-
Rethinking Attention Gated with Hybrid Dual Pyramid Transformer-CNN for Generalized Segmentation in Medical Imaging
Authors:
Fares Bougourzi,
Fadi Dornaika,
Abdelmalik Taleb-Ahmed,
Vinh Truong Hoang
Abstract:
Inspired by the success of Transformers in Computer vision, Transformers have been widely investigated for medical imaging segmentation. However, most of Transformer architecture are using the recent transformer architectures as encoder or as parallel encoder with the CNN encoder. In this paper, we introduce a novel hybrid CNN-Transformer segmentation architecture (PAG-TransYnet) designed for effi…
▽ More
Inspired by the success of Transformers in Computer vision, Transformers have been widely investigated for medical imaging segmentation. However, most of Transformer architecture are using the recent transformer architectures as encoder or as parallel encoder with the CNN encoder. In this paper, we introduce a novel hybrid CNN-Transformer segmentation architecture (PAG-TransYnet) designed for efficiently building a strong CNN-Transformer encoder. Our approach exploits attention gates within a Dual Pyramid hybrid encoder. The contributions of this methodology can be summarized into three key aspects: (i) the utilization of Pyramid input for highlighting the prominent features at different scales, (ii) the incorporation of a PVT transformer to capture long-range dependencies across various resolutions, and (iii) the implementation of a Dual-Attention Gate mechanism for effectively fusing prominent features from both CNN and Transformer branches. Through comprehensive evaluation across different segmentation tasks including: abdominal multi-organs segmentation, infection segmentation (Covid-19 and Bone Metastasis), microscopic tissues segmentation (Gland and Nucleus). The proposed approach demonstrates state-of-the-art performance and exhibits remarkable generalization capabilities. This research represents a significant advancement towards addressing the pressing need for efficient and adaptable segmentation solutions in medical imaging applications.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
A Survey on Structure-Preserving Graph Transformers
Authors:
Van Thuy Hoang,
O-Joun Lee
Abstract:
The transformer architecture has shown remarkable success in various domains, such as natural language processing and computer vision. When it comes to graph learning, transformers are required not only to capture the interactions between pairs of nodes but also to preserve graph structures connoting the underlying relations and proximity between them, showing the expressive power to capture diffe…
▽ More
The transformer architecture has shown remarkable success in various domains, such as natural language processing and computer vision. When it comes to graph learning, transformers are required not only to capture the interactions between pairs of nodes but also to preserve graph structures connoting the underlying relations and proximity between them, showing the expressive power to capture different graph structures. Accordingly, various structure-preserving graph transformers have been proposed and widely used for various tasks, such as graph-level tasks in bioinformatics and chemoinformatics. However, strategies related to graph structure preservation have not been well organized and systematized in the literature. In this paper, we provide a comprehensive overview of structure-preserving graph transformers and generalize these methods from the perspective of their design objective. First, we divide strategies into four main groups: node feature modulation, context node sampling, graph rewriting, and transformer architecture improvements. We then further divide the strategies according to the coverage and goals of graph structure preservation. Furthermore, we also discuss challenges and future directions for graph transformer models to preserve the graph structure and understand the nature of graphs.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Towards Efficient Communication and Secure Federated Recommendation System via Low-rank Training
Authors:
Ngoc-Hieu Nguyen,
Tuan-Anh Nguyen,
Tuan Nguyen,
Vu Tien Hoang,
Dung D. Le,
Kok-Seng Wong
Abstract:
Federated Recommendation (FedRec) systems have emerged as a solution to safeguard users' data in response to growing regulatory concerns. However, one of the major challenges in these systems lies in the communication costs that arise from the need to transmit neural network models between user devices and a central server. Prior approaches to these challenges often lead to issues such as computat…
▽ More
Federated Recommendation (FedRec) systems have emerged as a solution to safeguard users' data in response to growing regulatory concerns. However, one of the major challenges in these systems lies in the communication costs that arise from the need to transmit neural network models between user devices and a central server. Prior approaches to these challenges often lead to issues such as computational overheads, model specificity constraints, and compatibility issues with secure aggregation protocols. In response, we propose a novel framework, called Correlated Low-rank Structure (CoLR), which leverages the concept of adjusting lightweight trainable parameters while kee** most parameters frozen. Our approach substantially reduces communication overheads without introducing additional computational burdens. Critically, our framework remains fully compatible with secure aggregation protocols, including the robust use of Homomorphic Encryption. The approach resulted in a reduction of up to 93.75% in payload size, with only an approximate 8% decrease in recommendation performance across datasets. Code for reproducing our experiments can be found at https://github.com/NNHieu/CoLR-FedRec.
△ Less
Submitted 28 February, 2024; v1 submitted 8 January, 2024;
originally announced January 2024.
-
Mitigating Degree Biases in Message Passing Mechanism by Utilizing Community Structures
Authors:
Van Thuy Hoang,
O-Joun Lee
Abstract:
This study utilizes community structures to address node degree biases in message-passing (MP) via learnable graph augmentations and novel graph transformers. Recent augmentation-based methods showed that MP neural networks often perform poorly on low-degree nodes, leading to degree biases due to a lack of messages reaching low-degree nodes. Despite their success, most methods use heuristic or uni…
▽ More
This study utilizes community structures to address node degree biases in message-passing (MP) via learnable graph augmentations and novel graph transformers. Recent augmentation-based methods showed that MP neural networks often perform poorly on low-degree nodes, leading to degree biases due to a lack of messages reaching low-degree nodes. Despite their success, most methods use heuristic or uniform random augmentations, which are non-differentiable and may not always generate valuable edges for learning representations. In this paper, we propose Community-aware Graph Transformers, namely CGT, to learn degree-unbiased representations based on learnable augmentations and graph transformers by extracting within community structures. We first design a learnable graph augmentation to generate more within-community edges connecting low-degree nodes through edge perturbation. Second, we propose an improved self-attention to learn underlying proximity and the roles of nodes within the community. Third, we propose a self-supervised learning task that could learn the representations to preserve the global graph structure and regularize the graph augmentations. Extensive experiments on various benchmark datasets showed CGT outperforms state-of-the-art baselines and significantly improves the node degree biases. The source code is available at https://github.com/NSLab-CUK/Community-aware-Graph-Transformer.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Companion Animal Disease Diagnostics based on Literal-aware Medical Knowledge Graph Representation Learning
Authors:
Van Thuy Hoang,
Sang Thanh Nguyen,
Sangmyeong Lee,
Jooho Lee,
Luong Vuong Nguyen,
O-Joun Lee
Abstract:
Knowledge graph (KG) embedding has been used to benefit the diagnosis of animal diseases by analyzing electronic medical records (EMRs), such as notes and veterinary records. However, learning representations to capture entities and relations with literal information in KGs is challenging as the KGs show heterogeneous properties and various types of literal information. Meanwhile, the existing met…
▽ More
Knowledge graph (KG) embedding has been used to benefit the diagnosis of animal diseases by analyzing electronic medical records (EMRs), such as notes and veterinary records. However, learning representations to capture entities and relations with literal information in KGs is challenging as the KGs show heterogeneous properties and various types of literal information. Meanwhile, the existing methods mostly aim to preserve graph structures surrounding target nodes without considering different types of literals, which could also carry significant information. In this paper, we propose a knowledge graph embedding model for the efficient diagnosis of animal diseases, which could learn various types of literal information and graph structure and fuse them into unified representations, namely LiteralKG. Specifically, we construct a knowledge graph that is built from EMRs along with literal information collected from various animal hospitals. We then fuse different types of entities and node feature information into unified vector representations through gate networks. Finally, we propose a self-supervised learning task to learn graph structure in pretext tasks and then towards various downstream tasks. Experimental results on link prediction tasks demonstrate that our model outperforms the baselines that consist of state-of-the-art models. The source code is available at https://github.com/NSLab-CUK/LiteralKG.
△ Less
Submitted 31 August, 2023;
originally announced September 2023.
-
Transitivity-Preserving Graph Representation Learning for Bridging Local Connectivity and Role-based Similarity
Authors:
Van Thuy Hoang,
O-Joun Lee
Abstract:
Graph representation learning (GRL) methods, such as graph neural networks and graph transformer models, have been successfully used to analyze graph-structured data, mainly focusing on node classification and link prediction tasks. However, the existing studies mostly only consider local connectivity while ignoring long-range connectivity and the roles of nodes. In this paper, we propose Unified…
▽ More
Graph representation learning (GRL) methods, such as graph neural networks and graph transformer models, have been successfully used to analyze graph-structured data, mainly focusing on node classification and link prediction tasks. However, the existing studies mostly only consider local connectivity while ignoring long-range connectivity and the roles of nodes. In this paper, we propose Unified Graph Transformer Networks (UGT) that effectively integrate local and global structural information into fixed-length vector representations. First, UGT learns local structure by identifying the local substructures and aggregating features of the $k$-hop neighborhoods of each node. Second, we construct virtual edges, bridging distant nodes with structural similarity to capture the long-range dependencies. Third, UGT learns unified representations through self-attention, encoding structural distance and $p$-step transition probability between node pairs. Furthermore, we propose a self-supervised learning task that effectively learns transition probability to fuse local and global structural features, which could then be transferred to other downstream tasks. Experimental results on real-world benchmark datasets over various downstream tasks showed that UGT significantly outperformed baselines that consist of state-of-the-art models. In addition, UGT reaches the expressive power of the third-order Weisfeiler-Lehman isomorphism test (3d-WL) in distinguishing non-isomorphic graph pairs. The source code is available at https://github.com/NSLab-CUK/Unified-Graph-Transformer.
△ Less
Submitted 18 August, 2023;
originally announced August 2023.
-
Observation of Brillouin scattering in a high-index doped silica chip waveguide
Authors:
M. Zerbib,
V. T. Hoang,
J. C. Beugnot,
K. P. Huy,
B. Little,
S. T. Chu,
D. J. Moss,
R. Morandotti,
B. Wetzel,
T. Sylvestre
Abstract:
We report the observation of Brillouin backscattering in a 50-cm long spiral high-index doped silica chip waveguide and measured a Brillouin frequency shift of 16 GHz which is in very good agreement with theoretical predictions and numerical simulations based on the elastodynamics equation.
We report the observation of Brillouin backscattering in a 50-cm long spiral high-index doped silica chip waveguide and measured a Brillouin frequency shift of 16 GHz which is in very good agreement with theoretical predictions and numerical simulations based on the elastodynamics equation.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
Connector 0.5: A unified framework for graph representation learning
Authors:
Thanh Sang Nguyen,
Jooho Lee,
Van Thuy Hoang,
O-Joun Lee
Abstract:
Graph representation learning models aim to represent the graph structure and its features into low-dimensional vectors in a latent space, which can benefit various downstream tasks, such as node classification and link prediction. Due to its powerful graph data modelling capabilities, various graph embedding models and libraries have been proposed to learn embeddings and help researchers ease con…
▽ More
Graph representation learning models aim to represent the graph structure and its features into low-dimensional vectors in a latent space, which can benefit various downstream tasks, such as node classification and link prediction. Due to its powerful graph data modelling capabilities, various graph embedding models and libraries have been proposed to learn embeddings and help researchers ease conducting experiments. In this paper, we introduce a novel graph representation framework covering various graph embedding models, ranging from shallow to state-of-the-art models, namely Connector. First, we consider graph generation by constructing various types of graphs with different structural relations, including homogeneous, signed, heterogeneous, and knowledge graphs. Second, we introduce various graph representation learning models, ranging from shallow to deep graph embedding models. Finally, we plan to build an efficient open-source framework that can provide deep graph embedding models to represent structural relations in graphs. The framework is available at https://github.com/NSLab-CUK/Connector.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Optimizing supercontinuum spectro-temporal properties by leveraging machine learning towards multi-photon microscopy
Authors:
Van Thuy Hoang,
Yassin Boussafa,
Lynn Sader,
Sébastien Février,
Vincent Couderc,
Benjamin Wetzel
Abstract:
Multi-photon microscopy has played a significant role in biological imaging since it allows to observe living tissues with improved penetration depth and excellent sectioning effect. Multi-photon microscopy relies on multi-photon absorption, enabling the use of different imaging modalities that strongly depends on the properties of the sample structure, the selected fluorophore and the excitation…
▽ More
Multi-photon microscopy has played a significant role in biological imaging since it allows to observe living tissues with improved penetration depth and excellent sectioning effect. Multi-photon microscopy relies on multi-photon absorption, enabling the use of different imaging modalities that strongly depends on the properties of the sample structure, the selected fluorophore and the excitation laser. However, versatile and tunable laser excitation for multi-photon absorption is still a challenge, limited by e.g. the narrow bandwidth of typical laser gain medium or by the tunability of wavelength conversion offered by optical parametric oscillators or amplifiers. As an alternative, supercontinuum generation can provide broadband excitationspanning from the ultra-violet to far infrared domains and integrating numerous fluorophore absorption peaks, in turn enabling different imaging modalities or potential multiplexed spectroscopy. Here, we report on the use of machine learning to optimize the spectro-temporal properties of supercontinuum generation in order to selectively enhance multi-photon excitation signals compatible with a variety of fluorophores (or modalities) for multi-photon microscopy. Specifically, we numerically explore how the use of reconfigurable (femtosecond) pulse patterns can be readily exploited to control the nonlinear propagation dynamics and associated spectral broadening occurring in a highly-nonlinear fiber. In this framework, we show that the use of multiple pulses to seed optical fiber propagation can trigger a variety of nonlinear interactions and complex propagation scenario. This approach, exploiting the temporal dimension as an extended degree of freedom, is used to maximize typical multi-photon excitations at selected wavelengths, here obtained in a versatile and reconfigurable manner suitable for imaging applications.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
Enhanced Teaching-Learning-based Optimization for 3D Path Planning of Multicopter UAVs
Authors:
Van Truong Hoang,
Manh Duong Phung
Abstract:
This paper introduces a new path planning algorithm for unmanned aerial vehicles (UAVs) based on the teaching-learning-based optimization (TLBO) technique. We first define an objective function that incorporates requirements on the path length and constraints on the movement and safe operation of UAVs to convert the path planning into an optimization problem. The optimization algorithm named Multi…
▽ More
This paper introduces a new path planning algorithm for unmanned aerial vehicles (UAVs) based on the teaching-learning-based optimization (TLBO) technique. We first define an objective function that incorporates requirements on the path length and constraints on the movement and safe operation of UAVs to convert the path planning into an optimization problem. The optimization algorithm named Multi-subject TLBO is then proposed to minimize the formulated objective function. The algorithm is developed based on TLBO but enhanced with new operations including mutation, elite selection and multi-subject training to improve the solution quality and speed up the convergence rate. Comparison with state-of-the-art algorithms and experiments with real UAVs have been conducted to evaluate the performance of the proposed algorithm. The results confirm its validity and effectiveness in generating optimal, collision-free and flyable paths for UAVs in complex operating environments.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
CryptMPI: A Fast Encrypted MPI Library
Authors:
Abu Naser,
Cong Wu,
Mehran Sadeghi Lahijani,
Mohsen Gavahi,
Viet Tung Hoang,
Zhi Wang,
Xin Yuan
Abstract:
The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment. However, supporting security in the communication infrastructure of today's public cloud is challenging, because current networks for data centers are so fast that adding encryption can incur very significant overheads. In this work, we introduce Cry…
▽ More
The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment. However, supporting security in the communication infrastructure of today's public cloud is challenging, because current networks for data centers are so fast that adding encryption can incur very significant overheads. In this work, we introduce CryptMPI, a high performance encrypted MPI library that supports communication with both integrity and privacy. We present the techniques in CryptMPI and report our benchmarking results using micro-benchmarks and NAS parallel benchmarks. The evaluation results indicate that the aforementioned techniques are effective in improving the performance of encrypted communication.
△ Less
Submitted 2 November, 2020; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications
Authors:
Abu Naser,
Mehran Sadeghi Lahijani,
Cong Wu,
Mohsen Gavahi,
Viet Tung Hoang,
Zhi Wang,
Xin Yuan
Abstract:
In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data. To meet this goal, we consider incorporating encryption in the Message Passing Interface (MPI) library. We empirically evaluate four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, and…
▽ More
In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data. To meet this goal, we consider incorporating encryption in the Message Passing Interface (MPI) library. We empirically evaluate four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, and CryptoPP using micro-benchmarks and NAS parallel benchmarks on two different networking technologies, 10Gbps Ethernet and 40Gbps InfiniBand. We also develop accurate models that allow us to reason about the performance of encrypted MPI communication in different situations and give guidance on how to improve encrypted MPI performance.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO
Authors:
V. T. Hoang,
M. D. Phung,
T. H. Dinh,
Q. Zhu,
Q. P. Ha
Abstract:
In this paper, we propose an algorithm for the formation of multiple UAVs used in vision-based inspection of infrastructure. A path planning algorithm is first developed by using a variant of the particle swarm optimisation, named theta-PSO, to generate a feasible path for the overall formation configuration taken into account the constraints for visual inspection. Here, we introduced a cost funct…
▽ More
In this paper, we propose an algorithm for the formation of multiple UAVs used in vision-based inspection of infrastructure. A path planning algorithm is first developed by using a variant of the particle swarm optimisation, named theta-PSO, to generate a feasible path for the overall formation configuration taken into account the constraints for visual inspection. Here, we introduced a cost function that includes various constraints on flight safety and visual inspection. A reconfigurable topology is then added based on the use of intermediate waypoints to allow the formation to avoid collision with obstacles during operation. The planned path and formation are then combined to derive the trajectory and velocity profiles for each UAV. Experiments have been conducted for the task of inspecting a light rail bridge. The results confirmed the validity and effectiveness of the proposed algorithm.
△ Less
Submitted 7 September, 2019;
originally announced September 2019.
-
System Architecture for Real-time Surface Inspection Using Multiple UAVs
Authors:
Van Truong Hoang,
Manh Duong Phung,
Tran Hiep Dinh,
Quang P. Ha
Abstract:
This paper presents a real-time control system for surface inspection using multiple unmanned aerial vehicles (UAVs). The UAVs are coordinated in a specific formation to collect data of the inspecting objects. The communication platform for data transmission is based on the Internet of Things (IoT). In the proposed architecture, the UAV formation is established via using the angle-encoded particle…
▽ More
This paper presents a real-time control system for surface inspection using multiple unmanned aerial vehicles (UAVs). The UAVs are coordinated in a specific formation to collect data of the inspecting objects. The communication platform for data transmission is based on the Internet of Things (IoT). In the proposed architecture, the UAV formation is established via using the angle-encoded particle swarm optimisation to generate an inspecting path and redistribute it to each UAV where communication links are embedded with an IoT board for network and data processing capabilities. Data collected are transmitted in real time through the network to remote computational units. To detect potential damage or defects, an online image processing technique is proposed and implemented based on histograms. Extensive simulation, experiments and comparisons have been conducted to verify the validity and performance of the proposed system.
△ Less
Submitted 7 July, 2019;
originally announced July 2019.
-
Angle-Encoded Swarm Optimization for UAV Formation Path Planning
Authors:
V. T. Hoang,
M. D. Phung,
T. H. Dinh,
Q. P. Ha
Abstract:
This paper presents a novel and feasible path planning technique for a group of unmanned aerial vehicles (UAVs) conducting surface inspection of infrastructure. The ultimate goal is to minimise the travel distance of UAVs while simultaneously avoid obstacles, and maintain altitude constraints as well as the shape of the UAV formation. A multiple-objective optimisation algorithm, called the Angle-e…
▽ More
This paper presents a novel and feasible path planning technique for a group of unmanned aerial vehicles (UAVs) conducting surface inspection of infrastructure. The ultimate goal is to minimise the travel distance of UAVs while simultaneously avoid obstacles, and maintain altitude constraints as well as the shape of the UAV formation. A multiple-objective optimisation algorithm, called the Angle-encoded Particle Swarm Optimization (theta-PSO) algorithm, is proposed to accelerate the swarm convergence with angular velocity and position being used for the location of particles. The whole formation is modelled as a virtual rigid body and controlled to maintain a desired geometric shape among the paths created while the centroid of the group follows a pre-determined trajectory. Based on the testbed of 3DR Solo drones equipped with a proprietary Mission Planner, and the Internet-of-Things (IoT) for multi-directional transmission and reception of data between the UAVs, extensive experiments have been conducted for triangular formation maintenance along a monorail bridge. The results obtained confirm the feasibility and effectiveness of the proposed approach.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
Crack Detection Using Enhanced Thresholding on UAV based Collected Images
Authors:
Q. Zhu,
T. H. Dinh,
V. T. Hoang,
M. D. Phung,
Q. P. Ha
Abstract:
This paper proposes a thresholding approach for crack detection in an unmanned aerial vehicle (UAV) based infrastructure inspection system. The proposed algorithm performs recursively on the intensity histogram of UAV-taken images to exploit their crack-pixels appearing at the low intensity interval. A quantified criterion of interclass contrast is proposed and employed as an object cost and stop…
▽ More
This paper proposes a thresholding approach for crack detection in an unmanned aerial vehicle (UAV) based infrastructure inspection system. The proposed algorithm performs recursively on the intensity histogram of UAV-taken images to exploit their crack-pixels appearing at the low intensity interval. A quantified criterion of interclass contrast is proposed and employed as an object cost and stop condition for the recursive process. Experiments on different datasets show that our algorithm outperforms different segmentation approaches to accurately extract crack features of some commercial buildings.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
Adaptive twisting sliding mode control for quadrotor unmanned aerial vehicles
Authors:
V. T. Hoang,
M. D. Phung,
Q. P. Ha
Abstract:
This work addresses the problem of robust attitude control of quadcopters. First, the mathematical model of the quadcopter is derived considering factors such as nonlinearity, external disturbances, uncertain dynamics and strong coupling. An adaptive twisting sliding mode control algorithm is then developed with the objective of controlling the quadcopter to track desired attitudes under various c…
▽ More
This work addresses the problem of robust attitude control of quadcopters. First, the mathematical model of the quadcopter is derived considering factors such as nonlinearity, external disturbances, uncertain dynamics and strong coupling. An adaptive twisting sliding mode control algorithm is then developed with the objective of controlling the quadcopter to track desired attitudes under various conditions. For this, the twisting sliding mode control law is modified with a proposed gain adaptation scheme to improve the control transient and tracking performance. Extensive simulation studies and comparisons with experimental data have been carried out for a Solo quadcopter. The results show that the proposed control scheme can achieve strong robustness against disturbances while is adaptable to parametric variations.
△ Less
Submitted 5 June, 2018;
originally announced June 2018.
-
Adaptive Super-twisting Second-order Sliding Mode for Attitude Control of Quadcopter UAVs
Authors:
Van Truong Hoang,
Quang Hieu Pham
Abstract:
This work addresses the modelling and control aspects for quadcopter or drone unmanned aerial vehicles (UAVs). First, the mathematical model of the drone is derived by identifying significant parameters and the negligible ones are treated as disturbances. The control design begins with the switching surface selection, then, an Adaptive Super Twisting Sliding Mode (ASTSM) Control algorithm is appli…
▽ More
This work addresses the modelling and control aspects for quadcopter or drone unmanned aerial vehicles (UAVs). First, the mathematical model of the drone is derived by identifying significant parameters and the negligible ones are treated as disturbances. The control design begins with the switching surface selection, then, an Adaptive Super Twisting Sliding Mode (ASTSM) Control algorithm is applied to adjust attitudes of the quadcopter under harsh conditions such as nonlinear, strong coupling, high uncertainties and disturbances. Simulation results show that the proposed controller can achieve robust operation with disturbance rejection, parametric variation adaptation as well as chattering attenuation. Comparisons with some commonly used and advanced controllers in a quadcopter model show advantages of the proposed control scheme.
△ Less
Submitted 20 March, 2018;
originally announced March 2018.
-
Adaptive Second-order Sliding Mode Control of UAVs for Civil Applications
Authors:
Van Truong Hoang,
Ansu Man Singh,
Manh Duong Phung,
Quang Ha
Abstract:
Quadcopters, as unmanned aerial vehicles (UAVs), have great potential in civil applications such as surveying, building monitoring, and infrastructure condition assessment. Quadcopters, however, are relatively sensitive to noises and disturbances so that their performance may be quickly downgraded in the case of inadequate control, system uncertainties and/or external disturbances. In this study,…
▽ More
Quadcopters, as unmanned aerial vehicles (UAVs), have great potential in civil applications such as surveying, building monitoring, and infrastructure condition assessment. Quadcopters, however, are relatively sensitive to noises and disturbances so that their performance may be quickly downgraded in the case of inadequate control, system uncertainties and/or external disturbances. In this study, we deal with the quadrotor low-level control by proposing a robust scheme named the adaptive second-order quasi-continuous sliding mode control (adaptive 2-QCSM). The ultimate objective is for robust attitude control of the UAV in monitoring and inspection of built infrastructure. First, the mathematical model of the quadcopter is derived considering nonlinearity, strong coupling, uncertain dynamics and external disturbances. The control design includes the selection of the sliding manifold and the development of quasi-continuous second-order sliding mode controller with an adaptive gain. Stability of the overall control system is analysed by using a global Lyapunov function for convergence of both the sliding dynamics and adaptation scheme. Extensive simulations have been carried out for evaluation. Results show that the proposed controller can achieve robustness against disturbances or parameter variations and has better tracking performance in comparison with experimental responses of a UAV in a real-time monitoring task.
△ Less
Submitted 31 July, 2017;
originally announced July 2017.
-
Automatic Crack Detection in Built Infrastructure Using Unmanned Aerial Vehicles
Authors:
Manh Duong Phung,
Van Truong Hoang,
Tran Hiep Dinh,
Quang Ha
Abstract:
This paper addresses the problem of crack detection which is essential for health monitoring of built infrastructure. Our approach includes two stages, data collection using unmanned aerial vehicles (UAVs) and crack detection using histogram analysis. For the data collection, a 3D model of the structure is first created by using laser scanners. Based on the model, geometric properties are extracte…
▽ More
This paper addresses the problem of crack detection which is essential for health monitoring of built infrastructure. Our approach includes two stages, data collection using unmanned aerial vehicles (UAVs) and crack detection using histogram analysis. For the data collection, a 3D model of the structure is first created by using laser scanners. Based on the model, geometric properties are extracted to generate way points necessary for navigating the UAV to take images of the structure. Then, our next step is to stick together those obtained images from the overlapped field of view. The resulting image is then clustered by histogram analysis and peak detection. Potential cracks are finally identified by using locally adaptive thresholds. The whole process is automatically carried out so that the inspection time is significantly improved while safety hazards can be minimised. A prototypical system has been developed for evaluation and experimental results are included.
△ Less
Submitted 31 July, 2017;
originally announced July 2017.
-
Domain-specific queries and Web search personalization: some investigations
Authors:
Van Tien Hoang,
Angelo Spognardi,
Francesco Tiezzi,
Marinella Petrocchi,
Rocco De Nicola
Abstract:
Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles…
▽ More
Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles", which can have the undesired effect of separating users from information that does not fit their preferences. This paper moves from early results on quantification of personalization over Google search query results. Inspired by previous works, we have carried out some experiments consisting of search queries performed by a battery of Google accounts with differently prepared profiles. Matching query results, we quantify the level of personalization, according to topics of the queries and the profile of the accounts. This work reports initial results and it is a first step a for more extensive investigation to measure Web search personalization.
△ Less
Submitted 16 August, 2015;
originally announced August 2015.
-
An Enciphering Scheme Based on a Card Shuffle
Authors:
Viet Tung Hoang,
Ben Morris,
Phillip Rogaway
Abstract:
We introduce the swap-or-not shuffle and show that the technique gives rise to a new method to convert a pseudorandom function (PRF) into a pseudorandom permutation (PRP) (or, alternatively, to directly build a confusion/diffusion blockcipher). We then prove that swap-or-not has excellent quantitative security bounds, giving a Luby-Rackoff type result that ensures security (assuming an ideal round…
▽ More
We introduce the swap-or-not shuffle and show that the technique gives rise to a new method to convert a pseudorandom function (PRF) into a pseudorandom permutation (PRP) (or, alternatively, to directly build a confusion/diffusion blockcipher). We then prove that swap-or-not has excellent quantitative security bounds, giving a Luby-Rackoff type result that ensures security (assuming an ideal round function) to a number of adversarial queries that is nearly the size of the construction's domain. Swap-or-not provides a direct solution for building a small-domain cipher and achieving format-preserving encryption, yielding the best bounds known for a practical scheme for enciphering credit-card numbers. The analysis of swap-or-not is based on the theory of mixing times of Markov chains.
△ Less
Submitted 21 November, 2014; v1 submitted 6 August, 2012;
originally announced August 2012.
-
Fixed Parameter Polynomial Time Algorithms for Maximum Agreement and Compatible Supertrees
Authors:
Viet Tung Hoang,
Wing-Kin Sung
Abstract:
Consider a set of labels $L$ and a set of trees ${\mathcal T} = \{{\mathcal T}^{(1), {\mathcal T}^{(2), ..., {\mathcal T}^{(k) \$ where each tree ${\mathcal T}^{(i)$ is distinctly leaf-labeled by some subset of $L$. One fundamental problem is to find the biggest tree (denoted as supertree) to represent $\mathcal T}$ which minimizes the disagreements with the trees in ${\mathcal T}$ under certain…
▽ More
Consider a set of labels $L$ and a set of trees ${\mathcal T} = \{{\mathcal T}^{(1), {\mathcal T}^{(2), ..., {\mathcal T}^{(k) \$ where each tree ${\mathcal T}^{(i)$ is distinctly leaf-labeled by some subset of $L$. One fundamental problem is to find the biggest tree (denoted as supertree) to represent $\mathcal T}$ which minimizes the disagreements with the trees in ${\mathcal T}$ under certain criteria. This problem finds applications in phylogenetics, database, and data mining. In this paper, we focus on two particular supertree problems, namely, the maximum agreement supertree problem (MASP) and the maximum compatible supertree problem (MCSP). These two problems are known to be NP-hard for $k \geq 3$. This paper gives the first polynomial time algorithms for both MASP and MCSP when both $k$ and the maximum degree $D$ of the trees are constant.
△ Less
Submitted 20 February, 2008;
originally announced February 2008.