234 research outputs found

    On weak topology of Orlicz spaces

    No full text
    This paper presents some properties of singular functionals on Orlicz spaces, from which, criteria for weak convergence and weak compactness in such spaces are obtained

    Normal structure and weakly normal structure of Orlicz spaces

    Get PDF
    summary:Every Orlicz space equipped with Orlicz norm has weak sum property, therefore, it has weakly normal structure and fixed point property. A criterion of sum property also of normal structure for such spaces is given as well, which shows that every Orlicz space has isonormal structure

    Jung constants of Orlicz function spaces

    No full text
    Estimation of the Jung constants of Orlicz function spaces equipped with either Luxemburg norm or Orlicz norm is given. The exact values of the Jung constants of a class of reflexive Orlicz function spaces have been found by using a new quantitative index of N-functions

    Theoretically Principled Federated Learning for Balancing Privacy and Utility

    Full text link
    We propose a general learning framework for the protection mechanisms that protects privacy via distorting model parameters, which facilitates the trade-off between privacy and utility. The algorithm is applicable to arbitrary privacy measurements that maps from the distortion to a real value. It can achieve personalized utility-privacy trade-off for each model parameter, on each client, at each communication round in federated learning. Such adaptive and fine-grained protection can improve the effectiveness of privacy-preserved federated learning. Theoretically, we show that gap between the utility loss of the protection hyperparameter output by our algorithm and that of the optimal protection hyperparameter is sub-linear in the total number of iterations. The sublinearity of our algorithm indicates that the average gap between the performance of our algorithm and that of the optimal performance goes to zero when the number of iterations goes to infinity. Further, we provide the convergence rate of our proposed algorithm. We conduct empirical results on benchmark datasets to verify that our method achieves better utility than the baseline methods under the same privacy budget

    Contrastive Masked Autoencoders for Self-Supervised Video Hashing

    Full text link
    Self-Supervised Video Hashing (SSVH) models learn to generate short binary representations for videos without ground-truth supervision, facilitating large-scale video retrieval efficiency and attracting increasing research attention. The success of SSVH lies in the understanding of video content and the ability to capture the semantic relation among unlabeled videos. Typically, state-of-the-art SSVH methods consider these two points in a two-stage training pipeline, where they firstly train an auxiliary network by instance-wise mask-and-predict tasks and secondly train a hashing model to preserve the pseudo-neighborhood structure transferred from the auxiliary network. This consecutive training strategy is inflexible and also unnecessary. In this paper, we propose a simple yet effective one-stage SSVH method called ConMH, which incorporates video semantic information and video similarity relationship understanding in a single stage. To capture video semantic information for better hashing learning, we adopt an encoder-decoder structure to reconstruct the video from its temporal-masked frames. Particularly, we find that a higher masking ratio helps video understanding. Besides, we fully exploit the similarity relationship between videos by maximizing agreement between two augmented views of a video, which contributes to more discriminative and robust hash codes. Extensive experiments on three large-scale video datasets (i.e., FCVID, ActivityNet and YFCC) indicate that ConMH achieves state-of-the-art results. Code is available at https://github.com/huangmozhi9527/ConMH.Comment: This work is accepted by the AAAI 2023. 9 pages, 6 figures, 6 table

    Effects of transglutaminase pre-crosslinking on salt-induced gelation of soy protein isolate emulsion

    Get PDF
    peer-reviewedThe salt-induced gelation behavior of soy protein isolate (SPI) emulsions was markedly influenced by microbial transglutaminase (TGase) pre-crosslinking. Rheological data showed that when SPI emulsions were incubated with TGase at low concentrations (1 and 3 U/g protein) at 50 °C for 30 min prior to gelation, no change in storage modulus (G′), but enhanced resistance to deformation of the gels was observed. Extensive crosslinking by TGase (5 U/g protein) resulted in severe decreases in gel firmness and fracture properties (yielding stress and strain), likely due to the impairment of hydrophobic bonds and the formation of coarse networks. The water-holding capacity of the gels was significantly enhanced by increased concentrations of TGase. Interactive force analysis indicated that non-covalent interactions and disulfide bonds are the primary forces involved in CaSO4-induced SPI emulsion gel, but TGase treatment may limit hydrophobic interactions within the gel network. These results are of great potential value for the application of TGase in the food industry

    Try with Simpler -- An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection

    Full text link
    The rapid growth of deep learning (DL) has spurred interest in enhancing log-based anomaly detection. This approach aims to extract meaning from log events (log message templates) and develop advanced DL models for anomaly detection. However, these DL methods face challenges like heavy reliance on training data, labels, and computational resources due to model complexity. In contrast, traditional machine learning and data mining techniques are less data-dependent and more efficient but less effective than DL. To make log-based anomaly detection more practical, the goal is to enhance traditional techniques to match DL's effectiveness. Previous research in a different domain (linking questions on Stack Overflow) suggests that optimized traditional techniques can rival state-of-the-art DL methods. Drawing inspiration from this concept, we conducted an empirical study. We optimized the unsupervised PCA (Principal Component Analysis), a traditional technique, by incorporating lightweight semantic-based log representation. This addresses the issue of unseen log events in training data, enhancing log representation. Our study compared seven log-based anomaly detection methods, including four DL-based, two traditional, and the optimized PCA technique, using public and industrial datasets. Results indicate that the optimized unsupervised PCA technique achieves similar effectiveness to advanced supervised/semi-supervised DL methods while being more stable with limited training data and resource-efficient. This demonstrates the adaptability and strength of traditional techniques through small yet impactful adaptations
    • …
    corecore