Unsupervised Domain Adaptation (UDA) techniques leverage labeled data from a source domain to adapt to unlabeled data from a target domain, offering a primary solution for addressing cross-domain challenges in crowd c...
详细信息
Service caching is an emerging solution to addressing massive service request in a distributed environment for supporting rapidly growing services and applications. With the explosive increases in global mobile data t...
详细信息
The classification of short-term power load data by clustering algorithm can lay a good foundation for the subsequent power load forecasting work and provide a more efficient, safe and reliable direction for the opera...
详细信息
In this paper, we study the obstacle avoidance problem of second-order nonlinear multi-agent systems (MASs) with directed graph based on event-triggered control. Firstly, the consensus requirement is accomplished by u...
详细信息
Sandplay therapy is a novel psychological consultation and treatment method for people suffering from mental stress and psychological issues. It is popular among the masses owing to its interest and curative effect. H...
详细信息
Considering the fact that the test case runs abnormally and the test case execution fails during the development and debugging of the 5G terminal protocol conformance test system. Here useful approach is implemented b...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be ri...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be rigorously *** to scan testing provides high test coverage,it is applied to the testing of cryptographic integrated ***,while providing good controllability and observability,it also provides attackers with a backdoor to steal *** the text,a novel protection scheme is put forward to resist scan-based attacks,in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuseantifuse structures in a non-linear shift register(NLSR),then determine the scan input code according to the configuration of the fuse-antifuse structures and the styles of connection between the NLSR cells and the scan *** the key is right,the chip can be tested normally;otherwise,the data in the scan chain cannot be propagated normally,it is also impossible for illegal users to derive the desired scan *** proposed technique not only enhances the security of cryptographic chips,but also incurs acceptable overhead.
Accurate sales forecasting serves as a critical foundation for informed business decision-making and numerous methodologies have been advanced by scholars predominantly rely on complete datasets, however, in practice,...
详细信息
Point cloud registration is an important part of 3D point cloud map construction based on multi-line lidar. At present, traditional iterative nearest point algorithm (ICP) is mainly used for point cloud registration. ...
详细信息
The strong generalized minimum label spanning tree problem (SGMLSTP) is to search the minimum label spanning tree (MLST) from an Edge-labeled graph (ELG), in which each edge is associated with one or more labels. SGML...
详细信息
暂无评论