-
1 bit-by-bit code changing method
смена кода для каждого информационного символа; схема с поразрядным изменением кодов (способ закрепления кодов за абонентами в ПРС с расширением спектра сигналов, согласно которому для передачи каждого двоичного символа, используется отдельный расширяющий спектр код; применяется, напр., для борьбы с многолучевостью); см. также bit-homogeneous code assignmentАнгло-русский словарь промышленной и научной лексики > bit-by-bit code changing method
-
2 bit-nonhomogeneous code assignment
закрепление кодов со сменой от символа к символу; метод разрядно-неоднородного присвоения кодов; см. bit-by-bit code changing method; code assignmentАнгло-русский словарь промышленной и научной лексики > bit-nonhomogeneous code assignment
-
3 схема с поразрядным изменением кодов
Computers: bit-by-bit code changing methodУниверсальный русско-английский словарь > схема с поразрядным изменением кодов
См. также в других словарях:
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Threaded code — Not to be confused with multi threaded programming. In computer science, the term threaded code refers to a compiler implementation technique where the generated code has a form that essentially consists entirely of calls to subroutines. The code … Wikipedia
Atari 8-bit family — The Atari 8 bit family is a series of 8 bit home computers manufactured from 1979 to 1992. All are based on the MOS Technology 6502 CPU and were the first home computers designed with custom coprocessor chips, giving them the most powerful… … Wikipedia
Conjugate gradient method — A comparison of the convergence of gradient descent with optimal step size (in green) and conjugate vector (in red) for minimizing a quadratic function associated with a given linear system. Conjugate gradient, assuming exact arithmetic,… … Wikipedia
Huffman coding — Huffman tree generated from the exact frequencies of the text this is an example of a huffman tree . The frequencies and codes of each character are below. Encoding the sentence with this code requires 135 bits, as opposed of 288 bits if 36… … Wikipedia
information processing — Acquisition, recording, organization, retrieval, display, and dissemination of information. Today the term usually refers to computer based operations. Information processing consists of locating and capturing information, using software to… … Universalium
Protected mode — This article is about an x86 processor mode. For Internet Explorer Protected Mode, see Mandatory Integrity Control. x86 processor modes Mode First supported Real mode Intel 8086 8080 emulation mode NEC … Wikipedia
Digital AMPS — IS 54 and IS 136 are second generation (2G) mobile phone systems, known as Digital AMPS (D AMPS). It was once prevalent throughout the Americas, particularly in the United States and Canada. D AMPS is considered end of life, and existing networks … Wikipedia
information theory — the mathematical theory concerned with the content, transmission, storage, and retrieval of information, usually in the form of messages or data, and esp. by means of computers. [1945 50] * * * ▪ mathematics Introduction a mathematical… … Universalium
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Universal Character Set — The Universal Character Set (UCS), defined by the ISO/IEC 10646 International Standard, is a standard set of characters upon which many character encodings are based. The UCS contains nearly a hundred thousand abstract characters, each identified … Wikipedia