ID 原文 译文
45786 模型训练中,采用基于概率的训练方法。 In model training, the probabilistic training method was adopted.
45787 与改进前的模型相比,该模型能够更多地关注句子的全局特征;相较于最大化间隔训练算法,所提训练方法更充分地利用所有可能的依存句法树进行参数更新。 Compared with the original dependency paring model, the proposed model focused more on global features, and used all potential dependency trees to update model parameters.
45788 为了验证该模型的性能,在宾州中文树库(CTB5, Chinese Penn Treebank 5)上进行实验,结果表明,与已有的仅使用 LSTM 或 CNN 的句法分析模型相比,该模型在保证一定效率的同时,能够有效提升依存分析准确率。 Experiments on Chinese Penn Treebank 5(CTB5) dataset show that, compared with the parsing model using LSTM or CNN only, the proposed model not only re-mains the relatively low model complexity, but also achieves higher accuracies.
45789 提出了一种基于无线信息与能量同时传输的波束成形设计方案。 A beam-forming design was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.
45790 该方案在满足源节点信干噪比和中继传输功率等约束条件下,通过联合优化波束成形向量、功分因子和发射功率等参数实现能量收集的最大化。 A utility optimization problem was considered aiming to maximize the harvested energy by jointly optimizing the beam-forming matrix, the power splitting ratio at the relay and the transmit powers at the sources.
45791 此设计是一个非凸的优化问题,为了有效求解该问题,采用分步优化方法将原问题分解成 3 个子问题。提出利用半定松弛技术和约束激活准则分别求解 3 个子问题, To overcome this issue, the objective problem into three sub-problems was decoupled which could be solved by the proposed semi-definite relaxation technique and the derived constraints activation solution, respectively.
45792 并通过收敛迭代算法求得原问题的次优解。 The solution was finally obtained with the proposed convergent iterative algorithm.
45793 仿真结果表明,所提联合优化算法相比预编码、资源分配算法具有更好的性能, Simulation results show that the proposed joint optimization scheme achieves the optimal performance.
45794 且与传统的半双工算法相比,在计算复杂度略增的前提下其能量收集效率可提升 2~3 倍。 Compared with the traditional half-duplex (HD) algorithm, the proposed algorithm can obtain 2~3times energy harvesting (EH) efficiency improvement, while the computational complexity increases slightly.
45795 针对软件定义网络(SDN, software defined networking)中匹配域范围有限和缺乏有效的数据来源验证机制问题,提出基于密码标识的 SDN 安全控制转发方法。 Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN), a SDN security control forwarding method based on cipher identification was pro-posed.