access sequence 中文意思是什麼

access sequence 解釋
存取順序
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • sequence : n 1 繼續;接續;連續。2 順序;程序;次第;關系;關聯。3 後果;結果;接著發生的事;後事;後文。4 ...
  1. Direct sequence - code divition multiple access ( ds - cdma ) technology is achieved easily and used widely at present its receiver capability is confined by two factors, one of which is the multiple access interference ( mai ) which makes the capacity low, another of which is the near - far problem

    直接序列擴頻-碼分多址( ds - cdma )技術是最易實現、也是目前應用最廣的一種方式,它的接收性能受到兩個主要的限制:一個是多址干擾造成的性能下降;另一個則是遠近效應問題。
  2. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma技術以其高抗干擾能力、高容量、高保密性等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。
  3. By associating the synchronization point of process with thread status, tc looks into and confines the correct sequence of memory access events from the os aspect to ensure programs correct running. tc organically associates process management module with memory management module

    線程一致性模型通過將并行程序執行過程中的同步點和線程狀態結合起來,從操作系統的角度來觀察和限制存儲訪問的正確順序,從而保證了并行程序的正確執行。
  4. Obviously, the main reason sequences are useful is that it s easy to access the items in the sequence

    很明顯,序列較為有用的主要原因是它可以非常方便地訪問序列中的條目。
  5. The member function returns a random - access iterator that points at the first element of the sequence ( or just beyond the end of an empty sequence )

    這個函數返回一個可任意訪問序列元素的迭代器,這個迭代器指向序列的第一個元素.然後你可以通過這個所謂的迭代器來遍歷這個序列
  6. The system checks the access control entries in sequence until it finds one or more that allow all the requested access rights or until any of the requested access rights are denied

    系統按順序檢查訪問控制項,直到找到一個或多個允許所有請求的訪問權限的項,或者直到所有請求的訪問權限均被拒絕。
  7. Based on traditional derivative theories of commercial banks to operate internationally, retrospect of international development of overseas banks ’ international operation, combined with international operation history and current situation of our country ’ s state - owned banks, this paper puts forward strategies for international operation, that is, conducting a perfect market access study of targeted country, advancing ladder likely in term of territory, following the prescribed order in terms of organizing means, improving in proper sequence in terms of product strategy, this paper puts forward to construct internal risk control system and strengthen home country ’ s regulation on overseas institutions, advance process of commercial banks ’ international operation

    隨著我國加入wto 「后過渡期」的日益臨近,佔有我國金融絕對比重的國有商業銀行必然要面對與國際金融市場融合的新形勢,實施國際化經營。本文在闡述商業銀行跨國經營的傳統成因理論的基礎上,回顧海外銀行業國際化發展的歷史,結合我國國有商業銀行當前現狀,提出了國際化經營策略,即做好東道國市場準入研究,在地域上梯次推進,組織方式上按部就班,產品策略上循序漸進,以期解決在哪裡經
  8. By theory analysis and computer simulation, dual control write sequence read medium access control protocol ( d - mac ) we bring forward works better than typical global fifo mac protocol. in order to let residential and small business customers enjoy all kinds of services that backbone network provides economically as early as possible, we design a switch hub

    經過理論分析和計算機模擬,可以證明我們提出的雙控制寫入順序讀出媒質接入控制協議( d - mac )是一個非常有效的,比典型的globalfifomac協議具有更小的傳輸時延和信元時延抖動。
  9. Access burst sequence ab

    接入突發脈沖序列
  10. Then taken four kinds of maps for examples, comparing with m - sequence, their properties are calculated, verifying the advantages of the chaotic sequence generated by the new method. after this, an improved scheme is discussed - - using m - sequence to change the sequence ’ s turn and verifying that the permutation parameters have effect on improving the sequence ’ s properties. in chapter 5, monte carlo simulation method is used to test performances of our sequences ’ applications in the given model of direct spread spectrum cdma system, and results of error rate of the system are given ; the comparing resuls of performances of anti - multi - access interference and anti - multi - address interference of different pn sequence is also shown in this thesis

    本文首先對擴頻通信中常用二進制偽隨機序列的產生方法、性能特點進行了總結,指出了現有二進制偽隨機序列的應用局限性;其次,根據混沌非線性系統特徵,深入研究了混沌數字序列的產生方法;在此基礎上,提出了一種新的產生方法中間抽取法,然後,以四種混沌映射系統為例,對其所產生的混沌數字序列進行了偽隨機特性實驗數據分析,並與m序列進行比較,結果說明了混沌數字序列代替傳統擴頻序列的優點,同時驗證了新方法的可行性。
  11. The technology of direct sequence spread spectrum / code division multipul access ( dsss / cdma ) are applied in the broadband code division multiplex wireless communication systems, which means transmitting data at the rate of 2. 048mbps using four e1 lines within the band of 20mhz. in this paper, the theory of the whole debice is first analysized specified for the system asic design and optimizing its performance

    寬帶碼分復用無線傳輸系統是採用直接序列擴頻/碼分多址( dsss / cdma )技術,在20mhz頻帶內實現四路2 . 048mbps的e1鏈路數據速率的無線傳輸。本文首先分析了整個數傳設備實現原理,針對系統asic設計和優化整機集成性能出發,提出並實現了基於fpga控制pm4314e1晶元的介面模塊完成對e1鏈路信號的監控和告警功能的改進方案。
  12. Combining walsh sequence with direct spread spectrum sequence, we can construct hybrid ds - fh spread - spectrum communication mode. this is very important for the mode to have better performance on anti - multiple - access inference and anti - near - far inference

    將walsh函數序列與直接擴頻序列相結合構成的ds - fh混合擴頻通信方式對于系統抗多址干擾和遠近效應具有重要意義。
  13. Direct sequence spread spectrum ( ds ) signals have been widely used for secure communication and mobile communication known as code division multiple access ( cdma ) system. because ds signals have many advantages such as anti - jamming capability, low probability of interception, multiple access capability and so on

    直接序列擴頻通信具有低截獲概率,抗干擾能力強以及實現碼分多址等優點,因而在抗干擾通信及民用移動通信中得到廣泛的應用。
  14. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  15. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  16. Broadband direct sequence cdma for fixed wireless pstn access - layer 2

    固定式無線pstn訪問用寬帶直接順序cdma . 2層
  17. Broadband direct sequence cdma for fixed wireless pstn access - layer 1

    固定式無線pstn訪問用寬帶直接順序cdma . 1層
  18. When you do this, the visual basic compiler does not have access to the information it needs to call the procedure correctly, such as where the procedure is located, how it is identified, its calling sequence and return type, and the string character set it uses

    當您這樣做時, visual basic編譯器沒有權限訪問其正確調用過程所需的信息,例如過程的位置、標識方式、調用順序和返回類型,以及過程使用的字元串字符集。
  19. Similarly, operations on data may require access to more than just one element at a time in a predetermined sequence

    同樣,對數據的操作可能需要按預定的順序一次訪問一個以上的數據元素。
  20. If you have multiple lists sharing the same sublist, it looks like a tree graphically, but because the lists only go in a straight sequence, you cannot access the other branches from any other branch

    如果有多個列表共享同一個子列表,那麼從圖形上看,它像是一棵樹,但是由於列表只能向同一方向前進,所以在任何分支上都不能訪問其他分支。
分享友人