首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
In 1943, McCulloch and Pitts introduced a discrete recurrent neural network as a model for computation in brains. The work inspired breakthroughs such as the first computer design and the theory of finite automata. We focus on learning in Hopfield networks, a special case with symmetric weights and fixed-point attractor dynamics. Specifically, we explore minimum energy flow (MEF) as a scalable convex objective for determining network parameters. We catalog various properties of MEF, such as biological plausibility, and then compare to classical approaches in the theory of learning. Trained Hopfield networks can perform unsupervised clustering and define novel error-correcting coding schemes. They also efficiently find hidden structures (cliques) in graph theory. We extend this known connection from graphs to hypergraphs and discover n-node networks with robust storage of 2Ω(n1ϵ) memories for any ϵ>0. In the case of graphs, we also determine a critical ratio of training samples at which networks generalize completely.  相似文献   

2.
3.
4.
The Cauchy–Fueter complex is the counterpart of the Dolbeault complex in the theory of several quaternionic variables. By using the fundamental solution to the Laplacian operators of fourth order associated to this differential complex on HnHn, we can solve the system of non-homogeneous Cauchy–Fueter equations and prove the Hartogs’ extension phenomenon for quaternionic regular functions on any domain. The quaternionic version of Bochner–Martinelli integral representation formula for HH-valued functions is also given.  相似文献   

5.
Neural network quantum states (NQS) have been widely applied to spin-1/2 systems, where they have proven to be highly effective. The application to systems with larger on-site dimension, such as spin-1 or bosonic systems, has been explored less and predominantly using spin-1/2 Restricted Boltzmann Machines (RBMs) with a one-hot/unary encoding. Here, we propose a more direct generalization of RBMs for spin-1 that retains the key properties of the standard spin-1/2 RBM, specifically trivial product states representations, labeling freedom for the visible variables and gauge equivalence to the tensor network formulation. To test this new approach, we present variational Monte Carlo (VMC) calculations for the spin-1 anti-ferromagnetic Heisenberg (AFH) model and benchmark it against the one-hot/unary encoded RBM demonstrating that it achieves the same accuracy with substantially fewer variational parameters. Furthermore, we investigate how the hidden unit complexity of NQS depend on the local single-spin basis used. Exploiting the tensor network version of our RBM we construct an analytic NQS representation of the Affleck-Kennedy-Lieb-Tasaki (AKLT) state in the xyz spin-1 basis using only M=2N hidden units, compared to MO(N2) required in the Sz basis. Additional VMC calculations provide strong evidence that the AKLT state in fact possesses an exact compact NQS representation in the xyz basis with only M=N hidden units. These insights help to further unravel how to most effectively adapt the NQS framework for more complex quantum systems.  相似文献   

6.
A hyperjerk system described by a single fourth-order ordinary differential equation of the form x=f(x,x¨,x˙,x) has been referred to as a snap system. A damping-tunable snap system, capable of an adjustable attractor dimension (DL) ranging from dissipative hyperchaos (DL<4) to conservative chaos (DL=4), is presented for the first time, in particular not only in a snap system, but also in a four-dimensional (4D) system. Such an attractor dimension is adjustable by nonlinear damping of a relatively simple quadratic function of the form Ax2, easily tunable by a single parameter A. The proposed snap system is practically implemented and verified by the reconfigurable circuits of field programmable analog arrays (FPAAs).  相似文献   

7.
This paper models a translation for base-2 pseudorandom number generators (PRNGs) to mixed-radix uses such as card shuffling. In particular, we explore a shuffler algorithm that relies on a sequence of uniformly distributed random inputs from a mixed-radix domain to implement a Fisher–Yates shuffle that calls for inputs from a base-2 PRNG. Entropy is lost through this mixed-radix conversion, which is assumed to be surjective mapping from a relatively large domain of size 2J to a set of arbitrary size n. Previous research evaluated the Shannon entropy loss of a similar mapping process, but this previous bound ignored the mixed-radix component of the original formulation, focusing only on a fixed n value. In this paper, we calculate a more precise formula that takes into account a variable target domain radix, n, and further derives a tighter bound on the Shannon entropy loss of the surjective map, while demonstrating monotonicity in a decrease in entropy loss based on increased size J of the source domain 2J. Lastly, this formulation is used to specify the optimal parameters to simulate a card-shuffling algorithm with different test PRNGs, validating a concrete use case with quantifiable deviations from maximal entropy, making it suitable to low-power implementation in a casino.  相似文献   

8.
In this paper, we present a new method for the construction of maximally entangled states in CdCd when d2d. A systematic way of constructing a set of maximally entangled bases (MEBs) in CdCd was established. Both cases when d is divisible by d and not divisible by d are discussed. We give two examples of maximally entangled bases in C2C4, which are mutually unbiased bases. Finally, we found a new example of an unextendible maximally entangled basis (UMEB) in C2C5.  相似文献   

9.
Several models of dark matter motivate the concept of hidden sectors consisting of SU(3)C×SU(2)L×U(1)YSU(3)C×SU(2)L×U(1)Y singlet fields. The interaction between our and hidden matter could be transmitted by new abelian U(1)U(1) gauge bosons AA mixing with ordinary photons. If such AA?s with the mass in the sub-GeV range exist, they would be produced through mixing with photons emitted in decays of η   and ηη neutral mesons generated by the high energy proton beam in a neutrino target. The AA?s would then penetrate the downstream shielding and be observed in a neutrino detector via their A→e+eAe+e decays. Using bounds from the CHARM neutrino experiment at CERN that searched for an excess of e+ee+e pairs from heavy neutrino decays, the area excluding the γ−AγA mixing range 10−7???10−4107???104 for the AA mass region 1?MA?500 MeV1?MA?500 MeV is derived. The obtained results are also used to constrain models, where a new gauge boson X   interacts with quarks and leptons. New upper limits on the branching ratio as small as Br(η→γX)?10−14Br(ηγX)?1014 and Br(η→γX)?10−12Br(ηγX)?1012 are obtained, which are several orders of magnitude more restrictive than the previous bounds from the Crystal Barrel experiment.  相似文献   

10.
A Galerkin scheme is presented for a class of conservative nonlinear dispersive equations, such as the Camassa–Holm equation and the regularized long wave equation. The scheme has two advantageous features: first, it is conservative in that it keeps the discrete analogue of the continuous energy conservation property in the original equations; second, it can be formulated only with cheap H1H1-elements even if the original equations include third derivative uxxxuxxx. Numerical experiments confirm the stability and effectiveness of the proposed scheme.  相似文献   

11.
12.
13.
14.
15.
16.
17.
18.
19.
We consider products of two 2-manifolds such as S2×S2S2×S2, embedded in Euclidean space and show that the corresponding 4-volume preserving diffeomorphism algebra can be approximated by a tensor product SU(N)⊗SU(N)SU(N)SU(N) i.e. functions on a manifold are approximated by the Kronecker product of two SU(N)SU(N) matrices.  相似文献   

20.
This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and entanglement. Using Grover’s algorithm, a solution can be extracted in time O(2256/t), where t is the target value for the nonce. This is better using a square root over the classical search algorithm that requires O(2256/t) tries. If sufficiently large quantum computers are available for the public, mining activity in the classical sense becomes obsolete, as quantum computers always win. Without considering quantum noise, the size of the quantum computer needs to be 104 qubits.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号