The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli...
详细信息
Deep neural network approaches show promise in solving partial differential equations. However, unlike traditional numerical methods, they face challenges in enforcing essential boundary conditions. The widely adopted...
Deep neural network approaches show promise in solving partial differential equations. However, unlike traditional numerical methods, they face challenges in enforcing essential boundary conditions. The widely adopted penalty-type methods, for example, offer a straightforward implementation but introduces additional complexity due to the need for hyper-parameter tuning; moreover, the use of a large penalty parameter can lead to artificial extra stiffness, complicating the optimization process. In this paper, we propose a novel, intrinsic approach to impose essential boundary conditions through a framework inspired by intrinsic structures. We demonstrate the effectiveness of this approach using the deep Ritz method applied to Poisson problems, with the potential for extension to more general equations and other deep learning techniques. Numerical results are provided to substantiate the efficiency and robustness of the proposed method.
In the era of information explosion, data fusion has captured increasing attention from researchers as it plays an important part in data application. However, resolving the inconsistency of information generated by v...
详细信息
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio...
详细信息
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam...
详细信息
According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group ...
详细信息
ISBN:
(纸本)9789811136719
According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group elements, the verification stage requires only 3 pairing operations, and the algorithm is proved secure based on the computational Diffie-Hellman problem under the random oracle model. Compared with the other similar algorithm, this algorithm achieves higher security with higher efficiency and lower cost of communication. Then according to the signature algorithm proposed in this paper, an authentication scheme with the function of mutual authentication, aggregate authentication and group key agreement is presented. The analysis results show that the scheme is secure and efficient, especially suitable for the large-scale space networks.
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is...
详细信息
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in...
详细信息
暂无评论