ID 原文 译文
46596 该算法引入变异策略选择因子,并借鉴自适应差分进化算法的设计思想,将选择因子随个体共同参与进化,使个体执行当前最为适合的变异策略,克服原始算法进化过程的盲目性, A mutation strategy choice factor that guided the individual to choose a preferable mutation strategy at each mutation operation was introduced, avoiding the evolution blindness brought by the random selection of mutation strategy.
46597 同时选择因子的动态自适应特性保持了骨架算法近似无参数的优点; To retain the almost parameter-free characteristic of bare-bones algorithm, the tuning of choice factor to be adapted was involved in the individual evolution, inspired by the concept of self-adaptive DE.
46598 该算法加入停滞扰动策略,降低陷入局部最优的风险。 The algorithm also included a well-designed stagnation perturbation mechanism to reduce the risk of trapping into the local optimal.
46599 采用18 个标准测试函数进行实验,结果表明,新算法在收敛精度、收敛速度和顽健性上整体优于多种同类骨架算法以及知名的差分进化算法。 Experimental results on 18 benchmark functions show that the proposed algorithm generally achieves better performance theatre-in-the-round BBDE variants and several well-known DE algorithms in terms of convergence and robustness.
46600 为设计出可近容量限传输且能普适应用于慢、快衰落信道下的编码协作方案,研究了基于卷积 LDPC 码的编码协作。 To design a scheme that can approaching the capacity limitation transfer, and generally applied to slow and fastfading, the coded cooperation based on LDPC convolutional codes was studied.
46601 基于卷积 LDPC 码的凿孔算法构造出可 2 路传输的分码字,实现编码协作, Firstly, based on LDPC convolutional codes, the coded words were divided into two parts by puncturing algorithm to achieve coded cooperation.
46602 并在第二帧分码字传输阶段引入了空时传输进一步提升编码协作的性能。 The space-time transmission was introduced into the second frame of coded cooperation to further improve the performance of the system.
46603 仿真验证了所提方案的有效性。 Simulation results show the effectiveness of proposed scheme.
46604 在密文策略的属性加密技术上提出一种支持文件级别的访问授权和数据用户撤销的多关键字密文查询方案。 A multi-keyword search over encrypted data was proposed with file-level access authorization and data user revocation scheme through employing ciphertext-policy attribute-based encryption (CP-ABE).
46605 该方案在多数据拥有者多数据用户的场景下不仅支持文件级别的访问授权,即数据用户能够获取不同数据拥有者用不同密钥加密的密文, The scheme supports file-level access authorization in the multi-owner multi-user settings, which means that data users could only gain the authorized files encrypted by different data owners with different keys.