Anomaly detection is a task that involves identifying patterns or events that deviate significantly from the expected or normal behavior. In the context of classroom settings, it is essential to identify mischievous b...
详细信息
This paper presents a comprehensive evaluation and ranking of five Large Language Models - Mistral, Vicuna, Phi, Llama 2, and Zephyr - across five temperature variants. The focus is on their ability to predict the lik...
详细信息
The paper uses Deep Reinforcement Learning (DRL) to traffic signal regulation, solving urban traffic congestion. Our research paper demonstrates the simulation of intricate traffic conditions with microscopic accuracy...
详细信息
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n...
详细信息
Lung cancer is a major global cause of death, highlighting the critical need for quick and accurate detection methods. The exploration of computational alternatives arose from the standard way of manually processing C...
详细信息
The 'ConfigMaster: An interactive solution for system management' is a simple utility written using Bash scripting. It is designed for Unix-like systems. The tool lets users easily configure system settings an...
详细信息
The query model(or black-box model)has attracted much attention from the communities of both classical and quantum ***,quantum advantages are revealed by presenting a quantum algorithm that has a better query complexi...
详细信息
The query model(or black-box model)has attracted much attention from the communities of both classical and quantum ***,quantum advantages are revealed by presenting a quantum algorithm that has a better query complexity than its classical *** the history of quantum algorithms,the Deutsch algorithm and the Deutsch-Jozsa algorithm play a fundamental role and both are exact one-query quantum *** leads us to con-sider the problem:what functions can be computed by exact one-query quantum algorithms?This problem has been ad-dressed in the literature for total Boolean functions and symmetric partial Boolean functions,but is still open for general partial Boolean ***,in this paper,we continue to characterize the computational power of exact one-query quantum algorithms for general partial Boolean ***,we present several necessary and sufficient conditions for a partial Boolean function to be computed by exact one-query quantum ***,inspired by these conditions,we discover some new representative functions that can be computed by exact one-query quantum algorithms but have an essential difference from the already known ***,it is worth pointing out that before our work,the known func-tions that can be computed by exact one-query quantum algorithms are all symmetric functions and the quantum algo-rithm used is essentially the Deutsch-Jozsa algorithm,whereas the functions discovered in this paper are generally asym-metric and new algorithms to compute these functions are ***,this expands the class of functions that can be computed by exact one-query quantum algorithms.
As the world rapidly embraces quantum technologies, the need for robust quantum security protocols becomes increasingly paramount. Quantum Key Distribution (QKD) has been at the forefront of secure key exchange, but e...
详细信息
The constrained design, remote deployment, and sensitive data generated by Internet of Things (IoT) devices make them susceptible to various cyberattacks. One such attack is profiling IoT devices by tracking their pac...
详细信息
Consumer electronic devices used to support data communication are integral components of vehicular networks. However, due to factors such as the limited reliability and failure of electronic devices, vehicle communic...
详细信息
Consumer electronic devices used to support data communication are integral components of vehicular networks. However, due to factors such as the limited reliability and failure of electronic devices, vehicle communication data may fail to be uploaded and downloaded in a timely manner, potentially leading to serious traffic accidents. With the emergence of edge computing technology, computing tasks are distributed from traditional centralized cloud computing to the network edge, thereby enabling faster response to the processing demands of vehicle data. However, even though edge computing offers faster data processing capabilities, the issue of effective routing of data within vehicular edge computing (VEC) networks remains to be addressed. Therefore, this paper proposes a two-phase multi-path routing scheme for VEC networks. In the route decision phase, the scheme introduces an integrated adaptive function, that plans the route reasonably by considering the transmission latency, energy balance and communication quality. On this basis, different routing requirements (e.g., maximizing network lifetime or transmission reliability) can be achieved by setting the weights of the proposed function. In the route maintenance phase, the scheme implements real-time multi-path adjustment based on the route maintenance mechanism to support data routing. The simulation results show that the proposed scheme has significant advantages over three baseline schemes in terms of routing reliability and energy balance. In addition, we explore the impacts of the weights and initial network configuration on the routing performance. The obtained results can provide guidance for planning reliable and sustainable routes. IEEE
暂无评论