69 research outputs found
Dynamical versus Bayesian Phase Transitions in a Toy Model of Superposition
We investigate phase transitions in a Toy Model of Superposition (TMS) using
Singular Learning Theory (SLT). We derive a closed formula for the theoretical
loss and, in the case of two hidden dimensions, discover that regular -gons
are critical points. We present supporting theory indicating that the local
learning coefficient (a geometric invariant) of these -gons determines phase
transitions in the Bayesian posterior as a function of training sample size. We
then show empirically that the same -gon critical points also determine the
behavior of SGD training. The picture that emerges adds evidence to the
conjecture that the SGD learning trajectory is subject to a sequential learning
mechanism. Specifically, we find that the learning process in TMS, be it
through SGD or Bayesian learning, can be characterized by a journey through
parameter space from regions of high loss and low complexity to regions of low
loss and high complexity
Proton Heating in Solar Wind Compressible Turbulence with Collisions between Counter-propagating Waves
Magnetohydronamic turbulence is believed to play a crucial role in heating
the laboratorial, space, and astrophysical plasmas. However, the precise
connection between the turbulent fluctuations and the particle kinetics has not
yet been established. Here we present clear evidence of plasma turbulence
heating based on diagnosed wave features and proton velocity distributions from
solar wind measurements by the Wind spacecraft. For the first time, we can
report the simultaneous observation of counter-propagating magnetohydrodynamic
waves in the solar wind turbulence. Different from the traditional paradigm
with counter-propagating Alfv\'en waves, anti-sunward Alfv\'en waves (AWs) are
encountered by sunward slow magnetosonic waves (SMWs) in this new type of solar
wind compressible turbulence. The counter-propagating AWs and SWs correspond
respectively to the dominant and sub-dominant populations of the imbalanced
Els\"asser variables. Nonlinear interactions between the AWs and SMWs are
inferred from the non-orthogonality between the possible oscillation direction
of one wave and the possible propagation direction of the other. The associated
protons are revealed to exhibit bi-directional asymmetric beams in their
velocity distributions: sunward beams appearing in short and narrow patterns
and anti-sunward broad extended tails. It is suggested that multiple types of
wave-particle interactions, i.e., cyclotron and Landau resonances with AWs and
SMWs at kinetic scales, are taking place to jointly heat the protons
perpendicularly and parallel
Nonperturbative photon light front wave functions from a contact interaction model
We propose a method to calculate the light front wave functions
(LFWFs) of photon at low-virtuality, i.e., the light front amplitude of
at low , based on a light front projection
approach. We exemplify this method using a contact interaction model within
Dyson-Schwinger equations formalism and obtain the nonperturbative photon
LFWFs. In this case, we find the nonperturbative effects are encoded
in the enhanced quark mass and a dressing function of covariant quark-photon
vertex, as compared to the leading order quantum electrodynamics photon
LFWFs. We then use nonperturbative-effect modified photon
LFWFs to study the inclusive deep inelastic scattering HERA data in the
framework of the color dipole model. The results demonstrate that the
theoretical description of data at low can be significantly improved once
the nonperturbative corrections are included in the photon LFWFs.Comment: 11 pages, 4 figure
Secure Comparison Under Ideal/Real Simulation Paradigm
Secure comparison problem, also known as Yao's Millionaires' problem, was introduced by Andrew Yao in 1982. It is a fundamental problem in secure multi-party computation. In this problem, two millionaires are interested in determining the richer one between them without revealing their actual wealth. Yao's millionaires' problem is a classic and fundamental problem in cryptography. The design of secure and efficient solutions to this problem provides effective building blocks for secure multi-party computation. However, only a few of the solutions in the literature have succeeded in resisting attacks of malicious adversaries, and none of these solutions has been proven secure in malicious model under ideal/real simulation paradigm. In this paper, we propose two secure solutions to Yao's millionaires' problem in the malicious model. One solution has full simulation security, and the other solution achieves one-sided simulation security. Both protocols are only based on symmetric cryptography. Experimental results indicate that our protocols can securely solve Yao's millionaires' problem with high efficiency and scalability. Furthermore, our solutions show better performance than the state-of-the-art solutions in terms of complexity and security. Specifically, our solutions only require symmetric operations at most to achieve simulation-based security against malicious adversaries, where denotes the universal set and denotes the size of
DISC-FinLLM: A Chinese Financial Large Language Model based on Multiple Experts Fine-tuning
We propose Multiple Experts Fine-tuning Framework to build a financial large
language model (LLM), DISC-FinLLM. Our methodology improves general LLMs by
endowing them with multi-turn question answering abilities, domain text
processing capabilities, mathematical computation skills, and
retrieval-enhanced generation capabilities. We build a financial
instruction-tuning dataset named DISC-FIN-SFT, including instruction samples of
four categories (consulting, NLP tasks, computing and retrieval-augmented
generation). Evaluations conducted on multiple benchmarks demonstrate that our
model performs better than baseline models in various financial scenarios.
Further resources can be found at https://github.com/FudanDISC/DISC-FinLLM.Comment: 18 pages, 13 figures, 7 table
Machine Learning Methods in Real-World Studies of Cardiovascular Disease
Objective: Cardiovascular disease (CVD) is one of the leading causes of death worldwide, and answers are urgently needed regarding many aspects, particularly risk identification and prognosis prediction. Real-world studies with large numbers of observations provide an important basis for CVD research but are constrained by high dimensionality, and missing or unstructured data. Machine learning (ML) methods, including a variety of supervised and unsupervised algorithms, are useful for data governance, and are effective for high dimensional data analysis and imputation in real-world studies. This article reviews the theory, strengths and limitations, and applications of several commonly used ML methods in the CVD field, to provide a reference for further application. Methods: This article introduces the origin, purpose, theory, advantages and limitations, and applications of multiple commonly used ML algorithms, including hierarchical and k-means clustering, principal component analysis, random forest, support vector machine, and neural networks. An example uses a random forest on the Systolic Blood Pressure Intervention Trial (SPRINT) data to demonstrate the process and main results of ML application in CVD. Conclusion: ML methods are effective tools for producing real-world evidence to support clinical decisions and meet clinical needs. This review explains the principles of multiple ML methods in plain language, to provide a reference for further application. Future research is warranted to develop accurate ensemble learning methods for wide application in the medical field
Hepatitis C Virus Protects Human B Lymphocytes from Fas-Mediated Apoptosis via E2-CD81 Engagement
HCV infection is often associated with B-cell regulatory control disturbance and delayed appearance of neutralizing antibodies. CD81 is a cellular receptor for HCV and can bind to HCV envelope protein 2 (E2). CD81 also participates to form a B cell costimulatory complex. To investigate whether HCV influences B cell activation and immune function through E2 -CD81 engagement, here, human Burkitt's lymphoma cell line Raji cells and primary human B lymphocytes (PHB) were treated with HCV E2 protein and cell culture produced HCV particles (HCVcc), and then the related cell phenotypes were assayed. The results showed that both E2 and HCVcc triggered phosphorylation of IκBα, enhanced the expression of anti-apoptosis Bcl-2 family proteins, and protected Raji cells and PHB cells from Fas-mediated death. In addition, both E2 protein and HCVcc increased the expression of costimulatory molecules CD80, CD86 and CD81 itself, and decreased the expression of complement receptor CD21. The effects were dependent on E2-CD81 interaction on the cell surface, since CD81-silenced Raji cells did not respond to both treatments; and an E2 mutant that lose the CD81 binding activity, could not trigger the responses of both Raji cells and PHB cells. The effects were not associated with HCV replication in cells, for HCV pseudoparticle (HCVpp) and HCVcc failed to infect Raji cells. Hence, E2-CD81 engagement may contribute to HCV-associated B cell lymphoproliferative disorders and insufficient neutralizing antibody production
Adaptive Finite-Time Command Filtered Fault-Tolerant Control for Uncertain Spacecraft with Prescribed Performance
In this paper, an adaptive finite-time fault-tolerant control scheme is proposed for the attitude stabilization of rigid spacecrafts. A first-order command filter is presented at the second step of the backstepping design to approximate the derivative of the virtual control, such that the singularity problem caused by the differentiation of the virtual control is avoided. Then, an adaptive fuzzy finite-time backstepping controller is developed to achieve the finite-time attitude stabilization subject to inertia uncertainty, external disturbance, actuator saturation, and faults. Through using an error transformation, the prescribed performance boundary is incorporated into the controller design to guarantee the prescribed performance of the system output. Numerical simulations demonstrate the effectiveness of the proposed scheme
- …