49 research outputs found
ConcatPlexer: Additional Dim1 Batching for Faster ViTs
Transformers have demonstrated tremendous success not only in the natural
language processing (NLP) domain but also the field of computer vision,
igniting various creative approaches and applications. Yet, the superior
performance and modeling flexibility of transformers came with a severe
increase in computation costs, and hence several works have proposed methods to
reduce this burden. Inspired by a cost-cutting method originally proposed for
language models, Data Multiplexing (DataMUX), we propose a novel approach for
efficient visual recognition that employs additional dim1 batching (i.e.,
concatenation) that greatly improves the throughput with little compromise in
the accuracy. We first introduce a naive adaptation of DataMux for vision
models, Image Multiplexer, and devise novel components to overcome its
weaknesses, rendering our final model, ConcatPlexer, at the sweet spot between
inference speed and accuracy. The ConcatPlexer was trained on ImageNet1K and
CIFAR100 dataset and it achieved 23.5% less GFLOPs than ViT-B/16 with 69.5% and
83.4% validation accuracy, respectively
Cytohistological study of the leaf structures of Panax ginseng Meyer and Panax quinquefolius L.
AbstractBackgroundBoth Panax ginseng Meyer and Panax quinquefolius are obligate shade-loving plants whose natural habitats are broadleaved forests of Eastern Asia and North America. Panax species are easily damaged by photoinhibition when they are exposed to high temperatures or insufficient shade. In this study, a cytohistological study of the leaf structures of two of the most well-known Panax species was performed to better understand the physiological processes that limit photosynthesis.MethodsLeaves of ginseng plants grown in soil and hydroponic culture were sectioned for analysis. Leaf structures of both Panax species were observed using a light microscope, scanning electron microscope, and transmission electron microscope.ResultsThe mesostructure of both P. ginseng and P. quinquefolius frequently had one layer of noncylindrical palisade cells and three or four layers of spongy parenchymal cells. P. quinquefolius contained a similar number of stomata in the abaxial leaf surface but more tightly appressed enlarged grana stacks than P. ginseng contained. The adaxial surface of the epidermis in P. quinquefolius showed cuticle ridges with a pattern similar to that of P. ginseng.ConclusionThe anatomical leaf structure of both P. ginseng and P. quinquefolius shows that they are typical shade-loving sciophytes. Slight differences in chloroplast structure suggests that the two different species can be authenticated using transmission electron microscopy images, and light-resistant cultivar breeding can be performed via controlling photosynthesis efficiency
Targeted synthesis of two super-complex zeolites with embedded isoreticular structures
A novel structural coding approach combining structure solution, prediction, and the targeted synthesis of new zeolites with expanding complexity and embedded isoreticular structures was recently proposed. Using this approach, the structures of two new zeolites in the RHO family, PST-20 and PST-25, were predicted and synthesized. Herein, by extending this approach, the next two higher generation members of this family, PST-26 and PST-28, have been predicted and synthesized. These two zeolites have much larger unit cell volumes (422 655 Å3 and 614 912 Å3, respectively) than those of the lower generations. Their crystallization was confirmed by a combination of both powder X-ray and electron diffraction techniques. Aluminate and water concentrations in the synthetic mixture were found to be the two most critical factors influencing the structural expansion of embedded isoreticular zeolites under the synthetic conditions studied herein.PostprintPostprintPeer reviewe
Anti-Biofouling Features of Eco-Friendly Oleamide-PDMS Copolymers
The biofouling of marine organisms on a surface induces serious economic damage. One of the conventional anti-biofouling strategies is the use of toxic chemicals. In this study, a new eco-friendly oleamide-PDMS copolymer (OPC) is proposed for sustainable anti-biofouling and effective drag reduction. The anti-biofouling characteristics of the OPC are investigated using algal spores and mussels. The proposed OPC is found to inhibit the adhesion of algal spores and mussels. The slippery features of the fabricated OPC surfaces are examined by direct measurement of pressure drops in channel flows. The proposed OPC surface would be utilized in various industrial applications including marine vehicles and biomedical devices. © Copyright © 2020 American Chemical Society.1
Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected
Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process
The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information Security Requirements) proposed by the National Security Research Institute (NSRI) and established by the Telecommunications Technology Association (TTA) is being used. However, it is difficult to apply security requirements of TTAK.KO-12.0307 uniformly because of the reason that the characteristics of the ICS in each layer are different. There is also a limit to invest the security resources with equivalent priority for all requirements and ICS layers. It is still unresolved in the previous research studies which are related to information security resources, for example, Choi (2013), Ko et al. (2013), and Nah et al.’s (2016) studies. Therefore, this study tried to focus on what a top priority of information security requirements by the ICS in each layer is, using the analytic hierarchy process. As a result, we derived that the top priority requirement in the operation layer is “Identification Authentication Access Control,” in the control layer is “Event Response,” and in the field device layer is “Physical Interface Protection” with the highest importance. The results of this study can be utilized as a guideline for the security strategy and policy design by determining security requirements that should be prioritized in each layer of the ICS