248 research outputs found

    Human Development in East and Southeast Asian Economies: 1990-2010

    Get PDF
    This report reviews patterns and trends in human development (HD) in East and Southeast Asia (ESA) since 1990, analyzes causes and consequences of this development, highlighting both structural and institutional factors, and identifies the basic principles for durable enhancements in HD. The basic arguments are that most ESA economies have experienced rapid socioeconomic structural changes through industrialization and urbanization in the last two decades. From a HD perspective, these processes offer enormous room for expanding people's capabilities. However, to successfully seize such opportunities, appropriate institutions and public policies are needed, and so is public participation in policy making and implementation. Public policies are also important for equitable distribution of the expanded opportunities, which in turn contribute to the legitimacy of institutions and social cohesion. And while industrialization does often cause more environmental pollution, technological advances also offer the means to reduce such pollution, so long as appropriate environmental policies are implemented to ensure the use of such cleaner technologies. Subject to such appropriate public policies, in net terms industrialization and urbanization should expand people's capabilities and ensure sustainable HD. Six principles are critical to a successful HD strategy-agricultural and rural development to facilitate structural transformation and to increase employment; human capital accumulation to promote continued economic and income growth; inclusive urbanization to reduce dualism and enhance social integration; cleaner industrialization to ensure sustainability; people's participation and empowerment to improve decision making and governance; closer regional and international cooperation to ensure a better future for all on our fragile planet.Human Development, Structural Factors, Public Policy, East and Southeast Asia

    A Comparison of Regression Methods in Data Subject to Detection Limits: An Application to Lung Fiber Analysis Among Brake Workers

    Get PDF
    Objective: This thesis aims to apply and compare selected regression methods with a lung fiber analysis dataset. Final results based on 19 cases will be compared to 2011 Marsh et al.’s analysis based on the first 15 cases. Methods: Two research questions for the lung fiber dataset are: (1) is there a relationship between the lung fiber concentration of TAA and lung fiber concentration of AC? and (2) is there a relationship between the lung fiber concentration of TAA and duration of employment as a brake worker? Besides the substitution method, bivariate normal regression was used in the doubly left-censored situation in question 1, while the censored normal regression and regression modeling with count data were used in the situation with only the dependent variable subject to detection limits in question 2. Result: (1) The estimate of the slopes between the log-scale of two lung concentrations (TAA vs AC) were 0.59, 0.57, 0.59 and 0.54 in the simple linear regression with substitution (DL, 0.5DL, DL/√2) and the bivariate normal regression, respectively. All of the slope estimates were statistically significant different from zero (p-value = 0.001, 0.003, 0.002 and 0.003). (2) The estimate of the slopes between the log-scale of the TAA lung fiber concentrations and DOE were 0.001, 0.014, 0.008, 0.020 and 0.030 in the simple linear regression with substitution (DL, 0.5DL, and DL/√2), censored normal regression and the negative binomial regression, respectively. All of the slope estimates were not statistically significant different from zero (p-value = 0.933, 0.486, 0.675, 0.390 and 0.439). Conclusions: The consistent results from the substitution and other methods provide support for both a positive relationship between the lung concentration of TAA and AC and for no relationship between the lung concentration of TAA and DOE among 19 brake workers with mesothelioma. These findings are consistent with Marsh et al.’s findings in 2011 based on the first 15 cases. The public health significance is that the study results provide additional support for the conclusion that exposure to non-commercial amphibole asbestos, and not chrysotile, is related to the observed mesothelioma in brake workers. However, these conclusions need to be verified with a larger sample size

    ALP-KD: Attention-Based Layer Projection for Knowledge Distillation

    Full text link
    Knowledge distillation is considered as a training and compression strategy in which two neural networks, namely a teacher and a student, are coupled together during training. The teacher network is supposed to be a trustworthy predictor and the student tries to mimic its predictions. Usually, a student with a lighter architecture is selected so we can achieve compression and yet deliver high-quality results. In such a setting, distillation only happens for final predictions whereas the student could also benefit from teacher's supervision for internal components. Motivated by this, we studied the problem of distillation for intermediate layers. Since there might not be a one-to-one alignment between student and teacher layers, existing techniques skip some teacher layers and only distill from a subset of them. This shortcoming directly impacts quality, so we instead propose a combinatorial technique which relies on attention. Our model fuses teacher-side information and takes each layer's significance into consideration, then performs distillation between combined teacher layers and those of the student. Using our technique, we distilled a 12-layer BERT (Devlin et al. 2019) into 6-, 4-, and 2-layer counterparts and evaluated them on GLUE tasks (Wang et al. 2018). Experimental results show that our combinatorial approach is able to outperform other existing techniques.Comment: AAAI 2021. This work has been done while Peyman Passban was at Huawe

    CRC-based Reliable WiFi Backscatter Communiation for Supply Chain Management

    Full text link
    Supply chain management is aimed to keep going long-term performance of the supply chain and minimize the costs. Backscatter technology provides a more efficient way of being able to identify items and real-time monitoring. Among the backscatter systems, the ambient backscatter communication (AmBC) system provides a prospect of ultra-low energy consumption and does not require controlled excitation devices. In this paper, we introduce CRCScatter, a CRC reverse algorithm-based AmBC system using a single access point (AP). A CRC reverse decoder is applied to reverse the ambient data from CRC32 sequence in the backscatter packet and realize single-AP decoding. Based on the nature of DBPSK modulation in WiFi signal, the CRCScatter system obtains the tag data by XOR and Differential decoder. Our simulation results verify the effectiveness of our proposed system in the low SNR regime. The average decoding time of CRCScatter system is independent of the length of tag data. Furthermore, our system can append redundant bits in the tag data to improve the decoding accuracy while not increasing the decoding time

    To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Unsafe Images ... For Now

    Full text link
    The recent advances in diffusion models (DMs) have revolutionized the generation of complex and diverse images. However, these models also introduce potential safety hazards, such as the production of harmful content and infringement of data copyrights. Although there have been efforts to create safety-driven unlearning methods to counteract these challenges, doubts remain about their capabilities. To bridge this uncertainty, we propose an evaluation framework built upon adversarial attacks (also referred to as adversarial prompts), in order to discern the trustworthiness of these safety-driven unlearned DMs. Specifically, our research explores the (worst-case) robustness of unlearned DMs in eradicating unwanted concepts, styles, and objects, assessed by the generation of adversarial prompts. We develop a novel adversarial learning approach called UnlearnDiff that leverages the inherent classification capabilities of DMs to streamline the generation of adversarial prompts, making it as simple for DMs as it is for image classification attacks. This technique streamlines the creation of adversarial prompts, making the process as intuitive for generative modeling as it is for image classification assaults. Through comprehensive benchmarking, we assess the unlearning robustness of five prevalent unlearned DMs across multiple tasks. Our results underscore the effectiveness and efficiency of UnlearnDiff when compared to state-of-the-art adversarial prompting methods. Codes are available at https://github.com/OPTML-Group/Diffusion-MU-Attack. WARNING: This paper contains model outputs that may be offensive in nature.Comment: Codes are available at https://github.com/OPTML-Group/Diffusion-MU-Attac

    Selectivity Drives Productivity: Efficient Dataset Pruning for Enhanced Transfer Learning

    Full text link
    Massive data is often considered essential for deep learning applications, but it also incurs significant computational and infrastructural costs. Therefore, dataset pruning (DP) has emerged as an effective way to improve data efficiency by identifying and removing redundant training samples without sacrificing performance. In this work, we aim to address the problem of DP for transfer learning, i.e., how to prune a source dataset for improved pretraining efficiency and lossless finetuning accuracy on downstream target tasks. To our best knowledge, the problem of DP for transfer learning remains open, as previous studies have primarily addressed DP and transfer learning as separate problems. By contrast, we establish a unified viewpoint to integrate DP with transfer learning and find that existing DP methods are not suitable for the transfer learning paradigm. We then propose two new DP methods, label mapping and feature mapping, for supervised and self-supervised pretraining settings respectively, by revisiting the DP problem through the lens of source-target domain mapping. Furthermore, we demonstrate the effectiveness of our approach on numerous transfer learning tasks. We show that source data classes can be pruned by up to 40% ~ 80% without sacrificing downstream performance, resulting in a significant 2 ~ 5 times speed-up during the pretraining stage. Besides, our proposal exhibits broad applicability and can improve other computationally intensive transfer learning techniques, such as adversarial pretraining. Codes are available at https://github.com/OPTML-Group/DP4TL.Comment: Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023
    corecore