Twitter user geolocation is applied into various applications, such as local messages recommendation and event location recognition. Existing methods do not usually utilize the potential positional correlation between...
详细信息
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy...
详细信息
To achieve the tradeoff between state aggregation and traffic redundancy, different branches of the tree are formed in backbone and receivers’ access networks. In receivers’ access network, each branch corresponds t...
详细信息
The Sunway processor is a unique heterogeneous many-core processor used by Sunway TaihuLight supercomputer. However, developing parallel programs on the Sunway processor is still complex. In this paper, a source-to-so...
详细信息
As most binary translation systems don’t consider the difference of register requirements of basic blocks, which brings redundant memory access instructions caused by unnecessary registers overflow. To solve this pro...
详细信息
Deep neural network approaches show promise in solving partial differential equations. However, unlike traditional numerical methods, they face challenges in enforcing essential boundary conditions. The widely adopted...
Deep neural network approaches show promise in solving partial differential equations. However, unlike traditional numerical methods, they face challenges in enforcing essential boundary conditions. The widely adopted penalty-type methods, for example, offer a straightforward implementation but introduces additional complexity due to the need for hyper-parameter tuning; moreover, the use of a large penalty parameter can lead to artificial extra stiffness, complicating the optimization process. In this paper, we propose a novel, intrinsic approach to impose essential boundary conditions through a framework inspired by intrinsic structures. We demonstrate the effectiveness of this approach using the deep Ritz method applied to Poisson problems, with the potential for extension to more general equations and other deep learning techniques. Numerical results are provided to substantiate the efficiency and robustness of the proposed method.
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli...
详细信息
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ...
详细信息
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
In the era of information explosion, data fusion has captured increasing attention from researchers as it plays an important part in data application. However, resolving the inconsistency of information generated by v...
详细信息
暂无评论