ID |
原文 |
译文 |
45846 |
最后,仿真证明了所提方案的有效性。 |
Finally, simulation results verify the validity of the proposed scheme. |
45847 |
针对现有的相似性/相异性测度在量化证据冲突时存在的不足,定义一种新的被称为幂 Pignistic 概率距离的相异性测度, |
To deal with the shortcomings encountered when using the existing similarity/dissimilarity measures to quantify evidence conflict, a new dissimilarity measure called power-Pignistic probability distance was defined. |
45848 |
并提出基于幂 Pignistic 概率距离的加权证据组合方法。 |
Furthermore,a weighted evidence combination method was proposed based on power-Pignistic probability distance. |
45849 |
该方法通过幂 Pignistic 概率距离量化两证据之间的冲突程度, |
The conflict de-gree between two pieces of evidence was quantified by the power-Pignistic probability distance. |
45850 |
然后建立相似性矩阵并求得各证据的可信度, |
After that, a similarity measure matrix was constructed, based on which the credibility of evidence was obtained. |
45851 |
再用加权平均法修正证据, |
Then the weighted average method was used to revise the evidence. |
45852 |
最后利用 Dempster规则进行组合。 |
Finally, the fusion was accomplished by using Dempster’s rule. |
45853 |
数值算例的结果表明,所提方法是合理有效的。 |
The results of the numerical examples show the efficiency and rationality of the proposed method. |
45854 |
提出了一种静默池机制方法(SPA, silent-pool approach),当传感器节点感知到附近移动攻击者的存在,通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组。 |
Sensors’ ability was utilized to perceive the mobile attacker nearby, and SPA (silent-pool approach) was pro-posed, which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes. |
45855 |
在此基础上,进一步提出了对当前路由路径没有任何影响的安全机制——池外虚假信息注入(DPIOP, dummy packet injection out pool)法,诱使攻击者远离传输路径。 |
In addition, a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary faraway from the transmission path without changing the original routing path. |