The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-taile...The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space.展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ...For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach.展开更多
This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white...This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful.展开更多
Scaffold hopping refers to computer-aided screening for active compounds with different structures against the same receptor to enrich privileged scaffolds,which is a topic of high interest in organic and medicinal ch...Scaffold hopping refers to computer-aided screening for active compounds with different structures against the same receptor to enrich privileged scaffolds,which is a topic of high interest in organic and medicinal chemistry.However,most approaches cannot efficiently predict the potency level of candidates after scaffold hopping.Herein,we identified potent PDE5 inhibitors with a novel scaffold via a free energy perturbation(FEP)-guided scaffold-hopping strategy,and FEP shows great advantages to precisely predict the theoretical binding potenciesΔGFEPbetween ligands and their target,which were more consistent with the experimental binding potenciesΔGEXP(the mean absolute deviations|ΔGFEP-ΔGEXP|<2 kcal/mol)than thoseΔGMM-PBSAorΔGMM-GBSApredicted by the MM-PBSA or MM-GBSA method.Lead L12 had an IC_(50) of 8.7 nmol/L and exhibited a different binding pattern in its crystal structure with PDE5 from the famous starting drug tadalafil.Our work provides the first report via the FEPguided scaffold hopping strategy for potent inhibitor discovery with a novel scaffold,implying that it will have a variety of future applications in rational molecular design and drug discovery.展开更多
Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stali...Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stalinist slander.By Stalinism,I am referring to the narrative which was born from the bureaucratic degeneration of the Soviet Union,after the failure of working class to consolidate and capture state power in Hungary,Germany,Italy and other western countries which was materially in an advanced position than early 20th Century Russia.It was also the political ideology which was born as a result of civil far,famine,pandemic and the invasion of the newly formed Russian worker's state by more than fifteen foreign countries with colonial objectives.Trotsky's role in creating the Red Army,which was a different to that of a standing army and supporters of Trotsky in the Left Opposition were not only vilified and charged with false accusations but violently purged.In this paper I have highlighted how Stalinism marked a revolution against the revolution of 1917 and how Trotsky continuously struggled against the bureaucratic despotism over the working class in post 1917 Russia.展开更多
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo...Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.展开更多
The primary way to achieve thread-level parallelism on the Sunwayhigh-performance multicore processor is to use the OpenMP programming technique.To address the problem of low parallelism efficiency caused by slow acce...The primary way to achieve thread-level parallelism on the Sunwayhigh-performance multicore processor is to use the OpenMP programming technique.To address the problem of low parallelism efficiency caused by slow accessto thread private variables in the compilation of Sunway OpenMP programs, thispaper proposes a thread private variable access technique based on privilegedinstructions. The privileged instruction-based thread-private variable access techniquecentralizes the implementation of thread-private variables at the compilerlevel, eliminating the model switching overhead of invoking OS core processingand improving the speed of accessing thread-private variables. On the Sunway1621 server platform, NPB3.3-OMP and SPEC OMP2012 achieved 6.2% and6.8% running efficiency gains, respectively. The results show that the techniquesproposed in this paper can provide technical support for giving full play to theadvantages of Sunway’s high-performance multi-core processors.展开更多
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ...Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.展开更多
基金supported in part by the National Natural Science Foundation of China(62006141)the National Key R&D Program of China(2021YFC3300203)+1 种基金the Overseas Innovation Team Project of the“20 Regulations for New Universities”Funding Program of Jinan(2021GXRC073)the Excellent Youth Scholars Program of Shandong Province(2022HWYQ-048).
文摘The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space.
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.
基金This paper was supported by the National Natural Sci- ence Foundation of China (Gront Nos. 61175037, 6122831M), US Natural Science Foundation CNS-1205664, Special Innovation Project on Speech of Anhui Province (11010202192), Project from Anhui Science and Technol- ogy Agency (1106c0805008) and Youth Creative Project of University of Science and Technology of China.
文摘For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach.
文摘This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful.
基金supported by Natural Science Foundation of China(21877134,81872727,22077143,21702238,82003576,and 81703341)Guangzhou Science and Technology Project(The People’s Livelihood Programs for Science and Technology,201803010075,China)+1 种基金Science Foundation of Guangzhou City(201904020023,China)Fundamental Research Funds for Hainan University(KYQD(ZR)-21031,China)。
文摘Scaffold hopping refers to computer-aided screening for active compounds with different structures against the same receptor to enrich privileged scaffolds,which is a topic of high interest in organic and medicinal chemistry.However,most approaches cannot efficiently predict the potency level of candidates after scaffold hopping.Herein,we identified potent PDE5 inhibitors with a novel scaffold via a free energy perturbation(FEP)-guided scaffold-hopping strategy,and FEP shows great advantages to precisely predict the theoretical binding potenciesΔGFEPbetween ligands and their target,which were more consistent with the experimental binding potenciesΔGEXP(the mean absolute deviations|ΔGFEP-ΔGEXP|<2 kcal/mol)than thoseΔGMM-PBSAorΔGMM-GBSApredicted by the MM-PBSA or MM-GBSA method.Lead L12 had an IC_(50) of 8.7 nmol/L and exhibited a different binding pattern in its crystal structure with PDE5 from the famous starting drug tadalafil.Our work provides the first report via the FEPguided scaffold hopping strategy for potent inhibitor discovery with a novel scaffold,implying that it will have a variety of future applications in rational molecular design and drug discovery.
文摘Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stalinist slander.By Stalinism,I am referring to the narrative which was born from the bureaucratic degeneration of the Soviet Union,after the failure of working class to consolidate and capture state power in Hungary,Germany,Italy and other western countries which was materially in an advanced position than early 20th Century Russia.It was also the political ideology which was born as a result of civil far,famine,pandemic and the invasion of the newly formed Russian worker's state by more than fifteen foreign countries with colonial objectives.Trotsky's role in creating the Red Army,which was a different to that of a standing army and supporters of Trotsky in the Left Opposition were not only vilified and charged with false accusations but violently purged.In this paper I have highlighted how Stalinism marked a revolution against the revolution of 1917 and how Trotsky continuously struggled against the bureaucratic despotism over the working class in post 1917 Russia.
基金the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No.R-2021-150.
文摘Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.
文摘The primary way to achieve thread-level parallelism on the Sunwayhigh-performance multicore processor is to use the OpenMP programming technique.To address the problem of low parallelism efficiency caused by slow accessto thread private variables in the compilation of Sunway OpenMP programs, thispaper proposes a thread private variable access technique based on privilegedinstructions. The privileged instruction-based thread-private variable access techniquecentralizes the implementation of thread-private variables at the compilerlevel, eliminating the model switching overhead of invoking OS core processingand improving the speed of accessing thread-private variables. On the Sunway1621 server platform, NPB3.3-OMP and SPEC OMP2012 achieved 6.2% and6.8% running efficiency gains, respectively. The results show that the techniquesproposed in this paper can provide technical support for giving full play to theadvantages of Sunway’s high-performance multi-core processors.
文摘Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.