11,185 research outputs found

    Fused Text Segmentation Networks for Multi-oriented Scene Text Detection

    Full text link
    In this paper, we introduce a novel end-end framework for multi-oriented scene text detection from an instance-aware semantic segmentation perspective. We present Fused Text Segmentation Networks, which combine multi-level features during the feature extracting as text instance may rely on finer feature expression compared to general objects. It detects and segments the text instance jointly and simultaneously, leveraging merits from both semantic segmentation task and region proposal based object detection task. Not involving any extra pipelines, our approach surpasses the current state of the art on multi-oriented scene text detection benchmarks: ICDAR2015 Incidental Scene Text and MSRA-TD500 reaching Hmean 84.1% and 82.0% respectively. Morever, we report a baseline on total-text containing curved text which suggests effectiveness of the proposed approach.Comment: Accepted by ICPR201

    Dynamical fermion mass generation and exciton spectra in graphene

    Full text link
    The Coulomb interaction between massless Dirac fermions may induce dynamical chiral symmetry breaking by forming excitonic pairs in clean graphene, leading to semimetal-insulator transition. If the Dirac fermions have zero bare mass, an exact continuous chiral symmetry is dynamically broken and thus there are massless Goldstone excitons. If the Dirac fermions have a small bare mass, an approximate continuous chiral symmetry is dynamically broken and the resultant Goldstone type excitons become massive, which is analogous to what happens in QCD. In this paper, after solving Dyson-Schwinger gap equation in the presence of a small bare fermion mass, we found a remarkable reduction of the critical Coulomb interaction strength for excitonic pair formation and a strong enhancement of dynamical fermion mass. We then calculate the masses of Goldstone type excitons using the SVZ sum rule method and operator product expansion technique developed in QCD and find that the exciton masses are much larger than bare fermion mass but smaller than dynamical fermion mass gap. We also study the spin susceptibilities and estimate the masses of non-Goldstone type excitons using the same tools.Comment: 12 pages, 1 figur

    Quantifying SO<sub>2</sub> oxidation pathways to atmospheric sulfate using stable sulfur and oxygen isotopes: laboratory simulation and field observation

    Get PDF
    The formation of secondary sulfate in the atmosphere remains controversial, and it is an urgent need to seek a new method to quantify different sulfate formation pathways. Thus, SO2 and PM2.5 samples were collected from 4 to 22 December 2019 in the Nanjing region. Sulfur and oxygen isotopic compositions were synchronously measured to study the contribution of SO2 homogeneous and heterogeneous oxidation to sulfate. Meanwhile, the correlation of δ18O values between H2O and sulfate from SO2 oxidation by H2O2 and Fe3+ / O2 was simulatively investigated in the laboratory. Based on isotope mass equilibrium equations, the ratios of different SO2 oxidation pathways were quantified. The results showed that secondary sulfate constituted higher than 80 % of total sulfate in PM2.5 during the sampling period. Laboratory simulation experiments indicated that the δ18O value of sulfate was linearly dependent on the δ18O value of water, and the slopes of linear curves for SO2 oxidation by H2O2 and Fe3+ / O2 were 0.43 and 0.65, respectively. The secondary sulfate in PM2.5 was mainly ascribed to SO2 homogeneous oxidation by OH radicals and heterogeneous oxidation by H2O2 and Fe3+ / O2. SO2 heterogeneous oxidation was generally dominant during sulfate formation, and SO2 oxidation by H2O2 predominated in SO2 heterogeneous oxidation reactions, with an average ratio around 54.6 %. This study provided an insight into precisely evaluating sulfate formation by combining stable sulfur and oxygen isotopes.</p

    Noise-BERT: A Unified Perturbation-Robust Framework with Noise Alignment Pre-training for Noisy Slot Filling Task

    Full text link
    In a realistic dialogue system, the input information from users is often subject to various types of input perturbations, which affects the slot-filling task. Although rule-based data augmentation methods have achieved satisfactory results, they fail to exhibit the desired generalization when faced with unknown noise disturbances. In this study, we address the challenges posed by input perturbations in slot filling by proposing Noise-BERT, a unified Perturbation-Robust Framework with Noise Alignment Pre-training. Our framework incorporates two Noise Alignment Pre-training tasks: Slot Masked Prediction and Sentence Noisiness Discrimination, aiming to guide the pre-trained language model in capturing accurate slot information and noise distribution. During fine-tuning, we employ a contrastive learning loss to enhance the semantic representation of entities and labels. Additionally, we introduce an adversarial attack training strategy to improve the model's robustness. Experimental results demonstrate the superiority of our proposed approach over state-of-the-art models, and further analysis confirms its effectiveness and generalization ability.Comment: Accepted by ICASSP 202

    Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator

    Full text link
    DNN accelerators have been widely deployed in many scenarios to speed up the inference process and reduce the energy consumption. One big concern about the usage of the accelerators is the confidentiality of the deployed models: model inference execution on the accelerators could leak side-channel information, which enables an adversary to preciously recover the model details. Such model extraction attacks can not only compromise the intellectual property of DNN models, but also facilitate some adversarial attacks. Although previous works have demonstrated a number of side-channel techniques to extract models from DNN accelerators, they are not practical for two reasons. (1) They only target simplified accelerator implementations, which have limited practicality in the real world. (2) They require heavy human analysis and domain knowledge. To overcome these limitations, this paper presents Mercury, the first automated remote side-channel attack against the off-the-shelf Nvidia DNN accelerator. The key insight of Mercury is to model the side-channel extraction process as a sequence-to-sequence problem. The adversary can leverage a time-to-digital converter (TDC) to remotely collect the power trace of the target model's inference. Then he uses a learning model to automatically recover the architecture details of the victim model from the power trace without any prior knowledge. The adversary can further use the attention mechanism to localize the leakage points that contribute most to the attack. Evaluation results indicate that Mercury can keep the error rate of model extraction below 1%

    Determination of beam incidence conditions based on the analysis of laser interference patterns

    Get PDF
    Beam incidence conditions in the formation of two-, three- and four-beam laser interference patterns are presented and studied in this paper. In a laser interference lithography (LIL) process, it is of importance to determine and control beam incidence conditions based on the analysis of laser interference patterns for system calibration as any slight change of incident angles or intensities of beams will introduce significant variations of periods and contrasts of interference patterns. In this work, interference patterns were captured by a He-Ne laser interference system under different incidence conditions, the pattern period measurement was achieved by cross-correlation with, and the pattern contrast was calculated by image processing. Subsequently, the incident angles and intensities of beams were determined based on the analysis of spatial distributions of interfering beams. As a consequence, the relationship between the beam incidence conditions and interference patterns is revealed. The proposed method is useful for the calibration of LIL processes and for reverse engineering applications

    Sea Ice Extraction via Remote Sensed Imagery: Algorithms, Datasets, Applications and Challenges

    Full text link
    The deep learning, which is a dominating technique in artificial intelligence, has completely changed the image understanding over the past decade. As a consequence, the sea ice extraction (SIE) problem has reached a new era. We present a comprehensive review of four important aspects of SIE, including algorithms, datasets, applications, and the future trends. Our review focuses on researches published from 2016 to the present, with a specific focus on deep learning-based approaches in the last five years. We divided all relegated algorithms into 3 categories, including classical image segmentation approach, machine learning-based approach and deep learning-based methods. We reviewed the accessible ice datasets including SAR-based datasets, the optical-based datasets and others. The applications are presented in 4 aspects including climate research, navigation, geographic information systems (GIS) production and others. It also provides insightful observations and inspiring future research directions.Comment: 24 pages, 6 figure
    • …
    corecore