keying-on 中文意思是什麼

keying-on 解釋
鍵控繼續
  • keying : 按電鍵
  • on : adv 1 〈接觸、覆蓋〉上去;開(opp off)。 turn on the light [radio water gas] 開電燈[收音機、自來...
  1. The keying emery cloth page wheel of the living handle, adopt the domestic and top import emery cloth, brute force sticks, reliable craft production, it is open and adequate distribution while using has improved the precision of using, especially suitable for the aluminium alloy die casting, rubing the polishing of the complicacy superficy of the mould and so on high precise products

    採用國產頂級砂布及進口砂布,強力粘接,可靠的工藝生產,使用時呈開放均勻分佈,提高了使用精度,特別適用於鋁合金壓鑄件,模具復雜型面等高精產品的磨削拋光。
  2. This thesis focuses on the performance of complete complementary keying modulation and multi - carrier cdma architecture based on complete complementary codes ( ccc - cdma )

    本文主要研究了基於互補碼擴頻的cck調制性能和基於完全互補碼擴頻的多載波cdma系統性能,主要工作可以分為以下幾個部分。
  3. Built upon the project designing voip terminal based on coldfire platform, my task is designing two protocol modules : the secure real - time transport protocol ( srtp ) and multimedia internet keying ( mikey ), and then implements them on target platform

    本課題是在「基於coldfire平臺的voip終端設計」項目背景下,設計並實現該項目中的兩個協議模塊:安全的實時傳輸協議srtp和多媒體網際網路的密鑰協議mikey 。
  4. On - off keying ook

    通斷鍵控
  5. On - off keying

    通斷鍵控
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  7. On exploring tfsk time frequency shift keying for improving underwater acoustic communication

    時頻編碼水聲通信技術及性能分析
  8. This dissertation, basing on simulation, makes a deep research on simulating signal of gmsk ( gaussian filtered minimun frequency shift keying ) baseband modulation and demodulation in ais ( automatic identification system ) equipment. the technology related in the following makes the modulation and demodulation of baseband signal into realization by ti dsp, at the same time, provides a key technique to develop ais system inland

    本文著重對自動識別系統( ais - automaticidentificationsystem )設備的高斯濾波最小頻移鍵控( gmsk - gaussianfilteredminimunfrequencyshiftkeying )基帶調制解調信號進行了模擬研究,並在模擬的基礎上,在ti的dsp上實現了基帶信號的調制解調,為國內研製ais系統儲備了關鍵技術。
  9. Chapter five highlighted on some applications of surface acoustic wave ( saw ) filters that have been used in mobile and wireless communications, we have explained two applications, binary phase - shift keying ( bpsk ), and differential phase - shift keying ( dpsk ), we also proposed an application to implement the cck codewords and the cck demodulation using saw matched filter

    第五章研究了聲表面波濾波器在移動通信、無線通信中的應用,主要介紹了三種應用:二進制相移鍵控( bpsk ) 、差分相移鍵控( dpsk ) ,以及用saw匹配濾波器實現cck調制和解調。
  10. To solve this problem, this thesis will focus on investigation of the following detection methods based on the features of the dsss signal and with the binary - phase - shift - keying dsss ( dsss / bpsk ) signal as an example. 1. the power spectrum of the dsss / bpsk signal is discussed and the detection performance in each power spectrum estimation method is compared in terms of nonparametric methods, parametric methods and subspace methods in power spectrum estimation

    本文針對這一問題,從dsss信號特徵出發,以二進制相移鍵控的直接序列擴頻( dsss / bpsk )信號為例,研究了以下檢測方法: 1 .從功率譜估計的非參數方法、參數方法和子空間方法入手,討論了通過不同類型方法估計的dsss / bpsk信號功率譜,並比較了各功率譜估計方法應用於dsss / bpsk信號檢測的性能。
  11. The chapters on " keying - in the engram and preventive dianetics " explain so much about how children and parents can cause restimulation within each other that i feel i have a better understanding of my parents and a lot more affinity for them

    戴尼提書中「印痕的鍵入與預防戴尼提」一章闡述過孩子和父母之間如何會引起引發刺激,於是我對父母有了更好的了解,也更親近與他們。
  12. As long as your e - cert on the smart id card can be accessed by keying in your e - cert pin, scratches on the surface of the chip should not affect your e - cert on the id card

    只要你能如常輸入你的電子證書密碼及使用智能身份證內的電子證書,已刮花的晶片將不會對你的電子證書造成任何影響。
  13. The reseach work focused on the time delay estimation of the common practical radar singnals, including harmonics signal, chirp signal, polynomial phase signal, and phase - shift keying signal. the new algorithm for different radar signals are deduced in detail respectively, and simulation results are presented. the results proved that the new method is efficient for time delay and some other parameters estimation

    正弦信號、線性調頻信號、多項式相位信號、相位編碼信號是雷達信號中常用的幾種信號,對這幾種信號的研究是雷達信號處理中非常重要的內容,也是實際工程的需要。因此,本文選擇上述幾種信號作為研究對象,對這幾種信號的時延估計演算法進行了建模和理論推導,給出了時延估計演算法的具體表達式,並進行了計算機模擬。
分享友人