ID | 原文 | 译文 |
3613 | 仿真结果显示利用空时编码技术能够有效降低海洋湍流对系统误比特率的影响。 | The simulation results show that thespace-time coding technology can effectively mitigate the influence of ocean turbulence on the system bit error rate. |
3614 | 针对异构无线网络的接入选择问题,在考虑用户业务类型和网络状态的前提下,提出了一种基于蜻蜓算法优化模糊神经网络的异构无线网络接入选择算法。 | To solve the access selection problem of heterogeneous wireless network, an access selection algorithm basedon dragonfly algorithm (DA) optimized fuzzy neural network (FNN) was proposed, considering the user's business typeand network state. |
3615 | 针对模糊神经网络收敛速度低的问题,利用蜻蜓算法对模糊神经网络第二层和第五层的隶属度函数参数进行寻优,以得到模糊神经网络隶属度函数参数的初始值。 | In view of the low convergence speed of the fuzzy neural network, the dragonfly algorithm was usedto optimize the membership function parameters of the second and fifth layers of the fuzzy neural network, so as to obtainthe initial value of membership function parameters of the fuzzy neural network. |
3616 | 系统根据不同业务类型下用户对网络的偏好程度和网络的输出评分为用户选择最适合的网络。 | The most suitable network was selectedfor the users according to their preference to the network and the output score of the network under different businesstypes. |
3617 | 实验结果表明,利用蜻蜓算法优化模糊神经网络能够提高模糊神经网络的收敛速度,提高系统吞吐量,降低接入阻塞率,并在一定程度上减少切换次数。 | The experimental results show that dragonfly algorithm optimization can improve the convergence speed of fuzzyneural network, improve system throughput, reduce blocking rate, and reduce switching times to some extent. |
3618 | 现有的基于身份签密方案多是基于双(多)线性对构造的,针对其复杂的对运算导致签密效率低下的问题,基于 Cocks 的身份密码体制提出了一种新的高效签密方案。 | Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing opera-tions construction. To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryptionscheme based on the identity cryptosystem of Cocks was proposed. |
3619 | 首先,形式化所提方案的安全模型,给出了保密性和不可伪造性的定义; | Firstly, the security model of the proposed schemewas formalized, and the definition of confidentiality and unforgeability was given. |
3620 | 然后,利用二次剩余难解问题实现了所提方案的具体构造,进一步结合雅可比符号运算巧妙地在一个逻辑步骤内实现了签密算法设计; | Secondly, the quadratic residue prob-lem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in alogical step by combining Jacobi symbol operation. |
3621 | 最后,在随机预言模型下,给出了所提方案满足保密性和不可伪造性的安全性证明。 | Finally, the security proofed that the scheme satisfied the confiden-tiality and unforgeability was given under the random prediction model. |
3622 | 效率分析表明,相对于已有的基于身份签密的方案,所提方案较大幅度地提升了运算效率,同时具备基于身份密码的良好特性。 | The efficiency analysis shows that comparedwith the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiencyand has good characteristics of identity-based cryptosystem. |