ID |
原文 |
译文 |
46046 |
OPNET 仿真结果表明 SPEMR 实现的多径方案的性能劣化指数为 0.32,仅为 TLR 路由协议的 32%,传统 DSP 方案的 21%, |
OPNET simulation results indicate that the performance degradation index(DI) of the multi-path scheme implemented by SPEMR is 0.32, which is only 32% of the TLR and 21% of the traditional DSP scheme. |
46047 |
具有相对更强的实时传输海量数据的能力。 |
It is demonstrated that SPEMR has the better capability of transmitting massive data in real time. |
46048 |
在高维向量检索中,距离计算是很耗时的操作,当前科研趋势是采用分治法来减少距离计算。 |
In the high-dimensional vector retrieval, distance computation is a very time-consuming operation, the current research trend is to reduce the distance computation using divide and conquer algorithm. |
46049 |
iDistance通过锚点将向量空间划分为聚类子空间,BC-iDistance 通过 BC 码将聚类子空间每维划分成 2 个区域。 |
iDistance algorithm divides the vector space into subspace of clustering by pivot, BC-iDistance algorithm divides the subspace into 2 partitions in each dimension. |
46050 |
提出一种更加细粒度的区域划分方法和索引结构,每个区域对应一个细粒度位码 FGBC(fine grained bit code),通过 FGBC码实现了对候选集更精准的过滤。 |
A more fine-grained partition algorithm and index structure was proposed, each part corresponded with a unique FGBC code (fine-grained bit code), which realized the candidate sets filtered more precisely. |
46051 |
FGBC-iDistance 的距离计算次数最好能减少到 iDistance 的212d, |
The distance computation times of FGBC-iDistance can be reduced to212dof iDistance. |
46052 |
在距离计算次数上,有 FGBC-iDistance≤BC-iDistance≤iDistance。 |
The distance computation frequency comparison:FGBC-iDistance≤BC-iDistance≤iDistance. |
46053 |
实验结果表明当范围查询半径为 0.08 时,FGBC-iDistance的距离计算次数约为 20 000 次,远小于其他算法,运行时间也相应减少。 |
The experiment results show that when the scope radius of the range queryis 0.08, FGBC-iDistance distance computation times is about 20,000, which is far less than other algorithms, the running time is also reduced. |
46054 |
网络协议的隐形攻击行为生存性、隐蔽性和攻击性强,且不易被现有的安全防护手段检测到。 |
The survivability, concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures. |
46055 |
为了弥补现有协议分析方法的不足,从实现协议程序的指令入手,通过动态二进制分析捕获协议的正常行为指令序列。 |
In order to compensate for the shortcomings of existing protocol analysis methods, starting from the instructions to implement the protocol program, the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis. |