Skip to main content

Showing 1–16 of 16 results for author: Ang, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.01214  [pdf, other

    cs.CV

    YOLO algorithm with hybrid attention feature pyramid network for solder joint defect detection

    Authors: Li Ang, Siti Khatijah Nor Abdul Rahim, Raseeda Hamzah, Raihah Aminuddin, Gao Yousheng

    Abstract: Traditional manual detection for solder joint defect is no longer applied during industrial production due to low efficiency, inconsistent evaluation, high cost and lack of real-time data. A new approach has been proposed to address the issues of low accuracy, high false detection rates and computational cost of solder joint defect detection in surface mount technology of industrial scenarios. The… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  2. arXiv:2310.08756  [pdf

    eess.IV cs.CV

    Intelligent Scoliosis Screening and Diagnosis: A Survey

    Authors: Zhang Zhenlin, Pu Lixin, Li Ang, Zhang Jun, Li Xianjie, Fan Jipeng

    Abstract: Scoliosis is a three-dimensional spinal deformity, which may lead to abnormal morphologies, such as thoracic deformity, and pelvic tilt. Severe patients may suffer from nerve damage and urinary abnormalities. At present, the number of scoliosis patients in primary and secondary schools has exceeded five million in China, the incidence rate is about 3% to 5% which is growing every year. The researc… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: in Chinese language

  3. arXiv:2206.03128  [pdf, other

    cs.LG cs.GR

    Spatial-Temporal Adaptive Graph Convolution with Attention Network for Traffic Forecasting

    Authors: Chen Weikang, Li Yawen, Xue Zhe, Li Ang, Wu Guobin

    Abstract: Traffic forecasting is one canonical example of spatial-temporal learning task in Intelligent Traffic System. Existing approaches capture spatial dependency with a pre-determined matrix in graph convolution neural operators. However, the explicit graph structure losses some hidden representations of relationships among nodes. Furthermore, traditional graph convolution neural operators cannot aggre… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

  4. arXiv:2203.16338  [pdf, other

    cs.LG cs.CV math.NA quant-ph

    Stack operation of tensor networks

    Authors: Tianning Zhang, Tianqi Chen, Er** Li, Bo Yang, L. K. Ang

    Abstract: The tensor network, as a facterization of tensors, aims at performing the operations that are common for normal tensors, such as addition, contraction and stacking. However, due to its non-unique network structure, only the tensor network contraction is so far well defined. In this paper, we propose a mathematically rigorous definition for the tensor network stack approach, that compress a large a… ▽ More

    Submitted 24 May, 2022; v1 submitted 28 March, 2022; originally announced March 2022.

    Comments: 9 pages, 10 figures, close to the online published version, for the code on Github, see this https://github.com/veya2ztn/Stack_of_Tensor_Network

    Journal ref: Front. Phys. 10:906399 (2022)

  5. arXiv:2203.00002  [pdf, other

    cs.LG physics.app-ph physics.comp-ph physics.data-an

    SUTD-PRCM Dataset and Neural Architecture Search Approach for Complex Metasurface Design

    Authors: Tianning Zhang, Yee Sin Ang, Er** Li, Chun Yun Kee, L. K. Ang

    Abstract: Metasurfaces have received a lot of attentions recently due to their versatile capability in manipulating electromagnetic wave. Advanced designs to satisfy multiple objectives with non-linear constraints have motivated researchers in using machine learning (ML) techniques like deep learning (DL) for accelerated design of metasurfaces. For metasurfaces, it is difficult to make quantitative comparis… ▽ More

    Submitted 24 February, 2022; originally announced March 2022.

    Comments: 20 pages, 7 figures, 2 tables

  6. arXiv:2105.06960  [pdf, ps, other

    cs.LG stat.ML

    Thompson Sampling for Gaussian Entropic Risk Bandits

    Authors: Ming Liang Ang, Eloise Y. Y. Lim, Joel Q. L. Chang

    Abstract: The multi-armed bandit (MAB) problem is a ubiquitous decision-making problem that exemplifies exploration-exploitation tradeoff. Standard formulations exclude risk in decision making. Risknotably complicates the basic reward-maximising objectives, in part because there is no universally agreed definition of it. In this paper, we consider an entropic risk (ER) measure and explore the performance of… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:2011.08046

  7. arXiv:2012.00780  [pdf, other

    cs.LG cs.AI stat.ML

    Refining Deep Generative Models via Discriminator Gradient Flow

    Authors: Abdul Fatir Ansari, Ming Liang Ang, Harold Soh

    Abstract: Deep generative modeling has seen impressive advances in recent years, to the point where it is now commonplace to see simulated samples (e.g., images) that closely resemble real-world data. However, generation quality is generally inconsistent for any given model and can vary dramatically between samples. We introduce Discriminator Gradient flow (DGflow), a new technique that improves generated s… ▽ More

    Submitted 5 June, 2021; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: ICLR 2021 Camera Ready; Code available at https://github.com/clear-nus/DGflow; Updated Related Work

  8. Deep Multi-Output Forecasting: Learning to Accurately Predict Blood Glucose Trajectories

    Authors: Ian Fox, Lynn Ang, Mamta Jaiswal, Rodica Pop-Busui, Jenna Wiens

    Abstract: In many forecasting applications, it is valuable to predict not only the value of a signal at a certain time point in the future, but also the values leading up to that point. This is especially true in clinical applications, where the future state of the patient can be less important than the patient's overall trajectory. This requires multi-step forecasting, a forecasting variant where one aims… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: KDD 2018

    Journal ref: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

  9. Contextual Motifs: Increasing the Utility of Motifs using Contextual Data

    Authors: Ian Fox, Lynn Ang, Mamta Jaiswal, Rodica Pop-Busui, Jenna Wiens

    Abstract: Motifs are a powerful tool for analyzing physiological waveform data. Standard motif methods, however, ignore important contextual information (e.g., what the patient was doing at the time the data were collected). We hypothesize that these additional contextual data could increase the utility of motifs. Thus, we propose an extension to motifs, contextual motifs, that incorporates context. Recogni… ▽ More

    Submitted 31 July, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

    Comments: 10 pages, 7 figures, accepted for oral presentation at KDD '17

    Journal ref: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017

  10. Termite-hill: From natural to artificial termites in sensor networks

    Authors: A. M. Zungeru, L. -M. Ang, K. P. Seng

    Abstract: Termites present a very good natural metaphor to evolutionary computation. While each individuals computational power is small compared to more evolved species, it is the power of their colonies that inspires communication engineers. This paper presents a study of artificial termites in sensor networks for the purpose of solving its routing problem. The behaviors of each of the termites in their c… ▽ More

    Submitted 5 March, 2013; originally announced March 2013.

    Comments: 26 pages, 4 figures

    Journal ref: A.M. Zungeru, L.-M. Ang, K.P. Seng. Termite-hill: From Natural to Artificial Termites in Sensor Networks, International Journal of Swarm Intelligence Research (IGI-Publishers), vol. 3(4), pp. 1-23, 2012

  11. arXiv:1302.0689  [pdf, other

    cs.CV

    Multi-scale Visual Attention & Saliency Modelling with Decision Theory

    Authors: Anh Cat Le Ngo, Li-Minn Ang, Guo** Qiu, Kah-Phooi Seng

    Abstract: Bottom-up saliency, an early human visual processing, behaves like binary classification of interest and null hypothesis. Its discriminant power, mutual information of image features and class distribution, is closely related to saliency value by the well-known centre-surround theory. As classification accuracy very much depends on window sizes, the discriminant saliency (power) varies according t… ▽ More

    Submitted 4 February, 2013; originally announced February 2013.

  12. arXiv:1301.7661  [pdf, other

    cs.CV

    Fast non parametric entropy estimation for spatial-temporal saliency method

    Authors: Anh Cat Le Ngo, Guo** Qiu, Geoff Underwood, Kenneth Li-Minn Ang, Jasmine Kah-Phooi Seng

    Abstract: This paper formulates bottom-up visual saliency as center surround conditional entropy and presents a fast and efficient technique for the computation of such a saliency map. It is shown that the new saliency formulation is consistent with self-information based saliency, decision-theoretic saliency and Bayesian definition of surprises but also faces the same significant computational challenge of… ▽ More

    Submitted 31 January, 2013; originally announced January 2013.

  13. arXiv:1301.7641  [pdf, other

    cs.CV

    Multi-scale Discriminant Saliency with Wavelet-based Hidden Markov Tree Modelling

    Authors: Anh Cat Le Ngo, Kenneth Li-Minn Ang, Guo** Qiu, Jasmine Kah-Phooi Seng

    Abstract: The bottom-up saliency, an early stage of humans' visual attention, can be considered as a binary classification problem between centre and surround classes. Discriminant power of features for the classification is measured as mutual information between distributions of image features and corresponding classes . As the estimated discrepancy very much depends on considered scale level, multi-scale… ▽ More

    Submitted 6 June, 2013; v1 submitted 31 January, 2013; originally announced January 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1301.3964

  14. arXiv:1301.2884  [pdf, other

    cs.CV

    Wavelet-based Scale Saliency

    Authors: Anh Cat Le Ngo, Kenneth Li-Minn Ang, Jasmine Kah-Phooi Seng, Guo** Qiu

    Abstract: Both pixel-based scale saliency (PSS) and basis project methods focus on multiscale analysis of data content and structure. Their theoretical relations and practical combination are previously discussed. However, no models have ever been proposed for calculating scale saliency on basis-projected descriptors since then. This paper extend those ideas into mathematical models and implement them in th… ▽ More

    Submitted 14 January, 2013; originally announced January 2013.

    Comments: Partly published in ACIIDS 2013 - Kuala Lumpur Malaysia

  15. Radio Frequency Energy Harvesting and Management for Wireless Sensor Networks

    Authors: A. M. Zungeru, Li-Minn Ang, S. R. S. Prabaharan, Kah Phooi Seng

    Abstract: Radio Frequency (RF) Energy Harvesting holds a promising future for generating a small amount of electrical power to drive partial circuits in wirelessly communicating electronics devices. Reducing power consumption has become a major challenge in wireless sensor networks. As a vital factor affecting system cost and lifetime, energy consumption in wireless sensor networks is an emerging and active… ▽ More

    Submitted 4 September, 2012; v1 submitted 22 August, 2012; originally announced August 2012.

    Comments: 40 pages, 9 figures, 5 tables, Book chapter

    Journal ref: Green Mobile Devices and Networks: Energy Optimization and Scavenging Techniques (CRC Press, Taylor and Francis Group, 2011) pp. 341-368

  16. arXiv:1206.5938  [pdf

    cs.DC

    Performance Evaluation of Ant-Based Routing Protocols for Wireless Sensor Networks

    Authors: Adamu Murtala Zungeru, Li-Minn Ang, Kah Phooi Seng

    Abstract: High efficient routing is an important issue in the design of limited energy resource Wireless Sensor Networks (WSNs). Due to the characteristic of the environment at which the sensor node is to operate, coupled with severe resources; on-board energy, transmission power, processing capability, and storage limitations, prompt for careful resource management and new routing protocol so as to counter… ▽ More

    Submitted 26 June, 2012; originally announced June 2012.

    Comments: 10 pages, 5 figures, Journal Publication

    Journal ref: International Journal of Computer Science Issues (IJCSI), volume 9, Issue 3, No 2, May 2012, pp. 388-397