717 research outputs found

    XPS Characterization of Friedel-Crafts Cross-Linked Polystyrene

    Get PDF
    The combination of a difunctional alkylating agent, either hydroxymethylbenzyl chloride or α,α′-dichloroxylene with polystyrene or high-impact polystyrene together with a Friedel-Crafts catalyst, 2-ethylhexyldiphenylphosphate, and an amine to react with hydrogen chloride has been studied by X-ray photoelectron spectroscopy. The results confirm what had been suggested from previous investigations using thermogravimetric analysis; cross-linking of the polymer occurs as the temperature is raised and the alcohol-containing alkylating agent gives a greater amount of cross-linking than does the dichloro compound

    Multimodality Imaging Assessment of Ocular Ischemic Syndrome

    Get PDF
    Objectives. To assess the underlying mechanisms of OIS and confirm the haemodynamic and retinal structure changes of early OIS. Methods. An observational cross-sectional study was conducted of 60 internal carotid artery (ICA) stenosis patients, and they were divided into OIS and control group. Colour doppler imaging, optical coherence tomography, and fundus fluorescein angiography were performed. Results. The middle cerebral artery (MCA) stenosis differs significantly between the two groups. More OIS patients had new collateral patency of posterior communicating artery (PCoA) and retrograde flow via the ophthalmic artery (OA) (p<0.001). The peak systolic velocity (PSV) in central retinal artery (CRA) and choroidal thickness (CT) was significantly reduced in OIS patients (p=0.001 and p<0.001). The arm-retina time (ART) and the retinal arteriovenous passage time (AVP) were prolonged in OIS patients (p<0.001 and p=0.001). CT, ART, and PSV of the CRA showed high sensitivity, while ART and ICA stenosis grade showed high specificity for the diagnosis of OIS according to ROC curve. Conclusions. Patients who suffered from severe ipsilateral ICA stenosis, new collateral patency of PCoAs, and MCA stenosis may be more susceptible to OIS. The most sensitive sign is PSV of CRA and CT, and the most specific sign is ART

    FinGPT: Instruction Tuning Benchmark for Open-Source Large Language Models in Financial Datasets

    Full text link
    In the swiftly expanding domain of Natural Language Processing (NLP), the potential of GPT-based models for the financial sector is increasingly evident. However, the integration of these models with financial datasets presents challenges, notably in determining their adeptness and relevance. This paper introduces a distinctive approach anchored in the Instruction Tuning paradigm for open-source large language models, specifically adapted for financial contexts. Through this methodology, we capitalize on the interoperability of open-source models, ensuring a seamless and transparent integration. We begin by explaining the Instruction Tuning paradigm, highlighting its effectiveness for immediate integration. The paper presents a benchmarking scheme designed for end-to-end training and testing, employing a cost-effective progression. Firstly, we assess basic competencies and fundamental tasks, such as Named Entity Recognition (NER) and sentiment analysis to enhance specialization. Next, we delve into a comprehensive model, executing multi-task operations by amalgamating all instructional tunings to examine versatility. Finally, we explore the zero-shot capabilities by earmarking unseen tasks and incorporating novel datasets to understand adaptability in uncharted terrains. Such a paradigm fortifies the principles of openness and reproducibility, laying a robust foundation for future investigations in open-source financial large language models (FinLLMs).Comment: Workshop on Instruction Tuning and Instruction Following at NeurIPS 202

    SEISMIC VULNERABILITY ANALYSIS OF CABLE-STAYED BRIDGE DURING ROTATION CONSTRUCTION

    Get PDF
    &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Due to the swivel construction, the structural redundancy of cable-stayed bridge is reduced, and its seismic vulnerability is significantly higher than that of non-swirling construction structure and its own state of formation. Therefore, it is particularly important to study the damage changes of each component and stage system during the swivel construction of cable-stayed bridge under different horizontal earthquakes. Based on the construction of Rotary Cable-stayed Bridge in Haxi Street, the calculation formula of damage exceeding probability is established based on reliability theory, and the damage calibration of cable-stayed bridge components is carried out, and the finite element model of cable-stayed bridge rotating structure is established. The vulnerable parts of the main tower and the stay cable components of the cable-stayed bridge are identified and the incremental dynamic analysis is carried out. Finally, the seismic vulnerability curves of the main tower section, the stay cable and the rotating system are established. The results of the study show that the vulnerable areas of the H-shaped bridge towers are the abrupt changes in the main tower section near the upper and lower beams, and the vulnerable diagonal cables are the long cables anchored to the beam ends and the short cables near the main tower;At the same seismic level, the damage exceedance probability of main tower vulnerable section of cable-stayed bridge under transverse earthquake is greater than that under longitudinal earthquake, the damage exceedance probability of vulnerable stay cables under transverse seismic action is less than that under longitudinal seismic action;On the premise of the same damage probability, the required ground motion intensity of the system can be reduced by 0.35g at most compared with the component;Under the same seismic intensity, the system damage probability is 6.60 % higher than the component damage probability at most. The research results have reference significance for the construction of rotating cable-stayed bridges in areas lacking seismic records

    Investigating the Existence of "Secret Language'' in Language Models

    Full text link
    In this paper, we study the problem of secret language in NLP, where current language models (LMs) seem to have a hidden vocabulary that allows them to interpret absurd inputs as meaningful concepts. We investigate two research questions: ``Does the secret language phenomenon exist in different language models?'' and ``Does secret language depend on specific context?'' To answer these questions, we introduce a novel method named \textit{SecretFinding}, a gradient-based approach that can automatically discover secret languages in LMs. We conduct experiments on five representative models (Electra, ALBERT, Roberta, DistillBERT, and CLIP) finetuned on four NLP benchmarks (SST-2, MRPC, SNLI, and SQuAD) and a language-grounding benchmark (MSCOCO). Our experimental results show that even when we replace the most important words with others that are semantically dissimilar to the original words in a sentence, LMs do not consider the new sentence semantically dissimilar to the original, as the output does not change with a high probability. This phenomenon holds true across the five models and five tasks and gives a positive answer to the first research question. As for the second research question, we find that the secret language discovered by \textit{SecretFinding} is quite general and could even be transferred to other models in the black-box settings, such as GPT-3 and ChatGPT. Finally, we discuss the causes of secret language, how to eliminate it, the potential connection to memorization, and ethical implications. Examples of secret language found by SecretFinding are available on https://huggingface.co/spaces/anonymousauthors/ACL23_SecretLanguage
    corecore