234 research outputs found
On weak topology of Orlicz spaces
This paper presents some properties of singular functionals on Orlicz spaces, from which, criteria for weak convergence and weak compactness in such spaces are obtained
Normal structure and weakly normal structure of Orlicz spaces
summary:Every Orlicz space equipped with Orlicz norm has weak sum property, therefore, it has weakly normal structure and fixed point property. A criterion of sum property also of normal structure for such spaces is given as well, which shows that every Orlicz space has isonormal structure
Jung constants of Orlicz function spaces
Estimation of the Jung constants of Orlicz function spaces equipped with either Luxemburg norm or Orlicz norm is given. The exact values of the Jung constants of a class of reflexive Orlicz function spaces have been found by using a new quantitative index of N-functions
Theoretically Principled Federated Learning for Balancing Privacy and Utility
We propose a general learning framework for the protection mechanisms that
protects privacy via distorting model parameters, which facilitates the
trade-off between privacy and utility. The algorithm is applicable to arbitrary
privacy measurements that maps from the distortion to a real value. It can
achieve personalized utility-privacy trade-off for each model parameter, on
each client, at each communication round in federated learning. Such adaptive
and fine-grained protection can improve the effectiveness of privacy-preserved
federated learning.
Theoretically, we show that gap between the utility loss of the protection
hyperparameter output by our algorithm and that of the optimal protection
hyperparameter is sub-linear in the total number of iterations. The
sublinearity of our algorithm indicates that the average gap between the
performance of our algorithm and that of the optimal performance goes to zero
when the number of iterations goes to infinity. Further, we provide the
convergence rate of our proposed algorithm. We conduct empirical results on
benchmark datasets to verify that our method achieves better utility than the
baseline methods under the same privacy budget
Topical application of superoxide dismutase mediated by HIV-TAT peptide attenuates UVB-induced damages in human skin
Contrastive Masked Autoencoders for Self-Supervised Video Hashing
Self-Supervised Video Hashing (SSVH) models learn to generate short binary
representations for videos without ground-truth supervision, facilitating
large-scale video retrieval efficiency and attracting increasing research
attention. The success of SSVH lies in the understanding of video content and
the ability to capture the semantic relation among unlabeled videos. Typically,
state-of-the-art SSVH methods consider these two points in a two-stage training
pipeline, where they firstly train an auxiliary network by instance-wise
mask-and-predict tasks and secondly train a hashing model to preserve the
pseudo-neighborhood structure transferred from the auxiliary network. This
consecutive training strategy is inflexible and also unnecessary. In this
paper, we propose a simple yet effective one-stage SSVH method called ConMH,
which incorporates video semantic information and video similarity relationship
understanding in a single stage. To capture video semantic information for
better hashing learning, we adopt an encoder-decoder structure to reconstruct
the video from its temporal-masked frames. Particularly, we find that a higher
masking ratio helps video understanding. Besides, we fully exploit the
similarity relationship between videos by maximizing agreement between two
augmented views of a video, which contributes to more discriminative and robust
hash codes. Extensive experiments on three large-scale video datasets (i.e.,
FCVID, ActivityNet and YFCC) indicate that ConMH achieves state-of-the-art
results. Code is available at https://github.com/huangmozhi9527/ConMH.Comment: This work is accepted by the AAAI 2023. 9 pages, 6 figures, 6 table
Can the cellular internalization of cargo proteins be enhanced by fusing a Tat peptide in the center of proteins?:A fluorescence study
Effects of transglutaminase pre-crosslinking on salt-induced gelation of soy protein isolate emulsion
peer-reviewedThe salt-induced gelation behavior of soy protein isolate (SPI) emulsions was markedly influenced by microbial transglutaminase (TGase) pre-crosslinking. Rheological data showed that when SPI emulsions were incubated with TGase at low concentrations (1 and 3 U/g protein) at 50 °C for 30 min prior to gelation, no change in storage modulus (G′), but enhanced resistance to deformation of the gels was observed. Extensive crosslinking by TGase (5 U/g protein) resulted in severe decreases in gel firmness and fracture properties (yielding stress and strain), likely due to the impairment of hydrophobic bonds and the formation of coarse networks. The water-holding capacity of the gels was significantly enhanced by increased concentrations of TGase. Interactive force analysis indicated that non-covalent interactions and disulfide bonds are the primary forces involved in CaSO4-induced SPI emulsion gel, but TGase treatment may limit hydrophobic interactions within the gel network. These results are of great potential value for the application of TGase in the food industry
Try with Simpler -- An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection
The rapid growth of deep learning (DL) has spurred interest in enhancing
log-based anomaly detection. This approach aims to extract meaning from log
events (log message templates) and develop advanced DL models for anomaly
detection. However, these DL methods face challenges like heavy reliance on
training data, labels, and computational resources due to model complexity. In
contrast, traditional machine learning and data mining techniques are less
data-dependent and more efficient but less effective than DL. To make log-based
anomaly detection more practical, the goal is to enhance traditional techniques
to match DL's effectiveness. Previous research in a different domain (linking
questions on Stack Overflow) suggests that optimized traditional techniques can
rival state-of-the-art DL methods. Drawing inspiration from this concept, we
conducted an empirical study. We optimized the unsupervised PCA (Principal
Component Analysis), a traditional technique, by incorporating lightweight
semantic-based log representation. This addresses the issue of unseen log
events in training data, enhancing log representation. Our study compared seven
log-based anomaly detection methods, including four DL-based, two traditional,
and the optimized PCA technique, using public and industrial datasets. Results
indicate that the optimized unsupervised PCA technique achieves similar
effectiveness to advanced supervised/semi-supervised DL methods while being
more stable with limited training data and resource-efficient. This
demonstrates the adaptability and strength of traditional techniques through
small yet impactful adaptations
- …