Learning to assemble geometric shapes into a larger target structure is a pivotal task in various practical applications. In this work, we tackle this problem by establishing local correspondences between point clouds...
Learning to assemble geometric shapes into a larger target structure is a pivotal task in various practical applications. In this work, we tackle this problem by establishing local correspondences between point clouds of part shapes in both coarse- and fine-levels. To this end, we introduce Proxy Match Transform (PMT), an approximate high-order feature transform layer that enables reliable matching between mating surfaces of parts while incurring low costs in memory and compute. Building upon PMT, we introduce a new framework, dubbed Proxy Match TransformeR (PMTR), for the geometric assembly task. We evaluate the proposed PMTR on the large-scale 3D geometric shape assembly benchmark dataset of Breaking Bad and demonstrate its superior performance and efficiency compared to state-of-the-art methods. Project page: https://***/pmtr.
In [E. G. Birgin, R. Castillo and J. M. Martínez, Computational Optimization and Applications 31, pp. 31–55, 2005], a general class of safeguarded augmented Lagrangian methods is introduced which includes a larg...
In [E. G. Birgin, R. Castillo and J. M. Martínez, Computational Optimization and Applications 31, pp. 31–55, 2005], a general class of safeguarded augmented Lagrangian methods is introduced which includes a large number of different methods from the literature. Besides a numerical comparison including 65 different methods, primal-dual global convergence to a KKT point is shown under a (strong) regularity condition. In the present work, we generalize this framework by considering also classical/non-safeguarded Lagrange multipliers updates. This is done in order to give a rigorous theoretical study to the so-called hyperbolic augmented Lagrangian method, which is not safeguarded, while also including the classical Powell-Hestenes-Rockafellar augmented Lagrangian method. Our results are based on a weak regularity condition which does not require boundedness of the set of Lagrange multipliers. Somewhat surprisingly, in non-safeguarded methods, we show that the penalty parameter may be kept constant at every iteration even in the lack of convexity assumptions. Numerical experiments with all the problems in the Netlib and CUTEst collections are reported to compare and discuss the different approaches.
This paper addresses the problem of detecting humans in RGB and Thermal (long-wave IR) images taken by cameras mounted onboard a mobile robot. Human/Pedestrian detection is currently one of the most pertinent object d...
This paper addresses the problem of detecting humans in RGB and Thermal (long-wave IR) images taken by cameras mounted onboard a mobile robot. Human/Pedestrian detection is currently one of the most pertinent object detection problems, mainly due to safety concerns in autonomous vehicles. The majority of approaches apply deep-learning techniques based solely on RGB images. However, they have a few shortcomings, namely that during foggy weather, nighttime, and low-light scenarios, these images may not contain sufficient information. To address these issues, this work studies the use of thermal cameras as a complementary source of information for human detection in indoor and outdoor environments. The proposed approach uses YOLOv5 to detect pedestrians in both thermal and RGB images. Moreover, the different modalities are combined using early and late fusion techniques. Evaluation of the proposed approach is carried out in the FLIR Aligned dataset and in a new in-house dataset. Results indicate that the use of fusion techniques highlights a promising way to improve the overall performance in this application domain.
With the advent of technologies such as Edge computing, the horizons of remote computational applications have broadened multi-dimensionally. Autonomous Unmanned Aerial Vehicle (UAV) mission is a vital application to ...
With the advent of technologies such as Edge computing, the horizons of remote computational applications have broadened multi-dimensionally. Autonomous Unmanned Aerial Vehicle (UAV) mission is a vital application to utilize remote computation to catalyze its performance. However, offloading computational complexity to a remote system increases the latency in the system. Though technologies such as 5G networking minimize communication latency, the effects of latency on the control of UAVs are inevitable and may destabilize the system. Hence, it is essential to consider the delays in the system and compensate for them in the control design. Therefore, we propose a novel Edge-based predictive control architecture enabled by 5G networking, PACED-5G (Predictive Autonomous Control using Edge for Drones over 5G). In the proposed control architecture, we have designed a state estimator for estimating the current states based on the available knowledge of the time-varying delays, devised a Model Predictive controller (MPC) for the UAV to track the reference trajectory while avoiding obstacles, and provided an interface to offload the high-level tasks over Edge systems. The proposed architecture is validated in two experimental test cases using a quadrotor UAV.
This paper addresses the task of predicting the behavior of traffic participants, which involves complexities such as road geometry and agent interactions. To overcome these challenges, this paper presents a novel fra...
This paper addresses the task of predicting the behavior of traffic participants, which involves complexities such as road geometry and agent interactions. To overcome these challenges, this paper presents a novel framework called AIMP (Attention-based Interaction-aware Maneuver Prediction). AIMP utilizes interaction graphs to extract intricate interaction features from traffic scenes. The framework incorporates a Gated Mixture-of-Experts Attention Mechanism, which combines information from road geometry, interaction patterns, and motion dynamics. This fusion process also considers prior maneuver intention estimations, enhancing both explainability and informativeness. Experimental results highlight a performance enhancement (approximately 2% ∼ 9% of accuracy) of the proposed AIMP framework compared to alternative fusion methods.
Objective: Magnetic fields switching at kilohertz frequencies induce electric fields in the body, which can cause peripheral nerve stimulation (PNS). Although magnetostimulation has been extensively studied below 10 k...
详细信息
Beneficence is a social phenomenon that has rarely been modeled computationally so far. In this paper, we propose to study the beneficence of online opinions and comments published on social media on essential topics ...
Beneficence is a social phenomenon that has rarely been modeled computationally so far. In this paper, we propose to study the beneficence of online opinions and comments published on social media on essential topics for society. Our computational approach is based on measuring semantic similarity. We apply three measures to assess the beneficence of $\sim 41 K$ social media users: average Confidence, Normalized Google Distance, and Pointwise Mutual Information. As a use case, we analyze opinions on the topic of vaccinations on Facebook, where two distinct groups (Pro-Vax vs. Anti-Vax) are present. The results reveal a shared connection to beneficence among social media users, with both groups exhibiting similar levels of similarity and no significant clustering into echo chambers.
Partial discharge (PD) is a widespread phenomenon instigated in power transformer (PT) insulation systems. PDs are triggered by voids that vary in size and position within the PT insulation. The electrical characteris...
详细信息
We present an innovative, platform-independent concept for multiparameter sensing where the measurable parameters are in series, or cascaded, enabling measurements as a function of position. With temporally resolved d...
详细信息
We present an innovative, platform-independent concept for multiparameter sensing where the measurable parameters are in series, or cascaded, enabling measurements as a function of position. With temporally resolved detection, we show that squeezing can give a quantum enhancement in sensitivity over that of classical states by a factor of e2r, where r≈1 is the squeezing parameter. As an example, we have modeled an interferometer that senses multiple phase shifts along the same path, demonstrating a maximal quantum advantage by combining a coherent state with squeezed vacuum. Further classical modeling with up to 100 phases shows linear scaling potential for adding nodes to the sensor. The approach can be applied to remote sensing, geophysical surveying, and infrastructure monitoring.
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. This study explores IDOR vulnerabilities found within Android APIs, intending to clarify their inception while evaluating their implications for application security. This study combined the qualitative and quantitative approaches. Insights were obtained from an actual penetration test on an Android app into the primary reasons for IDOR vulnerabilities, underscoring insufficient input validation and weak authorization methods. We stress the frequent occurrence of IDOR vulnerabilities in the OWASP Top 10 API vulnerability list, highlighting the necessity to prioritize them in security evaluations. There are mitigation recommendations available for developers, which recognize its limitations involving a possibly small and homogeneous selection of tested Android applications, the testing environment that could cause some inaccuracies, and the impact of time constraints. Additionally, the study noted insufficient threat modeling and root cause analysis, affecting its generalizability and real-world relevance. However, comprehending and controlling IDOR dangers can enhance Android API security, protect user data, and bolster application resilience.
暂无评论