- Industry: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
A hypothetical talker, within a log-normal distribution of talkers, whose volume lies at the medium power of all talkers determining the volume distribution at the point of interest. Note: When the distribution follows a log-normal curve (values expressed in decibels,) the mean and standard deviation can be used to compute the medium-power talker. The talker volume distribution follows a log-normal curve and the medium-power talker is uniquely determined by the average talker volume. The medium-power talker volume, V, is given by V = Vo + 0. 1152, where Vo is the average of the talker volume distribution in volume units (vu,) and 2 is the variance of the distribution.
Industry:Telecommunications
A jack used to access communications circuits to observe signal conditions without interrupting the services.
Industry:Telecommunications
A jammer in which the frequency of the jamming transmitter is fixed before the transmitter is placed in operation. Note: Preset jammers are most useful in airborne jamming operations where weight and space requirements may prohibit the use of operators or elaborate control equipment in flight. Preset jammers are usually used in barrage-jamming over a wide band, usually in overlapping series of frequency bands.
Industry:Telecommunications
A joint effort of U. S. Federal, state, and local governments to develop standards for interoperable digital, narrowband radios to meet public-safety user needs. Note: Secondary objectives of Project 25 include obtaining maximum radio spectrum efficiency, ensuring competition throughout the life of the systems.
Industry:Telecommunications
A key encrypting key or data key transported in a multiple center CSM for eventual distribution to a pair of subscribers.
Industry:Telecommunications
A key encrypting key or data key transported in a multiple center CSM for eventual distribution to a pair of subscribers.
Industry:Telecommunications
A key establishment protocol whose secret key is a function of information contributed by two or more participants, so that no party can predetermine the value of the key. 2. A method for negotiating a key value on-line without transferring the key, even in an encrypted form, e.g., the Diffie-Hellman technique.
Industry:Telecommunications
A key generated in a COMSEC device by introducing (either mechanically or electronically) a seed key into the device and then using the seed, together with a software algorithm stored in the device, to produce the desired key.
Industry:Telecommunications
A key held for use under specific operational conditions or in support of specific contingency plans.
Industry:Telecommunications