• Not changing the Video Conference protocols in existence, we embed a good encryption algorithm (Permutation Code) in the system to safeguard the information of Multimedia.

    改变现有协议前提下嵌入性能良好加密解密算法排列算法)保障信息安全

    youdao

  • Then supplies realization of Encryption Chip based on Permutation Code by EDA, and integrates the modular of signal gathering so the chip can be used in voice communication encryption.

    通过EDA设计技术实现排列加密算法,加密芯片中集成信号采集模块可以使芯片应用语音通讯加密当中。

    youdao

  • In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.

    基于网络数据传输安全问题信息安全领域的重要课题之一,本文分析现有数据加密方法的基础上,数据传输系统应用一种基于分组密码新概念的新算法排列加密算法。

    youdao

  • To figure out what file is being compiled for each browser permutation, take a peek into the.nocache.js file and look for a section of code that looks similar to the code shown in Listing 16.

    弄清gwt编译每种浏览器编译出什么代码,请在.nocache . js文件查找类似清单16代码。

    youdao

  • The method used a parity-check matrix of a short LDPC code as its mother matrix upon which a long code was constructed with circulant permutation matrices.

    方法利用LDPC码的校验矩阵作为其母矩阵,此基础上采用循环置换矩阵构造一个长的LDPC码。

    youdao

  • The method used a parity-check matrix of a short LDPC code as its mother matrix upon which a long code was constructed with circulant permutation matrices.

    方法利用LDPC码的校验矩阵作为其母矩阵,此基础上采用循环置换矩阵构造一个长的LDPC码。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定