The paper uses Deep Reinforcement Learning (DRL) to traffic signal regulation, solving urban traffic congestion. Our research paper demonstrates the simulation of intricate traffic conditions with microscopic accuracy...
详细信息
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n...
详细信息
The query model(or black-box model)has attracted much attention from the communities of both classical and quantum ***,quantum advantages are revealed by presenting a quantum algorithm that has a better query complexi...
详细信息
The query model(or black-box model)has attracted much attention from the communities of both classical and quantum ***,quantum advantages are revealed by presenting a quantum algorithm that has a better query complexity than its classical *** the history of quantum algorithms,the Deutsch algorithm and the Deutsch-Jozsa algorithm play a fundamental role and both are exact one-query quantum *** leads us to con-sider the problem:what functions can be computed by exact one-query quantum algorithms?This problem has been ad-dressed in the literature for total Boolean functions and symmetric partial Boolean functions,but is still open for general partial Boolean ***,in this paper,we continue to characterize the computational power of exact one-query quantum algorithms for general partial Boolean ***,we present several necessary and sufficient conditions for a partial Boolean function to be computed by exact one-query quantum ***,inspired by these conditions,we discover some new representative functions that can be computed by exact one-query quantum algorithms but have an essential difference from the already known ***,it is worth pointing out that before our work,the known func-tions that can be computed by exact one-query quantum algorithms are all symmetric functions and the quantum algo-rithm used is essentially the Deutsch-Jozsa algorithm,whereas the functions discovered in this paper are generally asym-metric and new algorithms to compute these functions are ***,this expands the class of functions that can be computed by exact one-query quantum algorithms.
Lung cancer is a major global cause of death, highlighting the critical need for quick and accurate detection methods. The exploration of computational alternatives arose from the standard way of manually processing C...
详细信息
The 'ConfigMaster: An interactive solution for system management' is a simple utility written using Bash scripting. It is designed for Unix-like systems. The tool lets users easily configure system settings an...
详细信息
As the world rapidly embraces quantum technologies, the need for robust quantum security protocols becomes increasingly paramount. Quantum Key Distribution (QKD) has been at the forefront of secure key exchange, but e...
详细信息
The constrained design, remote deployment, and sensitive data generated by Internet of Things (IoT) devices make them susceptible to various cyberattacks. One such attack is profiling IoT devices by tracking their pac...
详细信息
Partition testing is one of the most fundamental and popularly used software testing *** first di-vides the input domain of the program under test into a set of disjoint partitions,and then creates test cases based on...
详细信息
Partition testing is one of the most fundamental and popularly used software testing *** first di-vides the input domain of the program under test into a set of disjoint partitions,and then creates test cases based on these *** by the theory of software cybernetics,some strategies have been proposed to dynamically se-lect partitions based on the feedback information gained during *** basic intuition of these strategies is to assign higher probabilities to those partitions with higher fault-detection potentials,which are judged and updated mainly ac-cording to the previous test *** a feedback-driven mechanism can be considered as a learning process—it makes decisions based on the observations acquired in the test ***,advanced learning techniques could be leveraged to empower the smart partition selection,with the purpose of further improving the effectiveness and efficiency of partition *** this paper,we particularly leverage reinforcement learning to enhance the state-of-the-art adaptive partition testing *** algorithms,namely RLAPT_Q and RLAPT_S,have been developed to implement the proposed *** studies have been conducted to evaluate the performance of the proposed approach based on seven object programs with 26 *** experimental results show that our approach outperforms the existing partition testing techniques in terms of the fault-detection capability as well as the overall testing *** study demonstrates the applicability and effectiveness of reinforcement learning in advancing the performance of software testing.
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
暂无评论