Multi-hop machine reading comprehension (MRC) depends on the model to answer a semantically related question based on the given supporting text. In this study, inspired by previous research about Graph Neural Network(...
详细信息
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In ...
ISBN:
(纸本)9781450397148
A basic problem of quantum computing is how to effectively express classical data in quantum systems. This problem is called state preparation problem, and the process of preparing quantum states is called coding. In this paper, the classical data of matrix is transformed into quantum states in the form of amplitude coding and simulated. This paper first introduces the detailed process of matrix transformation into the linear combination of quantum ground state, then designs a quantum circuit model to realize amplitude coding according to the idea of binary tree model and quantum random walk algorithm, and finally simulates the three matrices on IBM quantum cloud platform, and analyzes and introduces many situations. The experimental results verify the feasibility of converting the matrix into quantum states by amplitude coding, analyze the causes of errors in the experimental process, and put forward the corresponding solutions. This paper introduces in detail the whole process of matrix conversion to quantum states and the construction of quantum circuits for simulation. Compared with the existing experiments, the quantum circuits constructed in this paper are shorter in length, less in number of quantum gates, and more versatile.
The current research on cross-platform instant messaging user association is mainly divided into two categories: based on user attributes and based on user behavior. Methods based on user attributes mainly identify us...
详细信息
To address the issues of privacy leakage and copyright infringement in screen-camera scenarios, we propose a robust image watermarking method, which incorporates kolmogorov-arnold network (KAN) blocks and a simulation...
详细信息
At present, the scale of quantum computers in the real sense is still small, and quantum simulation has become one of the important ways of quantum theory research, grover quantum search algorithm is suitable for the ...
ISBN:
(纸本)9781450397148
At present, the scale of quantum computers in the real sense is still small, and quantum simulation has become one of the important ways of quantum theory research, grover quantum search algorithm is suitable for the search problem of disordered database. Firstly, according to the implementation principle of Grover algorithm and Boolean logic relationship, the design idea of multi-objective Oracle is analyzed, based on IBMQ quantum cloud platform, the quantum circuit of Grover algorithm with multi-objective items is simulated. Based on the characteristics of Grover algorithm and the simulation process of quantum gate, the action of multiple identical quantum gates is combined to reduce the update times of probability amplitude and improve the simulation efficiency. The libquantum quantum simulator is used for experiments and the target item is successfully searched, which proves the feasibility of the optimization method and provides reference for the simulation and optimization of other quantum algorithms.
Current intelligent diagnosis systems struggle to continually learn to diagnose more and more diseases due to catastrophic forgetting of old knowledge when learning new knowledge. Although storing small old data for s...
详细信息
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explor...
详细信息
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explored for a long ***,few studies have focused on knowledge discovery in the penetration testing *** experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent *** address this problem,a Bayesian inference based penetration semantic knowledge mining algorithm is ***,a directed bipartite graph model,a kind of Bayesian network,is constructed to formalize penetration testing ***,we adopt the maximum likelihood estimate method to optimize the model parameters and decompose a large Bayesian network into smaller networks based on conditional independence of variables for improved solution ***,irrelevant variable elimination is adopted to extract penetration semantic knowledge from the conditional probability distribution of the *** experimental results show that the proposed method can discover penetration semantic knowledge from raw penetration testing data effectively and efficiently.
In recent years, driven by huge engineering demands, industrial Cyber-Physical System (iCPS) has developed rapidly. As an important energy conversion device in iCPS, stable operation of permanent magnet synchronous mo...
详细信息
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod...
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable code. However, existing code clone detection methods ignore the source code structure information and sequence information seriously. In this paper, we launched our research on the harder-to-break Type IV code clone detection, and propose a new method, namely Aug_Clone, to complete code clone detection task. Firstly, we utilize our published code semantic enhancement model to obtain the code semantic vector. Secondly, we perform code clone detection by calculating the similarity between these semantic vectors. At last, we evaluate our method on a large public data set, and experimental results show improvement over the state-of-the-art benchmarks, which demonstrates the effectiveness and efficiency of our method.
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o...
详细信息
暂无评论