ID | 原文 | 译文 |
5064 | 实验结果表明,所提算法能有效识别无线电信号的波形类型和时/频坐标,在实地采集的 12 种、4 740 个样本的数据集中,识别准确率达到 86.04%,mAP 值达到 77.72,检测时间在中等配置的台式计算机上仅需 33 ms,充分验证了所提思路的可行性和所提算法的有效性。 | The experimental results show that the algorithm can effectively identify the waveform types andtime/frequency coordinates of radio signals. After training and testing on the self-collected data set with 12 types and 4 740samples, the accuracy reaches 86.04% and the mAP value reaches 77.72, while the detection time is only 33 ms on themedium configured desktop computer. |
5065 | 智能手机的普及使其对安全性有极高的要求,但传统的一次性认证方式,无法持续保证设备安全。 | The popularity of smart phones renders people extremely high requirements for safety. But the traditionalone-time authentication method can't continuously guarantee the security of equipment. |
5066 | 针对此问题,提出了一种基于步态特征的持续认证方案,以实现对当前访问者的判别。 | To solve the problem, acontinuous authentication scheme based on gait characteristics was proposed to realize the identification of currentvisitors. |
5067 | 所提方案采用移动平均滤波、基于阈值的有效值判断等操作降低噪声干扰,使用模板截取实现信息的最大化利用,并提出了最佳时域与频域特征组合以降低用户信息对存储空间的需求,通过支持向量机(SVM)实现身份认证功能。 | Moving average filtering, threshold-based useful information interception method and other operationswere adopted to reduce noise interference. Template interception was used to maximize the utilization of informa-tion, and an optimal combination of time domain features and frequency domain features were proposed to reducethe storage space requirement of users' information. Finally, the support vector machine realized the identity au-thentication function. |
5068 | 经实验测试,所提方案可达到对访问者身份的有效认证。 | Experiments show that the proposed scheme can effectively authenticate the identities of vis-itors. |
5069 | 针对理性委托计算中的安全性需求问题,提出了一种可证明安全的理性委托计算协议。 | A provably secure rational delegation computation scheme was proposed to solve the requirement of securityissues in rational delegate computation. |
5070 | 首先,在委托计算中引入博弈理论并分析理性参与者的行为偏好,并且在博弈论框架下构建理性委托计算博弈模型; | Firstly, game theory was introduced into delegation computation and according torational participants behavior preferences analysis, a rational delegate computing game model was designed. |
5071 | 其次,根据博弈模型中的均衡需求及理性委托计算的安全需求,设计理性安全模型; | Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation, arational security model was established. |
5072 | 再次,结合 Yao 的混淆电路可以随机化重用的优势及全同态加密技术,构造理性委托计算协议,且协议中参与者的策略组合可以达到纳什均衡状态; | Thirdly, combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology, the rational delegation computation protocol was constructed. Andthe combination of strategies in the protocol could reach the Nash equilibrium state. |
5073 | 最后,根据理性安全模型证明了协议的安全性和输入输出的隐私性,且性能分析表明了协议的有效性。 | Finally, the security of the protocoland the privacy of the input and output were proved according to the rational security model, and the performance analy-sis shows the validity of the protocol. |