英语人>网络例句>scheme out 相关的网络例句
scheme out相关的网络例句

查询词典 scheme out

与 scheme out 相关的网络例句 [注:此内容来源于网络,仅供参考]

Simulations show that the proposed scheme has a better performance than that of the traditional scheme when the channel information is not perfectively known at transmitter. And the scheme is obviously robust when the uncertanty of channel information changing.

仿真结果表明:当发射端获得的信道信息不准确时,提出的算法表现出比传统特征波束成形算法更低的误比特率,并且当信道信息的不确定程度变化时,提出算法的性能有很好的鲁棒性。

The analysis results show that this scheme doesn't need additional memory space and increases the probability that neighbor nodes have the same key space. Compared with the pairwise key predistribution scheme, this scheme can increase the threshold of captured nodes and improve the security of WSN, and fits the network environment and meets the security requirements of WSN.

分析表明,该方案在不增加存储空间的情况下,提高了邻居节点拥有相同密钥空间的概率,并且与多密钥空间密钥对预分布方案相比,可大幅提高被俘节点的阈值,增强了网络安全性,能够较好地适应无线传感器网络的网络环境和安全要求。

To further enhance the security and connectivity for wireless sensor networks,proposed an improved key management scheme.introduced the scheme,a random key predistribution using multiple key spaces and multipath key reinforcement was based on group-based deployment model which in the paper of du wen-liang.analysis and simulations show that the scheme has lower memory and communication overheads, better ability against attacks besides good security performance.

为了进一步提高无线传感器网络的安全连通性,在分析du wen-liang等人的group-based节点投放模型的基础上,提出了一种改进的密钥管理方案:多密钥空间与多路径增强相结合的随机密钥预分配方案。结果分析表明,该方案需要较少的内存存储空间,不仅提高了系统的连通性,还降低了节点的被捕获概率。

On the basis of published paper, an ID-based provable secure and strong designated verifier signature scheme, a modified strong designated verifier signencryption scheme, and a modified extended aggregate signature scheme based on the supersingular elliptic curve is presented in this thesis.

在已有文献的基础上,综合形成了一种基于身份标识的超奇异椭圆曲线上的强指定验证者的数字签名方案、签密方案和可扩展的群签名方案。

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

In this paper, the first identity-based proxy signature scheme without random oracles is proposed based on Paterson, et al's identity-based signature scheme. The unforgeability of the proposed scheme is based on the hardness of the well known computational Diffie-Hellman problem.

利用Paterson等的基于身份的签名方案构造了一个基于身份的代理签名方案,并在标准模型下基于计算Diffie-Hellman假设证明了它的安全性。

To realize the objective of costsaving development, a more advanced centralized pressure boost technologies of multibranch manifold station arrangement scheme has been drafted via a great deal of technical innovations, researches, comparison and selection on general scheme of station arrangement. This scheme is better fit for this "six lows" gas field.

为了实现在满足技术要求前提下低成本开发的目标,打破常规,围绕总体布站方案开展了大量的创新、研究、比选,制定出一个更先进合理的适应&六低&气田的集中增压&枝上枝&阀组布站工艺技术方案。

Firstly, the flood control regulation of TGP in Sep is computed based on the analyses on the inflow in Sep and Oct, and the risk and loss on the ahead impounding scheme is calculated and analyzed. Then, the storage level, power production and releasing discharge are achieved by computing on the electricity generation model through reservoir regulation graph. Thirdly, obstruction in channel is analyzed and the problem in the Chongqing reach is more serious in 175-145-155m scheme. The sediment aggrading process and distribution on different schemes is calculated by 1-D reservoir mathematical model. The navigation benefit is computed by navigation model. Based on above calculations, the impounding time is decided by the multi-purpose decision model, and evaluate by analytical hierarchy and balance layout model. A best impounding scheme is achieved to match the requirement of flood control electricity generation and navigation et al.

首先,在对宜昌站9、10月份来水分析的基础上,采用第2章建立的防洪优化调度子模型进行了三峡水库9月份防洪调度,分析了汛末提前不同天蓄水对防洪的影响,计算了汛末不同蓄水方案水库9月份的洪灾风险率和风险损失;接着,根据第2章建立的发电调度子模型进行了三峡水库发电调度计算,得出了不同蓄水方案下水库的坝前水位、发电量及下泄流量过程;然后,分析了175-145-155m方案下三峡水库的碍航问题,指出175-145-155m方案下重庆河段的碍航问题最为严重,通过进行不同蓄水方案下水库一维泥沙冲淤计算,得出了不同蓄水方案下库区淤积过程及分布,并通过航运调度子模型,计算了不同蓄水方案下水库的航运效益;最后,根据以上防洪、发电及航运调度计算的结果,运用第3章水沙多目标决策模型对水库的蓄水时间进行了多目标决策,并采用层次加权均衡规划模型对计算结果进行评价,得到一个能满足水库防洪、发电及航运各方面要求的最佳蓄水方案。

The processes include: Technology decompounding, Comparative analysis of key elements of technology, Making technology integration scheme, Appraising technology integration scheme,Implementing technology integration scheme.

详细论述了技术人员的整合管理过程。

By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree:SKDC, LKH, and OFT. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best.

摘 要:在基于密钥树的组密钥管理方案中引入了XOR操作以及单向函数链,提出了一种新的基于密钥树、XOR操作以及单向函数链的组密钥管理方案,介绍了新方案中初始化、成员加入以及成员退出的操作,将新方案与3种基于密钥树的组密钥管理方案SKDC,LKH,OFT进行了比较,数据表明:就传输、计算以及存储开销而言,新的组密钥管理方案性能最优。

第8/500页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
相关中文对照歌词
My Scheme
Diabolic Scheme
Love's Subtle Scheme
Joan
Money Scheme
Word On A Wing
Different Kind Of Free
Cake Soap
American Tale
A Better Tomorrow
推荐网络例句

Salt is good, but if the salt becomes flat and tasteless, with what do you season it?

14:33 盐本是好的,盐若失了味,可用什么叫它再咸呢?

He reiterated that the PLA is an army of the people under the leadership of the Communist Party of China.

他重申,人民解放军是在中国共产党领导下的人民军队。

After five years at the Laue-Langevin Institute in Grenoble, France, Jolie turned his focus to experimental work when, in 1992, he accepted a position at the University of Fribourg in Switzerland.

他在法国格赫诺柏的劳厄–蓝吉分研究所工作了五年之后,1992年转往瑞士夫里堡大学从事实验研究。