ID |
原文 |
译文 |
18645 |
当前的显著性目标检测算法在准确性和高效性两方面不能实现良好的平衡, |
It is difficult for current salient object detection algorithms to reach a good balance performancebetween accuracy and efficiency. |
18646 |
针对这一问题,该文提出了一种新的平衡准确性以及高效性的显著性目标检测深度卷积网络模型。 |
To solve this problem, a deep convolutional network for saliency objectdetection with balanced accuracy and high efficiency is produced. |
18647 |
首先,通过将传统的卷积替换为可分解卷积,大幅减少计算量,提高检测效率。 |
First, through replacing the traditionalconvolution with the decomposed convolution, the computational complexity is greatly reduced and thedetection efficiency of the model is improved. |
18648 |
其次,为了更好地利用不同尺度的特征,采用了稀疏跨层连接结构及多尺度融合结构来提高模型检测精度。 |
Second, in order to make better use of the characteristics ofdifferent scales, sparse cross-layer connection structure and multi-scale fusion structure are adopted to improvethe detection precision. |
18649 |
广泛的评价表明,与现有方法相比,所提的算法在效率和精度上都取得了领先的性能。 |
A wide range of evaluations show that compared with the existing methods, theproposed algorithm achieves the leading performance in efficiency and accuracy. |
18650 |
针对蠕虫病毒通常只能感染特定操作系统的特点,该文研究了多操作系统异构网络中的病毒传播规律及安全性能优化策略。 |
In view of the fact that worm viruses can only infect specific operating systems, the virus propagationrule and security performance optimization strategy in multi-operating system heterogeneous network arestudied in this paper. |
18651 |
首先,考虑多数病毒仅限在同种操作系统之间的链路中传播,在SIRS病毒传播模型中引入异构边比例参数,通过系统平衡点求解和基本再生数分析,研究异构边对单系统病毒传播和网络安全性能的影响。 |
First, considering that most viruses can only spread in link between the same operationsystem, the parameters of heterogeneous edges ratio are introduced into the Susceptible Infected RemoveSusceptible (SIRS) virus transmission model, and the influence of heterogeneous edges and network securityperformance on the single system virus transmission is studied through system equilibrium solution and basicregeneration number analysis. |
18652 |
其次,按照动态目标防御思想和技术,设计了非异构边随机中断、非异构边随机重连和单操作系统节点随机跳变3种网络安全优化策略,分析了3种策略下异构边比例和基本再生数的变化及其对网络安全性能的影响。 |
Secondly, according to the moving target defense thought and technology, thenetwork security optimization strategies is designed for non-isomeric random interrupt, non-isomeric randomreconnecting and single operating system random node migration, and the variation of the same ratio and thebasic number of regenerated numbers in the three strategies and the impact on the safety of the network areanaylrzed. |
18653 |
最后仿真验证了病毒传播模型的正确性和3种策略的网络安全性能优化效果,同随机中断和随机隔离策略对比,分析其对网络安全性能和网络业务承载能力的影响。 |
Finally, the correctness of the virus propagation model is verified by simulation, and the network security performance optimization effects of the three strategies are analyzed. |
18654 |
为了研究忆阻系统的簇发振荡及其形成机理,该文在Shimizu-Morioka(S-M)系统的基础上引入忆阻器件和两个慢变化的周期激励项,建立了一种多时间尺度的忆阻型S-M系统。 |
In order to study the bursting oscillations and its formation mechanism of memristor-based system, amulti-timescale memristor-based S-M system is established by introducing a memristor device and two slowlychanging periodic excitations into the Shimizu-Morioka (S-M) system. |