-
Leveraging LLM and Self-Supervised Training Models for Speech Recognition in Chinese Dialects: A Comparative Analysis
Authors:
Tianyi Xu,
Hongjie Chen,
Wang Qing,
Lv Hang,
Jian Kang,
Li Jie,
Zhennan Lin,
Yongxiang Li,
Xie Lei
Abstract:
Large-scale training corpora have significantly improved the performance of ASR models. Unfortunately, due to the relative scarcity of data, Chinese accents and dialects remain a challenge for most ASR models. Recent advancements in self-supervised learning have shown that self-supervised pre- training, combined with large language models (LLM), can effectively enhance ASR performance in low-resou…
▽ More
Large-scale training corpora have significantly improved the performance of ASR models. Unfortunately, due to the relative scarcity of data, Chinese accents and dialects remain a challenge for most ASR models. Recent advancements in self-supervised learning have shown that self-supervised pre- training, combined with large language models (LLM), can effectively enhance ASR performance in low-resource scenarios. We aim to investigate the effectiveness of this paradigm for Chinese dialects. Specifically, we pre-train a Data2vec2 model on 300,000 hours of unlabeled dialect and accented speech data and do alignment training on a supervised dataset of 40,000 hours. Then, we systematically examine the impact of various projectors and LLMs on Mandarin, dialect, and accented speech recognition performance under this paradigm. Our method achieved SOTA results on multiple dialect datasets, including Kespeech. We will open-source our work to promote reproducible research
△ Less
Submitted 27 May, 2025;
originally announced May 2025.
-
When SAM2 Meets Video Shadow and Mirror Detection
Authors:
Leiping Jie
Abstract:
As the successor to the Segment Anything Model (SAM), the Segment Anything Model 2 (SAM2) not only improves performance in image segmentation but also extends its capabilities to video segmentation. However, its effectiveness in segmenting rare objects that seldom appear in videos remains underexplored. In this study, we evaluate SAM2 on three distinct video segmentation tasks: Video Shadow Detect…
▽ More
As the successor to the Segment Anything Model (SAM), the Segment Anything Model 2 (SAM2) not only improves performance in image segmentation but also extends its capabilities to video segmentation. However, its effectiveness in segmenting rare objects that seldom appear in videos remains underexplored. In this study, we evaluate SAM2 on three distinct video segmentation tasks: Video Shadow Detection (VSD) and Video Mirror Detection (VMD). Specifically, we use ground truth point or mask prompts to initialize the first frame and then predict corresponding masks for subsequent frames. Experimental results show that SAM2's performance on these tasks is suboptimal, especially when point prompts are used, both quantitatively and qualitatively. Code is available at \url{https://github.com/LeipingJie/SAM2Video}
△ Less
Submitted 26 December, 2024;
originally announced December 2024.
-
Haptic VR Simulation for Surgery Procedures in Medical Training
Authors:
Lim Zheng Jie,
Kian Meng Yap
Abstract:
Traditional medical training faces challenges like ethical concerns, safety risks, and high costs. VR technology offers a promising solution but is limited by low complexity and lack of tactile feedback. This paper presents a cost-effective haptic VR surgery simulation which simulates realistic Kidney Transplant using commercial devices to enhance training authenticity and immersion. Trainees can…
▽ More
Traditional medical training faces challenges like ethical concerns, safety risks, and high costs. VR technology offers a promising solution but is limited by low complexity and lack of tactile feedback. This paper presents a cost-effective haptic VR surgery simulation which simulates realistic Kidney Transplant using commercial devices to enhance training authenticity and immersion. Trainees can conduct incision and anastomosis procedures using a haptic stylus device that provides tactile sensations. Results from the test with medical participants showed that haptic feedback positively enhances the VR medical training experience.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
3D-printed terahertz subwavelength dual-core fibers with dense channel-integration
Authors:
Haiyuan Ge,
Haisu Li,
Lu Jie,
Jianshuai Wang,
Yang Cao,
Shaghik Atakaramians,
Yandong Gong,
Guobin Ren,
Li Pei
Abstract:
Terahertz (THz) fiber that provides high-speed connections is an essential component in THz communication systems. The emerging space-division-multiplexing technology is expected to increase the transmission capacity of THz communications. A promising candidate to achieve that is integrating multiple channels in a compact THz multi-core fiber system. Here, we propose and experimentally demonstrate…
▽ More
Terahertz (THz) fiber that provides high-speed connections is an essential component in THz communication systems. The emerging space-division-multiplexing technology is expected to increase the transmission capacity of THz communications. A promising candidate to achieve that is integrating multiple channels in a compact THz multi-core fiber system. Here, we propose and experimentally demonstrate a THz subwavelength rectangular dielectric dual-core fiber structure, where two identical cores can be densely integrated, thanks to the polarization-maintaining feature of the rectangular fiber. Different configurations, including the placements, core-spacings, and polarization states of two fiber cores, are comprehensively investigated to improve channel isolation. Numerical simulations show that the fractional power in core of fiber mode has a dominant effect on inter-core coupling performance. Moreover, we design the core size (1 mm x 0.5 mm) slightly less than the WR5.1 waveguide (1.295 mm x 0.6475 mm) so that the fiber can be conveniently connected with the WR5.1 flange port with mode excitation efficiencies up to 62.8%. A cost-efficient dielectric 3D printing technique is employed for rapid fabrications of dual-core fibers and corresponding polymer flange structures that offer solid integration between the fiber samples and the WR5.1 port. Experimental measurements demonstrate that a 4-mm core-spacing (less than three times the operation wavelengths over 0.17-0.21 THz) supports robust dual-channel propagation with channel isolation values more than 15 dB, which are consistent with theoretical and numerical results. This work provides a densely integrated dual-core fiber system with low fabrication cost and practical connection to the WR5.1 flange, holding exciting potential for high-capacity THz space-division-multiplexing communication systems.
△ Less
Submitted 18 August, 2024;
originally announced August 2024.
-
LLM-jp: A Cross-organizational Project for the Research and Development of Fully Open Japanese LLMs
Authors:
LLM-jp,
:,
Akiko Aizawa,
Eiji Aramaki,
Bowen Chen,
Fei Cheng,
Hiroyuki Deguchi,
Rintaro Enomoto,
Kazuki Fujii,
Kensuke Fukumoto,
Takuya Fukushima,
Namgi Han,
Yuto Harada,
Chikara Hashimoto,
Tatsuya Hiraoka,
Shohei Hisada,
Sosuke Hosokawa,
Lu Jie,
Keisuke Kamata,
Teruhito Kanazawa,
Hiroki Kanezashi,
Hiroshi Kataoka,
Satoru Katsumata,
Daisuke Kawahara,
Seiya Kawano
, et al. (58 additional authors not shown)
Abstract:
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its…
▽ More
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its activities, and technical reports on the LLMs developed by LLM-jp. For the latest activities, visit https://llm-jp.nii.ac.jp/en/.
△ Less
Submitted 30 December, 2024; v1 submitted 4 July, 2024;
originally announced July 2024.
-
SuperEdge: Towards a Generalization Model for Self-Supervised Edge Detection
Authors:
Leng Kai,
Zhang Zhijie,
Liu Jie,
Zed Boukhers,
Sui Wei,
Cong Yang,
Li Zhijun
Abstract:
Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even in textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which are labor-intensive and subject to inconsistencies when acquired manually. In this work, we propose a novel self-supervised…
▽ More
Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even in textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which are labor-intensive and subject to inconsistencies when acquired manually. In this work, we propose a novel self-supervised approach for edge detection that employs a multi-level, multi-homography technique to transfer annotations from synthetic to real-world datasets. To fully leverage the generated edge annotations, we developed SuperEdge, a streamlined yet efficient model capable of concurrently extracting edges at pixel-level and object-level granularity. Thanks to self-supervised training, our method eliminates the dependency on manual annotated edge labels, thereby enhancing its generalizability across diverse datasets. Comparative evaluations reveal that SuperEdge advances edge detection, demonstrating improvements of 4.9% in ODS and 3.3% in OIS over the existing STEdge method on BIPEDv2.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Secure Software Development: Issues and Challenges
Authors:
Sam Wen Ping,
Jeffrey Cheok Jun Wah,
Lee Wen Jie,
Jeremy Bong Yong Han,
Saira Muzafar
Abstract:
In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digit…
▽ More
In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digitization of our lives proves to solve our human problems as well as improve quality of life but because it is digitalized, information and technology could be misused for other malicious gains. Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more. This issue can be corrected during the software development life cycle, integrating security across the development phases, and testing of the software is done early to reduce the number of vulnerabilities that might or might not heavily impact an organisation depending on the range of the attack. The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle where through planning and testing is done to maximise security while maintaining functionality of the system. In this paper, we are going to discuss the recent trends in security for system development as well as our predictions and suggestions to improve the current security practices in this industry.
△ Less
Submitted 18 November, 2023;
originally announced November 2023.
-
AdapterShadow: Adapting Segment Anything Model for Shadow Detection
Authors:
Leiping Jie,
Hui Zhang
Abstract:
Segment anything model (SAM) has shown its spectacular performance in segmenting universal objects, especially when elaborate prompts are provided. However, the drawback of SAM is twofold. On the first hand, it fails to segment specific targets, e.g., shadow images or lesions in medical images. On the other hand, manually specifying prompts is extremely time-consuming. To overcome the problems, we…
▽ More
Segment anything model (SAM) has shown its spectacular performance in segmenting universal objects, especially when elaborate prompts are provided. However, the drawback of SAM is twofold. On the first hand, it fails to segment specific targets, e.g., shadow images or lesions in medical images. On the other hand, manually specifying prompts is extremely time-consuming. To overcome the problems, we propose AdapterShadow, which adapts SAM model for shadow detection. To adapt SAM for shadow images, trainable adapters are inserted into the frozen image encoder of SAM, since the training of the full SAM model is both time and memory consuming. Moreover, we introduce a novel grid sampling method to generate dense point prompts, which helps to automatically segment shadows without any manual interventions. Extensive experiments are conducted on four widely used benchmark datasets to demonstrate the superior performance of our proposed method. Codes will are publicly available at https://github.com/LeipingJie/AdapterShadow.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Noncommutative Stein's maximal spherical means
Authors:
Li Wei,
Li Wenjuan,
Liu Jie,
Wu Lian
Abstract:
Based on a proper hypothesis on the noncommutative Fourier integral operators, we establish in this paper the strong-type $(p,p)$ (with $2\leq p\leq \infty$) estimates for the operator-valued Stein's maximal spherical means.
Based on a proper hypothesis on the noncommutative Fourier integral operators, we establish in this paper the strong-type $(p,p)$ (with $2\leq p\leq \infty$) estimates for the operator-valued Stein's maximal spherical means.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Bi-VLGM : Bi-Level Class-Severity-Aware Vision-Language Graph Matching for Text Guided Medical Image Segmentation
Authors:
Chen Wenting,
Liu Jie,
Yuan Yixuan
Abstract:
Medical reports with substantial information can be naturally complementary to medical images for computer vision tasks, and the modality gap between vision and language can be solved by vision-language matching (VLM). However, current vision-language models distort the intra-model relation and mainly include class information in prompt learning that is insufficient for segmentation task. In this…
▽ More
Medical reports with substantial information can be naturally complementary to medical images for computer vision tasks, and the modality gap between vision and language can be solved by vision-language matching (VLM). However, current vision-language models distort the intra-model relation and mainly include class information in prompt learning that is insufficient for segmentation task. In this paper, we introduce a Bi-level class-severity-aware Vision-Language Graph Matching (Bi-VLGM) for text guided medical image segmentation, composed of a word-level VLGM module and a sentence-level VLGM module, to exploit the class-severity-aware relation among visual-textual features. In word-level VLGM, to mitigate the distorted intra-modal relation during VLM, we reformulate VLM as graph matching problem and introduce a vision-language graph matching (VLGM) to exploit the high-order relation among visual-textual features. Then, we perform VLGM between the local features for each class region and class-aware prompts to bridge their gap. In sentence-level VLGM, to provide disease severity information for segmentation task, we introduce a severity-aware prompting to quantify the severity level of retinal lesion, and perform VLGM between the global features and the severity-aware prompts. By exploiting the relation between the local (global) and class (severity) features, the segmentation model can selectively learn the class-aware and severity-aware information to promote performance. Extensive experiments prove the effectiveness of our method and its superiority to existing methods. Source code is to be released.
△ Less
Submitted 20 May, 2023;
originally announced May 2023.
-
When SAM Meets Shadow Detection
Authors:
Leiping Jie,
Hui Zhang
Abstract:
As a promptable generic object segmentation model, segment anything model (SAM) has recently attracted significant attention, and also demonstrates its powerful performance. Nevertheless, it still meets its Waterloo when encountering several tasks, e.g., medical image segmentation, camouflaged object detection, etc. In this report, we try SAM on an unexplored popular task: shadow detection. Specif…
▽ More
As a promptable generic object segmentation model, segment anything model (SAM) has recently attracted significant attention, and also demonstrates its powerful performance. Nevertheless, it still meets its Waterloo when encountering several tasks, e.g., medical image segmentation, camouflaged object detection, etc. In this report, we try SAM on an unexplored popular task: shadow detection. Specifically, four benchmarks were chosen and evaluated with widely used metrics. The experimental results show that the performance for shadow detection using SAM is not satisfactory, especially when comparing with the elaborate models. Code is available at https://github.com/LeipingJie/SAMSh.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
A Prompt Log Analysis of Text-to-Image Generation Systems
Authors:
Yutong Xie,
Zhaoying Pan,
Jinge Ma,
Luo Jie,
Qiaozhu Mei
Abstract:
Recent developments in large language models (LLM) and generative AI have unleashed the astonishing capabilities of text-to-image generation systems to synthesize high-quality images that are faithful to a given reference text, known as a "prompt". These systems have immediately received lots of attention from researchers, creators, and common users. Despite the plenty of efforts to improve the ge…
▽ More
Recent developments in large language models (LLM) and generative AI have unleashed the astonishing capabilities of text-to-image generation systems to synthesize high-quality images that are faithful to a given reference text, known as a "prompt". These systems have immediately received lots of attention from researchers, creators, and common users. Despite the plenty of efforts to improve the generative models, there is limited work on understanding the information needs of the users of these systems at scale. We conduct the first comprehensive analysis of large-scale prompt logs collected from multiple text-to-image generation systems. Our work is analogous to analyzing the query logs of Web search engines, a line of work that has made critical contributions to the glory of the Web search industry and research. Compared with Web search queries, text-to-image prompts are significantly longer, often organized into special structures that consist of the subject, form, and intent of the generation tasks and present unique categories of information needs. Users make more edits within creation sessions, which present remarkable exploratory patterns. There is also a considerable gap between the user-input prompts and the captions of the images included in the open training data of the generative models. Our findings provide concrete implications on how to improve text-to-image generation systems for creation purposes.
△ Less
Submitted 16 March, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Strong decay properties of single heavy baryons $Λ_{Q}$, $Σ_{Q}$ and $Ω_{Q}$
Authors:
Guo-Liang Yu,
Yan Meng,
Zhen-Yu Li,
Zhi-Gang Wang,
Lu Jie
Abstract:
Motivated by recent progresses in experiments in searching for the $Ω_{c}$ baryons, we systematically analyze the strong decay behaviors of single heavy baryons $Λ_{Q}$, $Σ_{Q}$ and $Ω_{Q}$. The two-body strong decay properties of $S$-wave, $P$-wave and some $D$-wave states are studied with the $^{3}P_{0}$ model. The results support assigning the recently observed $Ω_{c}(3185)$ and $Ω_{c}(3327)$ a…
▽ More
Motivated by recent progresses in experiments in searching for the $Ω_{c}$ baryons, we systematically analyze the strong decay behaviors of single heavy baryons $Λ_{Q}$, $Σ_{Q}$ and $Ω_{Q}$. The two-body strong decay properties of $S$-wave, $P$-wave and some $D$-wave states are studied with the $^{3}P_{0}$ model. The results support assigning the recently observed $Ω_{c}(3185)$ and $Ω_{c}(3327)$ as the 2S($\frac{3}{2}^{+}$) and 1D($\frac{3}{2}^{+}$) states, respectively. In addition, the quantum numbers of many other experimentally observed baryons are also suggested according to their strong decays. Finally, some baryons which have good potentials to be observed in experiments are predicted and the possible decay channels for searching for these predicted states are also suggested.
△ Less
Submitted 6 May, 2023; v1 submitted 22 February, 2023;
originally announced February 2023.
-
TIDAL: Topology-Inferred Drug Addiction Learning
Authors:
Zhu Zailiang,
Dou Bozheng,
Cao Yukang,
Jiang Jian,
Zhu Yueying,
Chen Dong,
Feng Hongsong,
Liu Jie,
Zhang Bengong,
Zhou Tianshou,
Wei Guowei
Abstract:
Drug addiction or drug overdose is a global public health crisis, and the design of anti-addiction drugs remains a major challenge due to intricate mechanisms. Since experimental drug screening and optimization are too time-consuming and expensive, there is urgent need to develop innovative artificial intelligence (AI) methods for addressing the challenge. We tackle this challenge by topology-infe…
▽ More
Drug addiction or drug overdose is a global public health crisis, and the design of anti-addiction drugs remains a major challenge due to intricate mechanisms. Since experimental drug screening and optimization are too time-consuming and expensive, there is urgent need to develop innovative artificial intelligence (AI) methods for addressing the challenge. We tackle this challenge by topology-inferred drug addiction learning (TIDAL) built from integrating topological Laplacian, deep bidirectional transformer, and ensemble-assisted neural networks (EANNs). The topological Laplacian is a novel algebraic topology tool that embeds molecular topological invariants and algebraic invariants into its harmonic spectra and non-harmonic spectra, respectively. These invariants complement sequence information extracted from a bidirectional transformer. We validate the proposed TIDAL framework on 22 drug addiction related, 4 hERG, and 12 DAT datasets, showing that TIDAL is a state-of-the-art framework for the modeling and analysis of drug addiction data. We carry out cross-target analysis of the current drug addiction candidates to alert their side effects and identify their repurposing potentials, revealing drugmediated linear and bilinear target correlations. Finally, TIDAL is applied to shed light on relative efficacy, repurposing potential, and potential side effects of 12 existing anti-addiction medications. Our results suggest that TIDAL provides a new computational strategy for pressingly-needed anti-substance addiction drug development.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Is Complexity Required for Neural Network Pruning? A Case Study on Global Magnitude Pruning
Authors:
Manas Gupta,
Efe Camci,
Vishandi Rudy Keneta,
Abhishek Vaidyanathan,
Ritwik Kanodia,
Chuan-Sheng Foo,
Wu Min,
Lin Jie
Abstract:
Pruning neural networks has become popular in the last decade when it was shown that a large number of weights can be safely removed from modern neural networks without compromising accuracy. Numerous pruning methods have been proposed since, each claiming to be better than prior art, however, at the cost of increasingly complex pruning methodologies. These methodologies include utilizing importan…
▽ More
Pruning neural networks has become popular in the last decade when it was shown that a large number of weights can be safely removed from modern neural networks without compromising accuracy. Numerous pruning methods have been proposed since, each claiming to be better than prior art, however, at the cost of increasingly complex pruning methodologies. These methodologies include utilizing importance scores, getting feedback through back-propagation or having heuristics-based pruning rules amongst others. In this work, we question whether this pattern of introducing complexity is really necessary to achieve better pruning results. We benchmark these SOTA techniques against a simple pruning baseline, namely, Global Magnitude Pruning (Global MP), that ranks weights in order of their magnitudes and prunes the smallest ones. Surprisingly, we find that vanilla Global MP performs very well against the SOTA techniques. When considering sparsity-accuracy trade-off, Global MP performs better than all SOTA techniques at all sparsity ratios. When considering FLOPs-accuracy trade-off, some SOTA techniques outperform Global MP at lower sparsity ratios, however, Global MP starts performing well at high sparsity ratios and performs very well at extremely high sparsity ratios. Moreover, we find that a common issue that many pruning algorithms run into at high sparsity rates, namely, layer-collapse, can be easily fixed in Global MP. We explore why layer collapse occurs in networks and how it can be mitigated in Global MP by utilizing a technique called Minimum Threshold. We showcase the above findings on various models (WRN-28-8, ResNet-32, ResNet-50, MobileNet-V1 and FastGRNN) and multiple datasets (CIFAR-10, ImageNet and HAR-2). Code is available at https://github.com/manasgupta-1/GlobalMP.
△ Less
Submitted 7 January, 2024; v1 submitted 29 September, 2022;
originally announced September 2022.
-
LMBAO: A Landmark Map for Bundle Adjustment Odometry in LiDAR SLAM
Authors:
Letian Zhang,
Jinping Wang,
Lu Jie,
Nanjie Chen,
Xiaojun Tan,
Zhifei Duan
Abstract:
LiDAR odometry is one of the essential parts of LiDAR simultaneous localization and mapping (SLAM). However, existing LiDAR odometry tends to match a new scan simply iteratively with previous fixed-pose scans, gradually accumulating errors. Furthermore, as an effective joint optimization mechanism, bundle adjustment (BA) cannot be directly introduced into real-time odometry due to the intensive co…
▽ More
LiDAR odometry is one of the essential parts of LiDAR simultaneous localization and mapping (SLAM). However, existing LiDAR odometry tends to match a new scan simply iteratively with previous fixed-pose scans, gradually accumulating errors. Furthermore, as an effective joint optimization mechanism, bundle adjustment (BA) cannot be directly introduced into real-time odometry due to the intensive computation of large-scale global landmarks. Therefore, this letter designs a new strategy named a landmark map for bundle adjustment odometry (LMBAO) in LiDAR SLAM to solve these problems. First, BA-based odometry is further developed with an active landmark maintenance strategy for a more accurate local registration and avoiding cumulative errors. Specifically, this paper keeps entire stable landmarks on the map instead of just their feature points in the sliding window and deletes the landmarks according to their active grade. Next, the sliding window length is reduced, and marginalization is performed to retain the scans outside the window but corresponding to active landmarks on the map, greatly simplifying the computation and improving the real-time properties. In addition, experiments on three challenging datasets show that our algorithm achieves real-time performance in outdoor driving and outperforms state-of-the-art LiDAR SLAM algorithms, including Lego-LOAM and VLOM.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Evolution of phase transition in the finite-fugacity extended dimer model
Authors:
Yao Hongxu,
Li Jiaze,
Hou Jintao,
Lou Jie,
Chen Yan
Abstract:
We investigate the evolution of phase transition of the classical fully compact dimer model on the bipartite square lattice with second nearest bonds at finite temperatures. We use the numeric Monte Carlo method with the directed-loop algorithm to simulate the model. Our results show that the order of the phase transition depends on the fugacity of the second nearest bonds. We find that the phase…
▽ More
We investigate the evolution of phase transition of the classical fully compact dimer model on the bipartite square lattice with second nearest bonds at finite temperatures. We use the numeric Monte Carlo method with the directed-loop algorithm to simulate the model. Our results show that the order of the phase transition depends on the fugacity of the second nearest bonds. We find that the phase transition reduces from the Kosterlitz-Thouless transition to unconventional high-order phase transitions which feature the coexistence of properties Kosterliz-Thouless transition and the first-order phases transition simultaneously. As the fugacity increases further, phase transition evolves to the first-order phase transition. In addition, our results of dimer-dimer correlation functions and their corresponding structure factor functions computed by us show the evolution of decay correlation for different fugacity.
△ Less
Submitted 24 April, 2022;
originally announced April 2022.
-
Learning to Prune Deep Neural Networks via Reinforcement Learning
Authors:
Manas Gupta,
Siddharth Aravindan,
Aleksandra Kalisz,
Vijay Chandrasekhar,
Lin Jie
Abstract:
This paper proposes PuRL - a deep reinforcement learning (RL) based algorithm for pruning neural networks. Unlike current RL based model compression approaches where feedback is given only at the end of each episode to the agent, PuRL provides rewards at every pruning step. This enables PuRL to achieve sparsity and accuracy comparable to current state-of-the-art methods, while having a much shorte…
▽ More
This paper proposes PuRL - a deep reinforcement learning (RL) based algorithm for pruning neural networks. Unlike current RL based model compression approaches where feedback is given only at the end of each episode to the agent, PuRL provides rewards at every pruning step. This enables PuRL to achieve sparsity and accuracy comparable to current state-of-the-art methods, while having a much shorter training cycle. PuRL achieves more than 80% sparsity on the ResNet-50 model while retaining a Top-1 accuracy of 75.37% on the ImageNet dataset. Through our experiments we show that PuRL is also able to sparsify already efficient architectures like MobileNet-V2. In addition to performance characterisation experiments, we also provide a discussion and analysis of the various RL design choices that went into the tuning of the Markov Decision Process underlying PuRL. Lastly, we point out that PuRL is simple to use and can be easily adapted for various architectures.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification
Authors:
Eitan Rothberg,
Tingting Chen,
Luo Jie,
Hao Ji
Abstract:
Today's state-of-the-art image classifiers fail to correctly classify carefully manipulated adversarial images. In this work, we develop a new, localized adversarial attack that generates adversarial examples by imperceptibly altering the backgrounds of normal images. We first use this attack to highlight the unnecessary sensitivity of neural networks to changes in the background of an image, then…
▽ More
Today's state-of-the-art image classifiers fail to correctly classify carefully manipulated adversarial images. In this work, we develop a new, localized adversarial attack that generates adversarial examples by imperceptibly altering the backgrounds of normal images. We first use this attack to highlight the unnecessary sensitivity of neural networks to changes in the background of an image, then use it as part of a new training technique: localized adversarial training. By including locally adversarial images in the training set, we are able to create a classifier that suffers less loss than a non-adversarially trained counterpart model on both natural and adversarial inputs. The evaluation of our localized adversarial training algorithm on MNIST and CIFAR-10 datasets shows decreased accuracy loss on natural images, and increased robustness against adversarial inputs.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Search for $h_{c}\rightarrowπ^+π^-J/ψ$ via $ψ(3686)\rightarrow π^0π^+π^-J/ψ$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
S. Ahmed,
X. C. Ai,
M. Albrecht,
D. J. Ambrose,
A. Amoroso,
F. F. An,
Q. An,
J. Z. Bai,
O. Bakina,
R. Baldini Ferroli,
Y. Ban,
D. W. Bennett,
J. V. Bennett,
N. Berger,
M. Bertani,
D. Bettoni,
J. M. Bian,
F. Bianchi,
E. Boger,
I. Boyko,
R. A. Briere,
H. Cai
, et al. (393 additional authors not shown)
Abstract:
Using a data sample of $448.1\times10^6$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII, we perform search for the hadronic transition $h_c\rightarrowπ^+π^-J/ψ$ via $ψ(3686)\rightarrowπ^0h_c$. No signals of the transition are observed, and the upper limit on the product branching fraction $\mathcal{B}(ψ(3686)\rightarrowπ^0h_c)\mathcal{B}(h_c\rightarrowπ^+π^-J/ψ)$ at th…
▽ More
Using a data sample of $448.1\times10^6$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII, we perform search for the hadronic transition $h_c\rightarrowπ^+π^-J/ψ$ via $ψ(3686)\rightarrowπ^0h_c$. No signals of the transition are observed, and the upper limit on the product branching fraction $\mathcal{B}(ψ(3686)\rightarrowπ^0h_c)\mathcal{B}(h_c\rightarrowπ^+π^-J/ψ)$ at the 90% confidence level is determined to be $2.0\times10^{-6}$. This is the most stringent upper limit to date.
△ Less
Submitted 16 March, 2018; v1 submitted 10 January, 2018;
originally announced January 2018.
-
Orbital-angular-momentum mode-group multiplexed transmission over a graded-index ring-core fiber based on receive diversity and maximal ratio combining
Authors:
Junwei Zhang,
Guoxuan Zhu,
Liu Jie,
Xiong Wu,
Jianbo Zhu,
Cheng Du,
Wenyong Luo,
Siyuan Yu
Abstract:
An orbital-angular-momentum (OAM) mode-group multiplexing (MGM) scheme based on a graded-index ring-core fiber (GIRCF) is proposed, in which a single-input two-output (or receive diversity) architecture is designed for each MG channel and simple digital signal processing (DSP) is utilized to adaptively resist the mode partition noise resulting from random intra-group mode crosstalk. There is no ne…
▽ More
An orbital-angular-momentum (OAM) mode-group multiplexing (MGM) scheme based on a graded-index ring-core fiber (GIRCF) is proposed, in which a single-input two-output (or receive diversity) architecture is designed for each MG channel and simple digital signal processing (DSP) is utilized to adaptively resist the mode partition noise resulting from random intra-group mode crosstalk. There is no need of complex multiple-input multiple-output (MIMO) equalization in this scheme. Furthermore, the signal-to-noise ratio (SNR) of the received signals can be improved if a simple maximal ratio combining (MRC) technique is employed on the receiver side to efficiently take advantage of the diversity gain of receiver. Intensity-modulated direct-detection (IM-DD) systems transmitting three OAM mode groups with total 100-Gb/s discrete multi-tone (DMT) signals over a 1-km GIRCF and two OAM mode groups with total 40-Gb/s DMT signals over an 18-km GIRCF are experimentally demonstrated, respectively, to confirm the feasibility of our proposed OAM-MGM scheme.
△ Less
Submitted 9 November, 2017;
originally announced November 2017.
-
A new ignition hohlraum design for indirect-drive inertial confinement fusion
Authors:
Li Xin,
Wu Changshu,
Dai Zhensheng,
Zheng Wudi,
Gu Jianfa,
Gu Peijun,
Zou Shiyang,
Liu Jie,
Zhu Shaoping
Abstract:
In this paper, a six-cylinder-port hohlraum is proposed to provide high symmetry flux on capsule. It is designed to ignite a capsule with 1.2 mm radius in indirect-drive inertial confinement fusion (ICF) . Flux symmetry and laser energy are calculated by using three dimensional view factor method and laser energy balance in hohlraums. Plasma conditions are analyzed based on the two dimensional rad…
▽ More
In this paper, a six-cylinder-port hohlraum is proposed to provide high symmetry flux on capsule. It is designed to ignite a capsule with 1.2 mm radius in indirect-drive inertial confinement fusion (ICF) . Flux symmetry and laser energy are calculated by using three dimensional view factor method and laser energy balance in hohlraums. Plasma conditions are analyzed based on the two dimensional radiation-hydrodynamic simulations. There is no Ylm (l<=4) asymmetry in the six-cylinder-port hohlraum when the influences of laser entrance holes (LEHs) and laser spots cancel each other out with suitable target parameters. A radiation drive with 300 eV and good flux symmetry can be achieved with use of laser energy of 2.3 MJ and 500 TW peak power. According to the simulations, the electron temperature and the electron density on the wall of laser cone are high and low, respectively, which are similar to those of outer cones in the hohlraums on National Ignition Facility (NIF). And the laser intensity is also as low as those of NIF outer cones. So the backscattering due to laser plasma interaction (LPI) is considered to be negligible. The six-cyliner-port hohlraum could be superior to the traditional cylindrical hohlraum and the octahedral hohlraum in both higher symmetry and lower backscattering without supplementary technology at acceptable laser energy. It is undoubted that the hohlraum will add to the diversity of ICF approaches.
△ Less
Submitted 2 June, 2016;
originally announced June 2016.