14 research outputs found

    MacBehaviour: An R package for behavioural experimentation on large language models

    Full text link
    There has been increasing interest in investigating the behaviours of large language models (LLMs) and LLM-powered chatbots by treating an LLM as a participant in a psychological experiment. We therefore developed an R package called "MacBehaviour" that aims to interact with more than 60 language models in one package (e.g., OpenAI's GPT family, the Claude family, Gemini, Llama family, and open-source models) and streamline the experimental process of LLMs behaviour experiments. The package offers a comprehensive set of functions designed for LLM experiments, covering experiment design, stimuli presentation, model behaviour manipulation, logging response and token probability. To demonstrate the utility and effectiveness of "MacBehaviour," we conducted three validation experiments on three LLMs (GPT-3.5, Llama-2 7B, and Vicuna-1.5 13B) to replicate sound-gender association in LLMs. The results consistently showed that they exhibit human-like tendencies to infer gender from novel personal names based on their phonology, as previously demonstrated (Cai et al., 2023). In summary, "MacBehaviour" is an R package for machine behaviour studies which offers a user-friendly interface and comprehensive features to simplify and standardize the experimental process.Comment: 11 page

    Tricarbonyl M(I) (M = Re, 99mTc) complexes bearing acridine fluorophores : synthesis, characterization, DNA interaction studies and nuclear targeting

    Get PDF
    © The Royal Society of Chemistry 2010New pyrazolyl-diamine ligands with acridine derivatives at the 4-position of the pyrazolyl ring were synthesized and characterized (L1 and L2). Coordination towards the fac-[M(CO)3]+ (M = Re, 99mTc) led to complexes fac-[M(CO)3(κ3-L)] (L = L1: M = Re1, Tc1; L = L2: M = Re2, Tc2). The interaction of the novel pyrazolyl-diamine ligands (L1 and L2) and rhenium(I) complexes (Re1 and Re2) with calf thymus DNA (CT-DNA) was investigated by a variety of techniques, namely UV-visible , fluorescence spectroscopy and circular and linear dichroism . Compounds L1 and Re1 have moderate affinity to CT-DNA and bind to DNA by intercalation, while L2 and Re2 have a poor affinity for CT-DNA. Moreover, LD measurements showed that L1 and Re1 act as perfect intercalators . By confocal fluorescence microscopy we found that L1 and Re1 internalize and localize in the nucleus of B16F1 murine melanoma cells . The congener Tc1 complex also targets the cell nucleus exhibiting a time-dependent cellular uptake and a fast and high nuclear internalization (67.2% of activity after 30 min). Plasmid DNA studies have shown that Tc1 converts supercoiled (sc) puc19 DNA to the open circular (oc) form.Teresa Esteves and Sofia Gama thank the FCT for a doctoral and postdoctoral research grants (SFRH/BD/29154/2006 and SFRH/BPD/29564/2006, respectively). COST Action D39 is also acknowledge. The QITMS instrument was acquired with the support of the Programa Nacional de Reequipamento Científico (Contract>REDE/1503/REM/2005-ITN) of Fundação para a Ciência e a Tecnologia and is part of RNEM - Rede Nacional de Espectrometria de Massa

    Perfect contrast visual cryptography scheme

    No full text
    A perfect contrast visual cryptography scheme with the best contrast based on both the perfect black visual cryptography scheme(PBVCS) and the non-perfect black visual cryptography scheme(NPBVCS) was proposed.The proposed scheme applied simple Boolean operations to keep the consistency between the reconstructed image and the original secret image without pixel expansion and was easy to run

    Distance estimating algorithm based on gradient neighbors in wireless sensor networks

    No full text
    A modified distance-estimating algorithm DV-GNN was presented to improve the precision of indirect dis- tance measuring in wireless sensor networks, theoretical basis was analyzed, and implementing process was given. With the help of gradient neighbors, the resolving power of distance estimating was increased from effective radio range to the distance interval between nodes. Compared with the algorithm DV-hop, under the preservation of the low cost and over- head, the measuring accuracy was improved largely. The analysis and simulation validated that the method was quite ef- fective in wireless sensor networks with dense nodes

    Data outsourcing authentication model based on authenticated data structures for cloud computing

    No full text
    The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed

    CoMa-mSCTP: a connectivity management scheme based on mSCTP in mobile environments

    No full text
    An mSCTP-based connectivity management scheme,CoMa-mSCTP,was proposed to realize the integration of bandwidth aggregation and mobility supporting at transport layer.The major path management functions were defined and the path handoff procedure was introduced.A transport path subset selection policy based on wide-sense path defini-tion was proposed.The simulations on the effect of the throughput improvement,the path subset selection policy and the mobility supporting were complemented respectively.The simulation results show that CoMa-mSCTP can realize effi-cient integration of bandwidth aggregation and mobility and the application-based path subset selection policy has ap-parent performance advantages

    Research of STR multicast key management protocol based on bilinear pairing in ad hoc network

    No full text
    STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3-ary key tree,the improved STR protocol which is called PSTR(bilinear pairing-based STR) was proposed.The key generation process and six basic sub-protocols were included in the protocol.Through proving the bilinear form of PSTR key tree,the security of the PSTR in computation was proved.Finally PSTR were compared with STR through performance analysis,the results of which show that: PSTR is more efficient than STR in the communication cost and the computation cost as well as the storage requirement.Therefore,PSTR is a novel,reliable group key management protocol,and is well-suited for Ad hoc networks
    corecore