1,441 research outputs found
Quantum pumping with adiabatically modulated barriers in graphene
We study the adiabatic quantum pumping characteristics in the graphene
modulated by two oscillating gate potentials out of phase. The angular and
energy dependence of the pumped current is presented. The direction of the
pumped current can be reversed when a high barrier demonstrates stronger
transparency than a low one, which results from the Klein paradox. The
underlying physics of the pumping process is illuminated.Comment: 14 pages, 4 figure
Direct Coupling of Natural Boundary Element and Finite Element on Elastic Plane Problems in Unbounded Domains
The advantages of coupling of a natural boundary element method and a finite element method are introduced. Then we discuss the principle of the direct coupling of NBEM and FEM and its implementation. The comparison of the results between the direct coupling method and FEM proves that the direct coupling method is simple, feasible and valid in practice
Hide and Seek (HaS): A Lightweight Framework for Prompt Privacy Protection
Numerous companies have started offering services based on large language
models (LLM), such as ChatGPT, which inevitably raises privacy concerns as
users' prompts are exposed to the model provider. Previous research on secure
reasoning using multi-party computation (MPC) has proven to be impractical for
LLM applications due to its time-consuming and communication-intensive nature.
While lightweight anonymization techniques can protect private information in
prompts through substitution or masking, they fail to recover sensitive data
replaced in the LLM-generated results. In this paper, we expand the application
scenarios of anonymization techniques by training a small local model to
de-anonymize the LLM's returned results with minimal computational overhead. We
introduce the HaS framework, where "H(ide)" and "S(eek)" represent its two core
processes: hiding private entities for anonymization and seeking private
entities for de-anonymization, respectively. To quantitatively assess HaS's
privacy protection performance, we propose both black-box and white-box
adversarial models. Furthermore, we conduct experiments to evaluate HaS's
usability in translation and classification tasks. The experimental findings
demonstrate that the HaS framework achieves an optimal balance between privacy
protection and utility
Small RNA zippers lock miRNA molecules and block miRNA function in mammalian cells.
MicroRNAs (miRNAs) loss-of-function phenotypes are mainly induced by chemically modified antisense oligonucleotides. Here we develop an alternative inhibitor for miRNAs, termed \u27small RNA zipper\u27. It is designed to connect miRNA molecules end to end, forming a DNA-RNA duplex through a complementary interaction with high affinity, high specificity and high stability. Two miRNAs, miR-221 and miR-17, are tested in human breast cancer cell lines, demonstrating the 70∼90% knockdown of miRNA levels by 30-50 nM small RNA zippers. The miR-221 zipper shows capability in rescuing the expression of target genes of miR-221 and reversing the oncogenic function of miR-221 in breast cancer cells. In addition, we demonstrate that the miR-221 zipper attenuates doxorubicin resistance with higher efficiency than anti-miR-221 in human breast cancer cells. Taken together, small RNA zippers are a miRNA inhibitor, which can be used to induce miRNA loss-of-function phenotypes and validate miRNA target genes
The Direct Coupling Method of Natural Boundary Element and Finite Element on Elastic Plane Problem in Unbounded Domain
The advantage of the coupling method of natural boundary element method(NBEM) and finite element method (FEM) is introduced firstly. Then the principle of the direct coupling method of NBEM and FEM, and its implementation, are discussed. The comparison of results between the direct coupling method and FEM proves that the direct coupling method is simple, feasible and valid in practice
Study on Social Network for College Students\u27 Job Hunting
SNSs recruitment has caused the change of the traditional recruitment mode due to its advantages such as broad audience, quick information transmission, low recruitment cost and good interpersonal interaction. Through questionnaire survey, the paper implements on a study on the situation that the college students use social networks to find jobs. It is found that social network platforms are popular with college students, but it is not widely used in social job hunting platforms. What is more, the job hunting effect is not obvious. Meanwhile, the user information is prone to leakage, and the job hunting information provided is in poor quality. The paper proposes that the social network job hunting platforms should take measures to perfect the service content, strengthen the technical level and improve the information security for the college students. Additionally, the college students should also make reasonable choices and correctly utilize the social recruitment platform to protect the personal information security and improve the job hunting efficiency
- …