63 research outputs found
Randomized Tensor Ring Decomposition and Its Application to Large-scale Data Reconstruction
Dimensionality reduction is an essential technique for multi-way large-scale
data, i.e., tensor. Tensor ring (TR) decomposition has become popular due to
its high representation ability and flexibility. However, the traditional TR
decomposition algorithms suffer from high computational cost when facing
large-scale data. In this paper, taking advantages of the recently proposed
tensor random projection method, we propose two TR decomposition algorithms. By
employing random projection on every mode of the large-scale tensor, the TR
decomposition can be processed at a much smaller scale. The simulation
experiment shows that the proposed algorithms are times faster than
traditional algorithms without loss of accuracy, and our algorithms show
superior performance in deep learning dataset compression and hyperspectral
image reconstruction experiments compared to other randomized algorithms.Comment: ICASSP submissio
Tensor Ring Decomposition with Rank Minimization on Latent Space: An Efficient Approach for Tensor Completion
In tensor completion tasks, the traditional low-rank tensor decomposition
models suffer from the laborious model selection problem due to their high
model sensitivity. In particular, for tensor ring (TR) decomposition, the
number of model possibilities grows exponentially with the tensor order, which
makes it rather challenging to find the optimal TR decomposition. In this
paper, by exploiting the low-rank structure of the TR latent space, we propose
a novel tensor completion method which is robust to model selection. In
contrast to imposing the low-rank constraint on the data space, we introduce
nuclear norm regularization on the latent TR factors, resulting in the
optimization step using singular value decomposition (SVD) being performed at a
much smaller scale. By leveraging the alternating direction method of
multipliers (ADMM) scheme, the latent TR factors with optimal rank and the
recovered tensor can be obtained simultaneously. Our proposed algorithm is
shown to effectively alleviate the burden of TR-rank selection, thereby greatly
reducing the computational cost. The extensive experimental results on both
synthetic and real-world data demonstrate the superior performance and
efficiency of the proposed approach against the state-of-the-art algorithms
Analyzing EEG of Quasi-Brain-Death Based on Dynamic Sample Entropy Measures
To give a more definite criterion using electroencephalograph (EEG) approach on brain death determination is vital for both reducing the risks and preventing medical misdiagnosis. This paper presents several novel adaptive computable entropy methods based on
approximate entropy (ApEn) and sample entropy (SampEn) to monitor the varying symptoms of patients and to determine the brain death. The proposed method is a dynamic extension of the standard ApEn and SampEn by introducing a shifted time window. The main advantages of the developed dynamic approximate entropy (DApEn) and dynamic sample entropy (DSampEn) are for real-time computation and practical use. Results from the analysis of 35 patients (63 recordings) show that the proposed methods can illustrate effectiveness and well performance in evaluating the brain consciousness states
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the wide utilization and commercial application of CP-ABE systems to date. In this paper, we address two practical problems about the key abuse of CP-ABE: (1) The key escrow problem of the semi-trusted authority; and, (2) The malicious key delegation problem of the users. For the semi-trusted authority, its misbehavior (i.e., illegal key (re-)distribution) should be caught and prosecuted. And for a user, his/her malicious behavior (i.e., illegal key sharing) need be traced. We affirmatively solve these two key abuse problems by proposing the first accountable authority CP-ABE with white-box traceability that supports policies expressed in any monotone access structures. Moreover, we provide an auditor to judge publicly whether a suspected user is guilty or is framed by the authority
Modelling of brain consciousness based on collaborative adaptive filters
A novel method for the discrimination between discrete states of brain consciousness is proposed, achieved through examination of nonlinear features within the electroencephalogram (EEG). To allow for real time modes of operation, a collaborative adaptive filtering architecture, using a convex combination of adaptive filters is implemented. The evolution of the mixing parameter within this structure is then used as an indication of the predominant nature of the EEG recordings. Simulations based upon a number of different filter combinations illustrate the suitability of this approach to differentiate between the coma and quasi-brain-death states based upon fundamental signal characteristics
Exploring research hotspots and future directions in neural tube defects field by bibliometric and bioinformatics analysis
BackgroundNeural tube defects (NTDs) is the most common birth defect of the central nervous system (CNS) which causes the death of almost 88,000 people every year around the world. Much efforts have been made to investigate the reasons that contribute to NTD and explore new ways to for prevention. We trawl the past decade (2013–2022) published records in order to get a worldwide view about NTDs research field.Methods7,437 records about NTDs were retrieved from the Web of Science (WOS) database. Tools such as shell scripts, VOSviewer, SCImago Graphica, CiteSpace and PubTator were used for data analysis and visualization.ResultsOver the past decade, the number of publications has maintained an upward trend, except for 2022. The United States is the country with the highest number of publications and also with the closest collaboration with other countries. Baylor College of Medicine has the closest collaboration with other institutions worldwide and also was the most prolific institution. In the field of NTDs, research focuses on molecular mechanisms such as genes and signaling pathways related to folate metabolism, neurogenic diseases caused by neural tube closure disorders such as myelomeningocele and spina bifida, and prevention and treatment such as folate supplementation and surgical procedures. Most NTDs related genes are related to development, cell projection parts, and molecular binding. These genes are mainly concentrated in cancer, Wnt, MAPK, PI3K-Akt and other signaling pathways. The distribution of NTDs related SNPs on chromosomes 1, 3, 5, 11, 14, and 17 are relatively concentrated, which may be associated with high-risk of NTDs.ConclusionBibliometric analysis of the literature on NTDs field provided the current status, hotspots and future directions to some extant. Further bioinformatics analysis expanded our understanding of NTDs-related genes function and revealed some important SNP clusters and loci. This study provided some guidance for further studies. More extensive cooperation and further research are needed to overcome the ongoing challenge in pathogenesis, prevention and treatment of NTDs
- …