31 research outputs found

    Research Progress on Temporary Dominance of Sensations and Its Application in Food Sensory Evaluation

    Get PDF
    Temporal domination of sensations (TDS) is a temporal multidimensional dynamic sensory analysis method. This method provides the evaluators with a list of the attributes of products, and the evaluators obtain dynamic multi-attribute sensory evaluation results by selecting the perceptions they think to be dominant at each moment of tasting. In this paper, the concept and process of TDS and its application in food sensory evaluation are reviewed, and future directions in the improvement of TDS are discussed. We anticipate that this paper will provide new ideas for the development of new food products based on an understanding of the dynamic changes of sensory perception during food consumption

    CRISPR Screening Identifies BET and mTOR Inhibitor Synergy in Cholangiocarcinoma Through Serine Glycine One Carbon

    Get PDF
    Patients with cholangiocarcinoma have poor clinical outcomes due to late diagnoses, poor prognoses, and limited treatment strategies. To identify drug combinations for this disease, we have conducted a genome-wide CRISPR screen anchored on the bromodomain and extraterminal domain (BET) PROTAC degrader ARV825, from which we identified anticancer synergy when combined with genetic ablation of members of the mTOR pathway. This combination effect was validated using multiple pharmacological BET and mTOR inhibitors, accompanied by increased levels of apoptosis and cell cycle arrest. In a xenograft model, combined BET degradation and mTOR inhibition induced tumor regression. Mechanistically, the 2 inhibitor classes converged on H3K27ac-marked epigenetic suppression of the serine glycine one carbon (SGOC) metabolism pathway, including the key enzymes PHGDH and PSAT1. Knockdown of PSAT1 was sufficient to replicate synergy with single-agent inhibition of either BET or mTOR. Our results tie together epigenetic regulation, metabolism, and apoptosis induction as key therapeutic targets for further exploration in this underserved disease

    Interpreting Deep Learning-Based Networking Systems

    Full text link
    While many deep learning (DL)-based networking systems have demonstrated superior performance, the underlying Deep Neural Networks (DNNs) remain blackboxes and stay uninterpretable for network operators. The lack of interpretability makes DL-based networking systems prohibitive to deploy in practice. In this paper, we propose Metis, a framework that provides interpretability for two general categories of networking problems spanning local and global control. Accordingly, Metis introduces two different interpretation methods based on decision tree and hypergraph, where it converts DNN policies to interpretable rule-based controllers and highlight critical components based on analysis over hypergraph. We evaluate Metis over several state-of-the-art DL-based networking systems and show that Metis provides human-readable interpretations while preserving nearly no degradation in performance. We further present four concrete use cases of Metis, showcasing how Metis helps network operators to design, debug, deploy, and ad-hoc adjust DL-based networking systems.Comment: To appear at ACM SIGCOMM 202

    Detection of Tampering by Image Resizing Using Local Tchebichef Moments

    No full text
    There are many image resizing techniques, which include scaling, scale-and-stretch, seam carving, and so on. They have their own advantages and are suitable for different application scenarios. Therefore, a universal detection of tampering by image resizing is more practical. By preliminary experiments, we found that no matter which image resizing technique is adopted, it will destroy local texture and spatial correlations among adjacent pixels to some extent. Due to the excellent performance of local Tchebichef moments (LTM) in texture classification, we are motivated to present a detection method of tampering by image resizing using LTM in this paper. The tampered images are obtained by removing the pixels from original images using image resizing (scaling, scale-and-stretch and seam carving). Firstly, the residual is obtained by image pre-processing. Then, the histogram features of LTM are extracted from the residual. Finally, an error-correcting output code strategy is adopted by ensemble learning, which turns a multi-class classification problem into binary classification sub-problems. Experimental results show that the proposed approach can obtain an acceptable detection accuracies for the three content-aware image re-targeting techniques

    Spectral methods meet EM: A provably optimal algorithm for crowdsourcing. In Advances in neural information processing systems,

    No full text
    Abstract Crowdsourcing is a popular paradigm for effectively collecting labels at low cost. The Dawid-Skene estimator has been widely used for inferring the true labels from the noisy labels provided by non-expert crowdsourcing workers. However, since the estimator maximizes a non-convex log-likelihood function, it is hard to theoretically justify its performance. In this paper, we propose a two-stage efficient algorithm for multi-class crowd labeling problems. The first stage uses the spectral method to obtain an initial estimate of parameters. Then the second stage refines the estimation by optimizing the objective function of the Dawid-Skene estimator via the EM algorithm. We show that our algorithm achieves the optimal convergence rate up to a logarithmic factor. We conduct extensive experiments on synthetic and real datasets. Experimental results demonstrate that the proposed algorithm is comparable to the most accurate empirical approach, while outperforming several other recently proposed methods

    ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image

    No full text
    Abstract Morphing attacks (MAs) pose a substantial security threat to the Automatic Border Control (ABC) system. While a few morphing attack detection (MAD) methods have been proposed, the face morphing accomplice's facial restoration has not received sufficient attention. Due to the inability to foresee the morphing factor used for a particular morphed image, selecting the appropriate de‐morphing factor becomes a challenging problem in the restoration of the accomplice's facial image. If the morphing factor cannot be chosen reasonably, achieving the desired restoration effect is difficult. Therefore, this paper presents an adaptive de‐morphing factor framework (ADFF) architecture for restoring the accomplice's facial image. By exploiting the morphed images stored in the electronic passport system and the real‐time captured criminal's images, ADFF can effectively restore the accomplice's facial image. Experimental results and analysis show that ADFF can significantly reduce the security threats of MAs on ABC

    An Ultra-Short-Term Electrical Load Forecasting Method Based on Temperature-Factor-Weight and LSTM Model

    No full text
    Ultra-short-term electrical load forecasting is an important guarantee for the safety and efficiency of energy system operation. Temperature is also an important factor affecting the changes in electric load. However, in different cases, the impact of temperature on load forecasting will vary greatly, and sometimes even lead to the decrease of forecasting accuracy. This often brings great difficulties to researchers’ work. In order to make more scientific use of temperature factor for ultra-short-term electrical load forecasting, especially to avoid the negative influence of temperature on load forecasting, in this paper we propose an ultra-short-term electrical load forecasting method based on temperature factor weight and long short-term memory model. The proposed method evaluates the importance of the current prediction task’s temperature based on the change magnitude of the recent load and the correlation between temperature and load, and therefore the negative impacts of the temperature model can be avoided. The mean absolute percentage error of proposed method is decreased by 1.24%, 1.86%, and 6.21% compared with traditional long short-term memory model, back-propagation neural network, and gray model on average, respectively. The experimental results demonstrate that this method has obvious advantages in prediction accuracy and generalization ability

    Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs

    No full text
    Seam carving has been widely used in image resizing due to its superior performance in avoiding image distortion and deformation, which can maliciously be used on purpose, such as tampering contents of an image. As a result, seam-carving detection is becoming crucially important to recognize the image authenticity. However, existing methods do not perform well in the accuracy of seam-carving detection especially when the scaling ratio is low. In this paper, we propose an image forensic approach based on the cooccurrence of adjacent local binary patterns (LBPs), which employs LBP to better display texture information. Specifically, a total of 24 energy-based, seam-based, half-seam-based, and noise-based features in the LBP domain are applied to the seam-carving detection. Moreover, the cooccurrence features of adjacent LBPs are combined to highlight the local relationship between LBPs. Besides, SVM after training is adopted for feature classification to determine whether an image is seam-carved or not. Experimental results demonstrate the effectiveness in improving the detection accuracy with respect to different scaling ratios, especially under low scaling ratios
    corecore