432 research outputs found

    Reducing the Overhead of Memory Space, Network Communication and Disk I/O for Analytic Frameworks in Big Data Ecosystem

    Get PDF
    To facilitate big data processing, many distributed analytic frameworks and storage systems such as Apache Hadoop, Apache Hama, Apache Spark and Hadoop Distributed File System (HDFS) have been developed. Currently, many researchers are conducting research to either make them more scalable or enabling them to support more analysis applications. In my PhD study, I conducted three main works in this topic, which are minimizing the communication delay in Apache Hama, minimizing the memory space and computational overhead in HDFS and minimizing the disk I/O overhead for approximation applications in Hadoop ecosystem. Specifically, In Apache Hama, communication delay makes up a large percentage of the overall graph processing time. While most recent research has focused on reducing the number of network messages, we add a runtime communication and computation scheduler to overlap them as much as possible. As a result, communication delay can be mitigated. In HDFS, the block location table and its corresponding maintenance could occupy more than half of the memory space and 30% of processing capacity in master node, which severely limit the scalability and performance of master node. We propose Deister that uses deterministic mathematical calculations to eliminate the huge table for storing the block locations and its corresponding maintenance. My third work proposes to enable both efficient and accurate approximations on arbitrary sub-datasets of a large dataset. Existing offline sampling based approximation systems are not adaptive to dynamic query workloads and online sampling based approximation systems suffer from low I/O efficiency and poor estimation accuracy. Therefore, we develop a distribution aware method called Sapprox. Our idea is to collect the occurrences of a sub-dataset at each logical partition of a dataset (storage distribution) in the distributed system at a very small cost, and make good use of such information to facilitate online sampling

    Progress of Research on the Clinical Application of Radiation Protection Agents

    Get PDF
    With the advancement of nuclear technology, there is an increasing exposure of individuals to ionizing radiation. Incidents of radiation exposure occur occasionally, with the risk of radiation damage continuously rising. Radiation protectants are employed to prevent, alleviate, and treat ionizing radiation injuries. However, many current radiation protectants exhibit potent side effects, and there is currently no clinically established radiation protectant in routine use. Researchers have persistently endeavored to explore effective and low-toxicity radiation protectants. This article primarily focuses on internationally approved radiation protectants such as amifostine, dexrazoxane, phosphoramide mustard, polyethylene glycol-conjugated phosphoramide mustard, and sargramostim. Additionally, it discusses some natural antioxidants, resveratrol, and mesenchymal stem cells, which are currently undergoing clinical trials and promising to offer new avenues for the prevention and treatment of radiation injuries

    Experimental investigation on the bamboo-concrete filled circular steel tubular stub columns

    Full text link
    [EN] Concrete-filled steel tubes have been widely used all over the world due to their superior structural behaviour. To promote the use of ecofriendly materials and to reduce the use of concrete, this paper presents an innovative type of composite column, which can be referred as bamboo-concrete filled steel tubes. In this kind of column, concrete filled in the space between the external steel tube and the inner raw moso bamboo. Bamboo-concrete filled steel tubes inherit the merits of concrete-filled steel tubes such as high load-bearing capacity and ductility performance. Besides, global buckling behaviour of a bamboo column due to its relatively large slenderness can be significantly improved, and the bamboo column with nodes could provide confinement to the infilled concrete. This paper investigated the composite effect of bamboo-concrete filled steel tubular stub columns subjected to axial compression. In addition, concrete-filled double-skin steel tubular stub columns and hollow concrete-filled steel tubular stub columns were also tested for comparison. The main experimental parameter considered was the diameter-to-thickness ratio (D/t) of steel tube. Test results indicated that the composite columns with moso bamboo pipe as inner core elements showed better ductility than the hollow concrete-filled steel tubular stub columns. The bearing capacity and ductility visibly increased with decreasing of the D/t ratio.Gan, D.; Zhang, T.; Zhou, X.; He, Z. (2018). Experimental investigation on the bamboo-concrete filled circular steel tubular stub columns. En Proceedings of the 12th International Conference on Advances in Steel-Concrete Composite Structures. ASCCS 2018. Editorial Universitat Politècnica de València. 385-391. https://doi.org/10.4995/ASCCS2018.2018.7138OCS38539

    De-noising of Power Quality Disturbance Detection Based on Ensemble Empirical Mode Decomposition Threshold Algorithm

    Get PDF
    Actual power quality signal which is often affected by noise pollution impacts the analysis results of the disturbance signal. In this paper, EEMD (Ensemble Empirical Mode Decomposition)-based threshold de-noising method is proposed for power quality signal with different SNR (Signal-to-Noise Ratio). As a comparison, we use other four thresholds, namely, the heuristic threshold, the self-adaptive threshold, the fixed threshold and the minimax threshold to filter the noises from power quality signal. Through the analysis and comparison of three characteristics of the signal pre-and-post de-noised, including waveforms, SNR and MSE (Mean Square Error), furthermore the instantaneous attribute of corresponding time by HHT (Hilbert Huang Transform). Simulation results show that EEMD threshold de-noising method can make the waveform close to the actual value. The SNR is higher and the MSE is smaller compared with other four thresholds. The instantaneous attribute can reflect the actual disturbance signal more exactly. The optimal threshold EEMD-based algorithm is proposed for power quality disturbance signal de-noising. Meanwhile, EEMD threshold de-noising method with adaptivity is suitable for composite disturbance signal de-noising

    Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

    Full text link
    The widespread adoption of the Android operating system has made malicious Android applications an appealing target for attackers. Machine learning-based (ML-based) Android malware detection (AMD) methods are crucial in addressing this problem; however, their vulnerability to adversarial examples raises concerns. Current attacks against ML-based AMD methods demonstrate remarkable performance but rely on strong assumptions that may not be realistic in real-world scenarios, e.g., the knowledge requirements about feature space, model parameters, and training dataset. To address this limitation, we introduce AdvDroidZero, an efficient query-based attack framework against ML-based AMD methods that operates under the zero knowledge setting. Our extensive evaluation shows that AdvDroidZero is effective against various mainstream ML-based AMD methods, in particular, state-of-the-art such methods and real-world antivirus solutions.Comment: To Appear in the ACM Conference on Computer and Communications Security, November, 202

    3D Volumetric Super-Resolution in Radiology Using 3D RRDB-GAN

    Full text link
    This study introduces the 3D Residual-in-Residual Dense Block GAN (3D RRDB-GAN) for 3D super-resolution for radiology imagery. A key aspect of 3D RRDB-GAN is the integration of a 2.5D perceptual loss function, which contributes to improved volumetric image quality and realism. The effectiveness of our model was evaluated through 4x super-resolution experiments across diverse datasets, including Mice Brain MRH, OASIS, HCP1200, and MSD-Task-6. These evaluations, encompassing both quantitative metrics like LPIPS and FID and qualitative assessments through sample visualizations, demonstrate the models effectiveness in detailed image analysis. The 3D RRDB-GAN offers a significant contribution to medical imaging, particularly by enriching the depth, clarity, and volumetric detail of medical images. Its application shows promise in enhancing the interpretation and analysis of complex medical imagery from a comprehensive 3D perspective

    Unveiling the roles of the glutathione redox system in vivo by analyzing genetically modified mice

    Get PDF
    Redox status affects various cellular activities, such as proliferation, differentiation, and death. Recent studies suggest pivotal roles of reactive oxygen species not only in pathogenesis under oxidative insult but also in intracellular signal transduction. Glutathione is present in several millimolar concentrations in the cytoplasm and has multiple roles in the regulation of cellular homeostasis. Two enzymes, γ-glutamylcysteine synthetase and glutathione synthetase, constitute the de novo synthesis machinery, while glutathione reductase is involved in the recycling of oxidized glutathione. Multidrug resistant proteins and some other transporters are responsible for exporting oxidized glutathione, glutathione conjugates, and S-nitrosoglutathione. In addition to antioxidation, glutathione is more positively involved in cellular activity via its sulfhydryl moiety of a molecule. Animals in which genes responsible for glutathione metabolism are genetically modified can be used as beneficial and reliable models to elucidate roles of glutathione in vivo. This review article overviews recent progress in works related to genetically modified rodents and advances in the elucidation of glutathione-mediated reactions

    Pattern formation in oscillatory complex networks consisting of excitable nodes

    Full text link
    Oscillatory dynamics of complex networks has recently attracted great attention. In this paper we study pattern formation in oscillatory complex networks consisting of excitable nodes. We find that there exist a few center nodes and small skeletons for most oscillations. Complicated and seemingly random oscillatory patterns can be viewed as well-organized target waves propagating from center nodes along the shortest paths, and the shortest loops passing through both the center nodes and their driver nodes play the role of oscillation sources. Analyzing simple skeletons we are able to understand and predict various essential properties of the oscillations and effectively modulate the oscillations. These methods and results will give insights into pattern formation in complex networks, and provide suggestive ideas for studying and controlling oscillations in neural networks.Comment: 15 pages, 7 figures, to appear in Phys. Rev.

    AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection

    Full text link
    Code Clone Detection, which aims to retrieve functionally similar programs from large code bases, has been attracting increasing attention. Modern software often involves a diverse range of programming languages. However, current code clone detection methods are generally limited to only a few popular programming languages due to insufficient annotated data as well as their own model design constraints. To address these issues, we present AdaCCD, a novel cross-lingual adaptation method that can detect cloned codes in a new language without any annotations in that language. AdaCCD leverages language-agnostic code representations from pre-trained programming language models and propose an Adaptively Refined Contrastive Learning framework to transfer knowledge from resource-rich languages to resource-poor languages. We evaluate the cross-lingual adaptation results of AdaCCD by constructing a multilingual code clone detection benchmark consisting of 5 programming languages. AdaCCD achieves significant improvements over other baselines, and it is even comparable to supervised fine-tuning.Comment: 10 page

    HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

    Full text link
    Vertical Federated Learning (VFL) is a trending collaborative machine learning model training solution. Existing industrial frameworks employ secure multi-party computation techniques such as homomorphic encryption to ensure data security and privacy. Despite these efforts, studies have revealed that data leakage remains a risk in VFL due to the correlations between intermediate representations and raw data. Neural networks can accurately capture these correlations, allowing an adversary to reconstruct the data. This emphasizes the need for continued research into securing VFL systems. Our work shows that hashing is a promising solution to counter data reconstruction attacks. The one-way nature of hashing makes it difficult for an adversary to recover data from hash codes. However, implementing hashing in VFL presents new challenges, including vanishing gradients and information loss. To address these issues, we propose HashVFL, which integrates hashing and simultaneously achieves learnability, bit balance, and consistency. Experimental results indicate that HashVFL effectively maintains task performance while defending against data reconstruction attacks. It also brings additional benefits in reducing the degree of label leakage, mitigating adversarial attacks, and detecting abnormal inputs. We hope our work will inspire further research into the potential applications of HashVFL
    • …
    corecore