全國中小學科展

電腦科學與資訊工程

語音情緒辨識之研究

情緒辨識是增進人際溝通的重要能力。如生命線、電話客服等應用情境缺乏表情、肢體語言等輔助時,單以語音進行情緒辨識有極高的實用價值。 本研究探討比較支持向量機(SVM)及卷積神經網路(CNN)兩種機器學習方法於訓練「AI語音情緒辨識」分類器模型的表現。我們採用SAVEE和RAVDESS兩個英文語音資料庫,並自行製作與標註「逼逼中文情緒語料庫」。研究結果顯示SVM對SAVEE資料庫單一情緒的辨識正確率達84~94%,個別錄音員正確率達75%,超越官網紀錄的73.7%。同時,實驗顯示深度學習的模型在訓練資料不足的狀況下,反而相對遜色。

Deep learning on Covid-19 prediction and X-ray severity grading system

利用深度學習解決醫學問題一直是受矚目的研究主題。鑒於近期新冠肺炎疫情上升,有關新冠肺炎檢測的研究便成了熱門研究主題。目前,最有效的檢測方法是聚合酶連鎖反應 (PCR),然而,PCR耗時甚久且有人為誤差。因此,以X光影像圖透過深度學習來診斷並分級是一個有效率且安全的做法。在研究中,我們利用深度學習進行疾病診斷,在五元分類上有相當高的準確率(84.91%)、在COVID-19單獨辨識時得到了極高的準確率(99.35%)、產生出疾病熱區及設計了新的分級系統( X-ray Severity Grading System , XSGS),並將其用於嚴重程度分類,在不同分級下具有可辨別的差異。

基於觸控軌跡及裝置加速度資料提升年長者之觸控準確率

本研究使用機器學習方法,改善年長者使用手機時觸控系統對於點按位置判斷之能力。首先設計實驗比較年長者使用手機時,點按位置及手勢判斷的準確率,接著收集年長使用者的觸控軌跡及裝置相關資料,並訓練模型以減少系統判斷的錯誤率和誤差幅度。再比較及分析不同機器學習模型對於本研究之資料的適用程度及經校準後點按位置準確率的提升,進而挑選出一個能夠最有效提升點按位置準確率的模型進行點按位置的預測。實驗過後選擇最有效提升準確率的Random Forest Regressor進行其他的校正實驗及分析。使用者點按位置的預測準確率能被有效提升,準確率能提高32.3%。而最終,將訓練後的模型套回實驗用的手機程式,系統判斷受測者的點按位置能從原本的63.7%提升至97.5%。

應用網路爬蟲於社交軟體實現群眾互動平臺之研究

現今的大型活動,如:校慶活動、新北耶誕城等,缺乏互動性與參與感,其中原因大多是觀眾時常埋沒於手機中的社交軟體當中所導致。而我們的研究將利用此特性,探討大眾對於活動的觀點,搭配網路爬蟲抓取使用者的貼文,觀眾只需在Instagram、Twitter等社交軟體中發布文章,系統就會即時推播至活動中的大螢幕上,並且結合圖像辨識快速審核貼文,設計出一套能改善互動性低落的解決方案。研究中我們探討不同的網路爬蟲演算法、圖像辨識技術,及問卷調查等來使作品更加精進,且搭配Line Bot、後臺管理,及常駐貼文等功能來為各類大型活動量身打造,也能夠運用於政令宣導或文宣廣告等用途上,大幅提升活動的互動性與精采程度。

A Person Re-identification based Misidentification-proof Person Following Service Robot

Two years ago, I attended a robot contest, in which one of the missions required the robot to follow the pedestrian to complete the task. At that time, I used their demo program to complete the task. Not long after, I found two main issues: 1. The program follows the closest point read by the depth camera, which if I walk close to a wall next to, the robot may likely ‘follow’ the wall. 2. Not to mention if another pedestrian crosses between the robot and the target. Regarding these two issues, I decided to improve it. We’ve designed a procedure of using YOLO Object Detection and Person re-identification to re-identify the target for continuous following.

Enhancement of Online Stochastic Gradient Descent using Backward Queried Images

Stochastic gradient descent (SGD) is one of the preferred online optimization algorithms. However, one of its major drawbacks is its predisposition to forgetting previous data when optimizing through a data stream, also known as catastrophic interference. In this project, we attempt to mitigate this drawback by proposing a new low-cost approach which incorporates backward queried images with SGD during online training. Under this new approach, we propose that for every new training sample through the data stream, the neural network is optimized using the corresponding backward queried image from the initial dataset. After compiling the accuracy of the proposed method and SGD under a data-stream of 50,000 training cases with 10,000 test cases and comparing our algorithm to SGD, we see substantial improvements in the performance of the neural network with two different MNIST datasets (Fashion and Kuzushiji), classifying the MNIST datasets at a high accuracy for the mean, minimum, lower quartile, median, and upper quartile, while maintaining lower standard deviation in performance, demonstrating that our proposed algorithm can be a potential alternative to online SGD.

Limited Query Black-box Adversarial Attacks in the Real World

We study the creation of physical adversarial examples, which are robust to real-world transformations, using a limited number of queries to the target black-box neural networks. We observe that robust models tend to be especially susceptible to foreground manipulations, which motivates our novel Foreground attack. We demonstrate that gradient priors are a useful signal for black-box attacks and therefore introduce an improved version of the popular SimBA. We also propose an algorithm for transferable attacks that selects the most similar surrogates to the target model. Our black-box attacks outperform state-of-the-art approaches they are based on and support our belief that the concept of model similarity could be leveraged to build strong attacks in a limited-information setting.

彩色二維條碼手持產品開發之探討

QR Code是由黑白模組組成的二維數位條碼,掃描後可讀取儲存的訊息。受限於設計原理,QR Code使用二進位制儲存資料。增加模組數目可增加資料量,但若在條碼內塞進太多模組時,尺寸太小的模組將無法被掃描器讀取。此外,目前QR Code掃描器僅支援單張掃描,並無法應付同時多張條碼掃描的實務需求。 如能克服顏色辨識,理論上彩色二維條碼將能克服現行QR Code的限制,但市面上並無相關產品可供測試。因此本專題設計了一款10×10、具8顏色的"Colour Matrix",並利用Raspberry Pi開發Colour Matrix在手持裝置上運作的軟硬體來進行實驗。此實驗成功利用機器學習演算法在Raspberry Pi上進行的顏色辨識。開發的程式在單張掃描上效能與使用pyzbar辨識QR Code相當;在多張掃描方面,使用pyzbar辨識QR Code的解碼成功率為3.1%,而本專題的方法將成功率提升至92.4%,擴增數位條碼的使用範圍,具商用價值。

Limited Query Black-box Adversarial Attacks in the Real World

We study the creation of physical adversarial examples, which are robust to real-world transformations, using a limited number of queries to the target black-box neural networks. We observe that robust models tend to be especially susceptible to foreground manipulations, which motivates our novel Foreground attack. We demonstrate that gradient priors are a useful signal for black-box attacks and therefore introduce an improved version of the popular SimBA. We also propose an algorithm for transferable attacks that selects the most similar surrogates to the target model. Our black-box attacks outperform state-of-the-art approaches they are based on and support our belief that the concept of model similarity could be leveraged to build strong attacks in a limited-information setting.

A Person Re-identification based Misidentification-proof Person Following Service Robot

Two years ago, I attended a robot contest, in which one of the missions required the robot to follow the pedestrian to complete the task. At that time, I used their demo program to complete the task. Not long after, I found two main issues: 1. The program follows the closest point read by the depth camera, which if I walk close to a wall next to, the robot may likely ‘follow’ the wall. 2. Not to mention if another pedestrian crosses between the robot and the target. Regarding these two issues, I decided to improve it. We’ve designed a procedure of using YOLO Object Detection and Person re-identification to re-identify the target for continuous following.