1,045 research outputs found

    Fast Deep Multi-patch Hierarchical Network for Nonhomogeneous Image Dehazing

    Full text link
    Recently, CNN based end-to-end deep learning methods achieve superiority in Image Dehazing but they tend to fail drastically in Non-homogeneous dehazing. Apart from that, existing popular Multi-scale approaches are runtime intensive and memory inefficient. In this context, we proposed a fast Deep Multi-patch Hierarchical Network to restore Non-homogeneous hazed images by aggregating features from multiple image patches from different spatial sections of the hazed image with fewer number of network parameters. Our proposed method is quite robust for different environments with various density of the haze or fog in the scene and very lightweight as the total size of the model is around 21.7 MB. It also provides faster runtime compared to current multi-scale methods with an average runtime of 0.0145s to process 1200x1600 HD quality image. Finally, we show the superiority of this network on Dense Haze Removal to other state-of-the-art models.Comment: CVPR Workshops Proceedings 202

    Carroll fermions in two dimensions

    Full text link
    Carroll symmetry is a very powerful characteristic of generic null surfaces, as it replaces the usual Poincar\'e algebra with a vanishing speed of light version thereof. These symmetries have found universal applications in the physics of null manifolds as they arise in diverse situations ranging from black hole horizons to condensed matter systems with vanishing Fermi velocities. In this work, we concentrate on fermions living on two dimensional (2d2d) null manifolds and explore the Carroll invariant structure of the associated field theories in a systematic manner. The free massless versions of these fermions are shown to exhibit 2d2d Conformal Carroll or equivalently the 3d3d Bondi-Metzner-Sachs (BMS) algebra as their symmetry. Due to the degenerate nature of the manifold, we show the presence of two distinct classes of Clifford Algebras. We also find that in two dimensions there are two distinct fermion actions. We study discrete and continuous symmetries of both theories, and quantize them using highest weight representation of the vacuum. We also discuss how the symmetries of 2d2d free fermion CFTs can be continually deformed by infinite boosts or degenerate linear transformations on coordinates, leading to the corresponding BMS invariant theory at singular points.Comment: 37 pages, no figure

    Global phase space analysis for a class of single scalar field bouncing solutions in general relativity

    Full text link
    We carry out a compact phase space analysis of a non-canonical scalar field theory whose generic form of the Lagrangian is F(X)V(ϕ)F(X)-V(\phi) within general relativity. In particular, we focus on the power law and exponential potentials of the scalar field. A global dynamical system formulation particularly suitable for investigating nonsingular bouncing cosmologies is used to carry out the analysis. Global dynamical system techniques help us to extract generic conclusions for a wide range of initial conditions. The main aim of this work is to analyze the generic behavior of nonsingular bouncing solutions using global dynamical system tools. We show that for a noncanonical scalar field with exponential potential, nonsingular bouncing cosmologies are a generic feature and stable in past and future directions. However, the same cannot be concluded for power law potential due to the non-existence of global past or future attractors. Our analysis is intended to show how global phase space formulations can be utilized to address questions about the stability of bouncing solutions.Comment: 21 pages, 8 figure

    Realisation of a novel functionally redundant actuation system for a railway track-switch

    Get PDF
    This paper focuses on modelling, control, realisation and performance analysis of a full-scale demonstrator for a novel railway track switch. For over a century, railway track switches (or points) have been allowing trains to safely change between routes. As they are safety-critical elements of the rail network, when they fail, the signalling system will prevent trains from using that route. This means poor reliability (or lack of availability) leads to significant delays and costs; hence there is huge interest from researchers and engineers in improving the overall reliability of track switches. This paper presents new results, which represent a meaningful first step toward a revolution in the way track switches are actuated. A “REPOINT-Light” railway track switch demonstrator is introduced which uses a new concept of locking to allow redundant actuation with three actuator bearers operating under closed-loop feedback control. The new concept, its control system and its mechanical viability are tested in experiments at the Great Central Railway in the UK. To support the design of the actuators and the control system, a dynamic simulation model is developed by co-simulation involving Simulink and Simpack. The experimental results presented are used to validate the models and the paper discusses how the models themselves are used as the vehicle for the design of feedback controllers. Virtual testing of the controllers in simulation is a vital step prior to the implementation and deployment of the controllers in the demonstrator switch. The major contribution of this work is demonstrating, for the first time at full scale on a real-world track switch, that it is possible to use one-out-of-three actuator redundancy to provide fault-tolerant operation of railway track switch

    Visa Accessible Card (VAC) for specially abled users

    Get PDF
    The present disclosure relates to a VISA Accessible Cards (VAC) (202) which are designed for easy and secure transactions. The VAC (202) has limited alphabetic characters (102) as the card number, presented in Braille (104) and regular characters for both specially abled people and normal people. The card may not have other details like CVV or expiry date. The card information, such as PAN, expiry date, and CVV may be mapped to the VAC characters and stored securely in a cloud server. Users may choose different engravings on front of the card for easy identification. The card may accompanied by the VAC app, which requires biometric authentication for all transactions
    corecore