ID 原文 译文
17535 实验表明,该方法充分利用了网络不同深度的信息和关注的关键信息,使模型具有很强的判别能力,而且所提模型的平均准确率优于大多数先进算法。 Experiments show that the method makes full use of the information of different depths of the network and the key information of interest, so that the model has strong discriminating ability, and the average accuracy of the proposed model is better than most state-of-the-art algorithms.
17536 神经网络的深度在一定范围内与识别效果成正相关, The depth of neural network is positively correlated with the recognition effect in a certain range.
17537 为解决超出范围后网络层数增加识别准确率却下降的模型饱和问题,该文提出一种具有高效的微块内部结构和残差网络结构的神经网络模型,用于对舰船目标基于高分辨距离像的分类识别。 In order to solve the problem that model recognition accuracy decreases when the number of network layers increases after exceeding the range. A neural network model with efficient micro internal blocks structure and residual network structure is proposed, which is used for recognition of ship targets based on High RangeResolution Profile (HRRP) data.
17538 该方法利用具有小尺度卷积核的卷积模块提取目标的稳定可分特征,同时利用联合损失函数约束目标特征的类内距离提高识别能力。 In this method, the convolution module with a small scale convolution kernelis used to extract automatically the stable and separable features of target. And the intra-class distance of thetarget is constrained by the joint loss function to improve the recognition ability.
17539 仿真结果表明,该模型相比于其他常见网络结构,在模型参数更少的情况下,识别效果更好,同时具有较强的噪声鲁棒性。 Simulation results show thatcompared with other common network structures, this model has better recognition performance and strongernoise robustness with fewer model parameters.
17540 针对现有的密钥生成方案需要在通信流程中增加额外的密钥协商协议,导致在5G等标准通信系统中应用受限的问题,该文提出一种基于极化码的无协商密钥物理层安全传输方案。 The existing key generation scheme requires additional key reconciliation protocol in acommunication process, resulting in the limited application to the communication system, such as the Fifth-Generation mobile communication (5G). A physical layer secure transmission scheme with a joint polar codeand non-reconciliation secret keys is proposed.
17541 首先基于信道特征提取未协商的物理层密钥,然后针对物理信道与密钥加密信道共同构成的等效信道设计极化码,最后利用未协商的物理层密钥对编码后的序列进行简单的模二加加密后传输。 Firstly, the non-reconciliation physical layer keys are extracted from the channel feature, and then the polar code is designed based on the equivalent channel, which is formed by the physical channel and the key encryption channel. Finally, the encoded sequence is simply modular plusencrypted and transmitted using the non-reconciliation physical layer key.
17542 该方案通过针对性设计的极化码纠正密钥差异和噪声引起的比特错误,实现可靠的安全传输。 Key differences and noise-induced biterrors are corrected through a targeted design of polarization codes to achieve reliable and secure transmission.
17543 仿真表明,该文基于等效信道设计的极化码在保证合法双方以最优的码率可靠传输的同时可以防止窃听者窃听,实现了安全与通信的一体化。 The simulation shows that the polar code based on the equivalent channel can ensure the reliable transmission between two legitimate users at the optimal code rate.
17544 针对无线传感器网络中恶意节点产生的选择性转发攻击行为,该文提出一种有效的攻击检测方法。 For the selective forwarding attack behavior generated by malicious nodes in wireless sensor networks, an efficient detection method is proposed.