One of the most important issues for secure communication in the physical layer is developing physical layer security techniques to provide confidentiality and data integrity in wireless communication systems. The pro...
详细信息
The growing number of wirelessly dependent applications will soon outgrow the latency and dependability of existing technology. Fast closed-loop control in intra-body networks, intra-avionics communication, intra-vehi...
详细信息
To address the challenge of high manual measurement cost, heavy workload and difficulty in real-time collection, a multiparameter remote wireless monitoring system based on LoRa is proposed. The system uses sensors to...
详细信息
Due to their large size, generative Large Language Models (LLMs) require significant computing and storage resources. This paper introduces a new post-training quantization method, GPTQT, to reduce memory usage and en...
详细信息
ISBN:
(纸本)9798350364200;9798350364194
Due to their large size, generative Large Language Models (LLMs) require significant computing and storage resources. This paper introduces a new post-training quantization method, GPTQT, to reduce memory usage and enhance processing speed by expressing the weight of LLM in 3bit/2bit. Practice has shown that minimizing the quantization error of weights is ineffective, leading to overfitting. Therefore, GPTQT employs a progressive two-step approach: initially quantizing weights using Linear quantization to a relatively high bit, followed by converting obtained int weight to lower bit binary coding. A re-explore strategy is proposed to optimize initial scaling factor. During inference, these steps are merged into pure binary coding, enabling efficient computation. Testing across various models and datasets confirms GPTQT's effectiveness. Compared to the strong 3-bit quantization baseline, GPTQT further reduces perplexity by 4.01 on opt-66B and increases speed by 1.24x on opt-30b. The results on Llama2 show that GPTQT is currently the best binary coding quantization method for such kind of LLMs.
The Structured Random Matrix (SRM) model is an increasingly popular approach to industrial automation. This model is based on the idea that the control systems of industrial machines are "structured"in a cer...
详细信息
This initiative's main goal is to design a healthcare system specifically for people who are paralyzed. These people frequently struggle to communicate their requirements because of speech impairments and lack of ...
详细信息
As the demand for computational power continues to grow, traditional data processing approaches face limitations, primarily related to physical constraints in materials and processing units. In order to deal with such...
详细信息
ISBN:
(纸本)9798350339826
As the demand for computational power continues to grow, traditional data processing approaches face limitations, primarily related to physical constraints in materials and processing units. In order to deal with such limitations, the computing industry has turned to multi-core and Symmetric multiprocessing technology, harnessing the combined processing capabilities of multiple processors to spread workloads to improve performance. One of the key strategies in providing computational power for parallel processing is represented by the "multi-tenant approach" of Cloud computing, where multiple tenants can share a huge amount of computational power for the execution of services. Private Cloud is a slightly different approach which ensures more security and control. At the same time, it can provide service continuity and reliability at the system level rather than relying on individual components. In this paper, we discuss the key aspects of cloud computing w.r.t. the existing different service models, particularly focusing on the private Cloud model. To this end, we discuss established technologies for Cloud computing, particularly the well-known OpenStack. We discuss the key aspects related to the deployment of OpenStack using PuppetStack, which is a software solution we employed for our research. PuppetStack can support the deployment of high-availability private cloud infrastructure.
During physical computing events, we have offered to school-students, we have observed different problems students struggle with while working with sensors and actuators of physical computing devices. Whereas some pro...
详细信息
The primary goal of this research work is to develop an autonomous robot that can do domestic surveillance primarily and muti-application regions generally. Robots now play a significant part in our daily lives by eli...
详细信息
The computational schemes that are supposed to be used in the processes of processing operational information in real-time systems are considered. Two algorithms for scheduling jobs that do not allow interruption and ...
详细信息
暂无评论