In underground communication systems, continuous mud pulse signals are susceptible to pump noise during transmission, resulting in a high bit error rate(BER). In this paper, a Normal Inner Product Orthogonal Matching ...
详细信息
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper systematically analyzes the Security mechanisms of UEFI platform firmware. Then the vulnerability factors of UEFI firmware are describe...
详细信息
Knowledge graph representation learning provides a lot of help for subsequent tasks such as knowledge graph completion, information retrieval, and intelligent question answering. By representing the knowledge graph as...
详细信息
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical...
详细信息
A major user need is the completion of security audits by locating vulnerability functions using vulnerability information published by firmware manufacturers. However, it is difficult to manually analyze the relative...
详细信息
Fixed-time synchronization(FTS)of delayed memristor-based neural networks(MNNs)with discontinuous activations is studied in this *** continuous and discontinuous activations are considered *** the mixed delays which a...
详细信息
Fixed-time synchronization(FTS)of delayed memristor-based neural networks(MNNs)with discontinuous activations is studied in this *** continuous and discontinuous activations are considered *** the mixed delays which are closer to reality are taken into the ***,two kinds of control schemes are proposed,including feedback and adaptive control *** on some lemmas,mathematical inequalities and the designed controllers,a few synchronization criteria are ***,the upper bound of settling time(ST)which is independent of the initial values is ***,the feasibility of our theory is attested by simulation examples.
Software Definition Network (SDN) has three features as separation of control and forwarding, unified management of configuration, and dynamic programming, which have greatly improved flexibility of network deployment...
详细信息
作者:
Siran LISchool of Mathematical Sciences
IMA-Shanghai&Key Laboratory of Scientific and Engineering Computing(Ministry of Education)Shanghai Jiao Tong UniversityShanghai 200240China
Let(M,g_(0))be a compact Riemannian *** present a new proof of the classical Gaffney inequality for differential forms in boundary value spaces over M,via a variational approach a la Kozono-Yanagisawa[Lr-variational i...
详细信息
Let(M,g_(0))be a compact Riemannian *** present a new proof of the classical Gaffney inequality for differential forms in boundary value spaces over M,via a variational approach a la Kozono-Yanagisawa[Lr-variational inequality for vector fields and the Helmholtz-Weyl decomposition in bounded domains,Indiana ***.J.58(2009),1853-1920],combined with global computations based on the Bochner technique.
With the emergence of new technologies such as cloud computing, mobile internet, the Internet of Things, and 5G, the internet ecosystem has undergone significant changes. The connections between people and devices hav...
详细信息
At present, the scale of quantum computers in the real sense is still small, and quantum simulation has become one of the important ways of quantum theory research, grover quantum search algorithm is suitable for the ...
详细信息
暂无评论