99 research outputs found

    Gamifying Math Education using Object Detection

    Full text link
    Manipulatives used in the right way help improve mathematical concepts leading to better learning outcomes. In this paper, we present a phygital (physical + digital) curriculum inspired teaching system for kids aged 5-8 to learn geometry using shape tile manipulatives. Combining smaller shapes to form larger ones is an important skill kids learn early on which requires shape tiles to be placed close to each other in the play area. This introduces a challenge of oriented object detection for densely packed objects with arbitrary orientations. Leveraging simulated data for neural network training and light-weight mobile architectures, we enable our system to understand user interactions and provide real-time audiovisual feedback. Experimental results show that our network runs real-time with high precision/recall on consumer devices, thereby providing a consistent and enjoyable learning experience

    Adaptive Graduated Non-Convexity for Pose Graph Optimization

    Full text link
    We present a novel approach to robust pose graph optimization based on Graduated Non-Convexity (GNC). Unlike traditional GNC-based methods, the proposed approach employs an adaptive shape function using B-spline to optimize the shape of the robust kernel. This aims to reduce GNC iterations, boosting computational speed without compromising accuracy. When integrated with the open-source riSAM algorithm, the method demonstrates enhanced efficiency across diverse datasets. Accompanying open-source code aims to encourage further research in this area. https://github.com/SNU-DLLAB/AGNC-PGOComment: 4 pages, 3 figures. Accepted for the workshop on Robotic Perception and Mapping(ROPEM): Frontier Vision & Learning Techniques, organized at the 2023 International Conference on Intelligent Robots and Systems (IROS

    Unsupervised augmentation optimization for few-shot medical image segmentation

    Full text link
    The augmentation parameters matter to few-shot semantic segmentation since they directly affect the training outcome by feeding the networks with varying perturbated samples. However, searching optimal augmentation parameters for few-shot segmentation models without annotations is a challenge that current methods fail to address. In this paper, we first propose a framework to determine the ``optimal'' parameters without human annotations by solving a distribution-matching problem between the intra-instance and intra-class similarity distribution, with the intra-instance similarity describing the similarity between the original sample of a particular anatomy and its augmented ones and the intra-class similarity representing the similarity between the selected sample and the others in the same class. Extensive experiments demonstrate the superiority of our optimized augmentation in boosting few-shot segmentation models. We greatly improve the top competing method by 1.27\% and 1.11\% on Abd-MRI and Abd-CT datasets, respectively, and even achieve a significant improvement for SSL-ALP on the left kidney by 3.39\% on the Abd-CT dataset

    ROBUST RECURSIVE IDENTIFICATION OF HAMMERSTEIN MODELS BASED ON WEISZFALD ALGORITHM

    Get PDF
    The Hammerstein models can accurately describe a wide variety of nonlinear systems (chemical process, power electronics, electrical drives, sticky control valves). Algorithms of identification depend, among other, on the assumption about the nature of stochastic disturbance. Practical research shows that disturbances, owing the presence of outliers, have a non-Gaussian distribution. In such case it is a common practice to use the robust statistics. In the paper, by analysis of the least favourable probability density, it is shown that the robust (Huber`s) estimation criterion can be presented as a sum of non-overlapping - norm and - norm criteria. By using a Weiszfald algorithm - norm criterion is converted to - norm criterion. So, the weighted - norm criterion is obtained for the identification. The main contributions of the paper are: (i) Presentation of the Huber`s criterion as a sum of - norm and - norm criteria; (ii) Using the Weiszfald algorithm  – norm criterion is converted to a weighted - norm criterion; (iii) Weighted extended least squares in which robustness is included through weighting coefficients are derived for NARMAX (nonlinear autoregressive moving average with exogenous variable) . The illustration of the behaviour of the proposed algorithm is presented through simulations

    Robust T-Loss for Medical Image Segmentation

    Full text link
    This paper presents a new robust loss function, the T-Loss, for medical image segmentation. The proposed loss is based on the negative log-likelihood of the Student-t distribution and can effectively handle outliers in the data by controlling its sensitivity with a single parameter. This parameter is updated during the backpropagation process, eliminating the need for additional computation or prior information about the level and spread of noisy labels. Our experiments show that the T-Loss outperforms traditional loss functions in terms of dice scores on two public medical datasets for skin lesion and lung segmentation. We also demonstrate the ability of T-Loss to handle different types of simulated label noise, resembling human error. Our results provide strong evidence that the T-Loss is a promising alternative for medical image segmentation where high levels of noise or outliers in the dataset are a typical phenomenon in practice. The project website can be found at https://robust-tloss.github.ioComment: Early accepted to MICCAI 202

    Resource efficient boosting method for IoT security monitoring.

    Get PDF
    Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT). However, these methods can be computationally expensive for resource constraint IoT devices. This paper proposes an optimized resource efficient ML method that can detect various attacks on IoT devices. It utilizes Light Gradient Boosting Machine (LGBM). The performance of this approach was evaluated against four realistic IoT benchmark datasets. Experimental results show that the proposed method can effectively detect attacks on IoT devices with limited resources, and outperforms the state of the art techniques
    corecore