ID 原文 译文
47616 最后结合实际无线通信网络中的超长伪随机序列进行了相似度分析和验证。 Finally, similarity was analyzed and verified by combining super-long pseudo-random sequence in real wirelesscommunication networks.
47617 结果表明:在误判概率约为 1%时,相似度下界为 0.62。 The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.
47618 上述结果对于协议分析、流量分析、入侵检测等网络安全领域有重要的借鉴意义和理论价值。 Above conclusion is considerable importance from the significance and theoretical valuesin network security domains, such as protocol analysis, traffic analysis, intrusion detection and others.
47619 通过对现有三支决策理论和方法的分析,提出基于集对信息粒空间的三支决策模型,以及从对立统一的集对论观点,对三支决策的内涵和外延加以诠释。 Through the analysis of the existing theory and method of three-way decision, model of three-way decisionbased on the space of set pair information granule was proposed, which was to explain the intension and extension ofthree-way decision on the view of unity of opposites.
47620 首先,分析集对信息粒空间的结构,分为正同粒、负反粒和差异; Firstly the space structure of set pair information granule can be di-vided into positive granule, negative granule, different granule, which were similar and slightly different with three re-gions of generalized three-way decision. The three kinds of information granules in set pair information granule spacewere built based on certain positive degree, negative degree and different degree.
47621 其次,将集对信息粒按照所设定的阈值划分为 3 个互不相交的正同域、负反域和差异域, Secondly, according to the given thre-shold, set pair information granule is divided into mutually disjointing positive region, negative region and different re-gion.
47622 并基于这 3 个域给出决策损失函数的计算方法,给出决策算法流程;最后在风险投资评估中运用集对信息粒空间上的三支决策方法对风险投资进行评估决策,取得了较好的决策效果。 Based on these three regions, the computing method of decision loss function is put forward, and the process of de-cision-making algorithm is obtained use the three-way decision method of set pair information granule space to evaluateand make decision on risk investment, then good decision results have been achieved.
47623 在传统的 Waxman 方法的基础上,运用 K-means 的聚类思想生成节点, The major contribution was using the K-means to create nodes instead of traditional Waxman means in order toget a suitable and strong original electric power communication network.
47624 并对所生成的拓扑网络进行脆弱性分析和信息孤岛检测,然后对于网络中的脆弱节点进行补强。 After the nodes were created, a vulnerability analysis was given on the grid of the network topology and check that if it has a network islanding, at last the weak nodes would be reinforced.
47625 仿真实验结果显示这种结合 K-means 和脆弱性分析的拓扑生成算法在生成对意外风险具有较强抗性的电力网络拓扑方面具有比较好的效果。 A simulation about this algorithm shows that this algorithm which combines K-means and vulnera-bility can create a electric power communication networks with better resistance of risks.