• One of the advantages of OFDM is the flexibility concerning modulation and multiple access techniques.

    调制方式多址接入灵活性正交频分复用(OFDM)技术优点

    youdao

  • CDMA mobile communication system adopts multiple access techniques which means different address codes are used to distinguish users, base stations and channels.

    CDMA蜂窝移动通信系统是一采用技术的通信系统,即采用不同地址码区分用户基站信道

    youdao

  • Two multiple access techniques are analyzed in the context of this paper: Orthogonal frequency division multiplexing (OFDM) and code division multiple access (CDMA).

    介绍无线接入网中的两种关键技术:OFDM(正交复用)CD MA(码分多址)。

    youdao

  • Wireless telecommunications system with CDMA, FDMA and TDMA multiple access component, especially 'JD-CDMD' telecommunications system with hybrid multiple access techniques.

    具有码分,频分时分组成部分无线通信系统尤其是具有混合多址技术的“联合检测码分多址通信系统。”

    youdao

  • MESBIC's are the result of the belief that providing established firms with easier access to relevant management techniques and more job-specific experience, as well as substantial amounts of capital.

    MESBIC建立基于这种信念已建公司提供方便,使它更容易获得相关管理技术具体的工作经验以及大笔资金

    youdao

  • To apply these techniques, you need to access the root account.

    应用这些技术需要能够访问账户。

    youdao

  • In the sections that follow you'll learn techniques for designing and implementing data access objects.

    下面一节中学习设计实现数据访问对象技术

    youdao

  • What has often made the situation difficult for the customer (and for anyone troubleshooting these problems) is limited access to and understanding of troubleshooting tools and techniques.

    由于难于获得了解故障检修工具技术用户(任何解决这些问题人)经常陷入困境之中。

    youdao

  • A transaction implementation style that may use SOA techniques to access master data services as part of an application transaction.

    事务实现风格可以使用SOA技术在处理应用程序事务过程中访问数据服务

    youdao

  • The account has no access unless profiles are created for it, but using the techniques from the first case study would require a profile for every queue to which the channel needs access.

    创建配置文件之前帐户具有权限使用第一个中的技巧需要通道访问队列创建一个配置文件。

    youdao

  • Now that the view injects the filter predicate at the SQL level, DB2 can take advantage of the usual database techniques, that is index access.

    现在视图sql注入过滤谓词DB 2可以利用通常数据库技术索引访问

    youdao

  • "Laparoscopic" surgery describes the techniques a surgeon USES to gain access to the internal surgery site.

    腹腔镜手术一种手术技术外科医生可以利用腹腔镜达到内部器官和手术部位

    youdao

  • More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.

    准确地说安全性一个过程,它应用多种技术防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问

    youdao

  • Consider the difficulty in gaining access to multiple data stores, all of which require different authentication techniques.

    请考虑获得多个数据存储(其中所有数据存储都需要不同身份验证技术)的访问权限时所存在的困难

    youdao

  • Dominick points at techniques for detecting metadata retrieval requests in his postAuthorizing Access to WCF Metadata”.

    另外WCF数据授予访问权限”文章Dominick还从技术角度谈到检测元数据检索请求等。

    youdao

  • In this article, I demonstrated how to use two different techniques to access data dynamically from a Web page to create an RSS reader on the page.

    篇文章中,演示了如何使用两种不同技术动态访问web页面中的数据,从而页面创建一个RSS阅读器

    youdao

  • The techniques involved in implementing an EAz data access object to persist and retrieve permissions.

    实现EAz数据访问对象保持检索权限涉及技术

    youdao

  • Root exploits refer to techniques that gain super user access to the server.

    Rootexploits 是指获取超级用户密码访问系统的技术

    youdao

  • Unauthorized access using techniques such as dictionary attack and falsified message.

    非授权访问,实施攻击技术包括目录攻击伪造消息

    youdao

  • You can access information managed by other services, such as the portlet definition registry service or portlet entity registry service, using the same techniques to wrap each component as a GBean.

    可以访问其他服务所管理信息例如portlet定义注册服务portlet实体注册服务,使用相同技术每个组件打包g Bean。

    youdao

  • The following untyped DataSet techniques have various combinations of convenience and performance. First, you can access the value of a column using a DataColumn instance

    以下非类型化数据技术方便性性能各种组合

    youdao

  • That said, hackers have been known to gain local access to networks. Good network administrators should be aware of ARP Cache Poisoning techniques.

    就是说黑客知道接入了这个网络优秀网络管理员应该意识到ARP缓存中的技术

    youdao

  • They are often REST-based and therefore require only a simple HTTP access to retrieve the data and parse it using the preceding techniques.

    它们通常基于REST因此只需一个简单HTTP访问就可以检索数据使用前面介绍的结束来解析数据。

    youdao

  • When there are multiple tasks waiting to gain access to data structures, there are multiple techniques that can be used.

    多个任务等待访问数据结构时,可以使用多种技术

    youdao

  • It focuses on adoption of proper techniques and policies to improve case quality, boost access performance, and increase the efficiency and competence of the CBR systems.

    如何采取合适的策略技术提高案例质量改进案例库访问性能提高CBR系统效率能力成为人们关注焦点。

    youdao

  • The techniques used to hack the vehicles' controls are sophisticated, and many require physical access to the engine, so for the moment this is unlikely to happen to your car.

    侵入车辆控制系统技术复杂许多需要能够发动机进行实体连接类事件不可能发生汽车上的。

    youdao

  • This paper briefly introduces various Media Access Control (MAC) techniques used in present networks.

    概述目前各种网络应用媒体访问控制(MAC)技术

    youdao

  • This paper briefly introduces various Media Access Control (MAC) techniques used in present networks.

    概述目前各种网络应用媒体访问控制(MAC)技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定