829 research outputs found

    WeakIdent: Weak formulation for Identifying Differential Equations using Narrow-fit and Trimming

    Full text link
    Data-driven identification of differential equations is an interesting but challenging problem, especially when the given data are corrupted by noise. When the governing differential equation is a linear combination of various differential terms, the identification problem can be formulated as solving a linear system, with the feature matrix consisting of linear and nonlinear terms multiplied by a coefficient vector. This product is equal to the time derivative term, and thus generates dynamical behaviors. The goal is to identify the correct terms that form the equation to capture the dynamics of the given data. We propose a general and robust framework to recover differential equations using a weak formulation, for both ordinary and partial differential equations (ODEs and PDEs). The weak formulation facilitates an efficient and robust way to handle noise. For a robust recovery against noise and the choice of hyper-parameters, we introduce two new mechanisms, narrow-fit and trimming, for the coefficient support and value recovery, respectively. For each sparsity level, Subspace Pursuit is utilized to find an initial set of support from the large dictionary. Then, we focus on highly dynamic regions (rows of the feature matrix), and error normalize the feature matrix in the narrow-fit step. The support is further updated via trimming of the terms that contribute the least. Finally, the support set of features with the smallest Cross-Validation error is chosen as the result. A comprehensive set of numerical experiments are presented for both systems of ODEs and PDEs with various noise levels. The proposed method gives a robust recovery of the coefficients, and a significant denoising effect which can handle up to 100%100\% noise-to-signal ratio for some equations. We compare the proposed method with several state-of-the-art algorithms for the recovery of differential equations

    Research on Warnings with New Thought of Neuro-IE

    Get PDF
    AbstractSafety production is a seriously stubborn problem in modern industry engineering. Warnings, as the most fundamental and important measure used in safety management, especially in Mine Exploitation, have played a vital role in risk cognition, behaviors guide and accidents prevention. However, traditional researches are so subjective that it's hard to deeply explore the inner mechanism and process, which has been hidden behind the outer behaviors. As a result, the effectiveness of Warnings is much discounted. In this paper, we make use of neuroscience methods to study Warnings from the basically cognitive levels and have acquired preliminary achievements, which provide new evidence, discussion and introductions for former researches

    System-on-Chip Packet Processor for an Experimental Network Services Platform

    Get PDF
    As the focus of networking research shifts from raw performance to the delivery of advanced network services, there is a growing need for open-platform systems for extensible networking research. The Applied Research Laboratory at Washington University in Saint Louis has developed a flexible Network Services Platform (NSP) to meet this need. The NSP provides an extensible platform for prototyping next-generation network services and applications. This paper describes the design of a system-on-chip Packet Processor for the NSP which performs all core packet processing functions including segmentation and reassembly, packet classification, route lookup, and queue management. Targeted to a commercial configurable logic device, the system is designed to support gigabit links and switch fabrics with a 2:1 speed advantage. We provide resource consumption results for each component of the Packet Processor design

    Long Non-Coding RNA TUG1 Attenuates Insulin Resistance in Mice with Gestational Diabetes Mellitus via Regulation of the MicroRNA-328-3p/SREBP-2/ERK Axis

    Get PDF
    Background Long non-coding RNAs (lncRNAs) have been illustrated to contribute to the development of gestational diabetes mellitus (GDM). In the present study, we aimed to elucidate how lncRNA taurine upregulated gene 1 (TUG1) influences insulin resistance (IR) in a high-fat diet (HFD)-induced mouse model of GDM. Methods We initially developed a mouse model of HFD-induced GDM, from which islet tissues were collected for RNA and protein extraction. Interactions among lncRNA TUG1/microRNA (miR)-328-3p/sterol regulatory element binding protein 2 (SREBP-2) were assessed by dual-luciferase reporter assay. Fasting blood glucose (FBG), fasting insulin (FINS), homeostasis model assessment of insulin resistance (HOMA-IR), HOMA pancreatic β-cell function (HOMA-β), insulin sensitivity index for oral glucose tolerance tests (ISOGTT) and insulinogenic index (IGI) levels in mouse serum were measured through conducting gain- and loss-of-function experiments. Results Abundant expression of miR-328 and deficient expression of lncRNA TUG1 and SREBP-2 were characterized in the islet tissues of mice with HFD-induced GDM. LncRNA TUG1 competitively bound to miR-328-3p, which specifically targeted SREBP-2. Either depletion of miR-328-3p or restoration of lncRNA TUG1 and SREBP-2 reduced the FBG, FINS, HOMA-β, and HOMA-IR levels while increasing ISOGTT and IGI levels, promoting the expression of the extracellular signal-regulated kinase (ERK) signaling pathway-related genes, and inhibiting apoptosis of islet cells in GDM mice. Upregulation miR-328-3p reversed the alleviative effects of SREBP-2 and lncRNA TUG1 on IR. Conclusion Our study provides evidence that the lncRNA TUG1 may prevent IR following GDM through competitively binding to miR-328-3p and promoting the SREBP-2-mediated ERK signaling pathway inactivation

    Novel Parameterized Utility Function on Dual Hesitant Fuzzy Rough Sets and Its Application in Pattern Recognition

    Get PDF
    Based on comparative studies on correlation coefficient theory and utility theory, a series of rules that utility functions on dual hesitant fuzzy rough sets (DHFRSs) should satisfy, and a kind of novel utility function on DHFRSs are proposed. The characteristic of the introduced utility function is a parameter, which is determined by decision-makers according to their experiences. By using the proposed utility function on DHFRSs, a novel dual hesitant fuzzy rough pattern recognition method is also proposed. Furthermore, this study also points out that the classical dual tool is suitable to cope with dynamic data in exploratory data analysis situations, while the newly proposed one is suitable to cope with static data in confirmatory data analysis situations. Finally, a medical diagnosis and a traffic engineering example are introduced to reveal the effectiveness of the newly proposed utility functions on DHFRSs. Document type: Articl

    New Algorithms for Secure Outsourcing of Modular Exponentiations

    Get PDF
    With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientific community. Exponentiations modulo a large prime have been considered the most expensive operation in discrete-logarithm based cryptographic protocols, and the computationally limited devices such as RFID tags or smartcard may be incapable to accomplish these operations. Therefore, it is meaningful to present an efficient method to securely outsource most of this work-load to (untrusted) cloud servers. In this paper, we propose a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modular a prime in the two untrusted program model. Compared with the state-of-the-art algorithm \cite{HL05}, the proposed algorithm is superior in both efficiency and checkability. We then utilize this algorithm as a subroutine to achieve outsource-secure Cramer-Shoup encryptions and Schnorr signatures. Besides, we propose the first outsource-secure and efficient algorithm for simultaneous modular exponentiations. Moreover, we formally prove that both the algorithms can achieve the desired security notions. We also provide the experimental evaluation that demonstrates the efficiency and effectiveness of the proposed outsourcing algorithms and schemes

    Evolutionary-Computation Based Risk Assessment of Aircraft Landing Sequencing Algorithms

    Get PDF
    Abstract. Usually, Evolutionary Computation (EC) is used for optimisation and machine learning tasks. Recently, a novel use of EC has been proposedMultiobjective Evolutionary Based Risk Assessment (MEBRA). MEBRA characterises the problem space associated with good and inferior performance of computational algorithms. Problem instances are represented ("scenario Representation") and evolved ("scenario Generation") in order to evaluate algorithms ("scenario Evaluation"). The objective functions aim at maximising or minimising the success rate of an algorithm. In the "scenario Mining" step, MEBRA identifies the patterns common in problem instances when an algorithm performs best in order to understand when to use it, and in instances when it performs worst in order to understand when not to use it. So far, MEBRA has only been applied to a limited number of problems. Here we demonstrate its viability to efficiently detect hot spots in an algorithm's problem space. In particular, we apply the basic MEBRA rationale in the area of Air Traffic Management (ATM). We examine two widely used algorithms for Aircraft Landing Sequencing: First Come First Served (FCFS) and Constrained Position Shifting (CPS). Through the use of three different problem ("scenario") representations, we identify those patterns in ATM problems that signal instances when CPS performs better than FCFS, and those when it performs worse. We show that scenario representation affects the quality of MEBRA outputs. In particular, we find that the variable-length chromosome representation of aircraft scheduling sequence scenarios converges fast and finds all relevant risk patterns associated with the use of FCFS and CPS
    corecore