ID |
原文 |
译文 |
53427 |
仿真结果为 MIMO 雷达的系统设计提供了一定的理论基础。 |
The results are very significant to the design of MIMO Radar. |
53428 |
为了保证 MIMO 系统无线传输安全,提出了一种基于投影的物理层安全传输方案。 |
A scheme based on projection operator is proposed to guarantee the information theoretical security in MIMO physical layer transmission. |
53429 |
基站在合法信道的投影空间发射相互正交的涉密信号和干扰信号,干扰窃听方恢复信息,同时不影响期望用户接收信号。 |
The transmitter has multiple antennas and is able to simultaneously transmit separately information bearing signal to the intended receiver and randomized interference to the eavesdropper in the projection space. |
53430 |
给出了两种信号保密容量准则下功率分配的迭代算法。 |
An iterative algorithm of power allocation between them is given according to the secret channel capacity criteria. |
53431 |
通过分析干扰对窃听信号统计特性的影响,证明了对窃听方盲处理造成的不确定度(indeterminacy)。 |
Based on the special statistical distributions of the adversary’s received signal, the indeterminacy of its blind deconvolution is proved. |
53432 |
仿真结果表明,该方案具有较高的保密信道容量,在期望用户处获得比已有方案更低的误码率,而窃听方无法正确解调。 |
Numerical results indicate that the secret channel capacity of this scheme is enhanced with reduced bit error rate at the target user, while the eavesdropper can not demodulate correctly. |
53433 |
提出了一种新颖的基于尺度不变特征变换(SIFT)和主成分分析(PCA)的感知哈希方法。 |
This paper presents a novel perceptual hashing method based on scale invariant feature transform (SIFT) and principal component analysis (PCA). |
53434 |
SIFT 特征在通常的图像处理中具有很强的稳定性,并具有尺度和旋转不变性,通过对哈希生成两阶段框架的详细分析,SIFT 算法用来提取图像的局部特征点,PCA 用来对特征数据的信息压缩。 |
SIFT features are invariant to image scaling and rotation, and stable to common image processing. Through the detailed analysis of two-stage framework of generating hash, SIFT is used to capture the local features of image. PCA is used to compress features information. |
53435 |
每个特征点的 PCA 基的叠加构成图像哈希,在叠加中采用了伪随机处理,增强了算法安全性, |
Final hash is generated by summing PCA basis of each key point. The method uses pesduo-randomly processing for enhancing security of the algorithm. |
53436 |
图像之间的相似度通过哈希的归一化相关值来确定。 |
The similarity of images is determined by hash normalization correlation. |