6,726 research outputs found

    A reversal coarse-grained analysis with application to an altered functional circuit in depression

    Get PDF
    Introduction: When studying brain function using functional magnetic resonance imaging (fMRI) data containing tens of thousands of voxels, a coarse-grained approach – dividing the whole brain into regions of interest – is applied frequently to investigate the organization of the functional network on a relatively coarse scale. However, a coarse-grained scheme may average out the fine details over small spatial scales, thus rendering it difficult to identify the exact locations of functional abnormalities. Methods: A novel and general approach to reverse the coarse-grained approach by locating the exact sources of the functional abnormalities is proposed. Results: Thirty-nine patients with major depressive disorder (MDD) and 37 matched healthy controls are studied. A circuit comprising the left superior frontal gyrus (SFGdor), right insula (INS), and right putamen (PUT) exhibit the greatest changes between the patients with MDD and controls. A reversal coarse-grained analysis is applied to this circuit to determine the exact location of functional abnormalities. Conclusions: The voxel-wise time series extracted from the reversal coarse-grained analysis (source) had several advantages over the original coarse-grained approach: (1) presence of a larger and detectable amplitude of fluctuations, which indicates that neuronal activities in the source are more synchronized; (2) identification of more significant differences between patients and controls in terms of the functional connectivity associated with the sources; and (3) marked improvement in performing discrimination tasks. A software package for pattern classification between controls and patients is available in Supporting Information

    Information technology issues in China

    Get PDF
    In this chapter, we provide important information technology (IT) issues in China, such as organizational IT issues, technology issues, and individual issues. In the World IT Project survey, we recruited 310 IT workers in China. Most of the respondents were in their early career and worked full time in China's IT organizations. The findings show that the most important IT-related organizational issues are: IT reliability and efficiency, security and privacy, and IT strategic planning. Among technology issues, IT professionals identified the following issues as the top concerns: networks/telecommunications, big data systems, data mining, software as a service, and business intelligence/analytics. Most IT employees seem to be satisfied with their current jobs and felt a sense of accomplishment at work. Results further show that more than half of the IT workers would not change their jobs in the short term and felt secure in their current jobs. In addition, there were no significant work-life conflicts among the surveyed IT employees. © 2020 The Author(s)

    Understanding the e+eD()+D()e^+e^-\to D^{(*)+}D^{(*)-} processes observed by Belle

    Full text link
    We calculate the production cross sections for D+DD^{*+}D^{*-}, D+DD^+D^{*-} and D+DD^+D^- in e+ee^+e^- annihilation through one virtual photon in the framework of perturbative QCD with constituent quarks. The calculated cross sections for D+DD^{*+}D^{*-} and D+DD^+D^{*-} production are roughly in agreement with the recent Belle data. The helicity decomposition for DD^{*} meson production is also calculated. The fraction of the DL±DTD^{*\pm}_LD^{*\mp}_T final state in e+eD+De^+e^-\to D^{*+}D^{*-} process is found to be 65%. The fraction of DDTDD^*_T production is 100% and DDLDD^*_L is forbidden in e+ee^+e^- annihilation through one virtual photon. We further consider e+ee^+e^- annihilation through two virtual photons, and then find the fraction of DDTDD^{*}_T in e+eDDe^+e^-\to DD^{*} process to be about 91%.Comment: 8 pages, 2 figure

    Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks

    Full text link
    Adversarial patch is an important form of real-world adversarial attack that brings serious risks to the robustness of deep neural networks. Previous methods generate adversarial patches by either optimizing their perturbation values while fixing the pasting position or manipulating the position while fixing the patch's content. This reveals that the positions and perturbations are both important to the adversarial attack. For that, in this paper, we propose a novel method to simultaneously optimize the position and perturbation for an adversarial patch, and thus obtain a high attack success rate in the black-box setting. Technically, we regard the patch's position, the pre-designed hyper-parameters to determine the patch's perturbations as the variables, and utilize the reinforcement learning framework to simultaneously solve for the optimal solution based on the rewards obtained from the target model with a small number of queries. Extensive experiments are conducted on the Face Recognition (FR) task, and results on four representative FR models show that our method can significantly improve the attack success rate and query efficiency. Besides, experiments on the commercial FR service and physical environments confirm its practical application value. We also extend our method to the traffic sign recognition task to verify its generalization ability.Comment: Accepted by TPAMI 202

    The strong vertices of charmed mesons DD, DD^{*} and charmonia J/ψJ/\psi, ηc\eta_{c}

    Full text link
    In this work, the strong form factors and coupling constants of the vertices DDJ/ψDDJ/\psi, DDJ/ψDD^{*}J/\psi, DDJ/ψD^{*}D^{*}J/\psi, DDηcDD^{*}\eta_{c}, DDηcD^{*}D^{*}\eta_{c} are calculated within the framework of the QCD sum rule. For each vertex, we analyze the form factor considering all possible off-shell cases and the contributions of the vacuum condensate terms qq\langle\overline{q}q\rangle, qgsσGq\langle\overline{q}g_{s}\sigma Gq\rangle, gs2G2\langle g_{s}^{2}G^{2}\rangle, f3G3\langle f^{3}G^{3}\rangle and qqgs2G2\langle\overline{q}q\rangle\langle g_{s}^{2}G^{2}\rangle. Then, the form factors are fitted into analytical functions g(Q2)g(Q^2) and are extrapolated into time-like regions to get the strong coupling constants. Finally, the strong coupling constants are obtained by using on-shell cases of the intermediate mesons(Q2=m2Q^2=-m^2). The results are as follows, gDDJ/ψ=5.010.16+0.58g_{DDJ/\psi}=5.01^{+0.58}_{-0.16}, gDDJ/ψ=3.550.21+0.20g_{DD^{*}J/\psi}=3.55^{+0.20}_{-0.21}GeV1^{-1}, gDDJ/ψ=5.100.43+0.59g_{D^{*}D^{*}J/\psi}=5.10^{+0.59}_{-0.43}, gDDηc=3.680.11+0.39g_{DD^{*}\eta_{c}}=3.68^{+0.39}_{-0.11} and gDDηc=4.870.40+0.42g_{D^{*}D^{*}\eta_{c}}=4.87^{+0.42}_{-0.40}GeV1^{-1}
    corecore