ID | 原文 | 译文 |
45846 | 最后,仿真证明了所提方案的有效性。 | Finally, simulation results verify the validity of the proposed scheme. |
45847 | 针对现有的相似性/相异性测度在量化证据冲突时存在的不足,定义一种新的被称为幂 Pignistic 概率距离的相异性测度, | To deal with the shortcomings encountered when using the existing similarity/dissimilarity measures to quantify evidence conflict, a new dissimilarity measure called power-Pignistic probability distance was defined. |
45848 | 并提出基于幂 Pignistic 概率距离的加权证据组合方法。 | Furthermore,a weighted evidence combination method was proposed based on power-Pignistic probability distance. |
45849 | 该方法通过幂 Pignistic 概率距离量化两证据之间的冲突程度, | The conflict de-gree between two pieces of evidence was quantified by the power-Pignistic probability distance. |
45850 | 然后建立相似性矩阵并求得各证据的可信度, | After that, a similarity measure matrix was constructed, based on which the credibility of evidence was obtained. |
45851 | 再用加权平均法修正证据, | Then the weighted average method was used to revise the evidence. |
45852 | 最后利用 Dempster规则进行组合。 | Finally, the fusion was accomplished by using Dempster’s rule. |
45853 | 数值算例的结果表明,所提方法是合理有效的。 | The results of the numerical examples show the efficiency and rationality of the proposed method. |
45854 | 提出了一种静默池机制方法(SPA, silent-pool approach),当传感器节点感知到附近移动攻击者的存在,通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组。 | Sensors’ ability was utilized to perceive the mobile attacker nearby, and SPA (silent-pool approach) was pro-posed, which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes. |
45855 | 在此基础上,进一步提出了对当前路由路径没有任何影响的安全机制——池外虚假信息注入(DPIOP, dummy packet injection out pool)法,诱使攻击者远离传输路径。 | In addition, a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary faraway from the transmission path without changing the original routing path. |