-
Interpretable Multimodal Learning for Tumor Protein-Metal Binding: Progress, Challenges, and Perspectives
Authors:
Xiaokun Liu,
Sayedmohammadreza Rastegari,
Yijun Huang,
Sxe Chang Cheong,
Weikang Liu,
Wenjie Zhao,
Qihao Tian,
Hongming Wang,
Yingjie Guo,
Shuo Zhou,
Sina Tabakhi,
Xianyuan Liu,
Zheqing Zhu,
Wei Sang,
Haiping Lu
Abstract:
In cancer therapeutics, protein-metal binding mechanisms critically govern the pharmacokinetics and targeting efficacy of drugs, thereby fundamentally shaping the rational design of anticancer metallodrugs. While conventional laboratory methods used to study such mechanisms are often costly, low throughput, and limited in capturing dynamic biological processes, machine learning (ML) has emerged as…
▽ More
In cancer therapeutics, protein-metal binding mechanisms critically govern the pharmacokinetics and targeting efficacy of drugs, thereby fundamentally shaping the rational design of anticancer metallodrugs. While conventional laboratory methods used to study such mechanisms are often costly, low throughput, and limited in capturing dynamic biological processes, machine learning (ML) has emerged as a promising alternative. Despite increasing efforts to develop protein-metal binding datasets and ML algorithms, the application of ML in tumor protein-metal binding remains limited. Key challenges include a shortage of high-quality, tumor-specific datasets, insufficient consideration of multiple data modalities, and the complexity of interpreting results due to the ''black box'' nature of complex ML models. This paper summarizes recent progress and ongoing challenges in using ML to predict tumor protein-metal binding, focusing on data, modeling, and interpretability. We present multimodal protein-metal binding datasets and outline strategies for acquiring, curating, and preprocessing them for training ML models. Moreover, we explore the complementary value provided by different data modalities and examine methods for their integration. We also review approaches for improving model interpretability to support more trustworthy decisions in cancer research. Finally, we offer our perspective on research opportunities and propose strategies to address the scarcity of tumor protein data and the limited number of predictive models for tumor protein-metal binding. We also highlight two promising directions for effective metal-based drug design: integrating protein-protein interaction data to provide structural insights into metal-binding events and predicting structural changes in tumor proteins after metal binding.
△ Less
Submitted 14 June, 2025; v1 submitted 4 April, 2025;
originally announced April 2025.
-
Survey-Based Calibration of the One-Community and Two-Community Social Network Models Used for Testing Singapore's Resilience to Pandemic Lockdown
Authors:
Jon Spalding,
Bertrand Jayles,
Renate Schubert,
Siew Ann Cheong,
Hans Herrmann
Abstract:
A resilient society is one capable of withstanding and thereafter recovering quickly from large shocks. Brought to the fore by the COVID-19 pandemic of 2020--2022, this social resilience is nevertheless difficult to quantify. In this paper, we measured how quickly the Singapore society recovered from the pandemic, by first modeling it as a dynamic social network governed by three processes: (1) ra…
▽ More
A resilient society is one capable of withstanding and thereafter recovering quickly from large shocks. Brought to the fore by the COVID-19 pandemic of 2020--2022, this social resilience is nevertheless difficult to quantify. In this paper, we measured how quickly the Singapore society recovered from the pandemic, by first modeling it as a dynamic social network governed by three processes: (1) random link addition between strangers; (2) social link addition between individuals with a friend in common; and (3) random link deletion . To calibrate this model, we carried out a survey of a representative sample of $N = 2,057$ residents and non-residents in Singapore between Jul and Sep 2022 to measure the numbers of random and social contacts gained over a fixed duration, as well as the number of contacts lost over the same duration, using phone contacts as proxy for social contacts. Lockdown simulations using the model that fits the survey results best suggest that Singapore would recover from such a disruption after 1--2 months.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Boosting Camera Motion Control for Video Diffusion Transformers
Authors:
Soon Yau Cheong,
Duygu Ceylan,
Armin Mustafa,
Andrew Gilbert,
Chun-Hao Paul Huang
Abstract:
Recent advancements in diffusion models have significantly enhanced the quality of video generation. However, fine-grained control over camera pose remains a challenge. While U-Net-based models have shown promising results for camera control, transformer-based diffusion models (DiT)-the preferred architecture for large-scale video generation - suffer from severe degradation in camera motion accura…
▽ More
Recent advancements in diffusion models have significantly enhanced the quality of video generation. However, fine-grained control over camera pose remains a challenge. While U-Net-based models have shown promising results for camera control, transformer-based diffusion models (DiT)-the preferred architecture for large-scale video generation - suffer from severe degradation in camera motion accuracy. In this paper, we investigate the underlying causes of this issue and propose solutions tailored to DiT architectures. Our study reveals that camera control performance depends heavily on the choice of conditioning methods rather than camera pose representations that is commonly believed. To address the persistent motion degradation in DiT, we introduce Camera Motion Guidance (CMG), based on classifier-free guidance, which boosts camera control by over 400%. Additionally, we present a sparse camera control pipeline, significantly simplifying the process of specifying camera poses for long videos. Our method universally applies to both U-Net and DiT models, offering improved camera control for video generation tasks.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Intelligent Interface: Enhancing Lecture Engagement with Didactic Activity Summaries
Authors:
Anna Wróblewska,
Marcel Witas,
Kinga Frańczak,
Arkadiusz Kniaź,
Siew Ann Cheong,
Tan Seng Chee,
Janusz Hołyst,
Marcin Paprzycki
Abstract:
Recently, multiple applications of machine learning have been introduced. They include various possibilities arising when image analysis methods are applied to, broadly understood, video streams. In this context, a novel tool, developed for academic educators to enhance the teaching process by automating, summarizing, and offering prompt feedback on conducting lectures, has been developed. The imp…
▽ More
Recently, multiple applications of machine learning have been introduced. They include various possibilities arising when image analysis methods are applied to, broadly understood, video streams. In this context, a novel tool, developed for academic educators to enhance the teaching process by automating, summarizing, and offering prompt feedback on conducting lectures, has been developed. The implemented prototype utilizes machine learning-based techniques to recognise selected didactic and behavioural teachers' features within lecture video recordings.
Specifically, users (teachers) can upload their lecture videos, which are preprocessed and analysed using machine learning models. Next, users can view summaries of recognized didactic features through interactive charts and tables. Additionally, stored ML-based prediction results support comparisons between lectures based on their didactic content. In the developed application text-based models trained on lecture transcriptions, with enhancements to the transcription quality, by adopting an automatic speech recognition solution are applied. Furthermore, the system offers flexibility for (future) integration of new/additional machine-learning models and software modules for image and video analysis.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
ViscoNet: Bridging and Harmonizing Visual and Textual Conditioning for ControlNet
Authors:
Soon Yau Cheong,
Armin Mustafa,
Andrew Gilbert
Abstract:
This paper introduces ViscoNet, a novel one-branch-adapter architecture for concurrent spatial and visual conditioning. Our lightweight model requires trainable parameters and dataset size multiple orders of magnitude smaller than the current state-of-the-art IP-Adapter. However, our method successfully preserves the generative power of the frozen text-to-image (T2I) backbone. Notably, it excels i…
▽ More
This paper introduces ViscoNet, a novel one-branch-adapter architecture for concurrent spatial and visual conditioning. Our lightweight model requires trainable parameters and dataset size multiple orders of magnitude smaller than the current state-of-the-art IP-Adapter. However, our method successfully preserves the generative power of the frozen text-to-image (T2I) backbone. Notably, it excels in addressing mode collapse, a pervasive issue previously overlooked. Our novel architecture demonstrates outstanding capabilities in achieving a harmonious visual-text balance, unlocking unparalleled versatility in various human image generation tasks, including pose re-targeting, virtual try-on, stylization, person re-identification, and textile transfer.Demo and code are available from project page https://soon-yau.github.io/visconet/ .
△ Less
Submitted 12 August, 2024; v1 submitted 5 December, 2023;
originally announced December 2023.
-
Thermal-Infrared Remote Target Detection System for Maritime Rescue based on Data Augmentation with 3D Synthetic Data
Authors:
Sungjin Cheong,
Wonho Jung,
Yoon Seop Lim,
Yong-Hwa Park
Abstract:
This paper proposes a thermal-infrared (TIR) remote target detection system for maritime rescue using deep learning and data augmentation. We established a self-collected TIR dataset consisting of multiple scenes imitating human rescue situations using a TIR camera (FLIR). Additionally, to address dataset scarcity and improve model robustness, a synthetic dataset from a 3D game (ARMA3) to augment…
▽ More
This paper proposes a thermal-infrared (TIR) remote target detection system for maritime rescue using deep learning and data augmentation. We established a self-collected TIR dataset consisting of multiple scenes imitating human rescue situations using a TIR camera (FLIR). Additionally, to address dataset scarcity and improve model robustness, a synthetic dataset from a 3D game (ARMA3) to augment the data is further collected. However, a significant domain gap exists between synthetic TIR and real TIR images. Hence, a proper domain adaptation algorithm is essential to overcome the gap. Therefore, we suggest a domain adaptation algorithm in a target-background separated manner from 3D game-to-real, based on a generative model, to address this issue. Furthermore, a segmentation network with fixed-weight kernels at the head is proposed to improve the signal-to-noise ratio (SNR) and provide weak attention, as remote TIR targets inherently suffer from unclear boundaries. Experiment results reveal that the network trained on augmented data consisting of translated synthetic and real TIR data outperforms that trained on only real TIR data by a large margin. Furthermore, the proposed segmentation model surpasses the performance of state-of-the-art segmentation methods.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
UPGPT: Universal Diffusion Model for Person Image Generation, Editing and Pose Transfer
Authors:
Soon Yau Cheong,
Armin Mustafa,
Andrew Gilbert
Abstract:
Text-to-image models (T2I) such as StableDiffusion have been used to generate high quality images of people. However, due to the random nature of the generation process, the person has a different appearance e.g. pose, face, and clothing, despite using the same text prompt. The appearance inconsistency makes T2I unsuitable for pose transfer. We address this by proposing a multimodal diffusion mode…
▽ More
Text-to-image models (T2I) such as StableDiffusion have been used to generate high quality images of people. However, due to the random nature of the generation process, the person has a different appearance e.g. pose, face, and clothing, despite using the same text prompt. The appearance inconsistency makes T2I unsuitable for pose transfer. We address this by proposing a multimodal diffusion model that accepts text, pose, and visual prompting. Our model is the first unified method to perform all person image tasks - generation, pose transfer, and mask-less edit. We also pioneer using small dimensional 3D body model parameters directly to demonstrate new capability - simultaneous pose and camera view interpolation while maintaining the person's appearance.
△ Less
Submitted 26 July, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Strategic differences between regional investments into graphene technology and how corporations and universities manage patent portfolios
Authors:
Ai Linh Nguyen,
Wenyuan Liu,
Khiam Aik Khor,
Andrea Nanetti,
Siew Ann Cheong
Abstract:
Nowadays, patenting activities are essential in converting applied science to technology in the prevailing innovation model. To gain strategic advantages in the technological competitions between regions, nations need to leverage the investments of public and private funds to diversify over all technologies or specialize in a small number of technologies. In this paper, we investigated who the lea…
▽ More
Nowadays, patenting activities are essential in converting applied science to technology in the prevailing innovation model. To gain strategic advantages in the technological competitions between regions, nations need to leverage the investments of public and private funds to diversify over all technologies or specialize in a small number of technologies. In this paper, we investigated who the leaders are at the regional and assignee levels, how they attained their leadership positions, and whether they adopted diversification or specialization strategies, using a dataset of 176,193 patent records on graphene between 1986 and 2017 downloaded from Derwent Innovation. By applying a co-clustering method to the IPC subclasses in the patents and using a z-score method to extract keywords from their titles and abstracts, we identified seven graphene technology areas emerging in the sequence synthesis - composites - sensors - devices - catalyst - batteries - water treatment. We then examined the top regions in their investment preferences and their changes in rankings over time and found that they invested in all seven technology areas. In contrast, at the assignee level, some were diversified while others were specialized. We found that large entities diversified their portfolios across multiple technology areas, while small entities specialized around their core competencies. In addition, we found that universities had higher entropy values than corporations on average, leading us to the hypothesis that corporations file, buy, or sell patents to enable product development. In contrast, universities focus only on licensing their patents. We validated this hypothesis through an aggregate analysis of reassignment and licensing and a more detailed analysis of three case studies - SAMSUNG, RICE UNIVERSITY, and DYSON.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Novel Light Field Imaging Device with Enhanced Light Collection for Cold Atom Clouds
Authors:
Sanha Cheong,
Josef C. Frisch,
Sean Gasiorowski,
Jason M. Hogan,
Michael Kagan,
Murtaza Safdari,
Ariel Schwartzman,
Maxime Vandegar
Abstract:
We present a light field imaging system that captures multiple views of an object with a single shot. The system is designed to maximize the total light collection by accepting a larger solid angle of light than a conventional lens with equivalent depth of field. This is achieved by populating a plane of virtual objects using mirrors and fully utilizing the available field of view and depth of fie…
▽ More
We present a light field imaging system that captures multiple views of an object with a single shot. The system is designed to maximize the total light collection by accepting a larger solid angle of light than a conventional lens with equivalent depth of field. This is achieved by populating a plane of virtual objects using mirrors and fully utilizing the available field of view and depth of field. Simulation results demonstrate that this design is capable of single-shot tomography of objects of size $\mathcal{O}$(1 mm$^3$), reconstructing the 3-dimensional (3D) distribution and features not accessible from any single view angle in isolation. In particular, for atom clouds used in atom interferometry experiments, the system can reconstruct 3D fringe patterns with size $\mathcal{O}$(100 $μ$m). We also demonstrate this system with a 3D-printed prototype. The prototype is used to take images of $\mathcal{O}$(1 mm$^{3}$) sized objects, and 3D reconstruction algorithms running on a single-shot image successfully reconstruct $\mathcal{O}$(100 $μ$m) internal features. The prototype also shows that the system can be built with 3D printing technology and hence can be deployed quickly and cost-effectively in experiments with needs for enhanced light collection or 3D reconstruction. Imaging of cold atom clouds in atom interferometry is a key application of this new type of imaging device where enhanced light collection, high depth of field, and 3D tomographic reconstruction can provide new handles to characterize the atom clouds.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Coverage hole detection in WSN with force-directed algorithm and transfer learning
Authors:
Yue-Hui Lai,
Se-Hang Cheong,
Hui Zhang,
Yain-Whar Si
Abstract:
Coverage hole detection is an important research problem in wireless sensor network research community. However, distributed approaches proposed in recent years for coverage hole detection problem have high computational complexity. In this paper, we propose a novel approach for coverage hole detection in wireless sensor networks called FD-TL (Force-directed and Transfer-learning) which is based o…
▽ More
Coverage hole detection is an important research problem in wireless sensor network research community. However, distributed approaches proposed in recent years for coverage hole detection problem have high computational complexity. In this paper, we propose a novel approach for coverage hole detection in wireless sensor networks called FD-TL (Force-directed and Transfer-learning) which is based on layout generation capability of Force-directed Algorithms and image recognition power of Convolutional Neural Network with transfer learning. In contrast to existing approaches, the proposed approach is a pure topology-based approach since FD-TL can detect both triangular and non-triangular coverage holes from a wireless sensor network based on the input network topology without relying on the physical locations of the anchor nodes. In FD-TL, a Force-directed Algorithm is used to generate a series of possible layouts from a given input topology. Next, a Convolutional Neural Network is used to recognize potential coverage holes from the generated layouts. During the training phase, a transfer learning method is used to aid the recognition process. Experimental results show that FD-TL method can achieve 90% sensitivity and 96% specificity for coverage hole detection in wireless sensor networks.
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Efficient message forwarding in mobile ad hoc network in disaster scenarios is challenging because location information on the boundary and interior nodes is often unavailable. Information related to boundary nodes can be used to design efficient routing protocols as well as to prolong the battery power of devices along the boundary of an ad hoc network. In this article, we developed an algorithm,…
▽ More
Efficient message forwarding in mobile ad hoc network in disaster scenarios is challenging because location information on the boundary and interior nodes is often unavailable. Information related to boundary nodes can be used to design efficient routing protocols as well as to prolong the battery power of devices along the boundary of an ad hoc network. In this article, we developed an algorithm, CWBound, which discovers boundary nodes in a complex non-convex mobile ad hoc (CNCAH) networks. Experiments show that the CWBound algorithm is at least three times faster than other state-of-the-art algorithms, and up to 400 times faster than classical force-directed algorithms. The experiments also confirmed that the CWBound algorithm achieved the highest accuracy (above 97% for 3 out of the 4 types of CNCAH networks) and sensitivity (90%) among the algorithms evaluated.
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
Force-directed algorithms for schematic drawings and placement: A survey
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Force-directed algorithms have been developed over the last 50 years and used in many application fields, including information visualisation, biological network visualisation, sensor networks, routing algorithms, scheduling, and graph drawing. Our survey provides a comprehensive summary of developments and a full roadmap for state-of-the-art force-directed algorithms in schematic drawings and pla…
▽ More
Force-directed algorithms have been developed over the last 50 years and used in many application fields, including information visualisation, biological network visualisation, sensor networks, routing algorithms, scheduling, and graph drawing. Our survey provides a comprehensive summary of developments and a full roadmap for state-of-the-art force-directed algorithms in schematic drawings and placement. We classified the model of force-directed algorithms into classical and hybrid. The classical force-directed algorithms are further classified as follows: (a) accumulated force models, (b) energy function minimisation models and (c) combinatorial optimisation models. The hybrid force-directed algorithms are classified as follows: (a) parallel and hardware accelerated models, (b) multilevel force-directed models and (c) multidimensional scaling force-directed algorithms. Five categories of application domains in which force-directed algorithms have been adopted for schematic drawings and placement are also summarised: (a) aesthetic drawings for general networks, (b) component placement and scheduling in high-level synthesis of very-large-scale integration circuits design, (c) information visualisation, (d) biological network visualisation and (e) node placement and localisation for sensor networks.
△ Less
Submitted 3 April, 2022;
originally announced April 2022.
-
Online force-directed algorithms for visualization of dynamic graphs
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Force-directed (FD) algorithms can be used to explore relationships in social networks, visualize money markets, and analyze transaction networks. However, FD algorithms are mainly designed for visualizing static graphs in which the topology of the networks remains constant throughout the calculation. In contrast to static graphs, nodes and edges in dynamic graphs can be added or removed as time p…
▽ More
Force-directed (FD) algorithms can be used to explore relationships in social networks, visualize money markets, and analyze transaction networks. However, FD algorithms are mainly designed for visualizing static graphs in which the topology of the networks remains constant throughout the calculation. In contrast to static graphs, nodes and edges in dynamic graphs can be added or removed as time progresses. In these situations, existing FD algorithms do not scale well, since any changes in the topology will trigger these algorithms to completely restart the entire computation. To alleviate this problem, we propose a design and implementation of five online FD algorithms to visualize dynamic graphs while maintaining their native force models. The online FD algorithms developed in this paper are able to reuse the force models of existing FD algorithms without significant modifications. To evaluate the effectiveness of the proposed approach, online FD algorithms are compared against static FD algorithms for visualizing dynamic graphs. Experimental results show that among the five algorithms evaluated, the online FD algorithm achieves the best number of edge crossings and the standard deviation of edge lengths for visualizing dynamic graphs.
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
An image classification approach for hole detection in wireless sensor networks
Authors:
Se-Hang Cheong,
Kim-Hou Ng,
Yain-Whar Si
Abstract:
Hole detection is a crucial task for monitoring the status of wireless sensor networks (WSN) which often consist of low-capability sensors. Holes can form in WSNs due to the problems during placement of the sensors or power/hardware failure. In these situations, sensing or transmitting data could be affected and can interrupt the normal operation of the WSNs. It may also decrease the lifetime of t…
▽ More
Hole detection is a crucial task for monitoring the status of wireless sensor networks (WSN) which often consist of low-capability sensors. Holes can form in WSNs due to the problems during placement of the sensors or power/hardware failure. In these situations, sensing or transmitting data could be affected and can interrupt the normal operation of the WSNs. It may also decrease the lifetime of the network and sensing coverage of the sensors. The problem of hole detection is especially challenging in WSNs since the exact location of the sensors is often unknown. In this paper, we propose a novel hole detection approach called FD-CNN which is based on Force-directed (FD) Algorithm and Convolutional Neural Network (CNN). In contrast to existing approaches, FD-CNN is a centralized approach and is able to detect holes from WSNs without relying on the information related to the location of the sensors. The proposed approach also alleviates the problem of high computational complexity in distributed approaches. The proposed approach accepts the network topology of a WSN as an input and generates the identity of the nodes surrounding each detected hole in the network as the final output. In the proposed approach, an FD algorithm is used to generate the layout of the wireless sensor networks followed by the identification of the holes in the layouts using a trained CNN model. In order to prepare labeled datasets for training the CNN model, an unsupervised pre-processing method is also proposed in this paper. After the holes are detected by the CNN model, two algorithms are proposed to identify the regions of the holes and corresponding nodes surrounding the regions. Extensive experiments are conducted to evaluate the proposed approach based on different datasets. Experimental results show that FD-CNN can achieve 80% sensitivity and 93% specificity in less than 2 minutes.
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
Snapshot Visualization of Complex Graphs with Force-Directed Algorithms
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Force-directed algorithms are widely used for visualizing graphs. However, these algorithms are computationally expensive in producing good quality layouts for complex graphs. The layout quality is largely influenced by execution time and methods' input parameters especially for large complex graphs. The snapshots of visualization generated from these algorithms are useful in presenting the curren…
▽ More
Force-directed algorithms are widely used for visualizing graphs. However, these algorithms are computationally expensive in producing good quality layouts for complex graphs. The layout quality is largely influenced by execution time and methods' input parameters especially for large complex graphs. The snapshots of visualization generated from these algorithms are useful in presenting the current view or a past state of an information on timeslices. Therefore, researchers often need to make a trade-off between the quality of visualization and the selection of appropriate force-directed algorithms. In this paper, we evaluate the quality of snapshots generated from 7 force-directed algorithms in terms of number of edge crossing and the standard deviations of edge length. Our experimental results showed that KK, FA2 and DH algorithms cannot produce satisfactory visualizations for large graphs within the time limit. KK-MS-DS algorithm can process large and planar graphs but it does not perform well for graphs with low average degrees. KK-MS algorithm produces better visualizations for sparse and non-clustered graphs than KK-MS-DS algorithm.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Saving lives: design and implementation of lifeline emergency ad hoc network
Authors:
Se-Hang Cheong,
Yain-Whar Si,
Leong-Hou U
Abstract:
This paper aims to propose a system for automatically forming ad hoc networks using mobile phones and battery-powered wireless routers for emergency situations. The system also provides functions to send emergency messages and identify the location of victims based on the network topology information.
Optimized link state routing protocol is used to instantly form an ad hoc emergency network bas…
▽ More
This paper aims to propose a system for automatically forming ad hoc networks using mobile phones and battery-powered wireless routers for emergency situations. The system also provides functions to send emergency messages and identify the location of victims based on the network topology information.
Optimized link state routing protocol is used to instantly form an ad hoc emergency network based on WiFi signals from mobile phones of the victims, backup battery-powered wireless routers preinstalled in buildings and mobile devices deployed by search and rescue teams. The proposed system is also designed to recover from partial crash of network and nodes lost.
Experimental results demonstrate the effectiveness of the proposed system in terms of battery life, transmission distance and noises.
A novel message routing schedule is proposed for conserving battery life. A novel function to estimate the location of a mobile device which sent an emergency message is proposed in this paper.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Boundary Node Detection and Unfolding of Complex Non-Convex Ad Hoc Networks
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Complex non-convex ad hoc networks (CNCAH) contain intersecting polygons and edges. In many instances, the layouts of these networks are not entirely convex in shape. In this article, we propose a Kamada-Kawai-based algorithm called W-KK-MS for boundary node detection problems, which is capable of aligning node positions while achieving high sensitivity, specificity, and accuracy in producing a vi…
▽ More
Complex non-convex ad hoc networks (CNCAH) contain intersecting polygons and edges. In many instances, the layouts of these networks are not entirely convex in shape. In this article, we propose a Kamada-Kawai-based algorithm called W-KK-MS for boundary node detection problems, which is capable of aligning node positions while achieving high sensitivity, specificity, and accuracy in producing a visual drawing from the input network topology. The algorithm put forward in this article selects and assigns weights to top-k nodes in each iteration to speed up the updating process of nodes. We also propose a novel approach to detect and unfold stacked regions in CNCAH networks. Experimental results show that the proposed algorithms can achieve fast convergence on boundary node detection in CNCAH networks and are able to successfully unfold stacked regions. The design and implementation of a prototype system called ELnet for analyzing CNCAH networks is also described in this article. The ELnet system is capable of generating synthetic networks for testing, integrating with force-directed algorithms, and visualizing and analyzing algorithms' outcomes.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Lifeline: Emergency Ad Hoc Network
Authors:
Se-Hang Cheong,
Kai-Ip Lee,
Yain-Whar Si,
Leong-Hou U
Abstract:
Lifeline is a group of systems designed for mobile phones and battery powered wireless routers for forming emergency Ad hoc networks. Devices installed with Lifeline program can automatically form Ad hoc networks when cellular signal is unavailable or disrupted during natural disasters. For instance, large scale earthquakes can cause extensive damages to land-based telecommunication infrastructure…
▽ More
Lifeline is a group of systems designed for mobile phones and battery powered wireless routers for forming emergency Ad hoc networks. Devices installed with Lifeline program can automatically form Ad hoc networks when cellular signal is unavailable or disrupted during natural disasters. For instance, large scale earthquakes can cause extensive damages to land-based telecommunication infrastructures. In such circumstances, mobile phones installed with Lifeline program can be used to send emergency messages by the victims who are trapped under collapsed buildings. In addition, Lifeline also provides a function for the rescuers to estimate the positions of the victims based on network propagation techniques. Lifeline also has the ability to recover from partial crash of network and nodes lost.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
KPE: Keypoint Pose Encoding for Transformer-based Image Generation
Authors:
Soon Yau Cheong,
Armin Mustafa,
Andrew Gilbert
Abstract:
Transformers have recently been shown to generate high quality images from text input. However, the existing method of pose conditioning using skeleton image tokens is computationally inefficient and generate low quality images. Therefore we propose a new method; Keypoint Pose Encoding (KPE); KPE is 10 times more memory efficient and over 73% faster at generating high quality images from text inpu…
▽ More
Transformers have recently been shown to generate high quality images from text input. However, the existing method of pose conditioning using skeleton image tokens is computationally inefficient and generate low quality images. Therefore we propose a new method; Keypoint Pose Encoding (KPE); KPE is 10 times more memory efficient and over 73% faster at generating high quality images from text input conditioned on the pose. The pose constraint improves the image quality and reduces errors on body extremities such as arms and legs. The additional benefits include invariance to changes in the target image domain and image resolution, making it easily scalable to higher resolution images. We demonstrate the versatility of KPE by generating photorealistic multiperson images derived from the DeepFashion dataset. We also introduce a evaluation method People Count Error (PCE) that is effective in detecting error in generated human images.
△ Less
Submitted 6 October, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
Coevolution of theoretical and applied research: a case study of graphene research by temporal and geographic analysis
Authors:
Ai Linh Nguyen,
Wenyuan Liu,
Siew Ann Cheong
Abstract:
As a part of science of science (SciSci) research, the evolution of scientific disciplines has been attracting a great deal of attention recently. This kind of discipline level analysis not only give insights of one particular field but also shed light on general principles of scientific enterprise. In this paper we focus on graphene research, a fast growing field covers both theoretical and appli…
▽ More
As a part of science of science (SciSci) research, the evolution of scientific disciplines has been attracting a great deal of attention recently. This kind of discipline level analysis not only give insights of one particular field but also shed light on general principles of scientific enterprise. In this paper we focus on graphene research, a fast growing field covers both theoretical and applied study. Using co-clustering method, we split graphene literature into two groups and confirm that one group is about theoretical research (T) and another corresponds to applied research (A). We analyze the proportion of T/A and found applied research becomes more and more popular after 2007. Geographical analysis demonstrated that countries have different preference in terms of T/A and they reacted differently to research trend. The interaction between two groups has been analyzed and shows that T extremely relies on T and A heavily relies on A, however the situation is very stable for T but changed markedly for A. No geographic difference is found for the interaction dynamics. Our results give a comprehensive picture of graphene research evolution and also provide a general framework which is able to analyze other disciplines.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Fast and resilient manipulation planning for target retrieval in clutter
Authors:
Changjoo Nam,
Jinhwi Lee,
Sang Hun Cheong,
Brian Y. Cho,
ChangHwan Kim
Abstract:
This paper presents a task and motion planning (TAMP) framework for a robotic manipulator in order to retrieve a target object from clutter. We consider a configuration of objects in a confined space with a high density so no collision-free path to the target exists. The robot must relocate some objects to retrieve the target without collisions. For fast completion of object rearrangement, the rob…
▽ More
This paper presents a task and motion planning (TAMP) framework for a robotic manipulator in order to retrieve a target object from clutter. We consider a configuration of objects in a confined space with a high density so no collision-free path to the target exists. The robot must relocate some objects to retrieve the target without collisions. For fast completion of object rearrangement, the robot aims to optimize the number of pick-and-place actions which often determines the efficiency of a TAMP framework.
We propose a task planner incorporating motion planning to generate executable plans which aims to minimize the number of pick-and-place actions. In addition to fully known and static environments, our method can deal with uncertain and dynamic situations incurred by occluded views. Our method is shown to reduce the number of pick-and-place actions compared to baseline methods (e.g., at least 28.0% of reduction in a known static environment with 20 objects).
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Where to relocate?: Object rearrangement inside cluttered and confined environments for robotic manipulation
Authors:
Sang Hun Cheong,
Brian Y. Cho,
Jinhwi Lee,
ChangHwan Kim,
Changjoo Nam
Abstract:
We present an algorithm determining where to relocate objects inside a cluttered and confined space while rearranging objects to retrieve a target object. Although methods that decide what to remove have been proposed, planning for the placement of removed objects inside a workspace has not received much attention. Rather, removed objects are often placed outside the workspace, which incurs additi…
▽ More
We present an algorithm determining where to relocate objects inside a cluttered and confined space while rearranging objects to retrieve a target object. Although methods that decide what to remove have been proposed, planning for the placement of removed objects inside a workspace has not received much attention. Rather, removed objects are often placed outside the workspace, which incurs additional laborious work (e.g., motion planning and execution of the manipulator and the mobile base, perception of other areas). Some other methods manipulate objects only inside the workspace but without a principle so the rearrangement becomes inefficient.
In this work, we consider both monotone (each object is moved only once) and non-monotone arrangement problems which have shown to be NP-hard. Once the sequence of objects to be relocated is given by any existing algorithm, our method aims to minimize the number of pick-and-place actions to place the objects until the target becomes accessible. From extensive experiments, we show that our method reduces the number of pick-and-place actions and the total execution time (the reduction is up to 23.1% and 28.1% respectively) compared to baseline methods while achieving higher success rates.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
The role of mainstreamness and interdisciplinarity for the relevance of scientific papers
Authors:
Stefan Thurner,
Wenyuan Liu,
Peter Klimek,
Siew Ann Cheong
Abstract:
There is demand from science funders, industry, and the public that science should become more risk-taking, more out-of-the-box, and more interdisciplinary. Is it possible to tell how interdisciplinary and out-of-the-box scientific papers are, or which papers are mainstream? Here we use the bibliographic coupling network, derived from all physics papers that were published in the Physical Review j…
▽ More
There is demand from science funders, industry, and the public that science should become more risk-taking, more out-of-the-box, and more interdisciplinary. Is it possible to tell how interdisciplinary and out-of-the-box scientific papers are, or which papers are mainstream? Here we use the bibliographic coupling network, derived from all physics papers that were published in the Physical Review journals in the past century, to try to identify them as mainstream, out-of-the-box, or interdisciplinary. We show that the network clusters into scientific fields. The position of individual papers with respect to these clusters allows us to estimate their degree of mainstreamness or interdisciplinary. We show that over the past decades the fraction of mainstream papers increases, the fraction of out-of-the-box decreases, and the fraction of interdisciplinary papers remains constant. Studying the rewards of papers, we find that in terms of absolute citations, both, mainstream and interdisciplinary papers are rewarded. In the long run, mainstream papers perform less than interdisciplinary ones in terms of citation rates. We conclude that to avoid a trend towards mainstreamness a new incentive scheme is necessary.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
The Golden Eras of Graphene Science and Technology: Bibliographic Evidences From Journal and Patent Publications
Authors:
Ai Linh Nguyen,
Wenyuan Liu,
Khiam Aik Khor,
Andrea Nanetti,
Siew Ann Cheong
Abstract:
Today's scientific research is an expensive enterprise funded largely by taxpayers' and corporate groups' monies. It is a critical part in the competition between nations, and all nations want to discover fields of research that promise to create future industries, and dominate these by building up scientific and technological expertise early. However, our understanding of the value chain going fr…
▽ More
Today's scientific research is an expensive enterprise funded largely by taxpayers' and corporate groups' monies. It is a critical part in the competition between nations, and all nations want to discover fields of research that promise to create future industries, and dominate these by building up scientific and technological expertise early. However, our understanding of the value chain going from science to technology is still in a relatively infant stage, and the conversion of scientific leadership into market dominance remains very much an alchemy rather than a science. In this paper, we analyze bibliometric records of scientific journal publications and patents related to graphene, at the aggregate level as well as on the temporal and spatial dimensions. We find the present leaders of graphene science and technology emerged rather late in the race, after the initial scientific leaders lost their footings. More importantly, notwithstanding the amount of funding already committed, we find evidences that suggest the 'Golden Eras' of graphene science and technology were in 2010 and 2012 respectively, in spite of the continued growth of journal and patent publications in this area.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Using Machine Learning to Predict the Evolution of Physics Research
Authors:
Wenyuan Liu,
Stanisław Saganowski,
Przemysław Kazienko,
Siew Ann Cheong
Abstract:
The advancement of science as outlined by Popper and Kuhn is largely qualitative, but with bibliometric data it is possible and desirable to develop a quantitative picture of scientific progress. Furthermore it is also important to allocate finite resources to research topics that have growth potential, to accelerate the process from scientific breakthroughs to technological innovations. In this p…
▽ More
The advancement of science as outlined by Popper and Kuhn is largely qualitative, but with bibliometric data it is possible and desirable to develop a quantitative picture of scientific progress. Furthermore it is also important to allocate finite resources to research topics that have growth potential, to accelerate the process from scientific breakthroughs to technological innovations. In this paper, we address this problem of quantitative knowledge evolution by analysing the APS publication data set from 1981 to 2010. We build the bibliographic coupling and co-citation networks, use the Louvain method to detect topical clusters (TCs) in each year, measure the similarity of TCs in consecutive years, and visualize the results as alluvial diagrams. Having the predictive features describing a given TC and its known evolution in the next year, we can train a machine learning model to predict future changes of TCs, i.e., their continuing, dissolving, merging and splitting. We found the number of papers from certain journals, the degree, closeness, and betweenness to be the most predictive features. Additionally, betweenness increases significantly for merging events, and decreases significantly for splitting events. Our results represent a first step from a descriptive understanding of the Science of Science (SciSci), towards one that is ultimately prescriptive.
△ Less
Submitted 29 October, 2018;
originally announced October 2018.
-
Knowledge Evolution in Physics Research: An Analysis of Bibliographic Coupling Networks
Authors:
Wenyuan Liu,
Andrea Nanetti,
Siew Ann Cheong
Abstract:
Even as we advance the frontiers of physics knowledge, our understanding of how this knowledge evolves remains at the descriptive levels of Popper and Kuhn. Using the APS publications data sets, we ask in this letter how new knowledge is built upon old knowledge. We do so by constructing year-to-year bibliographic coupling networks, and identify in them validated communities that represent differe…
▽ More
Even as we advance the frontiers of physics knowledge, our understanding of how this knowledge evolves remains at the descriptive levels of Popper and Kuhn. Using the APS publications data sets, we ask in this letter how new knowledge is built upon old knowledge. We do so by constructing year-to-year bibliographic coupling networks, and identify in them validated communities that represent different research fields. We then visualize their evolutionary relationships in the form of alluvial diagrams, and show how they remain intact through APS journal splits. Quantitatively, we see that most fields undergo weak Popperian mixing, and it is rare for a field to remain isolated/undergo strong mixing. The sizes of fields obey a simple linear growth with recombination. We can also reliably predict the merging between two fields, but not for the considerably more complex splitting. Finally, we report a case study of two fields that underwent repeated merging and splitting around 1995, and how these Kuhnian events are correlated with breakthroughs on BEC, quantum teleportation, and slow light. This impact showed up quantitatively in the citations of the BEC field as a larger proportion of references from during and shortly after these events.
△ Less
Submitted 4 April, 2017;
originally announced April 2017.
-
Accelerating the Kamada-Kawai algorithm for boundary detection in a mobile ad hoc network
Authors:
Se-Hang Cheong,
Yain-Whar Si
Abstract:
Force-directed algorithms such as the Kamada-Kawai algorithm have shown promising results for solving the boundary detection problem in a mobile ad hoc network. However, the classical Kamada-Kawai algorithm does not scale well when it is used in networks with large numbers of nodes. It also produces poor results in non-convex networks. To address these problems, this paper proposes an improved ver…
▽ More
Force-directed algorithms such as the Kamada-Kawai algorithm have shown promising results for solving the boundary detection problem in a mobile ad hoc network. However, the classical Kamada-Kawai algorithm does not scale well when it is used in networks with large numbers of nodes. It also produces poor results in non-convex networks. To address these problems, this paper proposes an improved version of the Kamada-Kawai algorithm. The proposed extension includes novel heuristics and algorithms that achieve a faster energy level reduction. Our experimental results show that the improved algorithm can significantly shorten the processing time and detect boundary nodes with an acceptable level of accuracy.
△ Less
Submitted 21 August, 2015;
originally announced August 2015.
-
Novel Degree Distribution Function for LT codes over Finite Field
Authors:
Siotai Cheong,
Pinyi Fan
Abstract:
Luby Transform (LT) code over finite field is a recent research topic. In order to find out the properties of LT codes over finite field, a novel degree distribution function is proposed in this paper. The main thinking of our developed distribution function is to improve the decoding success rate with the same overhead, and still to keep the sparse property for the encoding matrix. Numerical simu…
▽ More
Luby Transform (LT) code over finite field is a recent research topic. In order to find out the properties of LT codes over finite field, a novel degree distribution function is proposed in this paper. The main thinking of our developed distribution function is to improve the decoding success rate with the same overhead, and still to keep the sparse property for the encoding matrix. Numerical simulations are used to show the general performance of our novel function. Various simulation results show that in the environment of LT codes over finite field, our new degree distribution function performs much better than the degree distribution functions proposed by Luby as the field size increasing. In conclusion, our novel degree distribution function is more suitable to be used in LT codes over finite field.
△ Less
Submitted 15 October, 2014;
originally announced October 2014.
-
Quantitative Comparison Between Crowd Models for Evacuation Planning and Evaluation
Authors:
Vaisagh Viswanathan,
Chong Eu Lee,
Michael Harold Lees,
Siew Ann Cheong,
Peter M. A. Sloot
Abstract:
Crowd simulation is rapidly becoming a standard tool for evacuation planning and evaluation. However, the many crowd models in the literature are structurally different, and few have been rigorously calibrated against real-world egress data, especially in emergency situations. In this paper we describe a procedure to quantitatively compare different crowd models or between models and real-world da…
▽ More
Crowd simulation is rapidly becoming a standard tool for evacuation planning and evaluation. However, the many crowd models in the literature are structurally different, and few have been rigorously calibrated against real-world egress data, especially in emergency situations. In this paper we describe a procedure to quantitatively compare different crowd models or between models and real-world data. We simulated three models: (1) the lattice gas model, (2) the social force model, and (3) the RVO2 model, and obtained the distributions of six observables: (1) evacuation time, (2) zoned evacuation time, (3) passage density, (4) total distance traveled, (5) inconvenience, and (6) flow rate. We then used the DISTATIS procedure to compute the compromise matrix of statistical distances between the three models. Projecting the three models onto the first two principal components of the compromise matrix, we find the lattice gas and RVO2 models are similar in terms of the evacuation time, passage density, and flow rates, whereas the social force and RVO2 models are similar in terms of the total distance traveled. Most importantly, we find that the zoned evacuation times of the three models to be very different from each other. Thus we propose to use this variable, if it can be measured, as the key test between different models, and also between models and the real world. Finally, we compared the model flow rates against the flow rate of an emergency evacuation during the May 2008 Sichuan earthquake, and found the social force model agrees best with this real data.
△ Less
Submitted 10 January, 2014; v1 submitted 1 January, 2014;
originally announced January 2014.
-
Strategic Insights From Playing the Quantum Tic-Tac-Toe
Authors:
J. N. Leaw,
S. A. Cheong
Abstract:
In this paper, we perform a minimalistic quantization of the classical game of tic-tac-toe, by allowing superpositions of classical moves. In order for the quantum game to reduce properly to the classical game, we require legal quantum moves to be orthogonal to all previous moves. We also admit interference effects, by squaring the sum of amplitudes over all moves by a player to compute his or her…
▽ More
In this paper, we perform a minimalistic quantization of the classical game of tic-tac-toe, by allowing superpositions of classical moves. In order for the quantum game to reduce properly to the classical game, we require legal quantum moves to be orthogonal to all previous moves. We also admit interference effects, by squaring the sum of amplitudes over all moves by a player to compute his or her occupation level of a given site. A player wins when the sums of occupations along any of the eight straight lines we can draw in the $3 \times 3$ grid is greater than three. We play the quantum tic-tac-toe first randomly, and then deterministically, to explore the impact different opening moves, end games, and different combinations of offensive and defensive strategies have on the outcome of the game. In contrast to the classical tic-tac-toe, the deterministic quantum game does not always end in a draw. In contrast also to most classical two-player games of no chance, it is possible for Player 2 to win. More interestingly, we find that Player 1 enjoys an overwhelming quantum advantage when he opens with a quantum move, but loses this advantage when he opens with a classical move. We also find the quantum blocking move, which consists of a weighted superposition of moves that the opponent could use to win the game, to be very effective in denying the opponent his or her victory. We then speculate what implications these results might have on quantum information transfer and portfolio optimization.
△ Less
Submitted 21 July, 2010;
originally announced July 2010.