全國中小學科展

電腦科學與資訊工程

A Person Re-identification based Misidentification-proof Person Following Service Robot

Two years ago, I attended a robot contest, in which one of the missions required the robot to follow the pedestrian to complete the task. At that time, I used their demo program to complete the task. Not long after, I found two main issues: 1. The program follows the closest point read by the depth camera, which if I walk close to a wall next to, the robot may likely ‘follow’ the wall. 2. Not to mention if another pedestrian crosses between the robot and the target. Regarding these two issues, I decided to improve it. We’ve designed a procedure of using YOLO Object Detection and Person re-identification to re-identify the target for continuous following.

臺南市違停的離散小波與ARIMA分析

現今逐漸有許多科學家研究出一些能夠進行預測事件的方法,諸如天氣預報、價格變化的幅度等等。在眾多生活常見的問題中,我們選定違規停車為例,作為研究主題,而我們推測違規停車是一種具有週期性的問題,有多樣的潛在變因存在,於是我們跳脫以往多以心理層面、法規制度與地理熱點等的視角去看待違規停車,以資訊科學及數學的方法,建立一套分析的模式加以進行研究。 本文以連續小波變換CWT、最大重複離散小波轉換MODWT、差分整合移動平均自迴歸模型ARIMA、混合MODWT+ARIMA模型及混合Harr離散小波變換DWT+ARIMA模型,對臺南市三個不同特性的行政里的共五個聚類點,進行預測。原始的資料以週為單位,分成全日(allDay,0~24時)及白天(Day, 08~16時)兩種型態,並以連續46週的資料預測接下來4週。結果採用方均根誤差RMSE相對平均值、標準差、最大值的比值,進行預測品質的比較。

THE BLIND'S SHINE

Nowadays, all blind people are able to read any type of text thanks to The Braille system, which is a system of reading by touch. The Braille system provides a good and important help to blind people but it’s not enough. They try to integrate into society, try to read and write the same as those blessed with sight. However, only 18% of people can actually write in Braille and doing so takes a lot of effort. While Braille techniques have existed for many years now, there isn’t one that takes advantage of the comfort and easiness of modern technology. To be fair and give more chances to the blind people, and with all the available technologies nowadays, we must find solutions and innovative ideas to fulfill this objective. And this is how our project was born. To be honest, it’s not just a project, for us it’s a dream. Our focus in this project is creating an automatic machine based on transforming our language to their language and transforming this new invention to assist the blind in writing whole texts through speaking. It will be easier than the traditional way. This part of the project will help us print Braille on paper automatically in the cheapest, fastest and easiest way, unlike the traditional method that not only takes a lot of time but also needs a professional. Our printer will only cost approximately 250$ compared to regular printers that cost 6500$! the principles of the code of the speech recognition are voice pickup in all languages as first step, second speech recognition, then speech translation, after that speech analysis and finally translation into Braille and printing it. As for the future, we will work on face, object and image recognition as a scanner to make the visually impaired people read the name of the object and recognize people’s faces like anyone else.

HoneySurfer: Intelligent Web-Surfing Honeypots

In Singapore’s evolving cyber landscape, 96% of organisations have suffered at least one cyber attack and 95% of organisations have been reporting more sophisticated attacks in the frame of one year according to a 2019 report[1] by Carbon Black. As such, more tools must be utilised to counter increasingly refined attacks performed by malicious actors. Honeypots are effective tools for studying and mitigating these attacks. They work as decoy systems, typically deployed alongside real systems to capture and log the activities of the attacker. These systems are useful as they can actively detect potential attacks, help cybersecurity specialists study an attacker’s tactics and even misdirect attackers from their intended targets. Honeypots can be classified into two main categories: 1. Low-interaction honeypots merely emulate network services and internet protocols, allowing for limited interaction with the attacker. 2. High-interaction honeypots emulate operating systems, allowing for much more interaction with the attacker. Although honeypots are powerful tools, its value diminishes when its true identity is uncovered by attackers. This is especially so with attackers becoming more skilled through system fingerprinting or analysing network traffic from targets and hence, hindering honeypots from capturing more experienced attackers. While substantial research has been done to defend against system fingerprinting scans (see 1.1 Related Work), not much has been done to defend against network traffic analysis. As pointed out by Symantec[2][3], when attackers attempt to sniff network traffic of the system in question, the lack of network traffic raises a red flag, increasing the likelihood of the honeypot’s true identity being discovered. In addition, the main concern with regards to honeypot deployment being their ability to attract and engage attackers for a substantial period of time, an increased ability to interest malicious actors is invaluable. Producing human-like network activity on a honeypot would appeal to more malicious actors. Hence, this research aims to build an intelligent web-surfer which can learn and thus simulate human web-surfing behaviour, creating evidence of human network activities to disguise the identity of honeypots as production systems and luring in more attackers interested in packet sniffing for malicious purposes.

Predicting the Binding Affinity between Medicine and Estrogen Receptor Beta

Recent studies showed that the probability of Taiwanese females developing breast cancer has risen dramatically over the past 30 years. We are now facing younger and more breast cancer patients in Taiwan. What makes the matter even more severe, is the fact that patients that take cancer treating medicine will suffer from its serious side effects, some may even lose the ability to reproduce. We hope to develop a new system that can help doctors and researchers develop new medicine for treating breast cancer, the way medicine cures cancer tumors are by attaching onto the infected cells’ receptors. After collecting MACCS data (converted from SMILES), the dataset will be used for training the machine learning program. Due to the problem of insufficient training data, we used an ensemble method to generate our machine learning model. Among the three basic ensemble techniques, Max Voting, Averaging, and Weighted Averaging. we selected the max voting technique to perform the prediction for this research. We created two separate datasets, positive and negative, the two datasets will later be used as training data for the program. We weren’t sure of the ratio of positive and negative in the training data, therefore we compare 40 different ratios and evaluate the results. By comparing the accuracy of the models, we found out that when the ratio between positive data and negative data is 1:3000, the machine learning program will have the highest precision. After we created the final model through voting among the 1000 models generated, we evaluate the precision of the model through the following methods, AUC, precision, recall. The ultimate goal of this research is to assist doctors and researchers shorten the process of developing and testing new medicines.

Limited Query Black-box Adversarial Attacks in the Real World

We study the creation of physical adversarial examples, which are robust to real-world transformations, using a limited number of queries to the target black-box neural networks. We observe that robust models tend to be especially susceptible to foreground manipulations, which motivates our novel Foreground attack. We demonstrate that gradient priors are a useful signal for black-box attacks and therefore introduce an improved version of the popular SimBA. We also propose an algorithm for transferable attacks that selects the most similar surrogates to the target model. Our black-box attacks outperform state-of-the-art approaches they are based on and support our belief that the concept of model similarity could be leveraged to build strong attacks in a limited-information setting.

第五代行動通訊中基地台毫米波天線精確的方位角量測

第五代行動通訊(5th generation mobile networks)是現今科技發展的趨勢,新技術的出現也衍生出很多新的問題,在基地台點對點傳輸時,需要精確角度的天線才足以準確地接收高頻波短的毫米波,雖然現今已經有精密儀器能測量精確的方位角,但價格較高且使用方法複雜,面對數量龐大的5G基地台時,維修成本過高。本研究利用手機拍照得到天線與目標物相對角度,結合預先得知目標物的方位角,再經過數學運算即可得到精確的天線指向。本研究希望以隨手可得的手機,配合簡單的方法,可得到精確的天線指向,解決第五代行動通訊可能面臨的問題。

Method of prosthetic vision

This work is devoted to solving the problem of orientation in the space of visually impaired people. Working on the project, a new way of transmitting visual information through an acoustic channel was invented. In addition, was developed the device, which uses distance sensors to analyze the situation around a user. Thanks to the invented algorithm of transformation of the information about the position of the obstacle into the sound of a certain tone and intensity, this device allows the user to transmit subject-spatial information in real time. Currently, the device should use a facette locator made of 36 ultrasonic locators grouped in 12 sectors by the azimuth and 3 spatial cones by the angle. Data obtained in such a way is converted into its own note according to the following pattern : the angle of the place corresponds to octave, the azimuth corresponds to the note and the distance corresponds to the volume. The choice of the notes is not unambiguous. However, we used them for the reason that over the centuries, notes have had a felicitous way of layout on the frequency range and on the logarithmic scale. Therefore, the appearance of a new note in the total signal will not be muffled by a combination of other notes. Consequently, a blind person, moving around the room with the help of the tone and volume of the sound signals, will be able to assess the presence and location of all dangerous obstacles. After theoretical substantiation of the hypothesis and analysis of the available information, we started the production of prototypes of the devices that would implement the idea of transmitting information via the acoustic channel.

利用Yolo 模型辨識台灣國語口手語之研究

手語為聾啞人士日常溝通的工具,但對一般人來說這是一種難以理解的溝通方式。本實驗使用深度學習的 Yolov3 與 Yolov4 模型訓練37個國語注音符號手勢,然後再驗證模型對圖片、影片、即時(Real time)攝影辨識的正確率。 實驗結果顯示:Yolo v3 圖片辨識度效果還不錯,但影片辨識度很差,而Yolo v4 不管在靜態的圖片或動態影片都有不錯的辨識率,另外在即時的影像辨識也有不錯的效果。 雖然有部分符號的辨識度很低,但這可能是訓練時照片拍攝的問題,如果可以改進拍攝的數量和技巧,相信可以大幅提升判讀的準確率。

Limited Query Black-box Adversarial Attacks in the Real World

We study the creation of physical adversarial examples, which are robust to real-world transformations, using a limited number of queries to the target black-box neural networks. We observe that robust models tend to be especially susceptible to foreground manipulations, which motivates our novel Foreground attack. We demonstrate that gradient priors are a useful signal for black-box attacks and therefore introduce an improved version of the popular SimBA. We also propose an algorithm for transferable attacks that selects the most similar surrogates to the target model. Our black-box attacks outperform state-of-the-art approaches they are based on and support our belief that the concept of model similarity could be leveraged to build strong attacks in a limited-information setting.