantum state, and can also be used to realize general quantum gate

    介紹了自旋鏈在量子息過程中的應用,包括在量子和隱形傳輸中以及量子計算中的應用,自旋鏈可以充當量子道用來傳輸量子態,自旋鏈也可以用來實現量子用門。
  18. It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication

    量子具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際發生之前,不需要交換私鑰。
  19. By theory and practice simulation, the several types of constant envelope modulation techniques are analyzed and compared, including theirs modulation principle, phase path, the modulated wave envelope, power spectrums, error bit rate and the influence of its power spectrums of the band - limited and non - linear, etc. especially we have researched the ijf - oqpsk modulation technique, and the performance of its inter - symbol interference and time jitter free, and its strongly resisting of spectral spreading

    結合理論和實驗模擬結果,分析討論了衛星中的各種恆包絡調制技術,對它們的調制原理,相位路徑,已調波包絡,功率譜度,誤性能,以及帶限非線性道對其功率譜的影響等方面都作了研究和比較。特別研究了ijf ? oqpsk在消除間干擾和定時抖動方面的性能及其優良的旁瓣特性和抑制頻譜擴展特性。
  20. The failure of the cardholder to observe or follow any recommendation of the bank from time to time regarding the safety and secrecy of the card and the pin or the failure to report the loss or theft of the card or loss, theft or disclosure of the pin to a third party to the bank as soon as reasonable practicable upon discovery thereof shall constitute gross negligence

    持卡人在保管此卡或該方面未能遵守本銀行不時向持卡人建議之任何保管用卡及或私人措施,或未能在合理時間內及時知本銀行有關用卡遺失或被竊事宜或私人被外泄予他人,可被視作為疏忽行為論。
分享友人