Artificial intelligence (AI) is expected to significantly enhance radio resource management (RRM) in sixth-generation (6G) networks. However, the lack of explainability in complex deep learning (DL) models poses a cha...
详细信息
作者:
Abdullah AlshehriAbdullah AlqarniKuilian YangHossein FariborziComputer
Electrical and Mathematical Science & Engineering Division King Abdullah University of Science and Technology (KAUST) Thuwal Saudi Arabia Computer
Electrical and Mathematical Science & Engineering Division Electronics and Communication Engineering Umm Al-Qura University Al-Leith Saudi Arabia
In this paper, we present the design of a new low-power, high-performance MOS Current Mode Logic (MCML) D-Latch. The proposed design consists of cross-coupled transistors which dynamically control the load resistance ...
In this paper, we present the design of a new low-power, high-performance MOS Current Mode Logic (MCML) D-Latch. The proposed design consists of cross-coupled transistors which dynamically control the load resistance and eliminate static power dissipation. The performance of the design was improved by reducing the threshold voltage of the input transistors at the critical phase to switch them ON faster using the clocked-driven forward body biasing technique. The proposed design achieves an energy improvement of 54% and 49% and a performance improvement of 20% and 43% compared to the Folded and Folded (DTMOS) D-Latches, respectively. The designs were simulated on Cadence Virtuoso ADE tool using 40 nm technology TSMC PDK. Moreover, the proposed design provides higher output voltage swing and is less sensitive to the change of load capacitance compared to the other designs.
In this work we introduce the DODAG-X protocol for multipartite entanglement distribution in quantum networks. Leveraging the power of Destination Oriented Directed Acyclic Graphs (DODAGs), our protocol optimizes reso...
详细信息
Many solutions to address the challenge of robot learning have been devised, namely through exploring novel ways for humans to communicate complex goals and tasks in reinforcement learning (RL) setups. One way that ex...
详细信息
ISBN:
(数字)9798350384574
ISBN:
(纸本)9798350384581
Many solutions to address the challenge of robot learning have been devised, namely through exploring novel ways for humans to communicate complex goals and tasks in reinforcement learning (RL) setups. One way that experienced recent research interest directly addresses the problem by considering human feedback as preferences between pairs of trajectories (sequences of state-action pairs). However, when simply attributing a single preference to a pair of trajectories that contain many agglomerated steps, key pieces of information are lost in the process. We amplify the initial definition of preferences to account for highlights: state-action pairs of relatively high information (high/low reward) within a preferred trajectory. To include the additional information, we design novel regularization methods within a preference learning framework. To this extent, we present our method which is able to greatly reduce the necessary amount of preferences, by permitting the highlighting of favoured trajectories, in order to reduce the entropy of the credit assignment. We show the effectiveness of our work in both simulation and a user study, which analyzes the feedback given and its implications. We also use the total collected feedback to train a robot policy for socially compliant trajectories in a simulated social navigation environment. We release code and video examples at https://***/view/rl-polite
In this paper, we propose a robust interference management approach for the integrated sensing and communication (ISAC) system that employs non-orthogonal multiple access (NOMA) for multiplexing. Our proposed approach...
详细信息
ISBN:
(数字)9798350362244
ISBN:
(纸本)9798350362251
In this paper, we propose a robust interference management approach for the integrated sensing and communication (ISAC) system that employs non-orthogonal multiple access (NOMA) for multiplexing. Our proposed approach effectively addresses interference challenges by optimizing the pairing of communication users (CUs) and radar targets (RTs) while simultaneously designing receiving beamformers. These optimizations aim to maximize the combined utility of communication rates and the radar estimation information rate (REIR), inherently constituting a challenging non-convex combinatorial problem. To tackle this intricate problem, we employ the upper confidence bound (UCB) algorithm, a powerful online learning technique rooted in multi-armed bandit (MAB) theory. Along with UCB, we harness zeroforcing beamforming to optimize the receiving beamformer. The numerical results underscore the importance of CU-RT pairing, with a $65 \%$ average performance improvement over traditional NOMA-ISAC and OMA-ISAC, close to the exhaustive search performance by only $2 \%$. It also substantially reduces complexity, with about $90 \%$ less computational complexity than exhaustive search.
We investigate the equilibrium stability and robustness in a class of moving target defense problems, in which players have both incomplete information and asymmetric cognition. We first establish a Bayesian Stackelbe...
详细信息
We present a framework for constructing a first-order hyperbolic system whose solution approximates that of a desired higher-order evolution equation. Constructions of this kind have received increasing interest in re...
作者:
Matti VahsJana TumovaDivision of Robotics
Perception and Learning School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden
Uncertainties arising in various control systems, such as robots that are subject to unknown disturbances or environmental variations, pose significant challenges for ensuring system safety, such as collision avoidanc...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
Uncertainties arising in various control systems, such as robots that are subject to unknown disturbances or environmental variations, pose significant challenges for ensuring system safety, such as collision avoidance. At the same time, safety specifications are getting more and more complex, e.g., by composing multiple safety objectives through Boolean operators resulting in non-smooth descriptions of safe sets. Control Barrier Functions (CBFs) have emerged as a control technique to provably guarantee system safety. In most settings, they rely on an assumption of having deterministic dynamics and smooth safe sets. This paper relaxes these two assumptions by extending CBFs to encompass control systems with stochastic dynamics and safe sets defined by non-smooth functions. By explicitly considering the stochastic nature of system dynamics and accommodating complex safety specifications, our method enables the design of safe control strategies in uncertain and complex systems. We provide formal guarantees on the safety of the system by leveraging the theoretical foundations of stochastic CBFs and non-smooth safe sets. Numerical simulations demonstrate the effectiveness of the approach in various scenarios.
We introduce a real-time identification method for discrete-time state-dependent switching systems in both the input-output and state-space domains. In particular, we design a system of adaptive algorithms running in ...
详细信息
The design space of current quantum computers is expansive, with no obvious winning solution, leaving practitioners with a crucial question: “What is the optimal system configuration to run an algorithm?” This paper...
详细信息
ISBN:
(数字)9798331541378
ISBN:
(纸本)9798331541385
The design space of current quantum computers is expansive, with no obvious winning solution, leaving practitioners with a crucial question: “What is the optimal system configuration to run an algorithm?” This paper explores hardware design trade-offs across NISQ systems to better guide algorithm and hardware development. Algorithmic workloads and fidelity models drive the evaluation to appropriately capture architectural features such as gate expressivity, fidelity, and crosstalk. As a result of our analysis, we extend the criteria for gate design and selection from only maximizing average fidelity to a more comprehensive approach that additionally considers expressivity with respect to algorithm structures. A custom synthesis-driven compilation workflow that produces minimal circuit representations for a given system configuration drives our methodology and allows us to analyze any gate set effectively. In this work, we focus on native entangling gates (CNOT, ECR, CZ, ZZ, XX, Sycamore, √iSWAP), proposed gates (B Gate,
4
√CNOT, -
8
√CNOT), as well as parameterized gates (FSim, XY). By providing a method to evaluate the suitability of algorithms for hardware platforms, this work emphasizes the importance of hardware-software codesign for quantum computing.
暂无评论