Transmission line(TL)Parameter Identification(PI)method plays an essential role in the transmission *** existing PI methods usually have two limitations:(1)These methods only model for single TL,and can not consider t...
详细信息
Transmission line(TL)Parameter Identification(PI)method plays an essential role in the transmission *** existing PI methods usually have two limitations:(1)These methods only model for single TL,and can not consider the topology connection of multiple branches for simultaneous identification.(2)Transient bad data is ignored by methods,and the random selection of terminal section data may cause the distortion of PI and have serious ***,a multi-task PI model considering multiple TLs’spatial constraints and massive electrical section data is proposed in this *** Graph Attention network module is used to draw a single TL into a node and calculate its influence coefficient in the transmission ***-Task strategy of Hard Parameter Sharing is used to identify the conductance ofmultiple branches *** show that themethod has good accuracy and *** to the consideration of spatial constraints,the method can also obtain more accurate conductance values under different training and testing conditions.
Stance detection aims at inferring an author’s attitude towards a specific target in a text. Prior methods mainly consider target-related background information for a better understanding of targets while neglecting ...
详细信息
Adversarial purification is one of the promising approaches to defend neural networks against adversarial attacks. Recently, methods utilizing diffusion probabilistic models have achieved great success for adversarial...
详细信息
Studies have proposed that there is evidence for cosmological coupling of black holes(BHs)with an index of k≈3;hence,BHs serve as the astrophysical source of dark ***,the data sample is limited for the redshifts of≤...
详细信息
Studies have proposed that there is evidence for cosmological coupling of black holes(BHs)with an index of k≈3;hence,BHs serve as the astrophysical source of dark ***,the data sample is limited for the redshifts of≤*** recent years,the James Webb Space Telescope(JWST)has detected many high-redshift active galactic nuclei(AGNs)and *** the JWST NIRSpec-/NIRCam-resolved AGNs,three are determined to be in early-type host galaxies with a redshift of z~***,their M_(*)and MBH are in tension with the predicted cosmological coupling of black holes with k=3 at a confidence level of~2σ,which challenges the hypothesis that BHs serve as the origin of dark *** work on high-redshift AGNs using the JWST will further assess such a hypothesis by identifying more early-type host galaxies in the higher mass range.
Generative retrieval (GR) has witnessed significant growth recently in the area of information retrieval. Compared to the traditional "index-retrieve-then-rank" pipeline, the GR paradigm aims to consolidate ...
详细信息
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de...
详细信息
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among decision variables is intricate,leading to large group sizes and suboptimal optimization effects;hence a large-scale multi-objective optimization algorithm based on weighted overlapping grouping of decision variables(MOEAWOD)is proposed in this ***,the decision variables are perturbed and categorized into convergence and diversity variables;subsequently,the convergence variables are subdivided into groups based on the interactions among different decision *** the size of a group surpasses the set threshold,that group undergoes a process of weighting and overlapping ***,the interaction strength is evaluated based on the interaction frequency and number of objectives among various decision *** decision variable with the highest interaction in the group is identified and disregarded,and the remaining variables are then reclassified into ***,the decision variable with the strongest interaction is added to each *** minimizes the interactivity between different groups and maximizes the interactivity of decision variables within groups,which contributed to the optimized direction of convergence and diversity exploration with different *** was subjected to testing on 18 benchmark large-scale optimization problems,and the experimental results demonstrate the effectiveness of our *** with the other algorithms,our method is still at an advantage.
With the extensive use of large language models, automatically generating QA datasets for domain-specific fine-tuning has become crucial. However, considering the multifaceted demands for readability, diversity, and c...
详细信息
Federated edge learning (FEEL) is an advanced paradigm in edge artificial intelligence, enabling privacy-preserving collaborative model training through periodic communication between edge devices and a central server...
详细信息
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo...
详细信息
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was proposed. However, most of the existing constructions have some deficiencies, they either do not have perfect key update function or the corresponding security with tight reduction relies on a non-static complexity assumption. To address the above problems, a new construction of U-IB-HPS is created, and the corresponding security of our system is proved based on the static complexity assumption. Also, the corresponding comparisons and analysis of performances show that our proposal not only achieves the perfect key update function and the anonymity, but also has the tight security reduction. In additional, our proposal achieves the same computational efficiency as other previous systems. To further illustrate the practical function of U-IB-HPS, a generic method of non-interactive data authorization protocol with continuous leakage resilience is designed by employing U-IB-HPS as an underlying tool, which can provide continuous leakage-resilient data authorization function for the cloud computing. Hence, the application field of U-IB-HPS is further extended through our study.
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp...
详细信息
暂无评论