1,890 research outputs found

    Feature Selective Networks for Object Detection

    Full text link
    Objects for detection usually have distinct characteristics in different sub-regions and different aspect ratios. However, in prevalent two-stage object detection methods, Region-of-Interest (RoI) features are extracted by RoI pooling with little emphasis on these translation-variant feature components. We present feature selective networks to reform the feature representations of RoIs by exploiting their disparities among sub-regions and aspect ratios. Our network produces the sub-region attention bank and aspect ratio attention bank for the whole image. The RoI-based sub-region attention map and aspect ratio attention map are selectively pooled from the banks, and then used to refine the original RoI features for RoI classification. Equipped with a light-weight detection subnetwork, our network gets a consistent boost in detection performance based on general ConvNet backbones (ResNet-101, GoogLeNet and VGG-16). Without bells and whistles, our detectors equipped with ResNet-101 achieve more than 3% mAP improvement compared to counterparts on PASCAL VOC 2007, PASCAL VOC 2012 and MS COCO datasets

    The Association of Parent-Child Communication With Internet Addiction in Left-Behind Children in China: A Cross-Sectional Study

    Get PDF
    Objective: Internet addiction has emerged as a growing concern worldwide. This study aimed to compare the prevalence of Internet addiction between left-behind children (LBC) and non-left-behind children (non-LBC), and explore the role of paternal and maternal parent-child communication on LBC. Methods: We conducted a cross-sectional survey in rural areas in Anhui, China. The complete data were available from 699 LBC and 740 non-LBC. Multivariable logistic regression was used to examine 1) whether LBC were more likely to develop Internet addiction, and 2) the association between parent-child communication and Internet addiction among LBC. Results: LBC had a higher likelihood to report Internet addiction when compared to non-LBC (OR = 2.03, 95%CI = 1.43–2.88, p \u3c 0.001). Among LBC, parent-child communication (both mother-child and father-child) was protective factor for children’s Internet addiction. The role of mother-child communication played well among male LBC. Conclusions: The lack of parental supervision may lead to Internet addiction. It is highly recommended for migrant parents to improve the quality of communication with their children. Also, gender-matching effects should be considered in the relationship between children’s behavior and parental factors

    Peroxisomal regulation of redox homeostasis and adipocyte metabolism

    Get PDF
    Peroxisomes are ubiquitous cellular organelles required for specific pathways of fatty acid oxidation and lipid synthesis, and until recently their functions in adipocytes have not been well appreciated. Importantly, peroxisomes host many oxygen-consumption reactions and play a major role in generation and detoxification of reactive oxygen species (ROS) and reactive nitrogen species (RNS), influencing whole cell redox status. Here, we review recent progress in peroxisomal functions in lipid metabolism as related to ROS/RNS metabolism and discuss the roles of peroxisomal redox homeostasis in adipogenesis and adipocyte metabolism. We provide a framework for understanding redox regulation of peroxisomal functions in adipocytes together with testable hypotheses for developing therapies for obesity and the related metabolic diseases

    Density functional theory study of mechanism of forming a spiro-Si-heterocyclic ring compound from Me2SiSi: and acetaldehyde

    Get PDF
    AbstractThe H2SiSi: and its derivatives (X2SiSi:, X=H, Me, F, Cl, Br, Ph, Ar…) is a new species. Its cycloaddition reaction is a new area for the study of silylene chemistry. The mechanism of the cycloaddition reaction between singlet Me2SiSi: and acetaldehyde has been investigated with the B3LYP/6-31G∗ method in article. From the potential energy profile, it could be predicted that the reaction has one dominant reaction pathway. The reaction rule presented is that the two reactants firstly form a four-membered Si-heterocyclic ring silylene through the [2+2] cycloaddition reaction. Because of the 3p unoccupied orbital of Si: atom in the four-membered Si-heterocyclic ring silylene and the π orbital of acetaldehyde forming a π→p donor–acceptor bond, the four-membered Si-heterocyclic ring silylene further combines with acetaldehyde to form an intermediate. Because the Si atom in intermediate happens sp3 hybridization after transition state, then, intermediate isomerizes to a spiro-Si-heterocyclic ring compound via a transition state

    Catalytic Decomposition of Ozone by CuO/MnO2-Performance, Kinetics and Application Analysis

    Get PDF
    AbstractOzone as a major ambient gas pollutant needs to be removed for many indoor environments due to its adverse health effect. The objective of this study is to investigate the ozone removal performance of a Hopcalite catalyst CuO/MnO2 under different operation conditions. The effect of relative humidity (15-80%), temperature (30-160°C) and ozone concentration (200-2000ppb) was experimentally tested. Then the catalyst was coated on fiberglass media for application. The influence of preparation method was also investigated. Finally, the application analysis of such material is discussed for building environment control situation

    Security enhancement for NOMA-UAV networks

    Get PDF
    Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users. However, the security of NOMA-UAV systems remains a challenge due to the line-of-sight air-to-ground channels and higher transmission power of weaker users in NOMA. In this paper, we propose two schemes to guarantee the secure transmission in UAV-NOMA networks. When only one user requires secure transmission, we derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users. This disrupts the eavesdropping towards the secure user effectively. When multiple users require secure transmission, we further take the advantage of beamforming via multiple antennas at the UAV to guarantee their secure transmission. Due to the non-convexity of this problem, we convert it into a convex one for an iterative solution by using the second order cone programming. Finally, simulation results are provided to show the effectiveness of the proposed scheme
    • …
    corecore