ID | 原文 | 译文 |
53427 | 仿真结果为 MIMO 雷达的系统设计提供了一定的理论基础。 | The results are very significant to the design of MIMO Radar. |
53428 | 为了保证 MIMO 系统无线传输安全,提出了一种基于投影的物理层安全传输方案。 | A scheme based on projection operator is proposed to guarantee the information theoretical security in MIMO physical layer transmission. |
53429 | 基站在合法信道的投影空间发射相互正交的涉密信号和干扰信号,干扰窃听方恢复信息,同时不影响期望用户接收信号。 | The transmitter has multiple antennas and is able to simultaneously transmit separately information bearing signal to the intended receiver and randomized interference to the eavesdropper in the projection space. |
53430 | 给出了两种信号保密容量准则下功率分配的迭代算法。 | An iterative algorithm of power allocation between them is given according to the secret channel capacity criteria. |
53431 | 通过分析干扰对窃听信号统计特性的影响,证明了对窃听方盲处理造成的不确定度(indeterminacy)。 | Based on the special statistical distributions of the adversary’s received signal, the indeterminacy of its blind deconvolution is proved. |
53432 | 仿真结果表明,该方案具有较高的保密信道容量,在期望用户处获得比已有方案更低的误码率,而窃听方无法正确解调。 | Numerical results indicate that the secret channel capacity of this scheme is enhanced with reduced bit error rate at the target user, while the eavesdropper can not demodulate correctly. |
53433 | 提出了一种新颖的基于尺度不变特征变换(SIFT)和主成分分析(PCA)的感知哈希方法。 | This paper presents a novel perceptual hashing method based on scale invariant feature transform (SIFT) and principal component analysis (PCA). |
53434 | SIFT 特征在通常的图像处理中具有很强的稳定性,并具有尺度和旋转不变性,通过对哈希生成两阶段框架的详细分析,SIFT 算法用来提取图像的局部特征点,PCA 用来对特征数据的信息压缩。 | SIFT features are invariant to image scaling and rotation, and stable to common image processing. Through the detailed analysis of two-stage framework of generating hash, SIFT is used to capture the local features of image. PCA is used to compress features information. |
53435 | 每个特征点的 PCA 基的叠加构成图像哈希,在叠加中采用了伪随机处理,增强了算法安全性, | Final hash is generated by summing PCA basis of each key point. The method uses pesduo-randomly processing for enhancing security of the algorithm. |
53436 | 图像之间的相似度通过哈希的归一化相关值来确定。 | The similarity of images is determined by hash normalization correlation. |