Emerging Technologies
See recent articles
- [1] arXiv:2407.12829 (cross-list from cs.AR) [pdf, html, other]
-
Title: PICO-RAM: A PVT-Insensitive Analog Compute-In-Memory SRAM Macro with In-Situ Multi-Bit Charge Computing and 6T Thin-Cell-Compatible LayoutZhiyu Chen, Ziyuan Wen, Weier Wan, Akhil Reddy Pakala, Yiwei Zou, Wei-Chen Wei, Zengyi Li, Yubei Chen, Kaiyuan YangComments: This manuscript has been accepted to IEEE Journal of Solid-State Circuits (JSSC)Subjects: Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
Analog compute-in-memory (CIM) in static random-access memory (SRAM) is promising for accelerating deep learning inference by circumventing the memory wall and exploiting ultra-efficient analog low-precision arithmetic. Latest analog CIM designs attempt bit-parallel schemes for multi-bit analog Matrix-Vector Multiplication (MVM), aiming at higher energy efficiency, throughput, and training simplicity and robustness over conventional bit-serial methods that digitally shift-and-add multiple partial analog computing results. However, bit-parallel operations require more complex analog computations and become more sensitive to well-known analog CIM challenges, including large cell areas, inefficient and inaccurate multi-bit analog operations, and vulnerability to PVT variations. This paper presents PICO-RAM, a PVT-insensitive and compact CIM SRAM macro with charge-domain bit-parallel computation. It adopts a multi-bit thin-cell Multiply-Accumulate (MAC) unit that shares the same transistor layout as the most compact 6T SRAM cell. All analog computing modules, including digital-to-analog converters (DACs), MAC units, analog shift-and-add, and analog-to-digital converters (ADCs) reuse one set of local capacitors inside the array, performing in-situ computation to save area and enhance accuracy. A compact 8.5-bit dual-threshold time-domain ADC power gates the main path most of the time, leading to a significant energy reduction. Our 65-nm prototype achieves the highest weight storage density of 559 Kb/mm${^2}$ and exceptional robustness to temperature and voltage variations (-40 to 105 $^{\circ}$C and 0.65 to 1.2 V) among SRAM-based analog CIM designs.
- [2] arXiv:2407.13012 (cross-list from quant-ph) [pdf, html, other]
-
Title: CUAOA: A Novel CUDA-Accelerated Simulation Framework for the QAOAJonas Stein, Jonas Blenninger, David Bucher, Josef Peter Eder, Elif Çetiner, Maximilian Zorn, Claudia Linnhoff-PopienComments: 6 pages, 3 figuresSubjects: Quantum Physics (quant-ph); Emerging Technologies (cs.ET)
The Quantum Approximate Optimization Algorithm (QAOA) is a prominent quantum algorithm designed to find approximate solutions to combinatorial optimization problems, which are challenging for classical computers. In the current era, where quantum hardware is constrained by noise and limited qubit availability, simulating the QAOA remains essential for research. However, existing state-of-the-art simulation frameworks suffer from long execution times or lack comprehensive functionality, usability, and versatility, often requiring users to implement essential features themselves. Additionally, these frameworks are primarily restricted to Python, limiting their use in safer and faster languages like Rust, which offer, e.g., advanced parallelization capabilities. In this paper, we develop a GPU accelerated QAOA simulation framework utilizing the NVIDIA CUDA toolkit. This framework offers a complete interface for QAOA simulations, enabling the calculation of (exact) expectation values, direct access to the statevector, fast sampling, and high-performance optimization methods using an advanced state-of-the-art gradient calculation technique. The framework is designed for use in Python and Rust, providing flexibility for integration into a wide range of applications, including those requiring fast algorithm implementations leveraging QAOA at its core. The new framework's performance is rigorously benchmarked on the MaxCut problem and compared against the current state-of-the-art general-purpose quantum circuit simulation frameworks Qiskit and Pennylane as well as the specialized QAOA simulation tool QOKit. Our evaluation shows that our approach outperforms the existing state-of-the-art solutions in terms of runtime up to multiple orders of magnitude. Our implementation is publicly available at this https URL and Zenodo.
- [3] arXiv:2407.13059 (cross-list from cs.CY) [pdf, other]
-
Title: Prioritizing High-Consequence Biological Capabilities in Evaluations of Artificial Intelligence ModelsJaspreet Pannu, Doni Bloomfield, Alex Zhu, Robert MacKnight, Gabe Gomes, Anita Cicero, Thomas V. InglesbyComments: 9 pages, 1 figure, 3 tables, 1 boxSubjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET)
As a result of rapidly accelerating AI capabilities, over the past year, national governments and multinational bodies have announced efforts to address safety, security and ethics issues related to AI models. One high priority among these efforts is the mitigation of misuse of AI models. Many biologists have for decades sought to reduce the risks of scientific research that could lead, through accident or misuse, to high-consequence disease outbreaks. Scientists have carefully considered what types of life sciences research have the potential for both benefit and risk (dual-use), especially as scientific advances have accelerated our ability to engineer organisms and create novel variants of pathogens. Here we describe how previous experience and study by scientists and policy professionals of dual-use capabilities in the life sciences can inform risk evaluations of AI models with biological capabilities. We argue that AI model evaluations should prioritize addressing high-consequence risks (those that could cause large-scale harm to the public, such as pandemics), and that these risks should be evaluated prior to model deployment so as to allow potential biosafety and/or biosecurity measures. Scientists' experience with identifying and mitigating dual-use biological risks can help inform new approaches to evaluating biological AI models. Identifying which AI capabilities post the greatest biosecurity and biosafety concerns is necessary in order to establish targeted AI safety evaluation methods, secure these tools against accident and misuse, and avoid impeding immense potential benefits.
- [4] arXiv:2407.13072 (cross-list from cs.CY) [pdf, other]
-
Title: Accuracy of training data and model outputs in Generative AI: CREATe Response to the Information Commissioner Office ConsultationSubjects: Computers and Society (cs.CY); Emerging Technologies (cs.ET)
The accuracy of Generative AI is increasingly critical as Large Language Models become more widely adopted. Due to potential flaws in training data and hallucination in outputs, inaccuracy can significantly impact individuals interests by distorting perceptions and leading to decisions based on flawed information. Therefore, ensuring these models accuracy is not only a technical necessity but also a regulatory imperative. ICO call for evidence on the accuracy of Generative AI marks a timely effort in ensuring responsible Generative AI development and use.
CREATe, as the Centre for Regulation of the Creative Economy based at the University of Glasgow, has conducted relevant research involving intellectual property, competition, information and technology law. We welcome the ICO call for evidence on the accuracy of Generative AI, and we are happy to highlight aspects of data protection law and AI regulation that we believe should receive attention. - [5] arXiv:2407.13228 (cross-list from cs.CL) [pdf, other]
-
Title: Evaluating Large Language Models for Anxiety and Depression Classification using Counseling and Psychotherapy TranscriptsSubjects: Computation and Language (cs.CL); Computers and Society (cs.CY); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
We aim to evaluate the efficacy of traditional machine learning and large language models (LLMs) in classifying anxiety and depression from long conversational transcripts. We fine-tune both established transformer models (BERT, RoBERTa, Longformer) and more recent large models (Mistral-7B), trained a Support Vector Machine with feature engineering, and assessed GPT models through prompting. We observe that state-of-the-art models fail to enhance classification outcomes compared to traditional machine learning methods.
- [6] arXiv:2407.13285 (cross-list from cs.CV) [pdf, html, other]
-
Title: Collaborative real-time vision-based device for olive oil production monitoringComments: 6 pages, 10 figuresJournal-ref: 2024 13th Mediterranean Conference on Embedded Computing (MECO) 236-241Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET)
This paper proposes an innovative approach to improving quality control of olive oil manufacturing and preventing damage to the machinery caused by foreign objects. We developed a computer-vision-based system that monitors the input of an olive grinder and promptly alerts operators if a foreign object is detected, indicating it by using guided lasers, audio, and visual cues.
- [7] arXiv:2407.13528 (cross-list from physics.app-ph) [pdf, other]
-
Title: A new extremely ultrathin metasurface energy harvester and its simple modelling based on resonant half-wave dipole antennaSubjects: Applied Physics (physics.app-ph); Emerging Technologies (cs.ET)
In this paper we propose a novel design approach for an ultrathin metasurface energy harvester based on a surrogate model of dipole antenna. A significant advantage of this idea is the reduction of the time of the design process retrieved from a surrogate model of the resonant half-wave dipole antenna embedded in a medium. However, the design of a new electromagnetic energy harvester with a deep-subwavelength thickness (~ 0.004{\lambda}) is the major concern of this work. The proposed structure shows an enhanced level of absorption. Decreasing the thickness of metasurface as a new classification of energy harvester, we have managed to demonstrate the stability of the efficiency. In addition, this metasurface energy harvester proved to maintain a relatively constant performance (efficiency and HPBW more than 85% and 7%, respectively) as the angle of the EM incident wave was changed over a range of 75 degrees in the transverse magnetic (TM) polarization.
Cross submissions for Friday, 19 July 2024 (showing 7 of 7 entries )
- [8] arXiv:2403.05116 (replaced) [pdf, html, other]
-
Title: User Connection and Resource Allocation Optimization in Blockchain Empowered Metaverse over 6G Wireless CommunicationsComments: Published in IEEE Transactions on Wireless Communications (TWC). DOI: https://doi.org/10.1109/TWC.2024.3401184 . Full version of arXiv:2310.17872Subjects: Emerging Technologies (cs.ET); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
The convergence of blockchain, Metaverse, and non-fungible tokens (NFTs) brings transformative digital opportunities alongside challenges like privacy and resource management. Addressing these, we focus on optimizing user connectivity and resource allocation in an NFT-centric and blockchain-enabled Metaverse in this paper. Through user work-offloading, we optimize data tasks, user connection parameters, and server computing frequency division. In the resource allocation phase, we optimize communication-computation resource distributions, including bandwidth, transmit power, and computing frequency. We introduce the trust-cost ratio (TCR), a pivotal measure combining trust scores from users' resources and server history with delay and energy costs. This balance ensures sustained user engagement and trust. The DASHF algorithm, central to our approach, encapsulates the Dinkelbach algorithm, alternating optimization, semidefinite relaxation (SDR), the Hungarian method, and a novel fractional programming technique from a recent IEEE JSAC paper [2]. The most challenging part of DASHF is to rewrite an optimization problem as Quadratically Constrained Quadratic Programming (QCQP) via carefully designed transformations, in order to be solved by SDR and the Hungarian algorithm. Extensive simulations validate the DASHF algorithm's efficacy, revealing critical insights for enhancing blockchain-Metaverse applications, especially with NFTs.