103,890 research outputs found

    Crumpling wires in two dimensions

    Full text link
    An energy-minimal simulation is proposed to study the patterns and mechanical properties of elastically crumpled wires in two dimensions. We varied the bending rigidity and stretching modulus to measure the energy allocation, size-mass exponent, and the stiffness exponent. The mass exponent is shown to be universal at value DM=1.33D_{M}=1.33. We also found that the stiffness exponent α=−0.25\alpha =-0.25 is universal, but varies with the plasticity parameters ss and θp\theta_{p}. These numerical findings agree excellently with the experimental results

    Semantic bottleneck for computer vision tasks

    Full text link
    This paper introduces a novel method for the representation of images that is semantic by nature, addressing the question of computation intelligibility in computer vision tasks. More specifically, our proposition is to introduce what we call a semantic bottleneck in the processing pipeline, which is a crossing point in which the representation of the image is entirely expressed with natural language , while retaining the efficiency of numerical representations. We show that our approach is able to generate semantic representations that give state-of-the-art results on semantic content-based image retrieval and also perform very well on image classification tasks. Intelligibility is evaluated through user centered experiments for failure detection

    Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks

    Full text link
    This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance system utilizing face detectors. We show that existing adversarial perturbation methods are not effective to perform such an attack, especially when there are multiple faces in the input image. This is because the adversarial perturbation specifically generated for one face may disrupt the adversarial perturbation for another face. In this paper, we call this problem the Instance Perturbation Interference (IPI) problem. This IPI problem is addressed by studying the relationship between the deep neural network receptive field and the adversarial perturbation. As such, we propose the Localized Instance Perturbation (LIP) that uses adversarial perturbation constrained to the Effective Receptive Field (ERF) of a target to perform the attack. Experiment results show the LIP method massively outperforms existing adversarial perturbation generation methods -- often by a factor of 2 to 10.Comment: to appear ECCV 2018 (accepted version

    Mössbauer diffractometry on polycrystalline (57)Fe3Al

    Get PDF
    A Mossbauer powder diffractometer was used to measure diffraction patterns from polycrystalline foils of (Fe3Al)-Fe-57. The intensities of Bragg diffractions were measured as a function of the energy of the incident photon. The bee fundamental diffractions showed large changes in intensity as the incident energy was tuned through the nuclear resonances. These variations of diffraction intensity with incident energy were calculated with reasonable success using a kinematical theory of diffraction that included effects of coherent interference between x-ray Rayleigh scattering and, more importantly for these samples, Mossbauer scattering from nuclei having different hyperfine magnetic fields
    • …
    corecore