This paper studies the password-based strong authentication key exchange protocol in the cross-domain scenario, and gives an end-to-end highly secure C2C-PAKE protocol, in which the server shares a password with the c...
详细信息
Software Definition Network (SDN) has three features as separation of control and forwarding, unified management of configuration, and dynamic programming, which have greatly improved flexibility of network deployment...
详细信息
Owing to their exceptional properties,high-entropy alloys(HEAs)and high-entropy materials have emerged as promising research areas and shown diverse ***,the recent advances in the field are comprehensively reviewed,or...
详细信息
Owing to their exceptional properties,high-entropy alloys(HEAs)and high-entropy materials have emerged as promising research areas and shown diverse ***,the recent advances in the field are comprehensively reviewed,organized into five *** first section introduces the background of HEAs,covering their definition,significance,application prospects,basic properties,design principles,and *** subsequent section focuses on cutting-edge high-entropy structural materials,highlighting developments such as nanostructured alloys,grain boundary engineering,eutectic systems,cryogenic alloys,thin films,micro-nano-lattice structures,additive manufacturing,high entropy metallic glasses,nano-precipitate strengthened alloys,composition modulation,alloy fibers,and refractory *** the following section,the emphasis shifts to functional materials,exploring HEAs as catalysts,magneto-caloric materials,corrosion-resistant alloys,radiation-resistant alloys,hydrogen storage systems,and materials for ***,the review encompasses functional high-entropy materials outside the realm of alloys,including thermoelectric,quantum dots,nanooxide catalysts,energy storage materials,negative thermal expansion ceramics,and high-entropy wave absorption *** paper concludes with an outlook,discussing future directions and potential growth areas in the *** this comprehensive review,researchers,engineers,and scientists may gain valuable insights into the recent progress and opportunities for further exploration in the exciting domains of high-entropy alloys and functional materials.
This paper proposes a method for adapting the layout of flexible workpieces of various shapes, in order to reduce the difficulty of location design for personalized shapes. Different from the previous location design ...
详细信息
Taking advantage of their inherent dexterity,robotic arms are competent in completing many tasks *** a result of the modeling complexity and kinematic uncertainty of robotic arms,model-free control paradigm has been p...
详细信息
Taking advantage of their inherent dexterity,robotic arms are competent in completing many tasks *** a result of the modeling complexity and kinematic uncertainty of robotic arms,model-free control paradigm has been proposed and investigated ***,robust model-free control of robotic arms in the presence of noise interference remains a problem worth *** this paper,we first propose a new kind of zeroing neural network(ZNN),i.e.,integration-enhanced noise-tolerant ZNN(IENT-ZNN)with integration-enhanced noisetolerant ***,a unified dual IENT-ZNN scheme based on the proposed IENT-ZNN is presented for the kinematic control problem of both rigid-link and continuum robotic arms,which improves the performance of robotic arms with the disturbance of noise,without knowing the structural parameters of the robotic *** finite-time convergence and robustness of the proposed control scheme are proven by theoretical ***,simulation studies and experimental demonstrations verify that the proposed control scheme is feasible in the kinematic control of different robotic arms and can achieve better results in terms of accuracy and robustness.
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net...
详细信息
ISBN:
(纸本)9781450397148
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural netwoks to classify images with wrong labels, posing great threat to network security. White-box attack has achieved considerable success rate, for the model structure is already known. But black-box attack remains to be improved, so as to the transferability. We refer to the model augmentation method in network training process, and apply to generating adversarial examples to reduce overfitting. Consulting fundamental methods in adversarial examples, we propose a multi-cropping transformation method to alleviate overfitting and enhance transferability. Firstly, referring to data augmentation, we multi-crop original images in every iteration with random possibilities in adversarial exaples generating process. Secondly, the gradient of model loss function is calculated, and the perturbations are added to original images. Finally, we generate adversarial examples with iterative perturbations. The validation of our method is verified on single models and ensemble models, and the transferability is improved, compared to other fundamental methods.
Despite the huge accumulation of scientific literature,it is inefficient and laborious to manually search it for useful information to investigate structure-activity ***,we propose an efficient text-mining framework f...
详细信息
Despite the huge accumulation of scientific literature,it is inefficient and laborious to manually search it for useful information to investigate structure-activity ***,we propose an efficient text-mining framework for the discovery of credible and valuable domain knowledge from abstracts of scientific literature focusing on Nickel-based single crystal ***,the credibility of abstracts is quantified in terms of source timeliness,publication authority and author’s academic ***,eight entity types and domain dictionaries describing Nickel-based single crystal superalloys are predefined to realize the named entity recognition from the abstracts,achieving an accuracy of 85.10%.Thirdly,by formulating 12 naming rules for the alloy brands derived from the recognized entities,we extract the target entities and refine them as domain knowledge through the credibility *** this,we also map out the academic cooperative“Author-Literature-Institute”network,characterize the generations of Nickel-based single crystal superalloys,as well as obtain the fractions of the most important chemical elements in *** extracted rich and diverse knowledge of Nickel-based single crystal superalloys provides important insights toward understanding the structure-activity relationships for Nickel-based single crystal superalloys and is expected to accelerate the design and discovery of novel superalloys.
Nowadays programmable logic controllers (PLCs) are suffering increasing cyberattacks. Attackers could reprogram PLCs to inject malware that would cause physical damages and economic losses. These PLC malwares are high...
详细信息
This paper proposes an improved consensus algorithm based on PBFT(EBCR-PBFT). Firstly, The Modified Random Select(MRS) function is used to perform preliminary screening of network nodes, so as to solve the problem of ...
详细信息
With the booming of Large Language Models (LLMs), prompt-learning has become a promising method mainly researched in various research areas. Recently, many attempts based on prompt-learning have been made to improve t...
详细信息
暂无评论