ID 原文 译文
3793 构建时变连续图模型,用于表征天地一体化网络时变拓扑、链路连通时段、节点缓存等多维资源的时空属性; Firstly, a time-varying continuous graph model was constructed to describe the spatial and temporal attrib-utes of multi-dimensional resources, such as the topology, link connectivity opportunities, node caching and so on.
3794 提出面向业务的时间确定性路由算法,依据链路累积流量计算规则、节点流守恒约束与节点缓存约束,构建具有时间属性的最短时延路径; Then,a service-oriented time deterministic routing algorithm was proposed. According to the calculation rules of link cumula-tive traffic, and the constraints of node flow conservation and cache, the time-varying path with the shortest transmission delay was constructed.
3795 将所提路由算法与分段路由(SR)技术以及时间敏感网络(TSN)技术相结合,设计具有时延保障的时间确定路由协议,支持时变网络环境中拓扑发现、确定性路由的高效计算以及分组的定时转发。 After that, a delay-guaranteed time deterministic routing protocol was designed by combining the proposed routing algorithm with both the segment routing technology and the time sensitive network technology, whichsupported the dynamic topology discovery, the efficient calculation of deterministic routing and the timing forwarding ofdata packets on the time-varying network.
3796 仿真结果表明,通过关联利用链路资源与节点存储资源,与基于快照图和接触图的路由算法相比,所提路由算法的链路资源利用率高、分组成功投递率高,保障了业务的端到端传输时延。 The simulation results show that, compared with the routing algorithm basedon snapshot graph and contact graph, the proposed routing algorithm has higher link resource utilization rate and thepacket successful delivery rate by jointly using link and node storage resources by association, and ensures the end-to-endtransmission delay of services.
3797 考虑保密容量为负的情形,利用混沌序列对信息序列进行加密并且对冻结比特进行填充,并结合多块 polar编码结构,提出了一种具有较低复杂度和较高安全传输速率的 polar 码加密方案。 A chaos based encrypted polar coding scheme, which could be applied to the negative secrecy capacity case,was proposed. Chaotic sequences were employed to encrypt the information bits and fill the frozen bits. And multi-blockpolar coding structure was also employed in the proposed scheme.
3798 从可靠性、安全性、传输效率这 3 个方面对所提 polar 码加密方案进行相应的数学证明和理论分析。 The proposed scheme was featured as lower complex-ity and higher secrecy transmission rate. Corresponding mathematical analysis had been performed in terms of the errorprobability, security and transmission rate.
3799 结果表明,所提方案在保密容量为负的情形下,在保障可靠、安全的通信的基础上,可达到较高的安全传输速率,且具有较低的实现复杂度。 The result reveals that the proposed scheme can achieve reliability, security innegative secrecy capacity case. What's more, it has relatively low complexity and high secrecy transmission rate com-pared with the existing schemes.
3800 为了提高通信系统的安全性能且使有限的频谱得到高效利用,将填充式认知无线电(OCR)与非正交多址接入(NOMA)技术相结合,提出了一个次网络通过感知主用户是否占用频谱来实现辅助主网络通信或次网络通信的动态切换的系统模型。 In order to improve the secrecy performance of communication system and make efficient use of limited spec-trum, overlay cognitive radio (OCR) technology was combined with non-orthogonal multiple access (NOMA) technologyand the communication model was proposed, in which secondary network realized dynamic switching between assistingprimary network communication and secondary network communication by sensing whether the primary user occupiedthe spectrum or not.
3801 主次网络均采用人工噪声(AN)技术进一步改善系统的安全传输性能。 Artificial noise (AN) aided technology was used in primary and secondary networks respectively tofurther improve the secrecy performance of the system.
3802 通过分别推导主、次网络安全中断概率和安全吞吐量的表达式来研究系统的安全中断性能。 The secrecy performance of the system was studied by deducingthe expressions of the primary and secondary network secrecy outage probability and secrecy throughput respectively.