ID |
原文 |
译文 |
46136 |
针对传统产业发展能力评价方法依赖决策者的主观判断,缺乏客观性等问题,提出应用 BP 神经网络模型进行大数据产业发展能力评价,设计基于熵权的 BP 神经网络评价模型。 |
Traditional evaluation methods of industrial development ability were mostly lack of objectivity. An evaluation model was proposed by using a BP neural network based on entropy weight. |
46137 |
建立欠发达地区大数据产业发展能力评价指标体系, |
Evaluation index system of big data industry development ability in underdeveloped areas was established. |
46138 |
以贵州省产业发展数据作为实验样本,采用熵权法确定 BP 网络期望输出,并与 BP 网络实际输出进行比较。 |
Taking Guizhou industrial development data as samples,entropy weight method was used to determine expected output and compared with the actual output. |
46139 |
实验结果表明,所提熵权-BP 评价模型优化了单一 BP 神经网络求权重可能带来的较大误差,提高评价准确性与客观性,适用于欠发达地区大数据产业发展能力评价。 |
The experimental results show that the proposed entropy weight-BP evaluation model can optimize error of using single BP network and improve the accuracy and objectivity of evaluation. |
46140 |
鉴于无线传感器网络(WSN)对加密算法高效性和安全性的要求,设计一种轻量级的混沌分组加密算法,并提出了安全性更高的动态子密钥扩展方案。 |
In view of high efficiency and security requirements in WSN encryption algorithm, a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed. |
46141 |
该方案依托 WSN 云服务器的强大数据运算和处理能力,利用新的加解密机制,将子密钥同步任务转移到云服务器进行处理,大幅降低节点的运算负担。 |
To greatly reduce the computing burden of WSN nodes, this scheme made full use of WSN cloud servers monitoring platform, which was powerful in data computing and processing, and transferred the sub keys synchronization task from nodes to cloud servers. |
46142 |
实验结果和性能分析表明,该方案具有较好的扩散混乱特性和统计平衡性,且密钥安全性强、算法效率高, |
Experimental results and performance analysis show that the scheme has good characteristics of diffusion, confusion and statistical balance, strong key security and high algorithm efficiency. |
46143 |
在 WSN 通信加密领域具有良好的应用前景。 |
It has a good application prospect in the field ofWSN communication encryption. |
46144 |
网络攻防不对称是当前网络安全面临的核心问题之一。 |
The asymmetric situation of network attacks and defenses is one of the key issues of current network security. |
46145 |
基于欺骗的防御技术是防御方为改变这种不对称格局而引入的一种新思路, |
Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation. |