首页 > 最新文献

Scholarly Horizons University of Minnesota Morris Undergraduate Journal最新文献

英文 中文
Deep-Learning Realtime Upsampling Techniques in Video Games 视频游戏中的深度学习实时上采样技术
Pub Date : 2023-06-23 DOI: 10.61366/2576-2176.1127
Biruk Mengistu
This paper addresses the challenge of keeping up with the ever-increasing graphical complexity of video games and introduces a deep-learning approach to mitigating it. As games get more and more demanding in terms of their graphics, it becomes increasingly difficult to maintain high-quality images while also ensuring good performance. This is where deep learning super sampling (DLSS) comes in. The paper explains how DLSS works, including the use of convolutional autoencoder neural networks and various other techniques and technologies. It also covers how the network is trained and optimized, as well as how it incorporates temporal antialiasing and frame generation techniques to enhance the final image quality. We will also discuss the effectiveness of these techniques as well as compare their performance to running at native resolutions.
本文讨论了如何跟上电子游戏不断增加的图形复杂性,并介绍了一种深度学习方法来缓解这一挑战。随着游戏对图像的要求越来越高,在保证良好性能的同时保持高质量图像变得越来越困难。这就是深度学习超级抽样(DLSS)的用武之地。本文解释了DLSS的工作原理,包括卷积自编码器神经网络和各种其他技术和技术的使用。它还涵盖了如何训练和优化网络,以及它如何结合时间抗混叠和帧生成技术来增强最终图像质量。我们还将讨论这些技术的有效性,并将它们的性能与在本机分辨率下运行进行比较。
{"title":"Deep-Learning Realtime Upsampling Techniques in Video Games","authors":"Biruk Mengistu","doi":"10.61366/2576-2176.1127","DOIUrl":"https://doi.org/10.61366/2576-2176.1127","url":null,"abstract":"This paper addresses the challenge of keeping up with the ever-increasing graphical complexity of video games and introduces a deep-learning approach to mitigating it. As games get more and more demanding in terms of their graphics, it becomes increasingly difficult to maintain high-quality images while also ensuring good performance. This is where deep learning super sampling (DLSS) comes in. The paper explains how DLSS works, including the use of convolutional autoencoder neural networks and various other techniques and technologies. It also covers how the network is trained and optimized, as well as how it incorporates temporal antialiasing and frame generation techniques to enhance the final image quality. We will also discuss the effectiveness of these techniques as well as compare their performance to running at native resolutions.","PeriodicalId":498881,"journal":{"name":"Scholarly Horizons University of Minnesota Morris Undergraduate Journal","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136084995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Possible Attacks on Match-In-Database Fingerprint Authentication 匹配指纹认证可能的攻击
Pub Date : 2023-06-23 DOI: 10.61366/2576-2176.1129
Jadyn Sondrol
Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep the systems more secure.
生物识别技术被用来保护用户数据的隐私。有许多不同的生物识别系统,都处理用户的独特属性,如指纹、面部、视网膜、虹膜和语音识别。指纹生物识别系统,特别是数据库匹配系统,已成为目前应用最广泛的生物识别系统。为了使这些系统更加安全,使用威胁模型来识别潜在的攻击和减轻攻击的方法。介绍了一种数据库匹配指纹认证系统的威胁模型。它还描述了这些系统遇到的一些最常见的攻击,以及一些可能的缓解措施,可以适应以保持系统更安全。
{"title":"Possible Attacks on Match-In-Database Fingerprint Authentication","authors":"Jadyn Sondrol","doi":"10.61366/2576-2176.1129","DOIUrl":"https://doi.org/10.61366/2576-2176.1129","url":null,"abstract":"Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep the systems more secure.","PeriodicalId":498881,"journal":{"name":"Scholarly Horizons University of Minnesota Morris Undergraduate Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136084994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Methods Used in Face Swapping 探索换脸的方法
Pub Date : 2023-03-09 DOI: 10.61366/2576-2176.1120
Joshua Eklund
Face swapping involves replacing the face in one image (the target) with a face in a different image (the source) while maintaining the pose and expression of the target face. Previous methods of face swapping required extensive computer power and man hours. As such, new methods are being developed that are quicker, less resource intensive, and more accessible to the non-expert. This paper provides background information on key methods used for face swapping and outlines three recently developed approaches: one based on generative adversarial networks, one based on linear 3D morphable models, and one based on encoder-decoders.
换脸是指将一张图像(目标)中的脸替换为另一张图像(源)中的脸,同时保持目标脸的姿势和表情。以前的换脸方法需要大量的计算机和人力。因此,正在开发的新方法更快,资源密集程度更低,对非专业人员来说更容易获得。本文提供了用于人脸交换的关键方法的背景信息,并概述了最近发展的三种方法:一种基于生成对抗网络,一种基于线性三维变形模型,一种基于编码器-解码器。
{"title":"Exploring Methods Used in Face Swapping","authors":"Joshua Eklund","doi":"10.61366/2576-2176.1120","DOIUrl":"https://doi.org/10.61366/2576-2176.1120","url":null,"abstract":"Face swapping involves replacing the face in one image (the target) with a face in a different image (the source) while maintaining the pose and expression of the target face. Previous methods of face swapping required extensive computer power and man hours. As such, new methods are being developed that are quicker, less resource intensive, and more accessible to the non-expert. This paper provides background information on key methods used for face swapping and outlines three recently developed approaches: one based on generative adversarial networks, one based on linear 3D morphable models, and one based on encoder-decoders.","PeriodicalId":498881,"journal":{"name":"Scholarly Horizons University of Minnesota Morris Undergraduate Journal","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136180043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Scholarly Horizons University of Minnesota Morris Undergraduate Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1