Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstructi...
详细信息
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstruction has become a prevalent approach for unsupervised anomaly ***,effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time *** this paper,we propose a cross-dimension attentive feature fusion network for time series anomaly detection,referred to as ***,a series and feature mixing block is introduced to learn representations in 1D ***,a fast Fourier transform is employed to convert the time series into 2D space,providing the capability for 2D feature ***,a cross-dimension attentive feature fusion mechanism is designed that adaptively integrates features across different dimensions for anomaly *** results on real-world time series datasets demonstrate that CAFFN performs better than other competing methods in time series anomaly detection.
Recently,with the increasing complexity of multiplex Unmanned Aerial Vehicles(multi-UAVs)collaboration in dynamic task environments,multi-UAVs systems have shown new characteristics of inter-coupling among multiplex g...
详细信息
Recently,with the increasing complexity of multiplex Unmanned Aerial Vehicles(multi-UAVs)collaboration in dynamic task environments,multi-UAVs systems have shown new characteristics of inter-coupling among multiplex groups and intra-correlation within ***,previous studies often overlooked the structural impact of dynamic risks on agents among multiplex UAV groups,which is a critical issue for modern multi-UAVs communication to *** address this problem,we integrate the influence of dynamic risks on agents among multiplex UAV group structures into a multi-UAVs task migration problem and formulate it as a partially observable Markov *** then propose a Hybrid Attention Multi-agent Reinforcement Learning(HAMRL)algorithm,which uses attention structures to learn the dynamic characteristics of the task environment,and it integrates hybrid attention mechanisms to establish efficient intra-and inter-group communication aggregation for information extraction and group *** results show that in this comprehensive and challenging model,our algorithm significantly outperforms state-of-the-art algorithms in terms of convergence speed and algorithm performance due to the rational design of communication mechanisms.
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
As an emerging privacy-preservation machine learning framework,Federated Learning(FL)facilitates different clients to train a shared model collaboratively through exchanging and aggregating model parameters while raw ...
详细信息
As an emerging privacy-preservation machine learning framework,Federated Learning(FL)facilitates different clients to train a shared model collaboratively through exchanging and aggregating model parameters while raw data are kept local and *** this learning framework is applied to Deep Reinforcement Learning(DRL),the resultant Federated Reinforcement Learning(FRL)can circumvent the heavy data sampling required in conventional DRL and benefit from diversified training data,besides privacy preservation offered by *** FRL implementations presuppose that clients have compatible tasks which a single global model can *** practice,however,clients usually have incompatible(different but still similar)personalized tasks,which we called task *** may severely hinder the implementation of FRL for practical *** this paper,we propose a Federated Meta Reinforcement Learning(FMRL)framework by integrating Model-Agnostic Meta-Learning(MAML)and ***,we innovatively utilize Proximal Policy Optimization(PPO)to fulfil multi-step local training with a single round of ***,considering the sensitivity of learning rate selection in FRL,we reconstruct the aggregation optimizer with the Federated version of Adam(Fed-Adam)on the server *** experiments demonstrate that,in different environments,FMRL outperforms other FL methods with high training efficiency brought by Fed-Adam.
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solve...
详细信息
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the *** this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for *** main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data ***,we conducted extensive experiments to evaluate the UAV-ITD *** results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery.
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with *** and ES are usually invested by users o...
详细信息
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with *** and ES are usually invested by users or a third party,and they may form friendly microgrids(MGs)and operate *** centralized dispatching meth od no longer suits for hosting capacity evaluation of SDN.A quick hosting capacity evaluation method based on distributed optimal dispatching is ***,a multi-objective DG hosting capacity evaluation model is established,and the host ing capacity for DG is determined by the optimal DG planning *** steady-state security region method is applied to speed up the solving process of the DG hosting capacity evalua tion ***,the optimal dispatching models are estab lished for MG and SDN respectively to realize the operating *** the distributed dispatching strategy,the dual-side optimal operation of SDN-MGs can be realized by several iterations of power exchange ***,an SDN with four MGs is conducted considering multiple flexible *** shows that the DG hosting capacity of SDN oversteps the sum of the maximum active power demand and the rated branch ***,the annual DG electricity oversteps the maximum active power demand value.
This paper introduces a memristor-based neural network with bidirectional cyclic constructed from square wave pulse functions. Additionally, we design an image encryption and compression network framework incorporatin...
详细信息
In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources r...
详细信息
In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources required by the stream processing job will also *** resources used by stream processing jobs need to be adjusted according to load changes,avoiding the waste of computing *** present,existing works adjust stream processing jobs based on the assumption that there is a linear relationship between the operator parallelism and operator resource consumption(e.g.,throughput),which makes a significant deviation when the operator parallelism *** paper proposes a nonlinear model to represent operator *** divide the operator performance into three stages,the Non-competition stage,the Non-full competition stage,and the Full competition *** our proposed performance model,given the parallelism of the operator,we can accurately predict the CPU utilization and operator *** with actual experiments,the prediction error of our model is below 5%.We also propose a quick accurate auto-scaling(QAAS)method that uses the operator performance model to implement the auto-scaling of the operator parallelism of the Flink *** to previous work,QAAS is able to maintain stable job performance under load changes,minimizing the number of job adjustments and reducing data backlogs by 50%.
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ...
详细信息
暂无评论