ID 原文 译文
20215 首先,利用模糊推理方法分析数据量、环境条件及设备消耗对任务代价的影响,将感知任务按照代价差异划分为不同等级,同时为请求者制定预算并给予参与者合适的报酬。 First of all, the fuzzyreasoning method is used to analyze the impact of data quantity, environmental conditions and equipmentconsumption on mission cost, and the sensing mission is divided into different levels on the basis of costdifference. Meanwhile, the method is used to prepare a budget for the requester and give the participant anappropriate reward.
20216 其次,通过信誉度评估和参与者优选将感知任务分配给更合适的参与者完成感知任务并上传感知数据。 Then, the sensing mission is assigned to more appropriate participants to complete thesensing mission and upload the sensing data through credibility assessment and participants’ preference.
20217 最后,对参与者上传感知数据评估,更新参与者信誉度,并根据参与者完成感知任务的代价等级支付相应报酬。 Finally, the sensing data uploaded by participants is evaluated, and the credibility of participants is updated.Besides, the participants are paid according to the cost level of perceived missions.
20218 基于真实数据集的仿真实验结果表明,该模型能够利用各个模块间的相互影响,有效招募更多的用户参与感知任务并促进参与者上传高质量的感知数据。 The simulation experiments based on the real data set show that the model can recruit more users to participate in the sensing mission effectively and promote participants to upload high-quality sensing data by using the mutual influence between different modules.
20219 针对半诚信的数据收集者对包含敏感属性(SA)数据收集和使用过程中可能造成隐私泄露问题,该文在传统模型中增加实时的数据领导者,并基于改进模型提出一个隐私保护的数据收集协议, Semi-honest data collectors may cause privacy leaks during the collection and use of SensitiveAttribute (SA) data. In view of the problem, real-time data leaders are added in the traditional model and aprivacy-protected data collection protocol based on the improved model is proposed.
20220 确保无可信第三方假设前提下,数据收集者最大化数据效用只能建立在K匿名处理过的数据基础上。 Without the assumption oftrusted third party, the protocol ensures that data collectors maximization data utility can only be establishedon the basis of K-anonymized data.
20221 数据拥有者分布协作的方式参与协议流程,实现了准标识(QI)匿名化后SA的传输,降低了数据收集者通过QI关联准确SA值的概率,减弱内部标识揭露造成隐私泄露风险; Data owners participates in the protocol flow in a distributed andcollaborative manner to achieve the transmission of SA after the Quasi-Identifier (QI) is anonymized. Thisreduces the probability that the data collector uses the QI to associate SA values and weakens the risk ofprivacy leakage caused by internal identity disclosure.
20222 通过树形编码结构将SA的编码值分为随机锚点和补偿距离两份份额,由K匿名形成的等价类成员选举获取两个数据领导者,分别对两份份额进行聚集和转发,解除唯一性的网络标识和SA值的关联,有效防止外部标识揭露造成的隐私泄露; It divides the coded value of the SA into two shares of arandom anchor point and a compensation distance through the tree coding structure and the members of theequivalent class formed by K-anonymity elect two data leaders to aggregate and forward the two sharesrespectively, which releases the association between unique network identification and SA values and preventsleakage of privacy caused by external identification effectively.
20223 建立符合该协议特性的形式化规则并对协议进行安全分析,证明了协议满足隐私保护需求。 Formal rules are established that meet the characteristics of the protocol and analyze the protocol to prove that the protocol meets privacy protection requirements.
20224 为提高吸波体吸波效率,该文设计了一种基于集总电阻加载的小型化超宽带超材料吸波体结构,该结构通过纵向级联的方式,结合上下两层吸波体结构拓展了带宽。 A metameterial absorber is designed, fabricated and experimentally demonstrated to realized ultra-wideband absorption based on loading lumped resistances to raise the efficiency of absorber. The proposed structure comprises of an upper absorber and an under absorber by longitudinal cascade to expand bandwidth.