ID 原文 译文
4083 利用复杂网络拓扑结构的分形特性,分析网络效率与节点关联和的关系,用部分节点关联和来估计网络全局效率。 Considering the fractal propertiesof complex network topology, the relationship between network efficiency and node correlation sum was analyzed, andthe global network efficiency was estimated by partial nodes.
4084 此外,为了快速判断复杂网络的分形特性,提出基于节点关联和的分形特性判别方法。 Besides, to rapidly find the fractal properties of complexnetworks, a fractal property discrimination method based on node correlation sum was proposed.
4085 在构造网络和真实网络中进行实验分析,结果表明,所提方法能准确有效地估算网络全局效率,比原始的网络效率计算方法可缩减不低于 90%的计算时间。 The experimental anal-ysis in the construction network and the real-world network show that the proposed method can accurately and effectivelyestimate the global efficiency of the network, which reduces the calculation time by at least 90% compared with the orig-inal method.
4086 物联网认证技术是物联网安全领域的关键技术,它确保接入物联网的用户和设备节点身份信息的真实性。 Identity authentication technology is a key technology in the Internet of things (IoT)security field which en-sures the authenticity of the identity information of users and device nodes connected to the IoT.
4087 由于物联网设备的低成本、低功耗、小存储和网络的异构性等特点,使传统计算机网络中的身份认证机制往往无法适用。 Due to the low cost, lowpower consumption, small storage of IoT devices and heterogeneity of IoT network, the identity authentication mechan-isms in traditional computer networks are often not applicable.
4088 首先介绍了物联网发展历程,分析了物联网安全风险和认证工作面临的挑战,着重比较了 5 种典型的认证协议的优缺点,进而对 RFID、智能电网、车联网、智能家居等几种实践场景下的认证技术进行总结和对比分析。 Firstly, the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed. Then the emphasis was puton comparison of the advantages and disadvantages among five typical authentication protocols. Moreover, the authenti-cation technologies in several practical scenarios of RFID, smart grid, Internet of vehicles, and smart home were summa-rized and analyzed.
4089 最后,讨论了未来物联网认证技术的研究方向。 Finally, the future research direction was discussed.
4090 针对蜂窝网络中的缓存问题,考虑用户内容请求的空间异构性及时间波动性,提出了一种基于单个用户内容偏好预测的蜂窝网中无人机位置部署及缓存内容部署方案。 In order to design an efficient edge caching policy considering spatial heterogeneity and temporal fluctuationsof users' content requests, a proactive caching scheme was proposed with UAV's deployment location design based onuser preference prediction.
4091 首先基于用户的历史上下文信息,利用文件相似性及用户相似性来预测每个用户的内容偏好特性,并使用一种基于线性回归的方法来预测用户未来发起内容请求时的位置和时间; Firstly, each user's preference characteristics were predicted based on file similarity and usersimilarity, and the request time and user location were also predicted when a content request occurs.
4092 然后根据预测的地理位置、请求时间和内容偏好,分别利用基于自组织映射神经网络(SOM)的聚类算法和基于凝聚嵌套(AGNES)的分簇算法设计无人机的部署位置,并根据相应的无人机位置设计内容部署方案。 Thereafter, on thebasis of the predicted geographical location, request time and user preference, each UAV's deployment location and thecorresponding content placement were determined by virtue of clustering method based on SOM and AGNES.