Skip to main content

Showing 1–41 of 41 results for author: Kim, M J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04597  [pdf, other

    cs.CV cs.AI

    Feature Attenuation of Defective Representation Can Resolve Incomplete Masking on Anomaly Detection

    Authors: YeongHyeon Park, Sungho Kang, Myung Jin Kim, Hyeong Seok Kim, Juneho Yi

    Abstract: In unsupervised anomaly detection (UAD) research, while state-of-the-art models have reached a saturation point with extensive studies on public benchmark datasets, they adopt large-scale tailor-made neural networks (NN) for detection performance or pursued unified models for various tasks. Towards edge computing, it is necessary to develop a computationally efficient and scalable solution that av… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: 11 pages, 6 figures, 5 tables

  2. arXiv:2406.09246  [pdf, other

    cs.RO cs.LG

    OpenVLA: An Open-Source Vision-Language-Action Model

    Authors: Moo Jin Kim, Karl Pertsch, Siddharth Karamcheti, Ted Xiao, Ashwin Balakrishna, Suraj Nair, Rafael Rafailov, Ethan Foster, Grace Lam, Pannag Sanketi, Quan Vuong, Thomas Kollar, Benjamin Burchfiel, Russ Tedrake, Dorsa Sadigh, Sergey Levine, Percy Liang, Chelsea Finn

    Abstract: Large policies pretrained on a combination of Internet-scale vision-language data and diverse robot demonstrations have the potential to change how we teach robots new skills: rather than training new behaviors from scratch, we can fine-tune such vision-language-action (VLA) models to obtain robust, generalizable policies for visuomotor control. Yet, widespread adoption of VLAs for robotics has be… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Website: https://openvla.github.io/

  3. arXiv:2405.02499  [pdf, other

    cs.CR cs.AR

    DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands

    Authors: Hwayong Nam, Seungmin Baek, Minbok Wi, Michael Jaemin Kim, Jaehyun Park, Chihun Song, Nam Sung Kim, Jung Ho Ahn

    Abstract: The demand for precise information on DRAM microarchitectures and error characteristics has surged, driven by the need to explore processing in memory, enhance reliability, and mitigate security vulnerability. Nonetheless, DRAM manufacturers have disclosed only a limited amount of information, making it difficult to find specific information on their DRAM microarchitectures. This paper addresses t… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: To appear at the 51st IEEE/ACM International Symposium on Computer Architecture (ISCA)

  4. arXiv:2403.08302  [pdf, other

    cs.RO

    Online Multi-Contact Feedback Model Predictive Control for Interactive Robotic Tasks

    Authors: Seo Wook Han, Maged Iskandar, Jinoh Lee, Min Jun Kim

    Abstract: In this paper, we propose a model predictive control (MPC) that accomplishes interactive robotic tasks, in which multiple contacts may occur at unknown locations. To address such scenarios, we made an explicit contact feedback loop in the MPC framework. An algorithm called Multi-Contact Particle Filter with Exploration Particle (MCP-EP) is employed to establish real-time feedback of multi-contact… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: This paper has been accepted for publication at the IEEE International Conference on Robotics and Automation (ICRA), Yokohama, 2024

  5. arXiv:2403.08187  [pdf, other

    cs.CL cs.SD eess.AS

    Automatic Speech Recognition (ASR) for the Diagnosis of pronunciation of Speech Sound Disorders in Korean children

    Authors: Taekyung Ahn, Yeonjung Hong, Younggon Im, Do Hyung Kim, Dayoung Kang, Joo Won Jeong, Jae Won Kim, Min Jung Kim, Ah-ra Cho, Dae-Hyun Jang, Hosung Nam

    Abstract: This study presents a model of automatic speech recognition (ASR) designed to diagnose pronunciation issues in children with speech sound disorders (SSDs) to replace manual transcriptions in clinical procedures. Since ASR models trained for general purposes primarily predict input speech into real words, employing a well-known high-performance ASR model for evaluating pronunciation in children wit… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 12 pages, 2 figures

    ACM Class: I.2.7

  6. arXiv:2402.16785  [pdf, other

    cs.LG

    CARTE: Pretraining and Transfer for Tabular Learning

    Authors: Myung Jun Kim, Léo Grinsztajn, Gaël Varoquaux

    Abstract: Pretrained deep-learning models are the go-to solution for images or text. However, for tabular data the standard is still to train tree-based models. Indeed, transfer learning on tables hits the challenge of data integration: finding correspondences, correspondences in the entries (entity matching) where different words may denote the same entity, correspondences across columns (schema matching),… ▽ More

    Submitted 31 May, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  7. arXiv:2312.09634  [pdf, other

    stat.ML cs.LG

    Vectorizing string entries for data processing on tables: when are larger language models better?

    Authors: Léo Grinsztajn, Edouard Oyallon, Myung Jun Kim, Gaël Varoquaux

    Abstract: There are increasingly efficient data processing pipelines that work on vectors of numbers, for instance most machine learning models, or vector databases for fast similarity search. These require converting the data to numbers. While this conversion is easy for simple numerical and categorical entries, databases are strife with text entries, such as names or descriptions. In the age of large lang… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  8. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (267 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 1 June, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  9. arXiv:2310.04044  [pdf, other

    cs.RO

    Graph-based 3D Collision-distance Estimation Network with Probabilistic Graph Rewiring

    Authors: Minjae Song, Yeseung Kim, Min Jun Kim, Daehyung Park

    Abstract: We aim to solve the problem of data-driven collision-distance estimation given 3-dimensional (3D) geometries. Conventional algorithms suffer from low accuracy due to their reliance on limited representations, such as point clouds. In contrast, our previous graph-based model, GraphDistNet, achieves high accuracy using edge information but incurs higher message-passing costs with growing graph size,… ▽ More

    Submitted 10 March, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 7 pages, 6 figures

  10. arXiv:2310.04010  [pdf, other

    cs.CV cs.AI eess.IV

    Excision And Recovery: Visual Defect Obfuscation Based Self-Supervised Anomaly Detection Strategy

    Authors: YeongHyeon Park, Sungho Kang, Myung Jin Kim, Yeonho Lee, Hyeong Seok Kim, Juneho Yi

    Abstract: Due to scarcity of anomaly situations in the early manufacturing stage, an unsupervised anomaly detection (UAD) approach is widely adopted which only uses normal samples for training. This approach is based on the assumption that the trained UAD model will accurately reconstruct normal patterns but struggles with unseen anomalous patterns. To enhance the UAD performance, reconstruction-by-inpainti… ▽ More

    Submitted 9 November, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 10 pages, 5 figures, 5 tables

  11. arXiv:2308.14595  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Neural Network Training Strategy to Enhance Anomaly Detection Performance: A Perspective on Reconstruction Loss Amplification

    Authors: YeongHyeon Park, Sungho Kang, Myung Jin Kim, Hyeonho Jeong, Hyunkyu Park, Hyeong Seok Kim, Juneho Yi

    Abstract: Unsupervised anomaly detection (UAD) is a widely adopted approach in industry due to rare anomaly occurrences and data imbalance. A desirable characteristic of an UAD model is contained generalization ability which excels in the reconstruction of seen normal patterns but struggles with unseen anomalies. Recent studies have pursued to contain the generalization capability of their UAD models in rec… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 5 pages, 4 figures, 2 tables

  12. arXiv:2308.12952  [pdf, other

    cs.RO cs.LG

    BridgeData V2: A Dataset for Robot Learning at Scale

    Authors: Homer Walke, Kevin Black, Abraham Lee, Moo Jin Kim, Max Du, Chongyi Zheng, Tony Zhao, Philippe Hansen-Estruch, Quan Vuong, Andre He, Vivek Myers, Kuan Fang, Chelsea Finn, Sergey Levine

    Abstract: We introduce BridgeData V2, a large and diverse dataset of robotic manipulation behaviors designed to facilitate research on scalable robot learning. BridgeData V2 contains 60,096 trajectories collected across 24 environments on a publicly available low-cost robot. BridgeData V2 provides extensive task and environment variability, leading to skills that can generalize across environments, domains,… ▽ More

    Submitted 17 January, 2024; v1 submitted 24 August, 2023; originally announced August 2023.

    Comments: 9 pages

  13. arXiv:2307.05959  [pdf, other

    cs.RO cs.AI cs.LG

    Giving Robots a Hand: Learning Generalizable Manipulation with Eye-in-Hand Human Video Demonstrations

    Authors: Moo Jin Kim, Jiajun Wu, Chelsea Finn

    Abstract: Eye-in-hand cameras have shown promise in enabling greater sample efficiency and generalization in vision-based robotic manipulation. However, for robotic imitation, it is still expensive to have a human teleoperator collect large amounts of expert demonstrations with a real robot. Videos of humans performing tasks, on the other hand, are much cheaper to collect since they eliminate the need for e… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 21 pages, 7 figures, project webpage at https://giving-robots-a-hand.github.io/

  14. arXiv:2307.04298  [pdf, other

    cs.SD cs.LG eess.AS

    Edge Storage Management Recipe with Zero-Shot Data Compression for Road Anomaly Detection

    Authors: YeongHyeon Park, Uju Gim, Myung Jin Kim

    Abstract: Recent studies show edge computing-based road anomaly detection systems which may also conduct data collection simultaneously. However, the edge computers will have small data storage but we need to store the collected audio samples for a long time in order to update existing models or develop a novel method. Therefore, we should consider an approach for efficient storage management methods while… ▽ More

    Submitted 26 August, 2023; v1 submitted 9 July, 2023; originally announced July 2023.

    Comments: 5 pages, 3 figures, 4 tables

  15. X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands

    Authors: Hwayong Nam, Seungmin Baek, Minbok Wi, Michael Jaemin Kim, Jaehyun Park, Chihun Song, Nam Sung Kim, Jung Ho Ahn

    Abstract: The demand for accurate information about the internal structure and characteristics of dynamic random-access memory (DRAM) has been on the rise. Recent studies have explored the structure and characteristics of DRAM to improve processing in memory, enhance reliability, and mitigate a vulnerability known as rowhammer. However, DRAM manufacturers only disclose limited information through official d… ▽ More

    Submitted 12 August, 2023; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: 4 pages, 7 figures, accepted at IEEE Computer Architecture Letters

  16. arXiv:2305.16466  [pdf, other

    cs.RO

    Hierarchical Whole-body Control of the cable-Suspended Aerial Manipulator endowed with Winch-based Actuation

    Authors: Yuri Sarkisov, Andre Coelho, Maihara Santos, Min Jun Kim, Dzmitry Tsetserukou, Christian Ott, Konstantin Kondak

    Abstract: During operation, aerial manipulation systems are affected by various disturbances. Among them is a gravitational torque caused by the weight of the robotic arm. Common propeller-based actuation is ineffective against such disturbances because of possible overheating and high power consumption. To overcome this issue, in this paper we propose a winchbased actuation for the crane-stationed cable-su… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

    Comments: accepted to IEEE International Conference on Robotics and Automation (ICRA) 2023

  17. arXiv:2305.07844  [pdf, other

    eess.SY cs.LG

    Thompson Sampling for Parameterized Markov Decision Processes with Uninformative Actions

    Authors: Michael Gimelfarb, Michael Jong Kim

    Abstract: We study parameterized MDPs (PMDPs) in which the key parameters of interest are unknown and must be learned using Bayesian inference. One key defining feature of such models is the presence of "uninformative" actions that provide no information about the unknown parameters. We contribute a set of assumptions for PMDPs under which Thompson sampling guarantees an asymptotically optimal expected regr… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

  18. Passivity-based Decentralized Control for Collaborative Grasping of Under-Actuated Aerial Manipulators

    Authors: Jinyeong Jeong, Min Jun Kim

    Abstract: This paper proposes a decentralized passive impedance control scheme for collaborative grasping using under-actuated aerial manipulators (AMs). The AM system is formulated, using a proper coordinate transformation, as an inertially decoupled dynamics with which a passivity-based control design is conducted. Since the interaction for grasping can be interpreted as a feedback interconnection of pass… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

    Comments: IEEE International Conference on Robotics and Automation (ICRA) 2023

  19. Proprioceptive Sensor-Based Simultaneous Multi-Contact Point Localization and Force Identification for Robotic Arms

    Authors: Seo Wook Han, Min Jun Kim

    Abstract: In this paper, we propose an algorithm that estimates contact point and force simultaneously. We consider a collaborative robot equipped with proprioceptive sensors, in particular, joint torque sensors (JTSs) and a base force/torque (F/T) sensor. The proposed method has the following advantages. First, fast computation is achieved by proper preprocessing of robot meshes. Second, multi-contact can… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: 2023 International Conference on Robotics and Automation (ICRA)

  20. A Reachability Tree-Based Algorithm for Robot Task and Motion Planning

    Authors: Kanghyun Kim, Daehyung Park, Min Jun Kim

    Abstract: This paper presents a novel algorithm for robot task and motion planning (TAMP) problems by utilizing a reachability tree. While tree-based algorithms are known for their speed and simplicity in motion planning (MP), they are not well-suited for TAMP problems that involve both abstracted and geometrical state variables. To address this challenge, we propose a hierarchical sampling strategy, which… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: IEEE International Conference on Robotics and Automation (ICRA) 2023

  21. arXiv:2301.08556  [pdf, other

    cs.LG cs.CV cs.RO

    NeRF in the Palm of Your Hand: Corrective Augmentation for Robotics via Novel-View Synthesis

    Authors: Allan Zhou, Moo Jin Kim, Lirui Wang, Pete Florence, Chelsea Finn

    Abstract: Expert demonstrations are a rich source of supervision for training visual robotic manipulation policies, but imitation learning methods often require either a large number of demonstrations or expensive online expert supervision to learn reactive closed-loop behaviors. In this work, we introduce SPARTN (Synthetic Perturbations for Augmenting Robot Trajectories via NeRF): a fully-offline data augm… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

  22. arXiv:2211.01705  [pdf

    cs.CL

    A speech corpus for chronic kidney disease

    Authors: Jihyun Mun, Sunhee Kim, Myeong Ju Kim, Jiwon Ryu, Sejoong Kim, Minhwa Chung

    Abstract: In this study, we present a speech corpus of patients with chronic kidney disease (CKD) that will be used for research on pathological voice analysis, automatic illness identification, and severity prediction. This paper introduces the steps involved in creating this corpus, including the choice of speech-related parameters and speech lists as well as the recording technique. The speakers in this… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

  23. arXiv:2210.11068  [pdf, other

    cs.LG cs.CV cs.SD eess.AS

    Frequency of Interest-based Noise Attenuation Method to Improve Anomaly Detection Performance

    Authors: YeongHyeon Park, Myung Jin Kim, Won Seok Park

    Abstract: Accurately extracting driving events is the way to maximize computational efficiency and anomaly detection performance in the tire frictional nose-based anomaly detection task. This study proposes a concise and highly useful method for improving the precision of the event extraction that is hindered by extra noise such as wind noise, which is difficult to characterize clearly due to its randomness… ▽ More

    Submitted 2 December, 2022; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: 5 pages, 4 figures, 4 tables

  24. arXiv:2203.12677  [pdf, other

    cs.RO cs.CV cs.LG

    Vision-Based Manipulators Need to Also See from Their Hands

    Authors: Kyle Hsu, Moo Jin Kim, Rafael Rafailov, Jiajun Wu, Chelsea Finn

    Abstract: We study how the choice of visual perspective affects learning and generalization in the context of physical manipulation from raw sensor observations. Compared with the more commonly used global third-person perspective, a hand-centric (eye-in-hand) perspective affords reduced observability, but we find that it consistently improves training efficiency and out-of-distribution generalization. Thes… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

    Comments: First two authors contributed equally. ICLR 2022 (oral) camera-ready. 30 pages, 20 figures. Project website: https://sites.google.com/view/seeing-from-hands

  25. arXiv:2201.06699  [pdf, other

    cs.CR cs.LG

    AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private Inference

    Authors: Jaiyoung Park, Michael Jaemin Kim, Wonkyung Jung, Jung Ho Ahn

    Abstract: Hybrid private inference (PI) protocol, which synergistically utilizes both multi-party computation (MPC) and homomorphic encryption, is one of the most prominent techniques for PI. However, even the state-of-the-art PI protocols are bottlenecked by the non-linear layers, especially the activation functions. Although a standard non-linear activation function can generate higher model accuracy, it… ▽ More

    Submitted 18 February, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 11 pages, 5 figures

  26. BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption

    Authors: Sangpyo Kim, Jongmin Kim, Michael Jaemin Kim, Wonkyung Jung, Minsoo Rhu, John Kim, Jung Ho Ahn

    Abstract: Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by providing computation on encrypted data (ciphertexts). HE is based on noisy encryption schemes in which noise accumulates as more computations are applied to the data. The limited number of operations applicable to the data prevents practical applications from exploiting HE. Bootstrapping enables an unlimited… ▽ More

    Submitted 28 April, 2022; v1 submitted 31 December, 2021; originally announced December 2021.

    Comments: 15 pages, 10 figures

  27. arXiv:2112.07214  [pdf, other

    cs.SD cs.CV eess.AS

    Noise Reduction and Driving Event Extraction Method for Performance Improvement on Driving Noise-based Surface Anomaly Detection

    Authors: YeongHyeon Park, JoonSung Lee, Myung Jin Kim, Wonseok Park

    Abstract: Foreign substances on the road surface, such as rainwater or black ice, reduce the friction between the tire and the surface. The above situation will reduce the braking performance and make difficult to control the vehicle body posture. In that case, there is a possibility of property damage at least. In the worst case, personal damage will be occured. To avoid this problem, a road anomaly detect… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: 3 pages, 3 figures, 2 tables

  28. arXiv:2108.06703  [pdf, other

    cs.CR cs.AR

    Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh

    Authors: Michael Jaemin Kim, Jaehyun Park, Yeonhong Park, Wanju Doh, Namhoon Kim, Tae Jun Ham, Jae W. Lee, Jung Ho Ahn

    Abstract: Since its public introduction in the mid-2010s, the Row Hammer (RH) phenomenon has drawn significant attention from the research community due to its security implications. Although many RH-protection schemes have been proposed by processor vendors, DRAM manufacturers, and academia, they still have shortcomings. Solutions implemented in the memory controller (MC) incur increasingly higher costs du… ▽ More

    Submitted 24 December, 2021; v1 submitted 15 August, 2021; originally announced August 2021.

    Comments: 16 pages, to appear in HPCA 2022

  29. arXiv:2107.10167  [pdf, other

    cs.RO

    Enumeration of Polyominoes & Polycubes Composed of Magnetic Cubes

    Authors: Yitong Lu, Anuruddha Bhattacharjee, Daniel Biediger, Min Jun Kim, Aaron T. Becker

    Abstract: This paper examines a family of designs for magnetic cubes and counts how many configurations are possible for each design as a function of the number of modules. Magnetic modular cubes are cubes with magnets arranged on their faces. The magnets are positioned so that each face has either magnetic south or north pole outward. Moreover, we require that the net magnetic moment of the cube passes t… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 8 pages, 9 figures, 2 tables

  30. arXiv:2105.12342  [pdf, ps, other

    math.OC cs.LG econ.EM eess.SY stat.ML

    A data-driven approach to beating SAA out-of-sample

    Authors: Jun-ya Gotoh, Michael Jong Kim, Andrew E. B. Lim

    Abstract: While solutions of Distributionally Robust Optimization (DRO) problems can sometimes have a higher out-of-sample expected reward than the Sample Average Approximation (SAA), there is no guarantee. In this paper, we introduce a class of Distributionally Optimistic Optimization (DOO) models, and show that it is always possible to ``beat" SAA out-of-sample if we consider not just worst-case (DRO) mod… ▽ More

    Submitted 11 June, 2023; v1 submitted 26 May, 2021; originally announced May 2021.

    Comments: 25 pages, 2 page bibliography, 2 Figures, 12 page Appendix

    MSC Class: 90C17; 90C31; 93B35; 90C47; 90B50; 62G35; 62K25;

  31. arXiv:2003.11509  [pdf, other

    cs.RO cs.CV

    Visual-Inertial Telepresence for Aerial Manipulation

    Authors: Jongseok Lee, Ribin Balachandran, Yuri S. Sarkisov, Marco De Stefano, Andre Coelho, Kashmira Shinde, Min Jun Kim, Rudolph Triebel, Konstantin Kondak

    Abstract: This paper presents a novel telepresence system for enhancing aerial manipulation capabilities. It involves not only a haptic device, but also a virtual reality that provides a 3D visual feedback to a remotely-located teleoperator in real-time. We achieve this by utilizing onboard visual and inertial sensors, an object tracking algorithm and a pre-generated object database. As the virtual reality… ▽ More

    Submitted 20 June, 2020; v1 submitted 25 March, 2020; originally announced March 2020.

    Comments: Accepted to International Conference on Robotics and Automation (ICRA) 2020, IEEE copyright, 8 pages, 10 figures

  32. arXiv:2003.00472  [pdf, other

    cs.RO

    Optimal Oscillation Damping Control of cable-Suspended Aerial Manipulator with a Single IMU Sensor

    Authors: Yuri S. Sarkisov, Min Jun Kim, Andre Coelho, Dzmitry Tsetserukou, Christian Ott, Konstantin Kondak

    Abstract: This paper presents a design of oscillation damping control for the cable-Suspended Aerial Manipulator (SAM). The SAM is modeled as a double pendulum, and it can generate a body wrench as a control action. The main challenge is the fact that there is only one onboard IMU sensor which does not provide full information on the system state. To overcome this difficulty, we design a controller motivate… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

  33. arXiv:1907.00553  [pdf, other

    cs.RO eess.SY

    Model-free Friction Observers for Flexible Joint Robots with Torque Measurements

    Authors: Min Jun Kim, Fabian Beck, Christian Ott, Alin Albu-Schaeffer

    Abstract: This paper tackles a friction compensation problem without using a friction model. The unique feature of the proposed friction observer is that the nominal motor-side signal is fed back into the controller instead of the measured signal. By doing so, asymptotic stability and passivity of the controller are maintained. Another advantage of the proposed observer is that it provides a clear understan… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

    Comments: IEEE Transactions on Robotics

  34. arXiv:1904.08833  [pdf, other

    cs.RO eess.SY

    A Passivity-based Nonlinear Admittance Control with Application to Powered Upper-limb Control under Unknown Environmental Interactions

    Authors: Min Jun Kim, Woongyong Lee, Jae Yeon Choi, Goobong Chung, Kyung-Lyong Han, Il Seop Choi, Christian Ott, Wan Kyun Chung

    Abstract: This paper presents an admittance controller based on the passivity theory for a powered upper-limb exoskeleton robot which is governed by the nonlinear equation of motion. Passivity allows us to include a human operator and environmental interaction in the control loop. The robot interacts with the human operator via F/T sensor and interacts with the environment mainly via end-effectors. Although… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    Comments: Accepted in IEEE/ASME Transactions on Mechatronics (T-MECH)

  35. arXiv:1903.02426  [pdf, other

    cs.RO

    Development of SAM: cable-Suspended Aerial Manipulator

    Authors: Yuri S. Sarkisov, Min Jun Kim, Davide Bicego, Dzmitry Tsetserukou, Christian Ott, Antonio Franchi, Konstantin Kondak

    Abstract: High risk of a collision between rotor blades and the obstacles in a complex environment imposes restrictions on the aerial manipulators. To solve this issue, a novel system cable-Suspended Aerial Manipulator (SAM) is presented in this paper. Instead of attaching a robotic manipulator directly to an aerial carrier, it is mounted on an active platform which is suspended on the carrier by means of a… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

    Comments: Accepted to International Conference on Robotics and Automation (ICRA) 2019, IEEE copyright, 7 pages, 14 figures

  36. Reducing the Model Variance of a Rectal Cancer Segmentation Network

    Authors: Joohyung Lee, Ji Eun Oh, Min Ju Kim, Bo Yun Hur, Dae Kyung Sohn

    Abstract: In preoperative imaging, the demarcation of rectal cancer with magnetic resonance images provides an important basis for cancer staging and treatment planning. Recently, deep learning has greatly improved the state-of-the-art method in automatic segmentation. However, limitations in data availability in the medical field can cause large variance and consequent overfitting to medical image segmenta… ▽ More

    Submitted 30 December, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: published at IEEE ACCESS

    Journal ref: IEEE Access, vol. 7, Issue. 1, pp. 182725-182733, 2019

  37. arXiv:1812.05015  [pdf, ps, other

    cs.CR

    McNie2-Gabidulin: An improvement of McNie public key encryption using Gabidulin code

    Authors: Jon-Lark Kim, Young-Sik Kim, Lucky Galvez, Myeong Jae Kim

    Abstract: McNie is a code-based public key encryption scheme submitted as a candidate to the NIST Post-Quantum Cryptography standardization. In this paper, we present McNie2-Gabidulin, an improvement of McNie. By using Gabidulin code, we eliminate the decoding failure, which is one of the limitations of the McNie public key cryptosystem that uses LRPC codes. We prove that this new cryptosystem is IND-CPA se… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    MSC Class: 94B05; 94A60

  38. arXiv:1812.05008  [pdf, ps, other

    cs.CR

    McNie: A code-based public-key cryptosystem

    Authors: Jon-Lark Kim, Young-Sik Kim, Lucky Galvez, Myeong Jae Kim, Nari Lee

    Abstract: In this paper, we suggest a code-based public key encryption scheme, called McNie. McNie is a hybrid version of the McEliece and Niederreiter cryptosystems and its security is reduced to the hard problem of syndrome decoding. The public key involves a random generator matrix which is also used to mask the code used in the secret key. This makes the system safer against known structural attacks. In… ▽ More

    Submitted 26 January, 2019; v1 submitted 12 December, 2018; originally announced December 2018.

    MSC Class: 94B05; 94A60

  39. arXiv:1809.08819  [pdf, other

    cs.RO eess.SY

    Oscillation Damping Control of Pendulum-like Manipulation Platform using Moving Masses

    Authors: Min Jun Kim, Jianjie Lin, Konstantin Kondak, Dongheui Lee, Christian Ott

    Abstract: This paper presents an approach to damp out the oscillatory motion of the pendulum-like hanging platform on which a robotic manipulator is mounted. To this end, moving masses were installed on top of the platform. In this paper, asymptotic stability of the platform (which implies oscillation damping) is achieved by designing reference acceleration of the moving masses properly. A main feature of t… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: IFAC Symposium on Robot Control (SYROCO) 2018

  40. arXiv:1808.03037  [pdf, other

    cs.RO eess.SY

    Passive Compliance Control of Aerial Manipulators

    Authors: Min Jun Kim, Ribin Balachandran, Marco De Stefano, Konstantin Kondak, Christian Ott

    Abstract: This paper presents a passive compliance control for aerial manipulators to achieve stable environmental interactions. The main challenge is the absence of actuation along body-planar directions of the aerial vehicle which might be required during the interaction to preserve passivity. The controller proposed in this paper guarantees passivity of the manipulator through a proper choice of end-effe… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

    Comments: IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2018

  41. arXiv:1207.3127  [pdf, other

    cs.CV cs.LG eess.IV q-bio.CB stat.ML

    Tracking Tetrahymena Pyriformis Cells using Decision Trees

    Authors: Quan Wang, Yan Ou, A. Agung Julius, Kim L. Boyer, Min Jun Kim

    Abstract: Matching cells over time has long been the most difficult step in cell tracking. In this paper, we approach this problem by recasting it as a classification problem. We construct a feature set for each cell, and compute a feature difference vector between a cell in the current frame and a cell in a previous frame. Then we determine whether the two cells represent the same cell over time by trainin… ▽ More

    Submitted 12 July, 2012; originally announced July 2012.

    Comments: 21st International Conference on Pattern Recognition, 2012