783 research outputs found

    A Unified Bregman Alternating Minimization Algorithm for Generalized DC Programming with Application to Imaging Data

    Full text link
    In this paper, we consider a class of nonconvex (not necessarily differentiable) optimization problems called generalized DC (Difference-of-Convex functions) programming, which is minimizing the sum of two separable DC parts and one two-block-variable coupling function. To circumvent the nonconvexity and nonseparability of the problem under consideration, we accordingly introduce a Unified Bregman Alternating Minimization Algorithm (UBAMA) by maximally exploiting the favorable DC structure of the objective. Specifically, we first follow the spirit of alternating minimization to update each block variable in a sequential order, which can efficiently tackle the nonseparablitity caused by the coupling function. Then, we employ the Fenchel-Young inequality to approximate the second DC components (i.e., concave parts) so that each subproblem reduces to a convex optimization problem, thereby alleviating the computational burden of the nonconvex DC parts. Moreover, each subproblem absorbs a Bregman proximal regularization term, which is usually beneficial for inducing closed-form solutions of subproblems for many cases via choosing appropriate Bregman kernel functions. It is remarkable that our algorithm not only provides an algorithmic framework to understand the iterative schemes of some novel existing algorithms, but also enjoys implementable schemes with easier subproblems than some state-of-the-art first-order algorithms developed for generic nonconvex and nonsmooth optimization problems. Theoretically, we prove that the sequence generated by our algorithm globally converges to a critical point under the Kurdyka-{\L}ojasiewicz (K{\L}) condition. Besides, we estimate the local convergence rates of our algorithm when we further know the prior information of the K{\L} exponent.Comment: 44 pages, 7figures, 5 tables. Any comments are welcom

    Efficient Data Learning for Open Information Extraction with Pre-trained Language Models

    Full text link
    Open Information Extraction (OpenIE) is a fundamental yet challenging task in Natural Language Processing, which involves extracting all triples (subject, predicate, object) from a given sentence. While labeling-based methods have their merits, generation-based techniques offer unique advantages, such as the ability to generate tokens not present in the original sentence. However, these generation-based methods often require a significant amount of training data to learn the task form of OpenIE and substantial training time to overcome slow model convergence due to the order penalty. In this paper, we introduce a novel framework, OK-IE, that ingeniously transforms the task form of OpenIE into the pre-training task form of the T5 model, thereby reducing the need for extensive training data. Furthermore, we introduce an innovative concept of Anchor to control the sequence of model outputs, effectively eliminating the impact of order penalty on model convergence and significantly reducing training time. Experimental results indicate that, compared to previous SOTA methods, OK-IE requires only 1/100 of the training data (900 instances) and 1/120 of the training time (3 minutes) to achieve comparable results

    TSNet-SAC: Leveraging Transformers for Efficient Task Scheduling

    Full text link
    In future 6G Mobile Edge Computing (MEC), autopilot systems require the capability of processing multimodal data with strong interdependencies. However, traditional heuristic algorithms are inadequate for real-time scheduling due to their requirement for multiple iterations to derive the optimal scheme. We propose a novel TSNet-SAC based on Transformer, that utilizes heuristic algorithms solely to guide the training of TSNet. Additionally, a Sliding Augment Component (SAC) is introduced to enhance the robustness and resolve algorithm defects. Furthermore, the Extender component is designed to handle multi-scale training data and provide network scalability, enabling TSNet to adapt to different access scenarios. Simulation demonstrates that TSNet-SAC outperforms existing networks in accuracy and robustness, achieving superior scheduling-making latency compared to heuristic algorithms

    White Organic Light-Emitting Diodes with Thermally Activated Delayed Fluorescence Emitters

    Get PDF
    Recently, thermally activated delayed fluorescence (TADF) organic light-emitting diodes (OLEDs) have attracted both academic and industrial interest due to their extraordinary characteristics, such as high efficiency, low driving voltage, bright luminance, lower power consumption, and potentially long lifetime. In this chapter, various approaches to realize white OLEDs (WOLEDs) with TADF emitters have been introduced. The recent development of WOLEDs based on all TADF emitters, WOLEDs based on TADF and conventional fluorescence emitters, and WOLEDs based on TADF and phosphorescence emitters is highlighted. Particularly, the device structures, design strategies, working mechanisms, and electroluminescent processes of the representative high-performance WOLEDs with TADF emitters are reviewed. Moreover, challenges and opportunities for further enhancement of the performance of WOLEDs with TADF emitters are presented

    Mahalanobis Distance Map Approach for Anomaly Detection

    Get PDF
    Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. In this paper, we focus on the detection of various web-based attacks using Geometrical Structure Anomaly Detection (GSAD) model and we also propose a novel algorithm for the selection of most discriminating features to improve the computational complexity of payload-based GSAD model. Linear Discriminant method (LDA) is used for the feature reduction and classification of the incoming network traffic. GSAD model is based on a pattern recognition technique used in image processing. It analyses the correlations between various payload features and uses Mahalanobis Distance Map (MDM) to calculate the difference between normal and abnormal network traffic. We focus on the detection of generic attacks, shell code attacks, polymorphic attacks and polymorphic blending attacks. We evaluate accuracy of GSAD model experimentally on the real-world attacks dataset created at Georgia Institute of Technology. We conducted preliminary experiments on the DARPA 99 dataset to evaluate the accuracy of feature reduction

    Different cDNA microarray patterns of gene expression reflecting changes during metastatic progression in adenoid cystic carcinoma

    Get PDF
    BACKGROUND: The metastatic ability of tumor cells is determined by level of expression of specific genes that may be identified with the aid of cDNA microarray containing thousands of genes and can be used to establish the expression profile of disease related genes in complex biological system. MATERIALS AND METHODS: Salivary adenoid cystic carcinoma cell line and its high metastases adenoid cystic carcinoma clone were used as model systems to reveal the gene expression alteration related to metastasis mechanism by cDNA microarray analysis. The correlation of metastatic phenotypic changes and expression levels of 4 selected genes (encoding CD98, L6, RPL29, and TSH) were further validated by using RT-PCR analysis of human tumor specimens from primary adenoid cystic carcinoma and corresponding metastasis lymph nodes. RESULTS: Of the 7,675 clones of known genes and expressed sequence tags (ESTs) that were analyzed, 30 showed significantly different (minimum 3 fold) expression levels in two cell lines. Out of 30 genes found differentially expressed, 18 were up regulated (with ratio more than 3) and 12 down regulated (with ratio less than 1/3). CONCLUSION: Some of these genes are known to be involved in human tumor antigen, immune surveillance, adhesion, cell signaling pathway and growth control. It is suggested that the microarray in combination with a relevant analysis facilitates rapid and simultaneous identification of multiple genes of interests and in this study it provided a profound clue to screen candidate targets for early diagnosis and intervention
    • …
    corecore