Hash Function Learning via Codewords

Size: px
Start display at page:

Download "Hash Function Learning via Codewords"

Transcription

1 Hash Function Learning via Codewords 2015 ECML/PKDD, Porto, Portugal, September 7 11, Yinjie Huang 1 Michael Georgiopoulos 1 Georgios C. Anagnostopoulos 2 1 Machine Learning Laboratory, University of Central Florida, US 2 ICE Laboratory, Florida Institute of Technology, US September 09 th, 2015

2 Table of Contents 1 Introduction 2 Formulation 3 Algorithm 4 Experiments 5 Concentration Guarantees 6 Summary 7 References 8 Back Up Slides Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

3 Introduction Section 1 Introduction Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

4 Introduction What is Content-Based Image Retrieval? Figure: Content-Based Image Retrieval (CBIR) [Datta et al., 2008] Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

5 Introduction Challenges in CBIR There are two main challenges in CBIR: Search complexity considerations Nearest neighbor search. In practical settings (large amount of data), exhaustively comparing the query with each sample in the database is impractical. Storage space considerations Image features usually have hundreds or thousands of features. Storing all raw images in the database also poses a problem. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

6 Hash Function Learning Introduction Figure: Hashing based CBIR [Wang et al., 2012] Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

7 Hash Function Learning Introduction Design hash functions transforming the original data into compact binary codes. Hash functions to be learned aim to map similar data to similar hash codes. Benefits: Approximate nearest neighbors (ANN) search [Datta et al., 2008] using binary codes was shown to achieve sub-linear search time. Storage requirement advantages. For example, a 10 dimension real value vector needs 320 bits (for single precision), while the hash code (represent this vector) may need only 10 bits. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

8 Introduction Data-dependent hashing Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

9 Introduction Contributions One new hashing framework - *Supervised Hash Learning (*SHL): *SHL can naturally engage supervised, unsupervised and semi-supervised hash learning scenarios. *SHL considers a set of Hamming space codewords that are learned during training in order to capture the intrinsic similarities between the data. The minimization problem of *SHL naturally leads to a set of Support Vector Machine (SVM) problems, which can be efficiently solved by LIBSVM [Chang and Lin, 2011]. Theoretical insight about *SHL s superior performance. Results: We consider 5 benchmark datasets. Compared with 6 other state-of-art methods. The results show *SHL is highly competitive. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

10 Formulation Section 2 Formulation Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

11 Formulation Formulation *SHL utilizes codewords µ g, g N G. Each codeword is associated to a class. Figure: Idea of *SHL Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

12 Formulation Formulation By adjusting its parameters ω, *SHL attempts to reduce the distortion measure: E(ω) ( ) h(xn ), µ ln + min d ( ) h(x n ), µ g g n N U n N L d (1) d is the Hamming distance defined as d(h, h ) b [h b h b ]. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

13 Formulation Formulation Hash code: h(x) sgn f(x) H B for a sample x X. f(x) [f 1 (x)... f B (x)] T, where f b (x) w b, φ(x) Hb + β b with w b Ω wb { w b H b : w b Hb R b, R b > 0 } and β b R for all b N B. H b is a Reproducing Kernel Hilbert Space (RKHS) with inner product, Hb. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

14 Algorithm Section 3 Algorithm Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

15 Algorithm Algorithm Two key observations: Bounds of hash codes: Hinge Hamming distances. d (h(x), µ) = b [µ bf b (x) < 0] d (f, µ) b [1 µ bf b ] +. We have: E(ω) Ē(ω) g n γ g,n d ( ) f(x n ), µ g. Majorization-Minimization (MM): For parameter values ω and ω, we have: Ē(ω) Ē(ω ω ) g n γ d ( ) g,n f(x n ), µ g. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

16 Algorithm Algorithm - First block minimization Minimizing Ē( ω ), one obtains B independent, equivalent problems: inf C w b,m, β b,θ b,µ g,b g n γ g,n m [ ] 1 µ g,b f b (x n ) + 2 w b,m H m θ b,m b N B (2) By considering w b,m and β b for each b as a single block, it leads to the dual form: sup α b Ω ab α T b1 NG 1 2 αt bd b [(1 G 1 T G) K b ]D b α b b N B (3) Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

17 Algorithm Algorithm - First block minimization SVM training problem - LIBSVM. Figure: For each bit, one SVM problem. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

18 Algorithm Algorithm - Second block minimization Second block minimization: inf C γ g,n [1 µ g,bf b (x n )] + w b,m,β b, θ b,µ g,b g n MKL, closed form solution [Kloft et al., 2011]: m w b,m 2 H m θ b,m b N B (4) w b,m 2 p+1 H m θ b,m = ( w m b,m 2p p+1 H m ) 1, m N M, b N B. (5) p Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

19 Algorithm Algorithm - Third block minimization Third block minimization: inf w b,m,β b,θ b, µ g,b C g n γ g,n m [ ] 1 µ g,b f b (x n ) + w b,m 2 H m θ b,m b N B (6) optimize over codewords by substitution: inf µ g,b H γ g,n [1 µ g,b f b (x n )] + g N G, b N B (7) n Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

20 Experiments Section 4 Experiments Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

21 Experiments Supervised Hash Learning Results Methods to compare with: Kernel Supervised Learning (KSH) [Liu et al., 2012]. Binary Reconstructive Embedding (BRE) [Kulis and Darrell, 2009]. Single-layer Anchor Graph Hashing (1-AGH) and its two-layer version (2-AGH) [Liu et al., 2011]. Spectral Hashing (SPH) [Weiss et al., 2008]. Locality-Sensitive Hashing (LSH) [Gionis et al., 1999]. Performance metric: Precision (retrieval accuracy). Precision - Recall (PR) curve. Datasets: Pendigits, USPS, Mnist, PASCAL07, CIFAR-10. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

22 Experiments Pendigits 1 Pendigits 1 Pendigits 1 Pendigits Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on Pendigits dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

23 Experiments Mnist 1 Mnist 0.95 Mnist 1 Mnist Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Top s Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Recall Figure: The top s retrieval results and Precision-Recall curve on Mnist dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

24 Experiments CIFAR Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH CIFAR 10 Top s Retrieval Precision CIFAR 10 Our KSH LSH SPH BRE 1 AGH 2 AGH Precision CIFAR 10 Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on CIFAR-10 dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

25 Experiments Qualitative Results Query Image: Car *SHL KSH LSH SPH BRE 1 AGH 2 AGH Figure: Qualitative results on CIFAR-10. Query image is Car. The remaining 15 images for each row were retrieved using 45-bit binary codes generated by different hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

26 Experiments The Codewords Consider a small set of Mnist, bit length B = 25. Hamming distances between each pair of codewords after training µ 1 µ 2 µ 3 µ 4 µ 5 µ 6 µ 7 µ 8 µ 9 µ 10 µ µ µ µ µ µ µ µ µ µ Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

27 Concentration Guarantees Section 5 Concentration Guarantees Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

28 Concentration Guarantees Concentration Guarantees With high probability, *SHL produces hash codes concentrated around the correct codeword. Images from the same class will be mapped closer to each other, which will benefit precision-recall performance. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

29 Concentration Guarantees Concentration Guarantees Theorem Assume reproducing kernels of {H b } B b=1 s.t. k b(x, x ) r 2, x, x X. Then for a fixed value of ρ > 0, for any f F, any {µ l } G l=1, µ l H B and any δ > 0, with probability 1 δ, it holds that: er (f, µ l ) ^er (f, µ l ) + 2r ρb log ( ) 1 δ R b + N 2N b (8) where er (f, µ l ) 1 B E{d (h, µ l)}, l N G is the true label of x X, ^er (f, µ l ) 1 NB n,b Q ρ (f b (x n )µ ln,b), where { { }} Q ρ (u) min 1, max 0, 1 u ρ. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

30 Summary Section 6 Summary Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

31 Summary Summary A novel hash learning framework - *Supervised Hash Learning (*SHL) is proposed. *SHL is able to address supervised, unsupervised and, even, semi-supervised learning tasks in a unified fashion. Its training algorithm is simple to implement. Experiments on 5 benchmark datasets, compared with 6 other state-of-art methods, show *SHL is highly competitive. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

32 Summary Thank You! Thanks for your time. Codes are available here: yhuang/ Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

33 References Section 7 References Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

34 References References I Chang, C.-C. and Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1 27:27. Software available at cjlin/libsvm. Datta, R., Joshi, D., Li, J., and Wang, J. Z. (2008). Image retrieval: Ideas, influences, and trends of the new age. ACM Computing Surveys, 40(2):5:1 5:60. Gionis, A., Indyk, P., and Motwani, R. (1999). Similarity search in high dimensions via hashing. In Proceedings of the International Conference on Very Large Data Bases, pages Kloft, M., Brefeld, U., Sonnenburg, S., and Zien, A. (2011). lp-norm multiple kernel learning. Journal of Machine Learning Research, 12: Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

35 References References II Kulis, B. and Darrell, T. (2009). Learning to hash with binary reconstructive embeddings. In Proceedings of Advanced Neural Information Processing Systems, pages Liu, W., Wang, J., Ji, R., Jiang, Y.-G., and Chang, S.-F. (2012). Supervised hashing with kernels. In Proceedings of Computer Vision and Pattern Recognition, pages Liu, W., Wang, J., Kumar, S., and Chang, S.-F. (2011). Hashing with graphs. In Proceedings of the International Conference on Machine Learning, pages 1 8. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

36 References References III Wang, J., Kumar, S., and Chang, S.-F. (2012). Semi-supervised hashing for large-scale search. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(12): Weiss, Y., Torralba, A., and Fergus, R. (2008). Spectral hashing. In Proceedings of Advanced Neural Information Processing Systems, pages Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

37 Back Up Slides Section 8 Back Up Slides Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

38 Transductive Learning Datasets: Vowel Letter Back Up Slides Vowel Inductive Transductive Letter Inductive Transductive Accuracy Precision Accuracy Precision Number of Bits Number of Bits Figure: Accuracy results between Inductive and Transductive Learning. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

39 Back Up Slides Algorithm Two key observations: Bounds of hash codes: Hinge Hamming distances. d (h(x), µ) = b [µ bf b (x) < 0] d (f, µ) b [1 µ bf b ] +. We have: E(ω) Ē(ω) g n γ g,n d ( ) f(x n ), µ g, by defining: γ g,n { [g = l n ] n N L [ g = arg ming d ( f(x n ), µ g )] n N U (9) Majorization-Minimization (MM): For parameter values ω and ω, we have: Ē(ω) Ē(ω ω ) g n γ d ( ) g,n f(x n ), µ g, where the primed quantities are evaluated on ω. γ g,n { [g = ln ] n N L [ g = arg min g d (f (x n ), µ g )] n N U (10) Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

40 Back Up Slides USPS 1 USPS 1 USPS 1 USPS Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Num of Top s Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Recall Figure: The top s retrieval results and Precision-Recall curve on USPS dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

41 Back Up Slides PASCAL07 Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH PASCAL 07 Top s Retrieval Precision PASCAL 07 Our KSH LSH SPH BRE 1 AGH 2 AGH Precision PASCAL 07 Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on PASCAL07 dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41

3D-Assisted Image Feature Synthesis for Novel Views of an Object

3D-Assisted Image Feature Synthesis for Novel Views of an Object 3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view

More information

Empirical Assessment of Classification Accuracy of Local SVM

Empirical Assessment of Classification Accuracy of Local SVM Empirical Assessment of Classification Accuracy of Local SVM Nicola Segata Enrico Blanzieri Department of Engineering and Computer Science (DISI) University of Trento, Italy. segata@disi.unitn.it 18th

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850

More information

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Demosaicing Algorithm for Color Filter Arrays Based on SVMs www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan

More information

Optimization Techniques for Alphabet-Constrained Signal Design

Optimization Techniques for Alphabet-Constrained Signal Design Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Color Constancy Using Standard Deviation of Color Channels

Color Constancy Using Standard Deviation of Color Channels 2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern

More information

A Novel Image Deblurring Method to Improve Iris Recognition Accuracy

A Novel Image Deblurring Method to Improve Iris Recognition Accuracy A Novel Image Deblurring Method to Improve Iris Recognition Accuracy Jing Liu University of Science and Technology of China National Laboratory of Pattern Recognition, Institute of Automation, Chinese

More information

A Primer on Image Segmentation. Jonas Actor

A Primer on Image Segmentation. Jonas Actor A Primer on Image Segmentation It s all PDE s anyways Jonas Actor Rice University 21 February 2018 Jonas Actor Segmentation 21 February 2018 1 Table of Contents 1 Motivation 2 Simple Methods 3 Edge Methods

More information

Analysis and Design of Vector Error Diffusion Systems for Image Halftoning

Analysis and Design of Vector Error Diffusion Systems for Image Halftoning Ph.D. Defense Analysis and Design of Vector Error Diffusion Systems for Image Halftoning Niranjan Damera-Venkata Embedded Signal Processing Laboratory The University of Texas at Austin Austin TX 78712-1084

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

CS188 Spring 2014 Section 3: Games

CS188 Spring 2014 Section 3: Games CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the

More information

Autocomplete Sketch Tool

Autocomplete Sketch Tool Autocomplete Sketch Tool Sam Seifert, Georgia Institute of Technology Advanced Computer Vision Spring 2016 I. ABSTRACT This work details an application that can be used for sketch auto-completion. Sketch

More information

Permutation Editing and Matching via Embeddings

Permutation Editing and Matching via Embeddings Permutation Editing and Matching via Embeddings Graham Cormode, S. Muthukrishnan, Cenk Sahinalp (grahamc@dcs.warwick.ac.uk) Permutation Editing and Matching Why study permutations? Distances between permutations

More information

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu

More information

Spectacle lens design following Hamilton, Maxwell and Keller

Spectacle lens design following Hamilton, Maxwell and Keller Spectacle lens design following Hamilton, Maxwell and Keller Koby Rubinstein Technion Koby Rubinstein (Technion) Spectacle lens design following Hamilton, Maxwell and Keller 1 / 23 Background Spectacle

More information

3D Face Recognition in Biometrics

3D Face Recognition in Biometrics 3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

Forget Luminance Conversion and Do Something Better

Forget Luminance Conversion and Do Something Better Forget Luminance Conversion and Do Something Better Rang M. H. Nguyen National University of Singapore nguyenho@comp.nus.edu.sg Michael S. Brown York University mbrown@eecs.yorku.ca Supplemental Material

More information

Improved Image Retrieval based on Fuzzy Colour Feature Vector

Improved Image Retrieval based on Fuzzy Colour Feature Vector Improved Image Retrieval based on Fuzzy Colour Feature Vector Sami B. Abugharsa, and Ahlam M. Ben-Ahmeida Abstract--- One of Image indexing techniques is the Content- Based Image Retrieval which is an

More information

SOURCES OF ERROR IN UNBALANCE MEASUREMENTS. V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson

SOURCES OF ERROR IN UNBALANCE MEASUREMENTS. V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson SOURCES OF ERROR IN UNBALANCE MEASUREMENTS V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson Integral Energy Power Quality Centre School of Electrical, Computer and Telecommunications Engineering

More information

Support Vector Machine Classification of Snow Radar Interface Layers

Support Vector Machine Classification of Snow Radar Interface Layers Support Vector Machine Classification of Snow Radar Interface Layers Michael Johnson December 15, 2011 Abstract Operation IceBridge is a NASA funded survey of polar sea and land ice consisting of multiple

More information

Classification of Road Images for Lane Detection

Classification of Road Images for Lane Detection Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is

More information

Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction

Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction Jaya Gupta, Prof. Supriya Agrawal Computer Engineering Department, SVKM s NMIMS University

More information

Joint Inverted Indexing

Joint Inverted Indexing Joint Inverted Indexing Yan Xia 1 Kaiming He 2 Fang Wen 2 Jian Sun 2 1 University of Science and Technology of China 2 Microsoft esearch Asia Abstract Inverted indexing is a popular non-exhaustive solution

More information

Detection of Compound Structures in Very High Spatial Resolution Images

Detection of Compound Structures in Very High Spatial Resolution Images Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work

More information

Locating the Query Block in a Source Document Image

Locating the Query Block in a Source Document Image Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION

DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Journal of Advanced College of Engineering and Management, Vol. 3, 2017 DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Anil Bhujel 1, Dibakar Raj Pant 2 1 Ministry of Information and

More information

Jigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement

Jigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement Jigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement Sou-Young Jin, Suwon Lee, Nur Aziza Azis and Ho-Jin Choi Dept. of Computer Science, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon 305-701,

More information

Simulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor

Simulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor Journal of Power and Energy Engineering, 2014, 2, 403-410 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24054 Simulation Analysis of Control

More information

Implementation of Barcode Localization Technique using Morphological Operations

Implementation of Barcode Localization Technique using Morphological Operations Implementation of Barcode Localization Technique using Morphological Operations Savreet Kaur Student, Master of Technology, Department of Computer Engineering, ABSTRACT Barcode Localization is an extremely

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images A. Vadivel 1, M. Mohan 1, Shamik Sural 2 and A.K.Majumdar 1 1 Department of Computer Science and Engineering,

More information

SCIENCE & TECHNOLOGY

SCIENCE & TECHNOLOGY Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using

More information

Combined Modulation and Error Correction Decoder Using Generalized Belief Propagation

Combined Modulation and Error Correction Decoder Using Generalized Belief Propagation Combined Modulation and Error Correction Decoder Using Generalized Belief Propagation Graduate Student: Mehrdad Khatami Advisor: Bane Vasić Department of Electrical and Computer Engineering University

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Speech Synthesis using Mel-Cepstral Coefficient Feature

Speech Synthesis using Mel-Cepstral Coefficient Feature Speech Synthesis using Mel-Cepstral Coefficient Feature By Lu Wang Senior Thesis in Electrical Engineering University of Illinois at Urbana-Champaign Advisor: Professor Mark Hasegawa-Johnson May 2018 Abstract

More information

Supervised Learning for Link Adaptation in Multi-antenna Wireless Links

Supervised Learning for Link Adaptation in Multi-antenna Wireless Links 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

CLASSLESS ASSOCIATION USING NEURAL NETWORKS

CLASSLESS ASSOCIATION USING NEURAL NETWORKS Workshop track - ICLR 1 CLASSLESS ASSOCIATION USING NEURAL NETWORKS Federico Raue 1,, Sebastian Palacio, Andreas Dengel 1,, Marcus Liwicki 1 1 University of Kaiserslautern, Germany German Research Center

More information

Predicting Content Virality in Social Cascade

Predicting Content Virality in Social Cascade Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,

More information

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of

More information

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels

More information

Games, Privacy and Distributed Inference for the Smart Grid

Games, Privacy and Distributed Inference for the Smart Grid CUHK September 17, 2013 Games, Privacy and Distributed Inference for the Smart Grid Vince Poor (poor@princeton.edu) Supported in part by NSF Grant CCF-1016671 and in part by the Marie Curie Outgoing Fellowship

More information

Spatial Color Indexing using ACC Algorithm

Spatial Color Indexing using ACC Algorithm Spatial Color Indexing using ACC Algorithm Anucha Tungkasthan aimdala@hotmail.com Sarayut Intarasema Darkman502@hotmail.com Wichian Premchaiswadi wichian@siam.edu Abstract This paper presents a fast and

More information

Application of QAP in Modulation Diversity (MoDiv) Design

Application of QAP in Modulation Diversity (MoDiv) Design Application of QAP in Modulation Diversity (MoDiv) Design Hans D Mittelmann School of Mathematical and Statistical Sciences Arizona State University INFORMS Annual Meeting Philadelphia, PA 4 November 2015

More information

DEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE

DEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 4, July-August 2016, pp. 85 90, Article ID: IJECET_07_04_010 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=4

More information

Information Retrieval Evaluation

Information Retrieval Evaluation Information Retrieval Evaluation (COSC 416) Nazli Goharian nazli@cs.georgetown.edu Goharian, Grossman, Frieder, 2002, 2010 Measuring Effectiveness An algorithm is deemed incorrect if it does not have a

More information

Automata and Formal Languages - CM0081 Turing Machines

Automata and Formal Languages - CM0081 Turing Machines Automata and Formal Languages - CM0081 Turing Machines Andrés Sicard-Ramírez Universidad EAFIT Semester 2018-1 Turing Machines Alan Mathison Turing (1912 1954) Automata and Formal Languages - CM0081. Turing

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING

EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING Clemson University TigerPrints All Theses Theses 8-2009 EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING Jason Ellis Clemson University, jellis@clemson.edu

More information

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw

Bogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of

More information

Automatic Car License Plate Detection System for Odd and Even Series

Automatic Car License Plate Detection System for Odd and Even Series Automatic Car License Plate Detection System for Odd and Even Series Sapna Gaur Research Scholar Hindustan Institute of Technology Agra APJ Abdul Kalam Technical University, Lucknow Sweta Singh Asst. Professor

More information

Steganalysis in resized images

Steganalysis in resized images Steganalysis in resized images Jan Kodovský, Jessica Fridrich ICASSP 2013 1 / 13 Outline 1. Steganography basic concepts 2. Why we study steganalysis in resized images 3. Eye-opening experiment on BOSSbase

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing

Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Qin, Z; Gao, Y; Plumbley, MD 27 IEEE. Personal use of this material is permitted. Permission from IEEE must be

More information

PMUs Placement with Max-Flow Min-Cut Communication Constraint in Smart Grids

PMUs Placement with Max-Flow Min-Cut Communication Constraint in Smart Grids PMUs Placement with Max-Flow Min-Cut Communication Constraint in Smart Grids Ali Gaber, Karim G. Seddik, and Ayman Y. Elezabi Department of Electrical Engineering, Alexandria University, Alexandria 21544,

More information

Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks

Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks Sensors Volume 5, Article ID 89, 6 pages http://dx.doi.org/.55/5/89 Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks Peng Huang,, Feng Lin, Chang Liu,,5 Jian Gao, and Ji-liu

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

Toward Non-stationary Blind Image Deblurring: Models and Techniques

Toward Non-stationary Blind Image Deblurring: Models and Techniques Toward Non-stationary Blind Image Deblurring: Models and Techniques Ji, Hui Department of Mathematics National University of Singapore NUS, 30-May-2017 Outline of the talk Non-stationary Image blurring

More information

Orientation-based Wi-Fi Positioning on the Google Nexus One

Orientation-based Wi-Fi Positioning on the Google Nexus One 200 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications Orientation-based Wi-Fi Positioning on the Google Nexus One Eddie C.L. Chan, George Baciu, S.C. Mak

More information

On-site Traffic Accident Detection with Both Social Media and Traffic Data

On-site Traffic Accident Detection with Both Social Media and Traffic Data On-site Traffic Accident Detection with Both Social Media and Traffic Data Zhenhua Zhang Civil, Structural and Environmental Engineering University at Buffalo, The State University of New York, Buffalo,

More information

Machine Learning for Antenna Array Failure Analysis

Machine Learning for Antenna Array Failure Analysis Machine Learning for Antenna Array Failure Analysis Lydia de Lange Under Dr DJ Ludick and Dr TL Grobler Dept. Electrical and Electronic Engineering, Stellenbosch University MML 2019 Outline 15/03/2019

More information

CS229: Machine Learning

CS229: Machine Learning CS229: Machine Learning Event Identification in Continues Seismic Data Please print out, fill in and include this cover sheet as the first page of your submission. We strongly recommend that you use this

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

Hamming Codes and Decoding Methods

Hamming Codes and Decoding Methods Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP

More information

Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system

Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Dr Choi Look LAW Founding Director Positioning and Wireless Technology Centre School

More information

Optimized Codes for the Binary Coded Side-Information Problem

Optimized Codes for the Binary Coded Side-Information Problem Optimized Codes for the Binary Coded Side-Information Problem Anne Savard, Claudio Weidmann ETIS / ENSEA - Université de Cergy-Pontoise - CNRS UMR 8051 F-95000 Cergy-Pontoise Cedex, France Outline 1 Introduction

More information

Open Access Research of Dielectric Loss Measurement with Sparse Representation

Open Access Research of Dielectric Loss Measurement with Sparse Representation Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng

More information

Wildlife Census via LSH-based animal tracking APOORV PATWARDHAN

Wildlife Census via LSH-based animal tracking APOORV PATWARDHAN 1 Wildlife Census via LSH-based animal tracking APOORV PATWARDHAN National Parks and wildlife conservation 2 Jim Corbett National Park, India Amboseli National Park, Kenya And many more The Challenge 3

More information

Optimal Power Allocation for Type II H ARQ via Geometric Programming

Optimal Power Allocation for Type II H ARQ via Geometric Programming 5 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 5 Optimal Power Allocation for Type II H ARQ via Geometric Programming Hongbo Liu, Leonid Razoumov and Narayan

More information

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah

More information

Lixin Duan. Basic Information.

Lixin Duan. Basic Information. Lixin Duan Basic Information Research Interests Professional Experience www.lxduan.info lxduan@gmail.com Machine Learning: Transfer learning, multiple instance learning, multiple kernel learning, many

More information

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,

More information

DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks

DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks IEEE INFOCOM 216 - The 35th Annual IEEE International Conference on Computer Communications DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks Lu

More information

Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels

Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels B Kumbhani, V K Mohandas, R P Singh, S Kabra and R S Kshetrimayum Department of Electronics and Electrical

More information

Routing in Max-Min Fair Networks: A Game Theoretic Approach

Routing in Max-Min Fair Networks: A Game Theoretic Approach Routing in Max-Min Fair Networks: A Game Theoretic Approach Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra and Jin Zhang Arizona State University New Mexico State University Outline/Progress of the

More information

Vehicle Detection using Images from Traffic Security Camera

Vehicle Detection using Images from Traffic Security Camera Vehicle Detection using Images from Traffic Security Camera Lamia Iftekhar Final Report of Course Project CS174 May 30, 2012 1 1 The Task This project is an application of supervised learning algorithms.

More information

DETECTION AND CLASSIFICATION OF POWER QUALITY DISTURBANCE WAVEFORM USING MRA BASED MODIFIED WAVELET TRANSFROM AND NEURAL NETWORKS

DETECTION AND CLASSIFICATION OF POWER QUALITY DISTURBANCE WAVEFORM USING MRA BASED MODIFIED WAVELET TRANSFROM AND NEURAL NETWORKS Journal of ELECTRICAL ENGINEERING, VOL. 61, NO. 4, 2010, 235 240 DETECTION AND CLASSIFICATION OF POWER QUALITY DISTURBANCE WAVEFORM USING MRA BASED MODIFIED WAVELET TRANSFROM AND NEURAL NETWORKS Perumal

More information

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 05, 2015 ISSN (online: 2321-0613 Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Effects of the Unscented Kalman Filter Process for High Performance Face Detector

Effects of the Unscented Kalman Filter Process for High Performance Face Detector Effects of the Unscented Kalman Filter Process for High Performance Face Detector Bikash Lamsal and Naofumi Matsumoto Abstract This paper concerns with a high performance algorithm for human face detection

More information

Photo Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field

Photo Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field Photo Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field Dong-Sung Ryu, Sun-Young Park, Hwan-Gue Cho Dept. of Computer Science and Engineering, Pusan National University, Geumjeong-gu

More information

Ultra-Modified Control Algorithms for Matrix Converter in Wind Energy System

Ultra-Modified Control Algorithms for Matrix Converter in Wind Energy System Journal of Physical Science and Application 8 (2) (218) 28-42 doi: 1.17265/2159-5348/218.2.5 D DAVID PUBLISHING Ultra-Modified Control Algorithms for Matrix Converter in Wind Energy System Kotb B. Tawfiq,

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

The Game-Theoretic Approach to Machine Learning and Adaptation

The Game-Theoretic Approach to Machine Learning and Adaptation The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

More information

Domain Adaptation & Transfer: All You Need to Use Simulation for Real

Domain Adaptation & Transfer: All You Need to Use Simulation for Real Domain Adaptation & Transfer: All You Need to Use Simulation for Real Boqing Gong Tecent AI Lab Department of Computer Science An intelligent robot Semantic segmentation of urban scenes Assign each pixel

More information

Kernels and Support Vector Machines

Kernels and Support Vector Machines Kernels and Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, 2016 2016 Sham Kakade 1 Announcements: Project Milestones coming up HW2 You ve implemented GD,

More information

Dynamic Reconstruct for Network Photograph Exploration

Dynamic Reconstruct for Network Photograph Exploration Dynamic Reconstruct for Network Photograph Exploration T.RAJESH #1, A.RAVI #2 Asst. Professor in MCA #1, Asst. Professor in IT #2 Malineni Lakshmaiah Engineering College S.Konda, Prakasam Dist., A.P.,

More information

On Performance Improvements with Odd-Power (Cross) QAM Mappings in Wireless Networks

On Performance Improvements with Odd-Power (Cross) QAM Mappings in Wireless Networks San Jose State University From the SelectedWorks of Robert Henry Morelos-Zaragoza April, 2015 On Performance Improvements with Odd-Power (Cross) QAM Mappings in Wireless Networks Quyhn Quach Robert H Morelos-Zaragoza

More information

M.Tolotti - Mathematics (Preparatory) - September Exercises. Maximize p(g(x))g(x) q x subject to x R +

M.Tolotti - Mathematics (Preparatory) - September Exercises. Maximize p(g(x))g(x) q x subject to x R + M.Tolotti - Mathematics (Preparatory) - September 2010 1 Exercises EXERCISE 1. where Maximize p(g(x))g(x) q x subject to x R + p : R R is constant, i.e. p(g(x)) = p = 1 for all x. g(x) = 35x x 2. q = 10.

More information

SPECTRUM sensing, a promising solution to identify potential

SPECTRUM sensing, a promising solution to identify potential IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 66, NO. 1, JANUARY 1, 2018 5 Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Zhijin Qin, Member, IEEE, YueGao, Senior

More information