1,060 research outputs found

    WeakIdent: Weak formulation for Identifying Differential Equations using Narrow-fit and Trimming

    Full text link
    Data-driven identification of differential equations is an interesting but challenging problem, especially when the given data are corrupted by noise. When the governing differential equation is a linear combination of various differential terms, the identification problem can be formulated as solving a linear system, with the feature matrix consisting of linear and nonlinear terms multiplied by a coefficient vector. This product is equal to the time derivative term, and thus generates dynamical behaviors. The goal is to identify the correct terms that form the equation to capture the dynamics of the given data. We propose a general and robust framework to recover differential equations using a weak formulation, for both ordinary and partial differential equations (ODEs and PDEs). The weak formulation facilitates an efficient and robust way to handle noise. For a robust recovery against noise and the choice of hyper-parameters, we introduce two new mechanisms, narrow-fit and trimming, for the coefficient support and value recovery, respectively. For each sparsity level, Subspace Pursuit is utilized to find an initial set of support from the large dictionary. Then, we focus on highly dynamic regions (rows of the feature matrix), and error normalize the feature matrix in the narrow-fit step. The support is further updated via trimming of the terms that contribute the least. Finally, the support set of features with the smallest Cross-Validation error is chosen as the result. A comprehensive set of numerical experiments are presented for both systems of ODEs and PDEs with various noise levels. The proposed method gives a robust recovery of the coefficients, and a significant denoising effect which can handle up to 100%100\% noise-to-signal ratio for some equations. We compare the proposed method with several state-of-the-art algorithms for the recovery of differential equations

    Fourier Features for Identifying Differential Equations (FourierIdent)

    Full text link
    We investigate the benefits and challenges of utilizing the frequency information in differential equation identification. Solving differential equations and Fourier analysis are closely related, yet there is limited work in exploring this connection in the identification of differential equations. Given a single realization of the differential equation perturbed by noise, we aim to identify the underlying differential equation governed by a linear combination of linear and nonlinear differential and polynomial terms in the frequency domain. This is challenging due to large magnitudes and sensitivity to noise. We introduce a Fourier feature denoising, and define the meaningful data region and the core regions of features to reduce the effect of noise in the frequency domain. We use Subspace Pursuit on the core region of the time derivative feature, and introduce a group trimming step to refine the support. We further introduce a new energy based on the core regions of features for coefficient identification. Utilizing the core regions of features serves two critical purposes: eliminating the low-response regions dominated by noise, and enhancing the accuracy in coefficient identification. The proposed method is tested on various differential equations with linear, nonlinear, and high-order derivative feature terms. Our results demonstrate the advantages of the proposed method, particularly on complex and highly corrupted datasets

    Research on Warnings with New Thought of Neuro-IE

    Get PDF
    AbstractSafety production is a seriously stubborn problem in modern industry engineering. Warnings, as the most fundamental and important measure used in safety management, especially in Mine Exploitation, have played a vital role in risk cognition, behaviors guide and accidents prevention. However, traditional researches are so subjective that it's hard to deeply explore the inner mechanism and process, which has been hidden behind the outer behaviors. As a result, the effectiveness of Warnings is much discounted. In this paper, we make use of neuroscience methods to study Warnings from the basically cognitive levels and have acquired preliminary achievements, which provide new evidence, discussion and introductions for former researches

    Inherent P2X7 Receptors Regulate Macrophage Functions during Inflammatory Diseases

    Get PDF
    Macrophages are mononuclear phagocytes which derive either from blood-borne monocytes or reside as resident macrophages in peripheral (Kupffer cells of the liver, marginal zone macrophages of the spleen, alveolar macrophages of the lung) and central tissue (microglia). They occur as M1 (pro-inflammatory; classic) or M2 (anti-inflammatory; alternatively activated) phenotypes. Macrophages possess P2X7 receptors (Rs) which respond to high concentrations of extracellular ATP under pathological conditions by allowing the non-selective fluxes of cations (Na+, Ca2+, K+). Activation of P2X7Rs by still higher concentrations of ATP, especially after repetitive agonist application, leads to the opening of membrane pores permeable to ~900 Da molecules. For this effect an interaction of the P2X7R with a range of other membrane channels (e.g., P2X4R, transient receptor potential A1 [TRPA1], pannexin-1 hemichannel, ANO6 chloride channel) is required. Macrophagelocalized P2X7Rs have to be co-activated with the lipopolysaccharide-sensitive toll-like receptor 4 (TLR4) in order to induce the formation of the inflammasome 3 (NLRP3), which then activates the pro-interleukin-1 (pro-IL-1)-degrading caspase-1 to lead to IL-1 release. Moreover, inflammatory diseases (e.g., rheumatoid arthritis, Crohn’s disease, sepsis, etc.) are generated downstream of the P2X7R-induced upregulation of intracellular second messengers (e.g., phospholipase A2, p38 mitogen-activated kinase, and rho G proteins). In conclusion, P2X7Rs at macrophages appear to be important targets to preserve immune homeostasis with possible therapeutic consequences

    System-on-Chip Packet Processor for an Experimental Network Services Platform

    Get PDF
    As the focus of networking research shifts from raw performance to the delivery of advanced network services, there is a growing need for open-platform systems for extensible networking research. The Applied Research Laboratory at Washington University in Saint Louis has developed a flexible Network Services Platform (NSP) to meet this need. The NSP provides an extensible platform for prototyping next-generation network services and applications. This paper describes the design of a system-on-chip Packet Processor for the NSP which performs all core packet processing functions including segmentation and reassembly, packet classification, route lookup, and queue management. Targeted to a commercial configurable logic device, the system is designed to support gigabit links and switch fabrics with a 2:1 speed advantage. We provide resource consumption results for each component of the Packet Processor design

    Long Non-Coding RNA TUG1 Attenuates Insulin Resistance in Mice with Gestational Diabetes Mellitus via Regulation of the MicroRNA-328-3p/SREBP-2/ERK Axis

    Get PDF
    Background Long non-coding RNAs (lncRNAs) have been illustrated to contribute to the development of gestational diabetes mellitus (GDM). In the present study, we aimed to elucidate how lncRNA taurine upregulated gene 1 (TUG1) influences insulin resistance (IR) in a high-fat diet (HFD)-induced mouse model of GDM. Methods We initially developed a mouse model of HFD-induced GDM, from which islet tissues were collected for RNA and protein extraction. Interactions among lncRNA TUG1/microRNA (miR)-328-3p/sterol regulatory element binding protein 2 (SREBP-2) were assessed by dual-luciferase reporter assay. Fasting blood glucose (FBG), fasting insulin (FINS), homeostasis model assessment of insulin resistance (HOMA-IR), HOMA pancreatic β-cell function (HOMA-β), insulin sensitivity index for oral glucose tolerance tests (ISOGTT) and insulinogenic index (IGI) levels in mouse serum were measured through conducting gain- and loss-of-function experiments. Results Abundant expression of miR-328 and deficient expression of lncRNA TUG1 and SREBP-2 were characterized in the islet tissues of mice with HFD-induced GDM. LncRNA TUG1 competitively bound to miR-328-3p, which specifically targeted SREBP-2. Either depletion of miR-328-3p or restoration of lncRNA TUG1 and SREBP-2 reduced the FBG, FINS, HOMA-β, and HOMA-IR levels while increasing ISOGTT and IGI levels, promoting the expression of the extracellular signal-regulated kinase (ERK) signaling pathway-related genes, and inhibiting apoptosis of islet cells in GDM mice. Upregulation miR-328-3p reversed the alleviative effects of SREBP-2 and lncRNA TUG1 on IR. Conclusion Our study provides evidence that the lncRNA TUG1 may prevent IR following GDM through competitively binding to miR-328-3p and promoting the SREBP-2-mediated ERK signaling pathway inactivation

    Novel Parameterized Utility Function on Dual Hesitant Fuzzy Rough Sets and Its Application in Pattern Recognition

    Get PDF
    Based on comparative studies on correlation coefficient theory and utility theory, a series of rules that utility functions on dual hesitant fuzzy rough sets (DHFRSs) should satisfy, and a kind of novel utility function on DHFRSs are proposed. The characteristic of the introduced utility function is a parameter, which is determined by decision-makers according to their experiences. By using the proposed utility function on DHFRSs, a novel dual hesitant fuzzy rough pattern recognition method is also proposed. Furthermore, this study also points out that the classical dual tool is suitable to cope with dynamic data in exploratory data analysis situations, while the newly proposed one is suitable to cope with static data in confirmatory data analysis situations. Finally, a medical diagnosis and a traffic engineering example are introduced to reveal the effectiveness of the newly proposed utility functions on DHFRSs. Document type: Articl

    New Algorithms for Secure Outsourcing of Modular Exponentiations

    Get PDF
    With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientific community. Exponentiations modulo a large prime have been considered the most expensive operation in discrete-logarithm based cryptographic protocols, and the computationally limited devices such as RFID tags or smartcard may be incapable to accomplish these operations. Therefore, it is meaningful to present an efficient method to securely outsource most of this work-load to (untrusted) cloud servers. In this paper, we propose a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modular a prime in the two untrusted program model. Compared with the state-of-the-art algorithm \cite{HL05}, the proposed algorithm is superior in both efficiency and checkability. We then utilize this algorithm as a subroutine to achieve outsource-secure Cramer-Shoup encryptions and Schnorr signatures. Besides, we propose the first outsource-secure and efficient algorithm for simultaneous modular exponentiations. Moreover, we formally prove that both the algorithms can achieve the desired security notions. We also provide the experimental evaluation that demonstrates the efficiency and effectiveness of the proposed outsourcing algorithms and schemes
    corecore