176 research outputs found
Adaptive Window Pruning for Efficient Local Motion Deblurring
Local motion blur commonly occurs in real-world photography due to the mixing
between moving objects and stationary backgrounds during exposure. Existing
image deblurring methods predominantly focus on global deblurring,
inadvertently affecting the sharpness of backgrounds in locally blurred images
and wasting unnecessary computation on sharp pixels, especially for
high-resolution images. This paper aims to adaptively and efficiently restore
high-resolution locally blurred images. We propose a local motion deblurring
vision Transformer (LMD-ViT) built on adaptive window pruning Transformer
blocks (AdaWPT). To focus deblurring on local regions and reduce computation,
AdaWPT prunes unnecessary windows, only allowing the active windows to be
involved in the deblurring processes. The pruning operation relies on the
blurriness confidence predicted by a confidence predictor that is trained
end-to-end using a reconstruction loss with Gumbel-Softmax re-parameterization
and a pruning loss guided by annotated blur masks. Our method removes local
motion blur effectively without distorting sharp regions, demonstrated by its
exceptional perceptual and quantitative improvements compared to
state-of-the-art methods. In addition, our approach substantially reduces FLOPs
by 66% and achieves more than a twofold increase in inference speed compared to
Transformer-based deblurring methods. We will make our code and annotated blur
masks publicly available.Comment: 17 page
Development of Single Nucleotide Polymorphism Markers for the Wheat Curl Mite Resistance Gene Cmc4
Wheat curl mite (Aceria tosichella Keifer) is an important wheat (Triticum aestivum L. em. Thell.) pest in many wheat-growing regions worldwide. Mite feeding damage not only directly affects wheat yield, but A. tosichella also transmits Wheat streak mosaic virus (WSMV). Wheat resistance to A. tosichella, therefore, helps control WSMV. OK05312 (PI 670019) is an advanced breeding line released from Oklahoma that shows a high level of A. tosichella resistance. To map the gene(s) conditioning wheat resistance to A. tosichella in OK05312, a genetic linkage map was constructed using single nucleotide polymorphism (SNP) markers derived from genotyping-by-sequencing (GBS) and a population of 186 recombinant inbred lines (RILs) from the cross ‘Jerry’ (PI 632433)/OK05312. Seedlings of both parents and the RIL population were infested by A. tosichella Biotype 1 in greenhouse experiments. One major quantitative trait locus was identified on the short arm of chromosome 6D, which corresponds to the previously reported gene Cmc4 for A. tosichella resistance. This gene explained up to 71% of the phenotypic variation and was delimited in a 1.7-Mb (?3.3-cM) region by SNPs 370SNP7523 and 370SNP1639. We successfully converted 12 GBS-SNPs into Kompetitive allele specific polymerase chain reaction (KASP) markers. Two of them tightly linked to Cmc4 were validated to be highly diagnostic in a US winter wheat population and can be used for marker-assisted breeding for incorporation of Cmc4 into new wheat cultivars
A Two-Time Scale Decentralized Model Predictive Controller Based on Input and Output Model
A decentralized model predictive controller applicable for some systems which exhibit different dynamic characteristics in different channels was presented in this paper. These systems can be regarded as combinations of a fast model and a slow model, the response speeds of which are in two-time scale. Because most practical models used for control are obtained in the form of transfer function matrix by plant tests, a singular perturbation method was firstly used to separate the original transfer function matrix into two models in two-time scale. Then a decentralized model predictive controller was designed based on the two models derived from the original system. And the stability of the control method was proved. Simulations showed that the method was effective
Recommended from our members
BMQE system: a MQ equations system based on ergodic matrix
In this paper, we propose a multivariate quadratic (MQ) equation system based on ergodic matrix (EM) over a finite field with q elements (denoted as F^q). The system actually implicates a problem which is equivalent to the famous Graph Coloring problem, and therefore is NP complete for attackers. The complexity of bisectional multivariate quadratic equation (BMQE) system is determined by the number of the variables, of the equations and of the elements of Fq, which is denoted as n, m, and q, respectively. The paper shows that, if the number of the equations is larger or equal to twice the number of the variables, and qn is large enough, the system is complicated enough to prevent attacks from most of the existing attacking schemes
Recommended from our members
Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting
Key-aggregate searchable encryption (KASE) schemes support selective data sharing and keyword-based ciphertext searching by using the constant-size shared key and trapdoor, making these schemes attractive for resource-constrained users to store, share, and search encrypted data in public clouds. However, most previously proposed KASE schemes suffer from our proposed "off-line keyword guessing attack (KGA)" and some other weaknesses. Consequently, they fail to gain the keyword ciphertext indistinguishability and trapdoor indistinguishability, which are vital security goals of searchable encryption. Inspired by the relationship of public key encryption with keyword search (PEKS) and KASE, we design a new KASE scheme called key-aggregate searchable encryption with a designated server (dKASE). The dKASE scheme achieves our proposed keyword ciphertext indistinguishability against chosen keyword attack (KC-IND-CKA) and keyword trapdoor indistinguishability against keyword guessing attack (KT-IND-KGA) security models, where the latter model captures off-line KGA. Then, we extend the dKASE scheme to verifiable dKASE in multi-owner setting (dVKASEM) scheme. With dVKASEM, when multiple data owners authorize a user to access data, the user merely needs to store his single key and generate a single trapdoor to query these owners’ data. Besides, the adoption of the aggregate signature significantly reduces the overhead of verifying whether data has been tampered with. Performance analysis illustrates that our schemes are efficient
Recommended from our members
A secure and efficient data sharing and searching scheme in wireless sensor networks
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation
Gender-Related Differences in the Dysfunctional Resting Networks of Migraine Suffers
BACKGROUND: Migraine shows gender-specific incidence and has a higher prevalence in females. However, little is known about gender-related differences in dysfunctional brain organization, which may account for gender-specific vulnerability and characteristics of migraine. In this study, we considered gender-related differences in the topological property of resting functional networks. METHODOLOGY/PRINCIPAL FINDINGS: Data was obtained from 38 migraine patients (18 males and 20 females) and 38 healthy subjects (18 males and 20 females). We used the graph theory analysis, which becomes a powerful tool in investigating complex brain networks on a whole brain scale and could describe functional interactions between brain regions. Using this approach, we compared the brain functional networks between these two groups, and several network properties were investigated, such as small-worldness, network resilience, nodal centrality, and interregional connections. In our findings, these network characters were all disrupted in patients suffering from chronic migraine. More importantly, these functional damages in the migraine-affected brain had a skewed balance between males and females. In female patients, brain functional networks showed worse resilience, more regions exhibited decreased nodal centrality, and more functional connections revealed abnormalities than in male patients. CONCLUSIONS: These results indicated that migraine may have an additional influence on females and lead to more dysfunctional organization in their resting functional networks
Microstructure Abnormalities in Adolescents with Internet Addiction Disorder
BACKGROUND: Recent studies suggest that internet addiction disorder (IAD) is associated with structural abnormalities in brain gray matter. However, few studies have investigated the effects of internet addiction on the microstructural integrity of major neuronal fiber pathways, and almost no studies have assessed the microstructural changes with the duration of internet addiction. METHODOLOGY/PRINCIPAL FINDINGS: We investigated the morphology of the brain in adolescents with IAD (N = 18) using an optimized voxel-based morphometry (VBM) technique, and studied the white matter fractional anisotropy (FA) changes using the diffusion tensor imaging (DTI) method, linking these brain structural measures to the duration of IAD. We provided evidences demonstrating the multiple structural changes of the brain in IAD subjects. VBM results indicated the decreased gray matter volume in the bilateral dorsolateral prefrontal cortex (DLPFC), the supplementary motor area (SMA), the orbitofrontal cortex (OFC), the cerebellum and the left rostral ACC (rACC). DTI analysis revealed the enhanced FA value of the left posterior limb of the internal capsule (PLIC) and reduced FA value in the white matter within the right parahippocampal gyrus (PHG). Gray matter volumes of the DLPFC, rACC, SMA, and white matter FA changes of the PLIC were significantly correlated with the duration of internet addiction in the adolescents with IAD. CONCLUSIONS: Our results suggested that long-term internet addiction would result in brain structural alterations, which probably contributed to chronic dysfunction in subjects with IAD. The current study may shed further light on the potential brain effects of IAD
- …