Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ...
详细信息
Quantum algorithms of factoring problem have been paid more and more attention since Shor's algorithm was proposed. Combining the current quantum computer hardware level and integer factorization quantum algorithm...
详细信息
In recent years, deep learning has been widely used for human activity recognition (HAR) based on wearable sensor data due to its excellent performance. However, deep learning approaches often need a large amount of l...
详细信息
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t...
详细信息
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm...
详细信息
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the ...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the past 20 years,and points out that the scale and probability distribution of blackouts obey the power-law ***,it is concluded that transmission line fault,bus fault,large-scale power flow transfer and relay protection device misoperation are the main factors causing cascading ***,the five stages of cascading failure evolution are analyzed,which are slow successive interruption process,fast successive interruption process,transient oscillation,avalanche blackout and long ***,the research results of cascading failure at home and abroad in recent years are analyzed from three research points:small world network,topological network and two-layer coupling network.
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ...
详细信息
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers...
详细信息
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu...
详细信息
暂无评论