ID |
原文 |
译文 |
46376 |
进一步,为克服传统比特分配方案反馈比特利用度不高的问题, |
In addition, the bit allocation of traditional limited feedback schemes were based on the mean of interference leakage, which were not perfect and make the total number of the effective bits less than the bits provided by system. |
46377 |
给出一种新颖的比特分配方案来改善比特分布,减小了量化误差的影响。 |
Thus, a novel bit allocation scheme was provided that improving bit utilize and decreasing quantization error. |
46378 |
仿真实验表明,本算法能有效减少量化误差对系统性能的影响并显著提高系统的比特利用率,使有限反馈 CSI 时的干扰对齐性能得以提升。 |
Theoretical analysis and simulation experiments show that compare to the existed classical algorithms, the algorithm was a stepwise enhancement of signal quality for iterative search in perfect CSI which was better than linear algorithm and has a larger space with no need for strictly align interference in limited feedback CSI which reduces the influence of quantization error more. The effective bit distribution and bit utilization are improved by bit allocation, resulting in improved performance in limited feedback. |
46379 |
提出一种能对安全协议进行分析的自动化验证机制。 |
A automatic verification mechanism for security protocols analysis was proposed. |
46380 |
提出需求的概念,认为需求是攻击者未知但又对攻击者合成目标项至关重要的知识集合, |
The attacker model was proposed and the concept of ‘need’ was defined, a knowledge set which was necessary for the attacker to compose a tar-get message term but unknown to the attacker. |
46381 |
并建立了以需求为中心的攻击者模型; |
The attacker model was established as needed. |
46382 |
设计一种以攻击者为中心的状态搜索方式,按需添加协议会话实例,为避免新增协议会话实例引起攻击者推理出现时序矛盾, |
The mechanism centered on the attacker was designed, in which whether add a protocol session was determined by the attacker. |
46383 |
引入回溯机制以确保状态转移过程中攻击者知识能正确增长。 |
This might cause contradiction in time sequence, so some back-track algorithm was adopted to solve this contradiction. |
46384 |
实验表明,该系统能正确验证协议的安全性,状态空间数目略优于 Scyther工具。 |
Experiments show that the system can verify the security of the protocol, and the number of state space is slightly better than the Scythertool. |
46385 |
在经典图像隐写算法研究中,使用的载体图像库多为实验室环境下的自然图像库, |
In the research of state-of-the-art steganography algorithms, most of image sources were natural images in laboratory environment. |