It is known that two-dimensional two-component fundamental solitons of the semivortex (SV) type, with vorticities (s+,s−)=(0,1) in their components, are stable ground states (GSs) in the spin-orbit-coupled (SOC) binar...
详细信息
It is known that two-dimensional two-component fundamental solitons of the semivortex (SV) type, with vorticities (s+,s−)=(0,1) in their components, are stable ground states (GSs) in the spin-orbit-coupled (SOC) binary Bose-Einstein condensate with the contact self-attraction acting in both components, in spite of the possibility of the critical collapse in the system. However, excited states (ESs) of the SV solitons, with the vorticity set (s+,s−)=(S+,S++1) and S+=1,2,3,..., are unstable in the same system. We construct ESs of SV solitons in the SOC system with opposite signs of the self-interaction in the two components. The main finding is stability of the ES-SV solitons, with the extra vorticity (at least) up to S+=6. The threshold value of the norm for the onset of the critical collapse, Nthr, in these excited states is higher than the commonly known critical value, Nc≈5.85, associated with the single-component Townes solitons, Nthr increasing with the growth of S+. A velocity interval for stable motion of the GS-SV solitons is found too. The results suggest a solution for the challenging problem of the creation of stable vortex solitons with high topological charges.
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
详细信息
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia...
详细信息
The topological connectivity information derived from the brain functional network can bring new insights for diagnosing and analyzing dementia *** brain functional network is suitable to bridge the correlation betwee...
详细信息
The topological connectivity information derived from the brain functional network can bring new insights for diagnosing and analyzing dementia *** brain functional network is suitable to bridge the correlation between abnormal connectivities and dementia ***,it is challenging to access considerable amounts of brain functional network data,which hinders the widespread application of data-driven models in dementia *** this study,a novel distribution-regularized adversarial graph auto-Encoder(DAGAE)with transformer is proposed to generate new fake brain functional networks to augment the brain functional network dataset,improving the dementia diagnosis accuracy of data-driven ***,the label distribution is estimated to regularize the latent space learned by the graph encoder,which canmake the learning process stable and the learned representation ***,the transformer generator is devised to map the node representations into node-to-node connections by exploring the long-term dependence of highly-correlated distant brain *** typical topological properties and discriminative features can be preserved ***,the generated brain functional networks improve the prediction performance using different classifiers,which can be applied to analyze other cognitive *** on the Alzheimer’s Disease Neuroimaging Initiative(ADNI)dataset demonstrate that the proposed model can generate good brain functional *** classification results show adding generated data can achieve the best accuracy value of 85.33%,sensitivity value of 84.00%,specificity value of 86.67%.The proposed model also achieves superior performance compared with other related ***,the proposedmodel effectively improves cognitive disease diagnosis by generating diverse brain functional networks.
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s...
详细信息
ISBN:
(纸本)9781450397148
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, such as unreasonable seed energy allocation, low code coverage and incomplete testing. To solve the above problems, this paper proposes an optimization method of directed fuzzing based on Rich-Branch nodes. In this method, the concept of Rich-Branch nodes is defined and the algorithm of extracting Rich-Branch nodes is given. The optimization method collects the coverage information of the target program in the running process, calculates the weights of covered functions and nodes in real time by combining CG and CFG of the target program, and generates a list of Rich-Branch nodes. According to the weights of Rich-Branch nodes, the seed energy allocation algorithm of AFLGo is optimized and improved. Compared with AFLGo, this optimization method improves the average code coverage of each targeted point by 56.79%, and has the same target reaching ability as AFLGo.
Face Recognition (FR) systems, while widely used across various sectors, are vulnerable to adversarial attacks, particularly those based on deep neural networks. Despite existing efforts to enhance the robustness of F...
详细信息
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist...
详细信息
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assistance of a server trusted by both the clients via an unprotected network communication environment. The 3 PAKE protocols can be applied to various scenarios, including mobile commerce environment.
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed...
详细信息
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed traffic,this study proposes a cut-in prediction and risk assessment method with considering the interactions of multiple traffic *** integration of the support vector machine and Gaussian mixture model(SVM-GMM)is developed to simultaneously predict cut-in behavior and *** dimension of the input features is reduced through Chebyshev fitting to improve the training efficiency as well as the online inference *** on the predicted trajectory of the cut-in vehicle and the responsive actions of the autonomous vehicles,two risk measurements are introduced to formulate the comprehensive interaction risk through the combination of Sigmoid function and Softmax ***,the comparative analysis is performed to validate the proposed method using the naturalistic driving *** results show that the proposed method can predict the trajectory with higher precision and effectively evaluate the risk level of a cut-in maneuver compared to the methods without considering interaction.
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim...
详细信息
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel...
详细信息
暂无评论