The emergence of Large Language Models (LLMs) has had a significant impact on fields such as question answering (Q&A) and machine understanding. However, due to the specificity of government documents, there are s...
详细信息
ISBN:
(数字)9798331530891
ISBN:
(纸本)9798331530907
The emergence of Large Language Models (LLMs) has had a significant impact on fields such as question answering (Q&A) and machine understanding. However, due to the specificity of government documents, there are several LLMs exclusively focused on government document writing. In this survey, we thoroughly examine the application of LLMs in the creation and refinement of government documents. A systematic comparison of various models, i.e., ChatGPT-4 and Kimi, is provided here. Our findings reveal that, although LLMs can significantly streamline the document preparation process, there is considerable variation in their effectiveness. ChatGPT-4 stands out as the top-performing model, excelling in context understanding and grammatical accuracy, followed closely by QWen2.5. In contrast, TinyLlama performs limited comprehension of Chinese and exhibits a propensity for English output. This survey has two main contributions: (1) emphasizes the importance of the task of polishing government documents; (2) fills the gap in the market for a comprehensive comparison of LLMs in the task of polishing government documents. Through comparison analysis, this paper aims at giving a reference for future research and practical application of Large Language Models (LLMs) in the government sector. At the same time, it can assure the maximum of potential and lower the risks of it.
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local op...
详细信息
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local optima,limiting their effectiveness in achieving optimal power ***,we propose a novel multi-strategy fusion memetic algorithm(MFMA).MFMA integrates global exploration via the chimp optimization algorithm with local exploration using the coati optimization algorithm based on the optimal position learning and adaptive weight factor(COA-OLA),complemented by population management through truncation ***,leveraging MFMA,we propose a power optimization approach for MPRM logic circuits that searches for the best polarity configuration to minimize circuit *** results based on Microelectronics Center of North Carolina(MCNC)benchmark circuits demonstrate significant improvements over existing power optimization *** achieves a maximum power saving rate of 72.30%and an average optimization rate of 43.37%;it searches for solutions faster and with higher quality,validating its effectiveness and superiority in power optimization.
Brain tumor segmentation plays a crucial role in medical image analysis. Brain tumor patients considerably benefit from early discovery due to the increased likelihood of a successful outcome from therapy. Due to the ...
详细信息
Chroma intra prediction aims to reduce chroma redundancies within a frame, which plays an important role in improving the coding efficiency of intra coding. Existing chroma intra prediction methods typically utilize t...
详细信息
Convolutional Neural Networks (CNNs) continue to achieve great success in classification tasks as innovative techniques and complex multi-path architecture topologies are introduced. Neural Architecture Search (NAS) a...
详细信息
Backdoor attacks in federated learning (FL) face challenges such as lower attack success rates and compromised main task accuracy (MA) compared to local training. Existing methods like distributed backdoor attack (DBA...
详细信息
Binary code similarity detection is to detect the similarity of code at binary (assembly) level without source code. Existing works have their limitations when dealing with mutated binary code generated by different c...
详细信息
With the emergence of big data and advanced technologies, memory devices play an important role. However, there is a lack of efficient approaches for waveform anomaly detection to validate the reliability of memory de...
With the emergence of big data and advanced technologies, memory devices play an important role. However, there is a lack of efficient approaches for waveform anomaly detection to validate the reliability of memory devices under various operations. In this paper, we propose an efficient segment-level waveform anomaly detection method for memory devices that includes the stages of waveform segmentation and anomaly analysis. Being compatible with general waveform sequences, the proposed method features lightweight computational complexity. During the waveform segmentation stage, we execute downsampled segment collection and downsampled segment pair matching to obtain downsampled segments that are associated with individual operations. During the anomaly analysis stage, we execute ensemble denoising, entrywise alignment, anomaly presence examination through excess kurtosis, and anomaly detection with density-based spatial clustering of applications with noise (DBSCAN) to predict anomaly locations. Simulation results confirm the outstanding performance of the proposed method in terms of matching accuracy, excess kurtosis measurements, and segment-level anomaly detection.
Tabular anomaly detection under the one-class classification setting poses a significant challenge, as it involves accurately conceptualizing "normal" derived exclusively from a single category to discern an...
Blockchain technology can construct a decentralised architecture design for diverse software applications. Nevertheless, the defects of on-chain algorithmic autonomy and subsequent tedious arguments for fixing the bug...
Blockchain technology can construct a decentralised architecture design for diverse software applications. Nevertheless, the defects of on-chain algorithmic autonomy and subsequent tedious arguments for fixing the bugs raised concerns about whether blockchain can operate in a trustworthy way. Although multiple architectural patterns for blockchain governance have been summarised, concentrating on different governance dimensions (i.e., decision rights, incentives, and accountability), there is a need for guidance on the adoption of these patterns. In this paper, we present a set of decision models that can assist architects and developers in selecting appropriate patterns, to achieve governance in blockchain systems. This study provides a mapping between governance-related problems and each architectural pattern, and clarifies the trade-offs and conditions. The proposed decision models were evaluated based on expert opinions regarding the usability, correctness, and completeness collected via interviews.
暂无评论