337 research outputs found

    Approaching pre-modern China through the computer: the benefits and risks of using electronic resources in sinological research

    Get PDF
    Around the middle of the 1990s, Chinese Studies both in China and around the world irreversibly entered the digital era. Only a decade later, the means and resources for studying premodern Chinese civilization have dramatically changed. Online library catalogs, Internet-based bibliographies and indexes, electronic journals and books, and fulltext databases, many of which were beyond the wildest imagination of scholars of the previous generation, have now become indispensable tools for daily research. Especially noticeable is the largescale digitization of premodern Chinese texts which has, literally, revolutionized the informationseeking behavior and research process of today’s sinologists

    Algorithm-Directed Crash Consistence in Non-Volatile Memory for HPC

    Full text link
    Fault tolerance is one of the major design goals for HPC. The emergence of non-volatile memories (NVM) provides a solution to build fault tolerant HPC. Data in NVM-based main memory are not lost when the system crashes because of the non-volatility nature of NVM. However, because of volatile caches, data must be logged and explicitly flushed from caches into NVM to ensure consistence and correctness before crashes, which can cause large runtime overhead. In this paper, we introduce an algorithm-based method to establish crash consistence in NVM for HPC applications. We slightly extend application data structures or sparsely flush cache blocks, which introduce ignorable runtime overhead. Such extension or cache flushing allows us to use algorithm knowledge to \textit{reason} data consistence or correct inconsistent data when the application crashes. We demonstrate the effectiveness of our method for three algorithms, including an iterative solver, dense matrix multiplication, and Monte-Carlo simulation. Based on comprehensive performance evaluation on a variety of test environments, we demonstrate that our approach has very small runtime overhead (at most 8.2\% and less than 3\% in most cases), much smaller than that of traditional checkpoint, while having the same or less recomputation cost.Comment: 12 page

    A Comparative Study of Insertion Loss of Traffic Noise Barriers in Georgia

    Get PDF
    In this paper, three types of traffic noise barriers, interlocking steel panels, precast concrete panels, and Paragon panel 23-T, were evaluated in terms of insertion loss. Field test was conducted for the noise barriers recently installed as part of the Northwest Express Project in Georgia. The noise insertion loss was measured as noise difference in A-weighted decibels (dBA) immediately before and after the barriers. The insertion loss was then evaluated by correlating with noise barrier types and other influential variables, including the separation distance of barriers from traffic, the level of traffic, wind speed, and pavement types. The results showed that under prevailing conditions represented by other influential variables, all three barrier types achieved an insertion loss in the range of 7.02 dBA to 13.58 dBA, exceeding the noise reduction design goal of 7 dBA as stated in the Georgia Department of Transportation’s noise abatement policy. Among the three, the Paragon panel 23-T barriers effected the highest insertion loss, followed by the precast concrete panel barriers and the interlocking steel panel barriers

    Semi-supervised multiscale dual-encoding method for faulty traffic data detection

    Full text link
    Inspired by the recent success of deep learning in multiscale information encoding, we introduce a variational autoencoder (VAE) based semi-supervised method for detection of faulty traffic data, which is cast as a classification problem. Continuous wavelet transform (CWT) is applied to the time series of traffic volume data to obtain rich features embodied in time-frequency representation, followed by a twin of VAE models to separately encode normal data and faulty data. The resulting multiscale dual encodings are concatenated and fed to an attention-based classifier, consisting of a self-attention module and a multilayer perceptron. For comparison, the proposed architecture is evaluated against five different encoding schemes, including (1) VAE with only normal data encoding, (2) VAE with only faulty data encoding, (3) VAE with both normal and faulty data encodings, but without attention module in the classifier, (4) siamese encoding, and (5) cross-vision transformer (CViT) encoding. The first four encoding schemes adopted the same convolutional neural network (CNN) architecture while the fifth encoding scheme follows the transformer architecture of CViT. Our experiments show that the proposed architecture with the dual encoding scheme, coupled with attention module, outperforms other encoding schemes and results in classification accuracy of 96.4%, precision of 95.5%, and recall of 97.7%.Comment: 16 pages, 8 figure

    Optimal scheduling of industrial task-continuous load management for smart power utilization

    Get PDF
    In the context of climate change and energy crisis around the world, an increasing amount of attention has been paid to developing clean energy and improving energy efficiency. The penetration of distributed generation (DG) is increasing rapidly on the user’s side of an increasingly intelligent power system. This paper proposes an optimization method for industrial task-continuous load management in which distributed generation (including photovoltaic systems and wind generation) and energy storage devices are both considered. To begin with, a model of distributed generation and an energy storage device are built. Then, subject to various constraints, an operation optimization problem is formulated to maximize user profit, renewable energy efficiency, and the local consumption of distributed generation. Finally, the effectiveness of the method is verified by comparing user profit under different power modes

    Co-supervised learning paradigm with conditional generative adversarial networks for sample-efficient classification

    Full text link
    Classification using supervised learning requires annotating a large amount of classes-balanced data for model training and testing. This has practically limited the scope of applications with supervised learning, in particular deep learning. To address the issues associated with limited and imbalanced data, this paper introduces a sample-efficient co-supervised learning paradigm (SEC-CGAN), in which a conditional generative adversarial network (CGAN) is trained alongside the classifier and supplements semantics-conditioned, confidence-aware synthesized examples to the annotated data during the training process. In this setting, the CGAN not only serves as a co-supervisor but also provides complementary quality examples to aid the classifier training in an end-to-end fashion. Experiments demonstrate that the proposed SEC-CGAN outperforms the external classifier GAN (EC-GAN) and a baseline ResNet-18 classifier. For the comparison, all classifiers in above methods adopt the ResNet-18 architecture as the backbone. Particularly, for the Street View House Numbers dataset, using the 5% of training data, a test accuracy of 90.26% is achieved by SEC-CGAN as opposed to 88.59% by EC-GAN and 87.17% by the baseline classifier; for the highway image dataset, using the 10% of training data, a test accuracy of 98.27% is achieved by SEC-CGAN, compared to 97.84% by EC-GAN and 95.52% by the baseline classifier.Comment: 14 pages, 5 figure

    Elucidating the susceptibility to breast cancer: an in-depth proteomic and transcriptomic investigation into novel potential plasma protein biomarkers

    Get PDF
    Objectives: This study aimed to identify plasma proteins that are associated with and causative of breast cancer through Proteome and Transcriptome-wide association studies combining Mendelian Randomization.Methods: Utilizing high-throughput datasets, we designed a two-phase analytical framework aimed at identifying novel plasma proteins that are both associated with and causative of breast cancer. Initially, we conducted Proteome/Transcriptome-wide association studies (P/TWAS) to identify plasma proteins with significant associations. Subsequently, Mendelian Randomization was employed to ascertain the causation. The validity and robustness of our findings were further reinforced through external validation and various sensitivity analyses, including Bayesian colocalization, Steiger filtering, heterogeneity and pleiotropy. Additionally, we performed functional enrichment analysis of the identified proteins to better understand their roles in breast cancer and to assess their potential as druggable targets.Results: We identified 5 plasma proteins demonstrating strong associations and causative links with breast cancer. Specifically, PEX14 (OR = 1.201, p = 0.016) and CTSF (OR = 1.114, p < 0.001) both displayed positive and causal association with breast cancer. In contrast, SNUPN (OR = 0.905, p < 0.001), CSK (OR = 0.962, p = 0.038), and PARK7 (OR = 0.954, p < 0.001) were negatively associated with the disease. For the ER-positive subtype, 3 plasma proteins were identified, with CSK and CTSF exhibiting consistent trends, while GDI2 (OR = 0.920, p < 0.001) was distinct to this subtype. In ER-negative subtype, PEX14 (OR = 1.645, p < 0.001) stood out as the sole protein, even showing a stronger causal effect compared to breast cancer. These associations were robustly supported by colocalization and sensitivity analyses.Conclusion: Integrating multiple data dimensions, our study successfully pinpointed plasma proteins significantly associated with and causative of breast cancer, offering valuable insights for future research and potential new biomarkers and therapeutic targets

    Directory of English/Chinese Names of Scholars in Chinese Studies - 海外中国研究学者名录(英中对照)

    Get PDF
    The Directory of English/Chinese Names of Scholars in Chinese Studies was a by-product of the "Chinese Studies in North America - Research and Resources" project. It provides both the English and the Chinese names of scholars involved in Chinese Studies mainly in North America. The Chinese names for western scholars resulted from an extensive in the relevant literature and on the internet at appropriate sites to find and authenticate the Chinese names used by these scholars. Where we could not find the Chinese name adopted by a scholar, we have transliterated their name into Chinese characters using the standard reference book 英语姓名译名手册. It is hoped that this directory will be useful for people needing to search for the Chinese names used by western scholars, or for the standard transliterations of their names into Chinese characters. Corrections of inaccurate information and addition of new names of Chinese Studies scholars worldwide are welcome. For corrections, comments and updates, please send emails to Haihui Zhang (Librarian for Chinese studies at East Asian Library, University Library System at University of Pittsburgh) at [email protected]
    corecore