Hash Function Learning via Codewords
|
|
- Egbert Watson
- 6 years ago
- Views:
Transcription
1 Hash Function Learning via Codewords 2015 ECML/PKDD, Porto, Portugal, September 7 11, Yinjie Huang 1 Michael Georgiopoulos 1 Georgios C. Anagnostopoulos 2 1 Machine Learning Laboratory, University of Central Florida, US 2 ICE Laboratory, Florida Institute of Technology, US September 09 th, 2015
2 Table of Contents 1 Introduction 2 Formulation 3 Algorithm 4 Experiments 5 Concentration Guarantees 6 Summary 7 References 8 Back Up Slides Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
3 Introduction Section 1 Introduction Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
4 Introduction What is Content-Based Image Retrieval? Figure: Content-Based Image Retrieval (CBIR) [Datta et al., 2008] Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
5 Introduction Challenges in CBIR There are two main challenges in CBIR: Search complexity considerations Nearest neighbor search. In practical settings (large amount of data), exhaustively comparing the query with each sample in the database is impractical. Storage space considerations Image features usually have hundreds or thousands of features. Storing all raw images in the database also poses a problem. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
6 Hash Function Learning Introduction Figure: Hashing based CBIR [Wang et al., 2012] Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
7 Hash Function Learning Introduction Design hash functions transforming the original data into compact binary codes. Hash functions to be learned aim to map similar data to similar hash codes. Benefits: Approximate nearest neighbors (ANN) search [Datta et al., 2008] using binary codes was shown to achieve sub-linear search time. Storage requirement advantages. For example, a 10 dimension real value vector needs 320 bits (for single precision), while the hash code (represent this vector) may need only 10 bits. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
8 Introduction Data-dependent hashing Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
9 Introduction Contributions One new hashing framework - *Supervised Hash Learning (*SHL): *SHL can naturally engage supervised, unsupervised and semi-supervised hash learning scenarios. *SHL considers a set of Hamming space codewords that are learned during training in order to capture the intrinsic similarities between the data. The minimization problem of *SHL naturally leads to a set of Support Vector Machine (SVM) problems, which can be efficiently solved by LIBSVM [Chang and Lin, 2011]. Theoretical insight about *SHL s superior performance. Results: We consider 5 benchmark datasets. Compared with 6 other state-of-art methods. The results show *SHL is highly competitive. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
10 Formulation Section 2 Formulation Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
11 Formulation Formulation *SHL utilizes codewords µ g, g N G. Each codeword is associated to a class. Figure: Idea of *SHL Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
12 Formulation Formulation By adjusting its parameters ω, *SHL attempts to reduce the distortion measure: E(ω) ( ) h(xn ), µ ln + min d ( ) h(x n ), µ g g n N U n N L d (1) d is the Hamming distance defined as d(h, h ) b [h b h b ]. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
13 Formulation Formulation Hash code: h(x) sgn f(x) H B for a sample x X. f(x) [f 1 (x)... f B (x)] T, where f b (x) w b, φ(x) Hb + β b with w b Ω wb { w b H b : w b Hb R b, R b > 0 } and β b R for all b N B. H b is a Reproducing Kernel Hilbert Space (RKHS) with inner product, Hb. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
14 Algorithm Section 3 Algorithm Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
15 Algorithm Algorithm Two key observations: Bounds of hash codes: Hinge Hamming distances. d (h(x), µ) = b [µ bf b (x) < 0] d (f, µ) b [1 µ bf b ] +. We have: E(ω) Ē(ω) g n γ g,n d ( ) f(x n ), µ g. Majorization-Minimization (MM): For parameter values ω and ω, we have: Ē(ω) Ē(ω ω ) g n γ d ( ) g,n f(x n ), µ g. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
16 Algorithm Algorithm - First block minimization Minimizing Ē( ω ), one obtains B independent, equivalent problems: inf C w b,m, β b,θ b,µ g,b g n γ g,n m [ ] 1 µ g,b f b (x n ) + 2 w b,m H m θ b,m b N B (2) By considering w b,m and β b for each b as a single block, it leads to the dual form: sup α b Ω ab α T b1 NG 1 2 αt bd b [(1 G 1 T G) K b ]D b α b b N B (3) Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
17 Algorithm Algorithm - First block minimization SVM training problem - LIBSVM. Figure: For each bit, one SVM problem. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
18 Algorithm Algorithm - Second block minimization Second block minimization: inf C γ g,n [1 µ g,bf b (x n )] + w b,m,β b, θ b,µ g,b g n MKL, closed form solution [Kloft et al., 2011]: m w b,m 2 H m θ b,m b N B (4) w b,m 2 p+1 H m θ b,m = ( w m b,m 2p p+1 H m ) 1, m N M, b N B. (5) p Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
19 Algorithm Algorithm - Third block minimization Third block minimization: inf w b,m,β b,θ b, µ g,b C g n γ g,n m [ ] 1 µ g,b f b (x n ) + w b,m 2 H m θ b,m b N B (6) optimize over codewords by substitution: inf µ g,b H γ g,n [1 µ g,b f b (x n )] + g N G, b N B (7) n Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
20 Experiments Section 4 Experiments Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
21 Experiments Supervised Hash Learning Results Methods to compare with: Kernel Supervised Learning (KSH) [Liu et al., 2012]. Binary Reconstructive Embedding (BRE) [Kulis and Darrell, 2009]. Single-layer Anchor Graph Hashing (1-AGH) and its two-layer version (2-AGH) [Liu et al., 2011]. Spectral Hashing (SPH) [Weiss et al., 2008]. Locality-Sensitive Hashing (LSH) [Gionis et al., 1999]. Performance metric: Precision (retrieval accuracy). Precision - Recall (PR) curve. Datasets: Pendigits, USPS, Mnist, PASCAL07, CIFAR-10. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
22 Experiments Pendigits 1 Pendigits 1 Pendigits 1 Pendigits Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on Pendigits dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
23 Experiments Mnist 1 Mnist 0.95 Mnist 1 Mnist Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Top s Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Recall Figure: The top s retrieval results and Precision-Recall curve on Mnist dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
24 Experiments CIFAR Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH CIFAR 10 Top s Retrieval Precision CIFAR 10 Our KSH LSH SPH BRE 1 AGH 2 AGH Precision CIFAR 10 Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on CIFAR-10 dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
25 Experiments Qualitative Results Query Image: Car *SHL KSH LSH SPH BRE 1 AGH 2 AGH Figure: Qualitative results on CIFAR-10. Query image is Car. The remaining 15 images for each row were retrieved using 45-bit binary codes generated by different hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
26 Experiments The Codewords Consider a small set of Mnist, bit length B = 25. Hamming distances between each pair of codewords after training µ 1 µ 2 µ 3 µ 4 µ 5 µ 6 µ 7 µ 8 µ 9 µ 10 µ µ µ µ µ µ µ µ µ µ Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
27 Concentration Guarantees Section 5 Concentration Guarantees Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
28 Concentration Guarantees Concentration Guarantees With high probability, *SHL produces hash codes concentrated around the correct codeword. Images from the same class will be mapped closer to each other, which will benefit precision-recall performance. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
29 Concentration Guarantees Concentration Guarantees Theorem Assume reproducing kernels of {H b } B b=1 s.t. k b(x, x ) r 2, x, x X. Then for a fixed value of ρ > 0, for any f F, any {µ l } G l=1, µ l H B and any δ > 0, with probability 1 δ, it holds that: er (f, µ l ) ^er (f, µ l ) + 2r ρb log ( ) 1 δ R b + N 2N b (8) where er (f, µ l ) 1 B E{d (h, µ l)}, l N G is the true label of x X, ^er (f, µ l ) 1 NB n,b Q ρ (f b (x n )µ ln,b), where { { }} Q ρ (u) min 1, max 0, 1 u ρ. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
30 Summary Section 6 Summary Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
31 Summary Summary A novel hash learning framework - *Supervised Hash Learning (*SHL) is proposed. *SHL is able to address supervised, unsupervised and, even, semi-supervised learning tasks in a unified fashion. Its training algorithm is simple to implement. Experiments on 5 benchmark datasets, compared with 6 other state-of-art methods, show *SHL is highly competitive. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
32 Summary Thank You! Thanks for your time. Codes are available here: yhuang/ Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
33 References Section 7 References Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
34 References References I Chang, C.-C. and Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1 27:27. Software available at cjlin/libsvm. Datta, R., Joshi, D., Li, J., and Wang, J. Z. (2008). Image retrieval: Ideas, influences, and trends of the new age. ACM Computing Surveys, 40(2):5:1 5:60. Gionis, A., Indyk, P., and Motwani, R. (1999). Similarity search in high dimensions via hashing. In Proceedings of the International Conference on Very Large Data Bases, pages Kloft, M., Brefeld, U., Sonnenburg, S., and Zien, A. (2011). lp-norm multiple kernel learning. Journal of Machine Learning Research, 12: Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
35 References References II Kulis, B. and Darrell, T. (2009). Learning to hash with binary reconstructive embeddings. In Proceedings of Advanced Neural Information Processing Systems, pages Liu, W., Wang, J., Ji, R., Jiang, Y.-G., and Chang, S.-F. (2012). Supervised hashing with kernels. In Proceedings of Computer Vision and Pattern Recognition, pages Liu, W., Wang, J., Kumar, S., and Chang, S.-F. (2011). Hashing with graphs. In Proceedings of the International Conference on Machine Learning, pages 1 8. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
36 References References III Wang, J., Kumar, S., and Chang, S.-F. (2012). Semi-supervised hashing for large-scale search. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(12): Weiss, Y., Torralba, A., and Fergus, R. (2008). Spectral hashing. In Proceedings of Advanced Neural Information Processing Systems, pages Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
37 Back Up Slides Section 8 Back Up Slides Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
38 Transductive Learning Datasets: Vowel Letter Back Up Slides Vowel Inductive Transductive Letter Inductive Transductive Accuracy Precision Accuracy Precision Number of Bits Number of Bits Figure: Accuracy results between Inductive and Transductive Learning. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
39 Back Up Slides Algorithm Two key observations: Bounds of hash codes: Hinge Hamming distances. d (h(x), µ) = b [µ bf b (x) < 0] d (f, µ) b [1 µ bf b ] +. We have: E(ω) Ē(ω) g n γ g,n d ( ) f(x n ), µ g, by defining: γ g,n { [g = l n ] n N L [ g = arg ming d ( f(x n ), µ g )] n N U (9) Majorization-Minimization (MM): For parameter values ω and ω, we have: Ē(ω) Ē(ω ω ) g n γ d ( ) g,n f(x n ), µ g, where the primed quantities are evaluated on ω. γ g,n { [g = ln ] n N L [ g = arg min g d (f (x n ), µ g )] n N U (10) Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
40 Back Up Slides USPS 1 USPS 1 USPS 1 USPS Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Top s Retrieval Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Num of Top s Precision Our KSH LSH SPH BRE 1 AGH 2 AGH Recall Figure: The top s retrieval results and Precision-Recall curve on USPS dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
41 Back Up Slides PASCAL07 Top s Retrieval Precision (s=10) Our KSH LSH SPH BRE 1 AGH 2 AGH PASCAL 07 Top s Retrieval Precision PASCAL 07 Our KSH LSH SPH BRE 1 AGH 2 AGH Precision PASCAL 07 Our KSH LSH SPH BRE 1 AGH 2 AGH Number of Bits Number of Top s Recall Figure: The top s retrieval results and Precision-Recall curve on PASCAL07 dataset over *SHL and 6 other hashing algorithms. Huang & Georgiopoulos & Anagnostopoulos Hash Function Learning via Codewords September 09 th, / 41
3D-Assisted Image Feature Synthesis for Novel Views of an Object
3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view
More informationEmpirical Assessment of Classification Accuracy of Local SVM
Empirical Assessment of Classification Accuracy of Local SVM Nicola Segata Enrico Blanzieri Department of Engineering and Computer Science (DISI) University of Trento, Italy. segata@disi.unitn.it 18th
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationCROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen
CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850
More informationDemosaicing Algorithm for Color Filter Arrays Based on SVMs
www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationColor Constancy Using Standard Deviation of Color Channels
2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern
More informationA Novel Image Deblurring Method to Improve Iris Recognition Accuracy
A Novel Image Deblurring Method to Improve Iris Recognition Accuracy Jing Liu University of Science and Technology of China National Laboratory of Pattern Recognition, Institute of Automation, Chinese
More informationA Primer on Image Segmentation. Jonas Actor
A Primer on Image Segmentation It s all PDE s anyways Jonas Actor Rice University 21 February 2018 Jonas Actor Segmentation 21 February 2018 1 Table of Contents 1 Motivation 2 Simple Methods 3 Edge Methods
More informationAnalysis and Design of Vector Error Diffusion Systems for Image Halftoning
Ph.D. Defense Analysis and Design of Vector Error Diffusion Systems for Image Halftoning Niranjan Damera-Venkata Embedded Signal Processing Laboratory The University of Texas at Austin Austin TX 78712-1084
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationCS188 Spring 2014 Section 3: Games
CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the
More informationAutocomplete Sketch Tool
Autocomplete Sketch Tool Sam Seifert, Georgia Institute of Technology Advanced Computer Vision Spring 2016 I. ABSTRACT This work details an application that can be used for sketch auto-completion. Sketch
More informationPermutation Editing and Matching via Embeddings
Permutation Editing and Matching via Embeddings Graham Cormode, S. Muthukrishnan, Cenk Sahinalp (grahamc@dcs.warwick.ac.uk) Permutation Editing and Matching Why study permutations? Distances between permutations
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationSpectacle lens design following Hamilton, Maxwell and Keller
Spectacle lens design following Hamilton, Maxwell and Keller Koby Rubinstein Technion Koby Rubinstein (Technion) Spectacle lens design following Hamilton, Maxwell and Keller 1 / 23 Background Spectacle
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationEE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.
EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted
More informationAudio Fingerprinting using Fractional Fourier Transform
Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,
More informationForget Luminance Conversion and Do Something Better
Forget Luminance Conversion and Do Something Better Rang M. H. Nguyen National University of Singapore nguyenho@comp.nus.edu.sg Michael S. Brown York University mbrown@eecs.yorku.ca Supplemental Material
More informationImproved Image Retrieval based on Fuzzy Colour Feature Vector
Improved Image Retrieval based on Fuzzy Colour Feature Vector Sami B. Abugharsa, and Ahlam M. Ben-Ahmeida Abstract--- One of Image indexing techniques is the Content- Based Image Retrieval which is an
More informationSOURCES OF ERROR IN UNBALANCE MEASUREMENTS. V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson
SOURCES OF ERROR IN UNBALANCE MEASUREMENTS V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson Integral Energy Power Quality Centre School of Electrical, Computer and Telecommunications Engineering
More informationSupport Vector Machine Classification of Snow Radar Interface Layers
Support Vector Machine Classification of Snow Radar Interface Layers Michael Johnson December 15, 2011 Abstract Operation IceBridge is a NASA funded survey of polar sea and land ice consisting of multiple
More informationClassification of Road Images for Lane Detection
Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is
More informationVehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction
Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction Jaya Gupta, Prof. Supriya Agrawal Computer Engineering Department, SVKM s NMIMS University
More informationJoint Inverted Indexing
Joint Inverted Indexing Yan Xia 1 Kaiming He 2 Fang Wen 2 Jian Sun 2 1 University of Science and Technology of China 2 Microsoft esearch Asia Abstract Inverted indexing is a popular non-exhaustive solution
More informationDetection of Compound Structures in Very High Spatial Resolution Images
Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work
More informationLocating the Query Block in a Source Document Image
Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic
More informationPrivacy preserving data mining multiplicative perturbation techniques
Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data
More informationDYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION
Journal of Advanced College of Engineering and Management, Vol. 3, 2017 DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Anil Bhujel 1, Dibakar Raj Pant 2 1 Ministry of Information and
More informationJigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement
Jigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement Sou-Young Jin, Suwon Lee, Nur Aziza Azis and Ho-Jin Choi Dept. of Computer Science, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon 305-701,
More informationSimulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor
Journal of Power and Energy Engineering, 2014, 2, 403-410 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24054 Simulation Analysis of Control
More informationImplementation of Barcode Localization Technique using Morphological Operations
Implementation of Barcode Localization Technique using Morphological Operations Savreet Kaur Student, Master of Technology, Department of Computer Engineering, ABSTRACT Barcode Localization is an extremely
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationSegmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images
Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images A. Vadivel 1, M. Mohan 1, Shamik Sural 2 and A.K.Majumdar 1 1 Department of Computer Science and Engineering,
More informationSCIENCE & TECHNOLOGY
Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using
More informationCombined Modulation and Error Correction Decoder Using Generalized Belief Propagation
Combined Modulation and Error Correction Decoder Using Generalized Belief Propagation Graduate Student: Mehrdad Khatami Advisor: Bane Vasić Department of Electrical and Computer Engineering University
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationSpeech Synthesis using Mel-Cepstral Coefficient Feature
Speech Synthesis using Mel-Cepstral Coefficient Feature By Lu Wang Senior Thesis in Electrical Engineering University of Illinois at Urbana-Champaign Advisor: Professor Mark Hasegawa-Johnson May 2018 Abstract
More informationSupervised Learning for Link Adaptation in Multi-antenna Wireless Links
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationCLASSLESS ASSOCIATION USING NEURAL NETWORKS
Workshop track - ICLR 1 CLASSLESS ASSOCIATION USING NEURAL NETWORKS Federico Raue 1,, Sebastian Palacio, Andreas Dengel 1,, Marcus Liwicki 1 1 University of Kaiserslautern, Germany German Research Center
More informationPredicting Content Virality in Social Cascade
Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,
More informationLearning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer
Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of
More informationDiversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels
Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels
More informationGames, Privacy and Distributed Inference for the Smart Grid
CUHK September 17, 2013 Games, Privacy and Distributed Inference for the Smart Grid Vince Poor (poor@princeton.edu) Supported in part by NSF Grant CCF-1016671 and in part by the Marie Curie Outgoing Fellowship
More informationSpatial Color Indexing using ACC Algorithm
Spatial Color Indexing using ACC Algorithm Anucha Tungkasthan aimdala@hotmail.com Sarayut Intarasema Darkman502@hotmail.com Wichian Premchaiswadi wichian@siam.edu Abstract This paper presents a fast and
More informationApplication of QAP in Modulation Diversity (MoDiv) Design
Application of QAP in Modulation Diversity (MoDiv) Design Hans D Mittelmann School of Mathematical and Statistical Sciences Arizona State University INFORMS Annual Meeting Philadelphia, PA 4 November 2015
More informationDEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 4, July-August 2016, pp. 85 90, Article ID: IJECET_07_04_010 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=4
More informationInformation Retrieval Evaluation
Information Retrieval Evaluation (COSC 416) Nazli Goharian nazli@cs.georgetown.edu Goharian, Grossman, Frieder, 2002, 2010 Measuring Effectiveness An algorithm is deemed incorrect if it does not have a
More informationAutomata and Formal Languages - CM0081 Turing Machines
Automata and Formal Languages - CM0081 Turing Machines Andrés Sicard-Ramírez Universidad EAFIT Semester 2018-1 Turing Machines Alan Mathison Turing (1912 1954) Automata and Formal Languages - CM0081. Turing
More informationDistributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach
2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and
More informationEFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING
Clemson University TigerPrints All Theses Theses 8-2009 EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING Jason Ellis Clemson University, jellis@clemson.edu
More informationBogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw
appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of
More informationAutomatic Car License Plate Detection System for Odd and Even Series
Automatic Car License Plate Detection System for Odd and Even Series Sapna Gaur Research Scholar Hindustan Institute of Technology Agra APJ Abdul Kalam Technical University, Lucknow Sweta Singh Asst. Professor
More informationSteganalysis in resized images
Steganalysis in resized images Jan Kodovský, Jessica Fridrich ICASSP 2013 1 / 13 Outline 1. Steganography basic concepts 2. Why we study steganalysis in resized images 3. Eye-opening experiment on BOSSbase
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationMalicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing
Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Qin, Z; Gao, Y; Plumbley, MD 27 IEEE. Personal use of this material is permitted. Permission from IEEE must be
More informationPMUs Placement with Max-Flow Min-Cut Communication Constraint in Smart Grids
PMUs Placement with Max-Flow Min-Cut Communication Constraint in Smart Grids Ali Gaber, Karim G. Seddik, and Ayman Y. Elezabi Department of Electrical Engineering, Alexandria University, Alexandria 21544,
More informationResearch Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks
Sensors Volume 5, Article ID 89, 6 pages http://dx.doi.org/.55/5/89 Research Article ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks Peng Huang,, Feng Lin, Chang Liu,,5 Jian Gao, and Ji-liu
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationToward Non-stationary Blind Image Deblurring: Models and Techniques
Toward Non-stationary Blind Image Deblurring: Models and Techniques Ji, Hui Department of Mathematics National University of Singapore NUS, 30-May-2017 Outline of the talk Non-stationary Image blurring
More informationOrientation-based Wi-Fi Positioning on the Google Nexus One
200 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications Orientation-based Wi-Fi Positioning on the Google Nexus One Eddie C.L. Chan, George Baciu, S.C. Mak
More informationOn-site Traffic Accident Detection with Both Social Media and Traffic Data
On-site Traffic Accident Detection with Both Social Media and Traffic Data Zhenhua Zhang Civil, Structural and Environmental Engineering University at Buffalo, The State University of New York, Buffalo,
More informationMachine Learning for Antenna Array Failure Analysis
Machine Learning for Antenna Array Failure Analysis Lydia de Lange Under Dr DJ Ludick and Dr TL Grobler Dept. Electrical and Electronic Engineering, Stellenbosch University MML 2019 Outline 15/03/2019
More informationCS229: Machine Learning
CS229: Machine Learning Event Identification in Continues Seismic Data Please print out, fill in and include this cover sheet as the first page of your submission. We strongly recommend that you use this
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationHamming Codes and Decoding Methods
Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP
More informationRanging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system
Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Dr Choi Look LAW Founding Director Positioning and Wireless Technology Centre School
More informationOptimized Codes for the Binary Coded Side-Information Problem
Optimized Codes for the Binary Coded Side-Information Problem Anne Savard, Claudio Weidmann ETIS / ENSEA - Université de Cergy-Pontoise - CNRS UMR 8051 F-95000 Cergy-Pontoise Cedex, France Outline 1 Introduction
More informationOpen Access Research of Dielectric Loss Measurement with Sparse Representation
Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng
More informationWildlife Census via LSH-based animal tracking APOORV PATWARDHAN
1 Wildlife Census via LSH-based animal tracking APOORV PATWARDHAN National Parks and wildlife conservation 2 Jim Corbett National Park, India Amboseli National Park, Kenya And many more The Challenge 3
More informationOptimal Power Allocation for Type II H ARQ via Geometric Programming
5 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 5 Optimal Power Allocation for Type II H ARQ via Geometric Programming Hongbo Liu, Leonid Razoumov and Narayan
More informationClassification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine
Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah
More informationLixin Duan. Basic Information.
Lixin Duan Basic Information Research Interests Professional Experience www.lxduan.info lxduan@gmail.com Machine Learning: Transfer learning, multiple instance learning, multiple kernel learning, many
More informationEnhanced MLP Input-Output Mapping for Degraded Pattern Recognition
Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,
More informationDAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks
IEEE INFOCOM 216 - The 35th Annual IEEE International Conference on Computer Communications DAFEE: A Decomposed Approach for Energy Efficient Networking in Multi-Radio Multi-Channel Wireless Networks Lu
More informationAnalysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels
Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels B Kumbhani, V K Mohandas, R P Singh, S Kabra and R S Kshetrimayum Department of Electronics and Electrical
More informationRouting in Max-Min Fair Networks: A Game Theoretic Approach
Routing in Max-Min Fair Networks: A Game Theoretic Approach Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra and Jin Zhang Arizona State University New Mexico State University Outline/Progress of the
More informationVehicle Detection using Images from Traffic Security Camera
Vehicle Detection using Images from Traffic Security Camera Lamia Iftekhar Final Report of Course Project CS174 May 30, 2012 1 1 The Task This project is an application of supervised learning algorithms.
More informationDETECTION AND CLASSIFICATION OF POWER QUALITY DISTURBANCE WAVEFORM USING MRA BASED MODIFIED WAVELET TRANSFROM AND NEURAL NETWORKS
Journal of ELECTRICAL ENGINEERING, VOL. 61, NO. 4, 2010, 235 240 DETECTION AND CLASSIFICATION OF POWER QUALITY DISTURBANCE WAVEFORM USING MRA BASED MODIFIED WAVELET TRANSFROM AND NEURAL NETWORKS Perumal
More informationIMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.
IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationThe Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification
Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events
More informationArtifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 05, 2015 ISSN (online: 2321-0613 Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationEffects of the Unscented Kalman Filter Process for High Performance Face Detector
Effects of the Unscented Kalman Filter Process for High Performance Face Detector Bikash Lamsal and Naofumi Matsumoto Abstract This paper concerns with a high performance algorithm for human face detection
More informationPhoto Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field
Photo Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field Dong-Sung Ryu, Sun-Young Park, Hwan-Gue Cho Dept. of Computer Science and Engineering, Pusan National University, Geumjeong-gu
More informationUltra-Modified Control Algorithms for Matrix Converter in Wind Energy System
Journal of Physical Science and Application 8 (2) (218) 28-42 doi: 1.17265/2159-5348/218.2.5 D DAVID PUBLISHING Ultra-Modified Control Algorithms for Matrix Converter in Wind Energy System Kotb B. Tawfiq,
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationThe Game-Theoretic Approach to Machine Learning and Adaptation
The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning
More informationLossy Compression of Permutations
204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin
More informationA comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
More informationDomain Adaptation & Transfer: All You Need to Use Simulation for Real
Domain Adaptation & Transfer: All You Need to Use Simulation for Real Boqing Gong Tecent AI Lab Department of Computer Science An intelligent robot Semantic segmentation of urban scenes Assign each pixel
More informationKernels and Support Vector Machines
Kernels and Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, 2016 2016 Sham Kakade 1 Announcements: Project Milestones coming up HW2 You ve implemented GD,
More informationDynamic Reconstruct for Network Photograph Exploration
Dynamic Reconstruct for Network Photograph Exploration T.RAJESH #1, A.RAVI #2 Asst. Professor in MCA #1, Asst. Professor in IT #2 Malineni Lakshmaiah Engineering College S.Konda, Prakasam Dist., A.P.,
More informationOn Performance Improvements with Odd-Power (Cross) QAM Mappings in Wireless Networks
San Jose State University From the SelectedWorks of Robert Henry Morelos-Zaragoza April, 2015 On Performance Improvements with Odd-Power (Cross) QAM Mappings in Wireless Networks Quyhn Quach Robert H Morelos-Zaragoza
More informationM.Tolotti - Mathematics (Preparatory) - September Exercises. Maximize p(g(x))g(x) q x subject to x R +
M.Tolotti - Mathematics (Preparatory) - September 2010 1 Exercises EXERCISE 1. where Maximize p(g(x))g(x) q x subject to x R + p : R R is constant, i.e. p(g(x)) = p = 1 for all x. g(x) = 35x x 2. q = 10.
More informationSPECTRUM sensing, a promising solution to identify potential
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 66, NO. 1, JANUARY 1, 2018 5 Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Zhijin Qin, Member, IEEE, YueGao, Senior
More information