广告人忽视研究,会像将领忽视破译敌人信号密码一样危险。(大卫·奥格威)。
Advertising people who ignore research are as dangerous as generals who ignore decodes of enemy signals.
其中许多从没有被研究过,不管是那些对它们潜在着的威胁,还是那些像莫尔斯密码一样传递着爱和危险信号的内在含义,这些都让科学家一头雾水。
Many have never been studied, leaving scientists in the dark about the potential threats and the meaning of their Morse code-like flashes that signal everything from love to danger.
双频路由器发送2.4GHz和5GHz两种频段信号,使之成为一个使用同样名称和密码的网络。
Dual-band routers transmit both the 2.4GHz and 5GHz bands as one network with the same name and password.
一旦与另外一部手机取得联系,由双方手机商定通信信号加密密码,再进行实质性通信。
Once a cell phone contacted with another, they will agreed to communications and encrypt the signal with a password from the two sides, and then substantive communication.
遥控:在远距离上对一个活动,过程或机器的控制,如通过广播的指令或密码信号。
The control of an activity, a process, or a machine from a distance, as by radioed instructions or coded signals.
混沌信号具有天然的随机性,可以作为序列密码应用于信息加密。
The chaotic signal, which possesses natural randomness, can be used for information encryption as sequence cipher.
胁迫功能可以让住户用密码打开门的同时发送一个信号给门房。
A duress function lets residents open the door with a code and at the same time send a signal to the concierge that there's a problem.
随机信号理论在它形成的初期,便在通信、雷达、导航以及密码学等领域中获得了广泛的应用。
The theory of random signal has been widely used in the fields of communication, radar, navigation and cryptology in the initial stage of its formation.
这部分中,本文提出了基于密码学算法的图象置乱方法和基于混沌序列的图象置乱方法,并把电视信号加密方法应用到数字图象置乱中去。
In this part, the scrambling methods based on cryptography and chaos sequences are presented, and the encryption methods used in the TV are applied to the digital image scrambling.
信息隐藏技术是一门多学科交叉的新兴学科,它涉及到了信息论、数字信号处置、密码学和数字通信。
Information hiding technology is a rising subject involved with information theory, Digital Signal Processing, Cryptography, Digital communication.
被盗后由于密码系统和信号处理及驱动系统不可分割,盗贼也无法正常使用该电动车。
After the electric vehicle is stolen, because a cipher system and a signal processing and drive system are inseparable, a robber can not normally use the electric vehicle.
被盗后由于密码系统和信号处理及驱动系统不可分割,盗贼也无法正常使用该电动车。
After the electric vehicle is stolen, because a cipher system and a signal processing and drive system are inseparable, a robber can not normally use the electric vehicle.
应用推荐