ID | 原文 | 译文 |
4603 | 其识别性能的全面性和准确率相较于现有方法有显著提高。 | The proposed method outperforms the existing methods. |
4604 | 针对 3GPP 制定的 LTE-A/5G 业务中的高精度定位需求,突破现有全球卫星导航系统(GNSS)接收机百纳秒定时精度,研究基于 GNSS 的 5G 基站纳秒级高精度时间同步技术。 | For precision positioning requirements in the LTE-A/5G service developed by the 3GPP, the nanosecond pre-cision time synchronization technology based on global navigation satellite system (GNSS) for 5G base station was stud-ied which broke through the current GNSS receiver's hundred nanosecond timing accuracy. |
4605 | 分析 GNSS 误差邻域相似性特点,结合5G 基站时间同步需求特点,提出基于 GNSS 邻域相似性的 5G 基站纳秒级精度时间同步理论与接收机相关算法,并研究该时间同步方法在区域和广域条件下的具体特征。 | By analyzing the characteris-tics of neighborhood similarity of GNSS errors and combining the characteristics of time synchronization requirements of 5G base stations, a nanosecond precision time synchronization theory and related receiver algorithms for 5G base stations was proposed which based on the principle of neighborhood similarity of GNSS signals. The specific characteristics of the time synchronization technology under regional and wide-area conditions were studied. |
4606 | 仿真和实测结果表明,与现有百纳秒级基站时间同步精度相比,该技术方法可以实现任意区域基站 3 ns 以内的超高精度时间同步,支持 5G 基站米级高精度定位等高级增量业务开展。 | The simulation and experimental re-sults show that compared with the current time synchronization accuracy within hundred nanosecond rang of base stations,the proposed method can achieve precision time synchronization within 3 ns between the regional base stations, and support5G base station meter-level precision location based service(LBS) and other advanced incremental services. |
4607 | 针对以数据为中心的开放信息系统,亟需能够保护隐私的细粒度自适应访问控制,并平衡隐私保护与数据访问效用间平衡的问题,提出了一种面向隐私保护的多参与者理性风险自适应访问控制模型。 | Aiming at the problem that in the private sensitive date centralized and opening information systems, afine-grained and self-adaptive access control model for privacy preserving is desperately needed, thus the balance be-tween privacy preserving and data access utility should be achieved, a rational multi-player risk-adaptive based accesscontrol model for privacy preserving was proposed. |
4608 | 该模型基于香农自信息提出了动态访问数据集的隐私量化方法,构造了访问请求隐私风险函数和用户隐私风险函数; | Firstly, the privacy risk values of access request and requester wereformulized by the private information quantity of the requested dataset, and by using Shannon information. |
4609 | 进一步基于演化博弈在有限理性假设下构建多参与者的访问控制演化博弈模型,利用复制动态方程分析了访问控制参与者的动态策略选择,提出了该博弈模型的演化稳定策略选取方法。 | Secondly, arisk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the sup-posing of bounded rational players. Furthermore, dynamic strategies of participants were analyzed by using replicator dynamics equation, and the method of choosing evolutionary stable strategy was proposed. |
4610 | 仿真和对比表明,所提出的模型能够有效动态自适应地保护隐私,具有更好的隐私风险适应性,有限理性参与者的动态演化访问策略选取更加符合实际场景。 | Simulation and comparison results show that, the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios. |
4611 | 基于矩阵中元素统计的方法,给出了计算周期为 p 2 的 q 元序列 k–错线性复杂度的新方法,其中,p, q 为奇素数且 q 为模 p 2 的本原元。 | Based on element statistics in a matrix, a new efficient computing method for computing the k-error linearcomplexity of q-ary sequence of period p 2 was proposed, where p,q were odd primes and q modulo p 2 was primitive. |
4612 | 给出了一个一般性的结论及其证明,并通过列举 2 类周期为 p 2 的 q 元序列及其实例来验证结论的正确性。 | A general result and a concrete proof were showed. To verify the correctness of the result, two kinds of q-ary sequence ofperiod p 2 were illustrated. |