Sequential pattern mining (SPM) with gap constraints (or repetitive SPM or tandem repeat discovery in bioinformatics) can find frequent repetitive subsequences satisfying gap constraints, which are called positive seq...
详细信息
To reduce computational cost,we study some two-scale finite element approximations on sparse grids for elliptic partial differential equations of second order in a general *** any tensor product domain ?R^d with d =...
详细信息
To reduce computational cost,we study some two-scale finite element approximations on sparse grids for elliptic partial differential equations of second order in a general *** any tensor product domain ?R^d with d = 2,3,we construct the two-scale finite element approximations for both boundary value and eigenvalue problems by using a Boolean sum of some existing finite element approximations on a coarse grid and some univariate fine grids and hence they are cheaper *** applications,we obtain some new efficient finite element discretizations for the two classes of problem:The new two-scale finite element approximation on a sparse grid not only has the less degrees of freedom but also achieves a good accuracy of approximation.
We set up a class of parallel nonlinear multisplitting AOR methods by directly multisplitting the nonlinear mapping involved in the nonlinear complementarity problems. The different choices of the relaxation parameter...
详细信息
We set up a class of parallel nonlinear multisplitting AOR methods by directly multisplitting the nonlinear mapping involved in the nonlinear complementarity problems. The different choices of the relaxation parameters can yield all the known and a lot of new relaxation methods, as well as a lot of new relaxed parallel nonlinear multisplitting methods for solving the nonlinear complementarity problems. The two-sided approximation properties and the influences on the convergence rates from the relaxation parameters about our new methods are shown, and sufficient conditions guaranteeing the methods to converge globally are discussed. Finally, a lot of numerical results show that our new methods are feasible and efficient.
Frustration, that is, the impossibility of satisfying the energetic preferences between all spin pairs simultaneously, underlies the complexity of many fundamental properties in spin systems, including the computation...
详细信息
Frustration, that is, the impossibility of satisfying the energetic preferences between all spin pairs simultaneously, underlies the complexity of many fundamental properties in spin systems, including the computational difficulty in determining their ground states. Coherent Ising machines (CIMs) have been proposed as a promising analog computational approach to efficiently find different degenerate ground states of large and complex Ising models. However, CIMs also face challenges in solving frustrated Ising models: frustration not only reduces the probability of finding good solutions, but it also prohibits the leveraging of quantum effects in doing so. To circumvent these detrimental effects of frustration, we show how frustrated Ising models can be mapped to frustration-free CIM configurations by including ancillary modes and modifying the coupling protocol used in current CIM designs. Such frustration elimination may empower current CIMs to benefit from quantum effects in dealing with frustrated Ising models. In addition, these ancillary modes can also enable error detection and searching for excited states.
The speeding-up and slowing-down(SUSD)direction is a novel direction,which is proved to converge to the gradient descent direction under some *** authors propose the derivative-free optimization algorithm SUSD-TR,whic...
详细信息
The speeding-up and slowing-down(SUSD)direction is a novel direction,which is proved to converge to the gradient descent direction under some *** authors propose the derivative-free optimization algorithm SUSD-TR,which combines the SUSD direction based on the covariance matrix of interpolation points and the solution of the trust-region subproblem of the interpolation model function at the current iteration *** analyze the optimization dynamics and convergence of the algorithm *** of the trial step and structure step are *** results show their algorithm’s efficiency,and the comparison indicates that SUSD-TR greatly improves the method’s performance based on the method that only goes along the SUSD *** algorithm is competitive with state-of-the-art mathematical derivative-free optimization algorithms.
INTRODUCTION With the breakdown of Dennard’s scaling rule,chip power for a given area size is not constant as transistors shrink from generation to generation[1].In particular,the power wall problem worsens with the ...
详细信息
INTRODUCTION With the breakdown of Dennard’s scaling rule,chip power for a given area size is not constant as transistors shrink from generation to generation[1].In particular,the power wall problem worsens with the continual improvement in
The elastocaloric effect (eCE), referring to the thermal effect triggered by a uniaxial stress, provides a promising and versatile routine for green and high efficient thermal management. However, current eCE material...
详细信息
In named entity recognition, the main methods for constructing deep neural networks are fine-tuning and prompt tuning. Fine-tuning is a commonly used paradigm to optimize neural networks by using task-specific objecti...
详细信息
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h...
详细信息
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which has become a bottleneck in many-core processors. In this paper, we present a novel heterogeneous many-core processor architecture named deeply fused many-core (DFMC) for high performance computing systems. DFMC integrates management processing ele- ments (MPEs) and computing processing elements (CPEs), which are heterogeneous processor cores for different application features with a unified ISA (instruction set architecture), a unified execution model, and share-memory that supports cache coherence. The DFMC processor can alleviate the memory wall problem by combining a series of cooperative computing techniques of CPEs, such as multi-pattern data stream transfer, efficient register-level communication mechanism, and fast hardware synchronization technique. These techniques are able to improve on-chip data reuse and optimize memory access performance. This paper illustrates an implementation of a full system prototype based on FPGA with four MPEs and 256 CPEs. Our experimental results show that the effect of the cooperative computing techniques of CPEs is significant, with DGEMM (double-precision matrix multiplication) achieving an efficiency of 94%, FFT (fast Fourier transform) obtaining a performance of 207 GFLOPS and FDTD (finite-difference time-domain) obtaining a performance of 27 GFLOPS.
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography...
详细信息
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography security,and its ultimate goal is to extract embedded *** methods cannot extract under known cover *** this end,this paper proposes a method of extracting embedded messages under known cover ***,the syndrome-trellis encoding process is ***,a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix,while the embedding process is simulated using the cover sequence and parity-check *** the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion,comparing the path consistency can quickly filter the coding parameters to determine the correct matrices,and embedded messages can be extracted *** proposed method does not need to embed all possible messages for the second time,improving coding parameter recognition *** experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.
暂无评论