One of the advantages of OFDM is the flexibility concerning modulation and multiple access techniques.
调制方式和多址接入的灵活性是正交频分复用(OFDM)技术的一大优点。
CDMA mobile communication system adopts multiple access techniques which means different address codes are used to distinguish users, base stations and channels.
CDMA蜂窝移动通信系统是一种采用多址技术的通信系统,即采用不同的地址码来区分用户、基站和信道。
Two multiple access techniques are analyzed in the context of this paper: Orthogonal frequency division multiplexing (OFDM) and code division multiple access (CDMA).
介绍了无线接入网中的两种关键技术:OFDM(正交频分复用)和CD MA(码分多址)。
Wireless telecommunications system with CDMA, FDMA and TDMA multiple access component, especially 'JD-CDMD' telecommunications system with hybrid multiple access techniques.
具有码分,频分和时分多址组成部分的无线通信系统,尤其是具有混合多址技术的“联合检测码分多址通信系统。”
MESBIC's are the result of the belief that providing established firms with easier access to relevant management techniques and more job-specific experience, as well as substantial amounts of capital.
MESBIC的建立基于这种信念:为已建公司提供方便,使它更容易获得相关的管理技术,更具体的工作经验以及大笔资金。
To apply these techniques, you need to access the root account.
要想应用这些技术,需要能够访问根账户。
In the sections that follow you'll learn techniques for designing and implementing data access objects.
在下面一节中您将学习设计和实现数据访问对象的技术。
What has often made the situation difficult for the customer (and for anyone troubleshooting these problems) is limited access to and understanding of troubleshooting tools and techniques.
由于难于获得和了解故障检修工具和技术,用户(及任何解决这些问题的人)经常陷入困境之中。
A transaction implementation style that may use SOA techniques to access master data services as part of an application transaction.
事务实现风格,可以使用SOA技术在处理应用程序事务的过程中访问主数据服务。
The account has no access unless profiles are created for it, but using the techniques from the first case study would require a profile for every queue to which the channel needs access.
在创建配置文件之前,帐户不具有权限。但使用第一个用例中的技巧需要为通道访问的每一个队列都创建一个配置文件。
Now that the view injects the filter predicate at the SQL level, DB2 can take advantage of the usual database techniques, that is index access.
现在,该视图在sql级注入过滤谓词,DB 2可以利用通常的数据库技术,即索引访问。
"Laparoscopic" surgery describes the techniques a surgeon USES to gain access to the internal surgery site.
腹腔镜手术是一种手术技术。外科医生可以利用腹腔镜达到内部器官和手术部位。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
Consider the difficulty in gaining access to multiple data stores, all of which require different authentication techniques.
请考虑在获得对多个数据存储(其中所有数据存储都需要不同的身份验证技术)的访问权限时所存在的困难。
Dominick points at techniques for detecting metadata retrieval requests in his post “ Authorizing Access to WCF Metadata”.
另外在“给WCF元数据授予访问权限”文章中,Dominick还从技术角度谈到了检测元数据检索请求等。
In this article, I demonstrated how to use two different techniques to access data dynamically from a Web page to create an RSS reader on the page.
在这篇文章中,我演示了如何使用两种不同的技术动态地访问web页面中的数据,从而在页面上创建一个RSS阅读器。
The techniques involved in implementing an EAz data access object to persist and retrieve permissions.
实现EAz数据访问对象以保持和检索权限所涉及的技术。
Root exploits refer to techniques that gain super user access to the server.
Rootexploits 是指获取超级用户密码来访问系统的技术。
Unauthorized access using techniques such as dictionary attack and falsified message.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
You can access information managed by other services, such as the portlet definition registry service or portlet entity registry service, using the same techniques to wrap each component as a GBean.
您可以访问其他服务所管理的信息,例如portlet定义注册服务或portlet实体注册服务,使用相同的技术把每个组件打包成g Bean。
The following untyped DataSet techniques have various combinations of convenience and performance. First, you can access the value of a column using a DataColumn instance
以下非类型化数据集技术在方便性和性能上有各种组合。
That said, hackers have been known to gain local access to networks. Good network administrators should be aware of ARP Cache Poisoning techniques.
那就是说,黑客会被知道他接入了这个网络。优秀的网络管理员应该能意识到ARP缓存中的技术。
They are often REST-based and therefore require only a simple HTTP access to retrieve the data and parse it using the preceding techniques.
它们通常基于REST,因此只需一个简单的HTTP访问就可以检索数据,并使用前面介绍的结束来解析数据。
When there are multiple tasks waiting to gain access to data structures, there are multiple techniques that can be used.
当有多个任务等待访问数据结构时,可以使用多种技术。
It focuses on adoption of proper techniques and policies to improve case quality, boost access performance, and increase the efficiency and competence of the CBR systems.
如何采取合适的策略和技术来提高案例的质量,改进案例库访问性能,提高CBR系统的效率和能力成为人们关注的焦点。
The techniques used to hack the vehicles' controls are sophisticated, and many require physical access to the engine, so for the moment this is unlikely to happen to your car.
侵入车辆控制系统的技术很复杂,许多需要能够与发动机进行实体的连接,像这类事件是不可能发生到你的汽车上的。
This paper briefly introduces various Media Access Control (MAC) techniques used in present networks.
概述了目前在各种网络中应用的媒体访问控制(MAC)技术。
This paper briefly introduces various Media Access Control (MAC) techniques used in present networks.
概述了目前在各种网络中应用的媒体访问控制(MAC)技术。
应用推荐