您要查找的是不是:
- key code receiver 键控代码接收机
- And we show the key code and the datastructure. 说明了其中关键代码的实现和数据结构的设计。
- Keypad Interface Key Code Return. 键盘接口按键数据返回;
- Gets the key code of the key that raised the keyUp or keyDown event. 获取引发keyUp或keyDown事件的键的键代码。
- Theory analysis show s that this kind of key code dis tribution's p rotocol is absolutely safe. 理论分析表明这种密钥分配协议是安全可靠的。
- Lists Visual Basic 6.0 Key Code constants and their Visual Basic 2005 equivalents. 列出Visual Basic 6.;0 Key Code常数与其Visual Basic 2005等效项。
- This paper gives the key code of identifying the removable storage device in system development. 给出了实际开发过程中对可移动存储设备识别的关键代码。
- Mr. Tedesco: Nonsense, only I understand the key coding system. 弗朗西斯:给你?只有我知道这钥匙的密码。
- This paper use DLL to realize Z39.50 client and provides the key code which realize the business of Z39.50 client. 摘要介绍了一种利用DLL(动态链接库)技术来实现Z39.;50客户端开发的方法并给出实现业务的关键代码。
- Based on the acquisition principle of GPS receivers,effect of single frequency interference on GPS C/A code receiver acquisition performance is analyzed. 在GPS接收机信号捕获原理的基础上,分析了点频干扰对接收机捕获性能的影响。
- Based on it,as the foremost arithmetic of open key code,RSA is very safe,and have been faultness for20years,but the workload is very huge too. 因此,rsa算法的安全性很高,但算法工作量大。
- The system is characterized by adopting the mixture model of C/S and B/S and using the key code as identity recognition. 文中主要是从身份的识别和密钥生成、分配、传递体系,这两个方面分析和解决系统的安全问题。
- The permissions that managed code receives are determined by the security policy in effect. 属性传递。托管代码接收的权限由有效的安全策略确定。
- The improvement of legislation on bribery guilt which suggests expand the scope of crime of bribery as well as abolish the key code of making benefits for others. 七是受贿罪的立法完善,建议扩大贿赂的范围并取消“为他人谋取利益”的要件。
- A low complexity code multi-path mitigation algorithm for the C/A code receivers based on the carrier-aided smoothing is then introduced and detailed. 利用载波多路径误差源小于伪码多路径误差的性质,提出了一种针对伪码接收机的低复杂度的载波辅助伪码抗多径算法,并对算法进行了深入讨论和分析。
- This paper gives new random coding algorithm and new random public key code algorithm. 提出了一种随机编码算法;以及一个公开密钥编码算法.
- This paper presents three points of application of DOW function in VFP6.0.Some key codes are also given. 介绍了VFP6.;0中DOW函数的三则应用;并给出了具体代码。
- Crop circles are static pictures of key codes and fire letters emanating through photonic sources. 麦田怪圈是透过光子源而散发的钥匙编码(即关键编码)和火焰字母。
- The image to be encrypted can be reconstructed by subtracted key codes from the encrypted date. 加密图像和随机二值实振幅掩模相减,相减后的光强分布可以重建原图像。
- Because these keys are not continua code, the PC may lose these keys code in sleep mode. 因此您必须多按几次这些按键来醒机。