ID |
原文 |
译文 |
44746 |
我国提出了“中国制造 2025”,从国家发展战略的层面确定了以智能制造为主的发展方向。 |
“Made in China 2025” was proposed by China which determines the development direction based on intelligent manufacturing in the level of national development strategy. |
44747 |
以我国工业智能制造现状和技术优势为依据,以灵活、平滑、成本可控的方式帮助大中小生产企业实现工业智能化为目的,提出了“工业智能网”的概念,融合我国在信息基础设施建设、认知识别、人工智能等方面的条件和优势,构建工业智能网,以服务方式向大中小企业提供工业智能化解决方案,让更大范围内的生产企业以更低成本的方式实现智能制造。 |
Based on the status quo and technological advantages of China's industrial intelligent manufacturing,and aiming to help large, medium and small-sized production enterprises achieve industrial intelligence in a flexible,smooth and cost-controllable manner, the concept of “industrial intelligent network” was proposed to integrate the conditions and advantages in aspects of China's information infrastructure construction, cognitive identification, artificial intelligence, etc., to build an industrial intelligent network, to provide industrial intelligent services to large, medium and small-sized enterprises, so that production enterprises within a broader scale can benefit from intelligent manufacturing with lower costs. |
44748 |
当前,已有 k 次属性认证(简称 k-TABA)方案以及相关属性认证方案的主要缺点是认证子协议的运算复杂度依赖于属性认证策略的规模,而且并未考虑成员废除和属性更新问题。 |
At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA)schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the access formula and none of these schemes considers the problems of member revocation and attribute update. |
44749 |
基于直接匿名证明、集合成员身份证明和密文策略属性加密技术构造了新的 k-TABA 方案。 |
A new k-TABA scheme was constructed based on the building blocks of direct anonymous attestation,set membership proof and ciphertext-policy attribute-based encryption. |
44750 |
为了进一步优化用户端运算效率,首先对底层属性加密方案进行修改,然后利用 Green 等的密钥绑定技术对解密过程进行外包。 |
Moreover, in order to reduce user’s calculation as much as possible, the underlying attribute-based encryption scheme was modified, and then the main decryption operations were outsourced by using the key binding technique of Green et al. |
44751 |
该方案不但可部署于可信平台,而且支持可表述性认证策略。 |
The new scheme can be deployed on a trusted platform and support expressive authentication policies. |
44752 |
此外,该方案满足多个理想性质,诸如注册过程可验证性、成员废除和属性更新等。 |
In addition, it also satisfies several ideal properties, such as registration process verifiability, member revocation, attribute update, and so on. |
44753 |
该方案最显著的性能优势是用户在认证阶段的运算开销为常数。 |
The significant performance advantage of the new scheme is that the computation overhead of the user in the authentication phase is constant. |
44754 |
针对软件定义网络功能虚拟化环境下跨域服务链映射问题,提出了一种区域集中管理、全局协同调度的虚拟服务资源管控架构。 |
A virtual service resources controlling architecture with regional centralized management and global coordinated scheduling was proposed for the problem of cross-domain service chain mapping in SDNFV environment. |
44755 |
在此基础上,建立了一种有效的跨域服务链映射框架,在此框架下将跨域服务链映射问题建模为以最小化映射开销为目标的整数线性规划问题, |
On this basis, an effective mapping framework was built and the cross-domain mapping problem was modeled as an ILP with the purpose of minimizing mapping cost. |