174,240 research outputs found

    A/D Converter Architectures for Energy-Efficient Vision Processor

    Full text link
    AI applications have emerged in current world. Among AI applications, computer-vision (CV) related applications have attracted high interest. Hardware implementation of CV processors necessitates a high performance but low-power image detector. The key to energy-efficiency work lies in analog-digital converting, where output of imaging detectors is transferred to digital domain and CV algorithms can be performed on data. In this paper, analog-digital converter architectures are compared, and an example ADC design is proposed which achieves both good performance and low power consumption.Comment: arXiv admin note: substantial text overlap with arXiv:1701.0887

    Privacy-Preserving Multiparty Learning For Logistic Regression

    Full text link
    In recent years, machine learning techniques are widely used in numerous applications, such as weather forecast, financial data analysis, spam filtering, and medical prediction. In the meantime, massive data generated from multiple sources further improve the performance of machine learning tools. However, data sharing from multiple sources brings privacy issues for those sources since sensitive information may be leaked in this process. In this paper, we propose a framework enabling multiple parties to collaboratively and accurately train a learning model over distributed datasets while guaranteeing the privacy of data sources. Specifically, we consider logistic regression model for data training and propose two approaches for perturbing the objective function to preserve {\epsilon}-differential privacy. The proposed solutions are tested on real datasets, including Bank Marketing and Credit Card Default prediction. Experimental results demonstrate that the proposed multiparty learning framework is highly efficient and accurate.Comment: This work was done when Wei Du was at the University of Arkansa

    A Hermite WENO reconstruction for fourth order temporal accurate schemes based on the GRP solver for hyperbolic conservation laws

    Full text link
    This paper develops a new fifth order accurate Hermite WENO (HWENO) reconstruction method for hyperbolic conservation schemes in the framework of the two-stage fourth order accurate temporal discretization in [{\em J. Li and Z. Du, A two-stage fourth order time-accurate discretization {L}ax--{W}endroff type flow solvers, {I}. {H}yperbolic conservation laws, SIAM, J. Sci. Comput., 38 (2016), pp.~A3046--A3069}]. Instead of computing the first moment of the solution additionally in the conventional HWENO or DG approach, we can directly take the {\em interface values}, which are already available in the numerical flux construction using the generalized Riemann problem (GRP) solver, to approximate the first moment. The resulting scheme is fourth order temporal accurate by only invoking the HWENO reconstruction twice so that it becomes more compact. Numerical experiments show that such compactness makes significant impact on the resolution of nonlinear waves

    Tame automorphisms with multidegrees in the form of arithmetic progressions

    Full text link
    Let (a,a+d,a+2d)(a,a+d,a+2d) be an arithmetic progression of positive integers. The following statements are proved: (1) If a2da\mid 2d, then (a, a+d, a+2d)\in\mdeg(\Tame(\mathbb{C}^3)). (2) If a2da\nmid 2d, then, except for arithmetic progressions of the form (4i,4i+ij,4i+2ij)(4i,4i+ij,4i+2ij) with i,jNi,j \in\mathbb{N} and jj is an odd number, (a, a+d, a+2d)\notin\mdeg(\Tame(\mathbb{C}^3)). We also related the exceptional unknown case to a conjecture of Jie-tai Yu, which concerns with the lower bound of the degree of the Poisson bracket of two polynomials

    Multidegrees of Tame automorphisms with one prime number

    Full text link
    Let 3d1d2d33\leq d_1\leq d_2\leq d_3 be integers. We show the following results: (1) If d2d_2 is a prime number and d1gcd(d1,d3)2\frac{d_1}{\gcd(d_1,d_3)}\neq2, then (d1,d2,d3)(d_1,d_2,d_3) is a multidegree of a tame automorphism if and only if d1=d2d_1=d_2 or d3d1N+d2Nd_3\in d_1\mathbb{N}+d_2\mathbb{N}; (2) If d3d_3 is a prime number and gcd(d1,d2)=1\gcd(d_1,d_2)=1, then (d1,d2,d3)(d_1,d_2,d_3) is a multidegree of a tame automorphism if and only if d3d1N+d2Nd_3\in d_1\mathbb{N}+d_2\mathbb{N}. We also relate this investigation with a conjecture of Drensky and Yu, which concerns with the lower bound of the degree of the Poisson bracket of two polynomials, and we give a counter-example to this conjecture

    Liouville type theorems for conformal Gaussian curvature equation

    Full text link
    In this note, we study Liouville type theorem for conformal Gaussian curvature equation (also called the mean field equation) Δu=K(x)eu,inR2 -\Delta u=K(x)e^u, in R^2 where K(x)K(x) is a smooth function on R2R^2. When K(x)=K(x1)K(x)=K(x_1) is a sign-changing smooth function in the real line RR, we have a non-existence result for the finite total curvature solutions. When KK is monotone non-decreasing along every ray starting at origin, we can prove a non-existence result too. We use moving plane method and moving sphere method.Comment: 14 page

    LpL^p-estimates of maximal function related to Schr\"{o}dinger Equation in R2\mathbb{R}^2

    Full text link
    Using Guth's polynomial partitioning method, we obtain LpL^p estimates for the maximal function associated to the solution of Schr\"odinger equation in R2\mathbb R^2. The LpL^p estimates can be used to recover the previous best known result that limt0eitΔf(x)=f(x)\lim_{t \to 0} e^{it\Delta}f(x)=f(x) almost everywhere for all fHs(R2)f \in H^s (\mathbb{R}^2) provided that s>3/8s>3/8

    A Reconfigurable Streaming Deep Convolutional Neural Network Accelerator for Internet of Things

    Full text link
    Convolutional neural network (CNN) offers significant accuracy in image detection. To implement image detection using CNN in the internet of things (IoT) devices, a streaming hardware accelerator is proposed. The proposed accelerator optimizes the energy efficiency by avoiding unnecessary data movement. With unique filter decomposition technique, the accelerator can support arbitrary convolution window size. In addition, max pooling function can be computed in parallel with convolution by using separate pooling unit, thus achieving throughput improvement. A prototype accelerator was implemented in TSMC 65nm technology with a core size of 5mm2. The accelerator can support major CNNs and achieve 152GOPS peak throughput and 434GOPS/W energy efficiency at 350mW, making it a promising hardware accelerator for intelligent IoT devices

    LpL^p polyharmonic Robin problems on Lipschitz domains

    Full text link
    In this paper, we study a class of boundary value problems (BVPs) with Robin conditions in some LpL^p spaces for polyharmonic equation on Lipschitz domains. Utilizing polyharmonic fundamental solutions, these Robin BVPs are solved by the method of layer potentials. The crucial ingedients of our approach are the classical single layer potential and its higher order analog (which are called multi-layer SS-potentials), and the main results generalize ones of second order (Laplacian) case to higher order (polyharmonic) case.Comment: 14 page

    Scattering theory without large-distance asymptotics: scattering boundary condition

    Full text link
    By large-distance asymptotics, in conventional scattering theory, at the cost of losing the information of the distance between target and observer, one arrives at an explicit expression for scattering wave functions represented by a scattering phase shift. In the present paper, together with a preceding paper (T. Liu,W.-D. Li, and W.-S. Dai, JHEP06(2014)087), we establish a rigorous scattering theory without imposing large-distance asymptotics. We show that even without large-distance asymptotics, one can also obtain an explicit scattering wave function represented also by a scattering phase shift, in which, of course, the information of the distance is preserved. Nevertheless, the scattering amplitude obtained in the preceding paper depends not only on the scattering angle but also on the distance between target and observer. In this paper, by constructing a scattering boundary condition without large-distance asymptotics, we introduce a scattering amplitude, like that in conventional scattering theory, depending only on the scattering angle and being independent of the distance. Such a scattering amplitude, when taking large-distance asymptotics, will recover the scattering amplitude in conventional scattering theory. The present paper, with the preceding paper, provides a complete scattering theory without large-distance asymptotics
    corecore