(12) United States Patent (10) Patent No.: US 9,373,057 B1
|
|
- Valentine Walker
- 5 years ago
- Views:
Transcription
1 US B1 (12) Unted States Patent () Patent No.: Erhan et al. (45) Date of Patent: Jun. 21, 2016 (54) TRAINING A NEURAL NETWORK TO 6,934,415 B2 * 8/2005 Stentford... GO6K 9,4671 DETECT OBJECTS IN MAGES 382,205 7,142,269 B2 * 1 1/2006 Ikeno... GO2F 1 ( r ar. 349,6 (71) Applcant: Google Inc., Mountan Vew, CA (US) 7,602,944 B2 * /2009 Campbell... GO6K9/ ,240 (72) Inventors: Dumtru Erhan, Vence, CA (US); 7,660,437 B2 * 2/20 Breed... GO6K9/00369 Chrstan Szegedly, Sunnyvale, CA 382/0 (US); Dragomr Anguelov, San Francsco, CA (US) OTHER PUBLICATIONS r ar. Alexe et al., What s an object? 20 IEEE Conference on Com (73) Assgnee: Google Inc., Mountan Vew, CA (US) putervson and Pattern Recognton (CVPR), Jun. 20, pp r Carrera and Smnchsescu, "Constraned parametrc mn-cuts for ( c ) Notce: Subject to any dsclamer, the term of ths automatc object segmentaton. 20 IEEE Conference on Com patent s extended or adjusted under 35 puter Vson and Pattern Recognton (CVPR), Jun. 20, pp Dean et al., Fast, Accurate Detecton of 0,000 Object Classes on (21) Appl. No.: 14/528,815 a Sngle Machne. Proceedngs of the 2013 IEEE Conference on Computer Vson and Pattern Recognton, 2013, pp (22) Fled: Oct. 30, 2014 (Contnued) Related U.S. Applcaton Data (60) Provsonal applcaton No. 61/899,124, fled on Nov. Prmary Examner Yosef Kassa 1, (74) Attorney, Agent, or Frm Fsh & Rchardson P.C. (51) Int. Cl. (57) ABSTRACT G06K 9/00 ( ) Methods, systems, and apparatus, ncludng computer pro G06K 9/62 ( ) grams encoded on computer storage meda, for tranng a G06K 9/66 ( ) neural network to detect object n mages. One of the methods (52) U.S. Cl. ncludes recevng a tranng mage and object locaton data CPC... G06K9/6256 ( ); G06K9/6202 for the tranng mage; provdng the tranng mage to a ( ); G06K 9/66 ( ) neural network and obtanng boundng box data for the tran (58) Feld of Classfcaton Search ng mage from the neural network, wheren the boundng box USPC / , 158, 159, 278: 706/15 data comprses data defnng a pluralty of canddate bound s s s s s s p 9. p y 7O6/16 ng boxes n the tranng mage and a respectve confdence See applcaton fle for complete search hstory. score for each canddate boundng box n the tranng mage: determnng an optmal set of assgnments usng the object (56) References Cted locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments U.S. PATENT DOCUMENTS assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tran ng mage usng the optmal set of assgnments. 6,549,646 B1 * 4/2003 Yeh... GO6K 9, ,132 6,671,400 B1* 12/2003 Ekpar... HO4N 5, , Clams, 3 Drawng Sheets Neural Network Tranng System 0 Boundng Box Data 8 Object Detecton Neural Network 1 O2 Parameter Walues 1 Tranng mage 6 Tranng Images 4
2 Page 2 (56) References Cted OTHER PUBLICATIONS Endres and Hoem, Category ndependent object proposals. ECCV Proceedngs of the 11th European conference on Com puter vson: Part V, 20, pp Everngham et al., The pascal vsual object classes (voc) challenge. Internatonal Journal of ComputerVson, 88(2): , Jun. 20. Felzenszwalb et al., "Object detecton wth dscrmnatvely traned part-based models. IEEE Transactons on Pattern Analyss and Machne Intellgence, 32(9): , Sep. 20. Fschler and Elschlager, The representaton and matchng of pcto ral structures. IEEE Transactons on Computers, c-22(1): Jan Grshck et al., Dscrmnatvely traned deformable part models, release 5. Sep. 5, 2012 retreved on Nov. 3, 2014). Retreved from the Internet: URLs. lease5/>, 3 pages. Gu et al., Recognton usng regons IEEE Conference on Computer Vson and Pattern Recognton, CVPR 2009, Jun. 2009, pp Krzhevsky et al., ImageNet Classfcaton wth Deep Convolutonal Neural Networks. NIPS, pp. 1-9, Lampert et al., Beyond sldng wndows: Object localzaton by effcent subwndow search. IEEE Conference on ComputerVson and Pattern Recognton, 2008, CVPR 2008, Jun. 2008, pp Song et al., Sparselet models for effcent multclass object detec ton. ECCV12 Proceedngs of the 12th European conference on Computer Vson vol. Part II, 2012, pp Szegedy et al., Deep neural networks for object detecton. In Advances n Neural Informaton Processng Systems (NIPS), 2013, pp van de Sande et al., "Segmentaton as selectve search for object recognton IEEE Internatonal Conference on Computer Vson (ICCV), Nov. 2011, pp Zhu et al., Latent herarchcal structural learnng for object detec ton. In 20 IEEE Conference on Computer Vson and Pattern Recognton (CVPR), Jun. 20, pp * cted by examner
3 U.S. Patent Jun. 21, 2016 Sheet 1 of 3 Neural Network Tranng System 0 Boundng Box Data 8 Object Detecton Neural NetWOrk 2 Parameter Values 1 Tranng mage 6 Tranng Images 4 FIG. 1
4 U.S. Patent Jun. 21, 2016 Sheet 2 of 3 20, Receve tranng mage Process tranng mage usng neural network 204 Update parameter values for the neural network 206 FIG. 2
5 U.S. Patent Jun. 21, 2016 Sheet 3 of 3 Obtan boundng box data and object locaton data 302 ldentfy boundng boxes that correspond to object locatons 304 Update parameter values of neural network FIG. 3
6 1. TRAINING ANEURAL NETWORK TO DETECT OBJECTS IN MAGES 2 CROSS-REFERENCE TO RELATED APPLICATION Ths applcaton clams prorty to U.S. Provsonal Appl caton No. 61/899,124, fled on Nov. 1, The dsclosure of the pror applcaton s consdered part of and s ncorpo rated by reference n the dsclosure of ths applcaton. BACKGROUND Ths specfcaton relates to detectng objects n mages. Deep neural networks are machne learnng systems that employ multple layers of models, where the outputs of lower level layers are used to construct the outputs of hgher level layers. SUMMARY In general, one nnovatve aspect of the Subject matter descrbed n ths specfcaton can be emboded n methods that nclude the actons of recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dentfes one or more object locatons n the tranng mage; provdng the tranng mage to a neural net work and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data comprses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; deter mnng an optmal set of assgnments usng the object loca ton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tran ng mage usng the optmal set of assgnments. Other embodments of ths aspect nclude correspondng computer systems, apparatus, and computer programs recorded on one or more computer storage devces, each confgured to perform the actons of the methods. A system of one or more computers can be confgured to perform partcular operatons or actons by vrtue of havng Software, frmware, hardware, or a combnaton of them nstalled on the system that n operaton causes or cause the system to perform the actons. One or more computer pro grams can be confgured to perform partcular operatons or actons by vrtue of ncludng nstructons that, when executed by data processng apparatus, cause the apparatus to perform the actons. The foregong and other embodments can each optonally nclude one or more of the followng features, alone or n combnaton. Determnng the optmal set of assgnments can nclude performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. Performng the bpartte match ng can nclude: selectng as the optmal set of assgnments a set of assgnments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. The locaton loss term for a partcular set of assgnments can be based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. The locaton loss term F for the partcu lar set of assgnments X can satsfy: wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, l, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f I, s assgned to g, n the partcular set of assgnments X and Zero fl, s not assgned to g, n the partcular set of assgnments X, and l - gll s an L dstance between normalzed coordnates of h and normalzed coordnates of g. The confdence loss term for a partcular set of assgnments can be based on, for each canddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdencescore for the canddate boundng box s to a frst target confdencescore for canddate boundng boxes that are assgned to object locatons. The confdence loss term for the partcular set of assgn ments can be further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target conf dence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target con fdence score s lower than the frst target confdencescore. The confdence loss F, for the partcular set of assgn ments X can satsfy: Fo, (x,c) = -Xx log(c)- X. ( -Xx,es - c),,j whereranges from 1 to a total number of canddate boundng boxes, jranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. The neural network can be a deep convolutonal neural network. The neural network can be a deep neural network that comprses an output layer and one or more hdden layers, and tranng the neural network can nclude: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. Partcular embodments of the subject matter descrbed n ths specfcaton can be mplemented so as to realze one or more of the followng advantages. A neural network can be traned to effectvely predct multple boundng boxes n an nput mage, wth the confdence score assgned to each boundng box by the neural network accurately reflectng the lkelhood that the boundng box contans an mage of an object. Addtonally, the neural network can be traned to predct the boundng boxes and generate accurate confdence scores whle beng agnostc to the object category that the objects contaned n the boundng boxes belong to. The detals of one or more embodments of the subject matter of ths specfcaton are set forth n the accompanyng drawngs and the descrpton below. Other features, aspects,
7 3 and advantages of the Subject matter wll become apparent from the descrpton, the drawngs, and the clams. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows an example neural network tranng system. FIG. 2 s a flow dagram of an example process for tranng a neural network on a tranng mage. FIG.3 s a flow dagram of an example process for updatng the values of the parameters of a neural network usng bound ng box data and object locaton data. Lke reference numbers and desgnatons n the varous drawngs ndcate lke elements. DETAILED DESCRIPTION Ths specfcaton generally descrbes a system that can tran a neural network that s confgured to receve an nput mage and generate data defnng a predetermned number of canddate boundng boxes wthn the nput mage and, for each canddate boundng box, a confdence score that repre sents the lkelhood that the boundng box contans an mage of an object. FIG. 1 shows an example neural network tranng system 0 that s confgured to tran an object detecton neural network 2. The neural network tranng system 0 s an example of a system mplemented as computer programs on one or more computers n one or more locatons, n whch the systems, components, and technques descrbed below can be mplemented. The object detecton neural network 2 s a neural net work that s confgured to receve an nput mage and output boundng box data that defnes a predetermned number of canddate boundng boxes wthn the nput mage. Generally, the predetermned number wll be an nteger greater than one, e.g., ten, ffty, or one hundred, so that multple canddate boundng boxes are defned by the output of the object detec ton neural network 2 for each nput mage receved by the neural network. Each canddate boundng box covers a por ton of the nput mage at a respectve poston n the nput mage. The object detecton neural network 2 also outputs, as part of the boundng box data and for each canddate boundng box, a respectve confdence score that represents the lkelhood that the canddate boundng box contans an mage of an object. In partcular, the object detecton neural network 2 generates the output data for a gven nput mage n accordance wth current values of a set of parameters of the neural network, e.g., the current values for each of the param eters stored n a parameter values repostory 1. Generally, the object detecton neural network 2 s a deep neural network that ncludes an output layer and one or more hdden layers. For example, the object detecton neural network 2 may be a deep convolutonal neural network that ncludes one or more convolutonal layers, one or more fully-connected layers, and an output layer, wth each convolutonal and fully connected layer applyng a transformaton to nputs receved from the precedng layer n the network n accordance wth current values of a respectve set of parameters for the layer. Optonally, the deep convolutonal neural network can also nclude other types of neural network layers, e.g., max pool ng and regularzaton layers. The layers that make up an example deep convolutonal neural network are descrbed n more detal n Imagenet classfcaton wth deep convolu tonal neural networks, Alex Krzhevsky, Ilya Sutskever, and Geoffrey E. Hnton, NIPS, pages , The output layer of the object detecton neural network 2 receves an nput from the precedng layer and apples one or more transformatons to the receved nput to generate the data defnng the canddate boundng boxes and the corre spondng confdence scores. In some mplementatons, the output layer apples a lnear transformaton to the receved nput to generate, for each of the predetermned number of canddate boundng boxes, data dentfyng the coordnates of the vertces of the canddate boundng box wthn the nput mage. For example, the output layer can generate, for each canddate boundng box, values value that dentfy the nor malzed coordnates of the upper-left vertex of the boundng box and values that dentfy the normalzed coordnates of the lower-rght vertex of the boundng box. In these mplemen tatons, the output layer also apples a lnear transformaton and then a non-lnear transformaton to the receved nput to generate, for each of the canddate boundng boxes, a value that represents the confdence score for the boundng box. The neural network tranng system 0 trans the object detecton neural network 2 on a set of tranng mages 4 n order to determne traned values of the parameters of the object detecton neural network 2. That s, the neural net work tranng system 0 trans the neural network n order to update the values of the parameters n the parameter repos tory 1 from ntal values to traned values. Each tranng mage n the set of tranng mages 4 s assocated wth object locaton data that dentfes the locatons of one or more objects n the tranng mage,.e., data defnng one or more object locaton boundng boxes wthn the tranng mage that each ncludes an mage of a respectve object. Generally, n order to tran the neural network on a gven tranng mage, e.g., a tranng mage 6, the neural network tranng system 0 provdes the tranng mage to the object detecton neural network 2 and obtans from the object detecton neural network 2 boundng box data, e.g., bound ng box data 8 for the tranng mage 6. The boundng box data ncludes data that defnes the predetermned number of canddate boundng boxes wthn the tranng mage and the confdence score generated by the object detecton neural network 2 for each canddate boundng box. The neural network tranng system 0 updates the current values of the parameters of the object detecton neural network 2 usng the boundng box data and the object locaton data assocated wth the tranng mage that dentfes the locatons of the objects n the tranng mage. Tranng the object detecton neural network s descrbed n more detal below wth refer ence to FIGS. 2 and 3. FIG. 2 s a flow dagram of an example process 200 for tranng a neural network on a tranng mage. For conve nence, the process 200 wll be descrbed as beng performed by a system of one or more computers located n one or more locatons. For example, a neural network tranng system, e.g., the neural network tranng system 0 of FIG. 1, appro prately programmed, can perform the process 200. The system can perform the process 200 for each tranng mage n a set of tranng mages as part of a neural network tranng technque n order to tran a neural network, e.g., the object detecton neural network 2 of FIG. 1. That s, the system can perform the process 200 for each of the tranng mages n the set of tranng data n order to determne traned values of the parameters of the neural network. The system receves a tranng mage (step 202). The tran ng mage s assocated wth object locaton data that defnes one or more object boundng boxes wthn the tranng mage, wth each object boundng box contanng an mage of a respectve object. The system processes the tranng mage usng the neural network (step 204). That s, the system provdes the tranng mage to the neural network and obtans from the neural
8 5 network boundng box data for the tranng mage,.e., data dentfyng a predetermned number of canddate boundng boxes wthn the tranng mage and a confdence score for each canddate boundng box. The confdence score for a gven canddate boundng box represents the lkelhood that the boundng box contans an mage of an object. The neural network generates the boundng box data for the tranng mage n accordance wth current values of the parameters of the neural network. The system updates the values of the parameters of the neural network usng the boundng box data and the object locaton data assocated wth the tranng mage (step 206). Updatng the parameter values of the neural network s descrbed n more detal below wth reference to FIG. 3. FIG. 3 s a flow dagram of an example process 300 for updatng the values of the parameters of a neural network usng boundng box data and object locaton data. For conve nence, the process 300 wll be descrbed as beng performed by a system of one or more computers located n one or more locatons. For example, a neural network tranng system, e.g., the neural network tranng system 0 of FIG. 1, appro prately programmed, can perform the process 300. The system obtans boundng box data and object locaton data for a tranng mage (step 302). The system dentfes canddate boundng boxes dentfed by the neural network that correspond to object locatons dentfed n the object locaton data for the tranng mage (step 304). That s, the system determnes, for each object locaton, a respectve canddate boundng box that corre sponds to the object locaton. In partcular, the system per forms a bpartte matchng to generate an optmal set of assgnments that assgns a respectve canddate boundng box to each object locaton assocated wth the tranng mage. As part of the bpartte matchng, the system selects as the opt mal set of assgnments the set that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. For example, the system may select the set of assgn ments X that satsfes: x = argmn F(x, l, c), X where F(X.l.c) s the loss functon, X s a set of assgnments, 1 s a canddate boundng box, and c s the confdence score for the canddate boundng box, and where the mnmzaton s Subject to the constrant that each set of assgnments X must assgn exactly one canddate boundng box to each object locaton. In some mplementatons, the loss functon satsfes: where C. s a constant value, F, s the locaton loss and F. s the confdence loss. Generally, the locaton loss for a gven set of assgnments s based on, for each canddate boundng box that s assgned to an object locaton by the set of assgnments, the dstance n the tranng mage between the canddate boundng box and the object locaton that the canddate boundng box s assgned to. For example, the locaton loss for a gven set of assgnments X may satsfy: where ranges from 1 to the total number of canddate bound ng boxes, j ranges from 1 to the total number of object locatons, l, s the -th canddate boundng box, g, s the j-th object locaton, X, equals one fl s assgned to g, n the set of assgnments x and Zero f l s not assgned to g, n the set of assgnments X, and l; - gll s the L dstance between the normalzed coordnates of h and the normalzed coordnates of g. Generally, the confdence loss for a gven set of assgn ments s based on, for each canddate boundng box that s assgned to an object locaton by the gven set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that areassgned to object locatons, e.g., a score of one. The confdence loss for a gven set of assgnments s also based on, for each canddate boundng box that s not assgned to an object locaton by the gven set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wth the second target confdence score beng lower than the frst target confdence score e.g., the second target score beng Zero f the frst target confdence score s one. For example, the confdence loss for a gven set of assgnments X may satsfy: F.C, c)=-xx,j logo)-x (-)--s-). where ranges from 1 to the total number of canddate bound ng boxes, j ranges from 1 to the total number of object locatons, c, s the confdence score for the -th canddate boundng box, and X, equals one f l, s assgned to a j-th object locaton by the set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the set of assgnments X. The system updates the values of the parameters of the neural network usng the optmal set of assgnments (step 306). Generally, the system updates the values of the param eters of the neural network to mnmze the loss functon, gven that the set of assgnments s the optmal set of assgn ments. Thus, the system updates the values of the parameters so that the dstances between the canddate boundng boxes and the object locatons to whch the canddate boundng boxes are assgned by the optmal set of assgnments are reduced, the confdence scores for canddate boundng boxes that are assgned to an object locaton by the optmal set of assgnments are ncreased, and the confdence scores for can ddate boundng boxes that are not assgned to an object locaton by the optmal set of assgnments are decreased. In partcular, the system updates the values of the param eters by performng an teraton of a backpropagaton neural network tranng procedure, e.g., a stochastc gradent descent backpropagaton tranng technque, to determne the updated values of the parameters of the neural network. That s, the system backpropagates the error computed for the output of the output layer through to each layer below the output layer n the neural network n order to adjust the parameters of each of the neural network layers.
9 7 Thus, by performng the backpropagaton neural network tranng procedure for each tranng mage n the set of tran ng mages, the system trans the neural network to accurately determne, for an nput mage for whch object locatons are not known by the system, whch of the canddate boundng boxes dentfed by the boundng box data generated by the neural network for the nput mage are lkely to contan an mage of an object, and for each of those canddate boundng boxes, to locate the canddate boundng box accurately n the porton of the mage that contans the mage of the object. In some mplementatons, pror to dentfyng the cand date boundng boxes dentfed by the neural network for a gven tranng mage that correspond to object locatons n the tranng mage, the system clusters the object locatons to determne a set of object locaton clusters that the system can use as prors for each of the canddate boundng boxes. Add tonally, n some mplementatons, the system matches each object locaton to one of the prors rather than matchng the canddate boundng boxes to the object locatons. Embodments of the subject matter and the functonal operatons descrbed n ths specfcaton can be mplemented n dgtal electronc crcutry, n tangbly-emboded computer Software or frmware, n computer hardware, ncludng the structures dsclosed n ths specfcaton and ther structural equvalents, or n combnatons of one or more of them. Embodments of the subject matter descrbed n ths specf caton can be mplemented as one or more computer pro grams,.e., one or more modules of computer program nstructons encoded on a tangble non transtory program carrer for executon by, or to control the operaton of data processng apparatus. Alternatvely or n addton, the pro gram nstructons can be encoded on an artfcally generated propagated sgnal, e.g., a machne-generated electrcal, opt cal, or electromagnetc sgnal, that s generated to encode nformaton for transmsson to Sutable recever apparatus for executon by a data processng apparatus. The computer storage medum can be a machne-readable storage devce, a machne-readable storage substrate, a random or seral access memory devce, or a combnaton of one or more of them. The term data processng apparatus' encompasses all knds of apparatus, devces, and machnes for processng data, ncludng by way of example a programmable proces Sor, a computer, or multple processors or computers. The apparatus can nclude specal purpose logc crcutry, e.g., an FPGA (feld programmable gate array) or an ASIC (applca ton specfc ntegrated crcut). The apparatus can also nclude, n addton to hardware, code that creates an execu ton envronment for the computer program n queston, e.g., code that consttutes processor frmware, a protocol stack, a database management system, an operatng system, oracom bnaton of one or more of them. A computer program (whch may also be referred to or descrbed as a program, Software, a Software applcaton, a module, a software module, a Scrpt, or code) can be wrtten n any form of programmng language, ncludng compled or nterpreted languages, or declaratve or procedural lan guages, and t can be deployed n any form, ncludng as a stand-alone program or as a module, component, Subroutne, or other unt Sutable for use n a computng envronment. A computer program may, but need not, correspond to a fle n a fle system. A program can be stored n a porton of a fle that holds other programs or data, e.g., one or more scrpts stored n a markup language document, n a sngle fle dedcated to the program n queston, or n multple coordnated fles, e.g., fles that store one or more modules, Sub programs, or por tons of code. A computer program can be deployed to be executed on one computer or on multple computers that are located at one ste or dstrbuted across multple stes and nterconnected by a communcaton network. The processes and logc flows descrbed n ths specfca ton can be performed by one or more programmable com puters executng one or more computer programs to perform functons by operatng on nput data and generatng output. The processes and logc flows can also be performed by, and apparatus can also be mplemented as, specal purpose logc crcutry, e.g., an FPGA (feld programmable gate array) or an ASIC (applcaton specfc ntegrated crcut). Computers sutable for the executon of a computer pro gram nclude, by way of example, can be based on general or specal purpose mcroprocessors or both, or any other knd of central processng unt. Generally, a central processng unt wll receve nstructons and data from a read only memory or a random access memory or both. The essental elements of a computer are a central processng unt for performng or executng nstructons and one or more memory devces for storng nstructons and data. Generally, a computer wll also nclude, or be operatvely coupled to receve data from or transfer data to, or both, one or more mass storage devces for storng data, e.g., magnetc, magneto optcal dsks, or optcal dsks. However, a computer need not have such devces. Moreover, a computer can be embedded n another devce, e.g., a moble telephone, a personal dgtal assstant (PDA), a moble audo or vdeo player, a game console, a Global Pos tonng System (GPS) recever, or a portable storage devce, e.g., a unversal seral bus (USB) flash drve, to name just a few. Computer readable meda sutable for storng computer program nstructons and data nclude all forms of non-vola tle memory, meda and memory devces, ncludng by way of example semconductor memory devces, e.g., EPROM, EEPROM, and flash memory devces; magnetc dsks, e.g., nternal hard dsks or removable dsks; magneto optcal dsks; and CD ROM and DVD-ROM dsks. The processor and the memory can be Supplemented by, or ncorporated n, specal purpose logc crcutry. To provde for nteracton wth a user, embodments of the Subject matter descrbed n ths specfcaton can be mple mented on a computer havng a dsplay devce, e.g., a CRT (cathode ray tube) or LCD (lqud crystal dsplay) montor, for dsplayng nformaton to the user and a keyboard and a pontng devce, e.g., amouse or a trackball, by whch the user can provde nput to the computer. Other knds of devces can be used to provde for nteracton wth a user as well; for example, feedback provded to the user can be any form of sensory feedback, e.g., vsual feedback, audtory feedback, or tactle feedback; and nput from the user can be receved n any form, ncludng acoustc, speech, or tactle nput. In add ton, a computer can nteract wth a user by sendng docu ments to and recevng documents from a devce that s used by the user; for example, by sendng web pages to a web browser on a user's clent devce n response to requests receved from the web browser. Embodments of the subject matter descrbed n ths spec fcaton can be mplemented n a computng system that ncludes a back end component, e.g., as a data server, or that ncludes a mddleware component, e.g., an applcaton server, or that ncludes a front end component, e.g., a clent computer havng a graphcal user nterface or a Web browser through whch a user can nteract wth an mplementaton of the Subject matter descrbed n ths specfcaton, or any comb naton of one or more Suchback end, mddleware, or frontend components. The components of the system can be ntercon nected by any form or medum of dgtal data communcaton, e.g., a communcaton network. Examples of communcaton
10 9 networks nclude a local area network ( LAN ) and a wde area network ( WAN ), e.g., the Internet. The computng system can nclude clents and servers. A clent and server are generally remote from each other and typcally nteract through a communcaton network. The relatonshp of clent and server arses by vrtue of computer programs runnng on the respectve computers and havng a clent-server relatonshp to each other. Whle ths specfcaton contans many specfc mplemen taton detals, these should not be construed as lmtatons on the scope of any nventon or of what may be clamed, but rather as descrptons of features that may be specfc to partcular embodments of partcular nventons. Certan fea tures that are descrbed n ths specfcaton n the context of separate embodments can also be mplemented n combna ton n a sngle embodment. Conversely, varous features that are descrbed n the context of a sngle embodment can also be mplemented n multple embodments separately or n any sutable subcombnaton. Moreover, although features may be descrbed above as actng n certan combnatons and even ntally clamed as Such, one or more features from a clamed combnaton can n Some cases be excsed from the comb naton, and the clamed combnaton may be drected to a Subcombnaton or varaton of a Subcombnaton. Smlarly, whle operatons are depcted n the drawngs n a partcular order, ths should not be understood as requrng that such operatons be performed n the partcular order shown or n sequental order, or that all llustrated operatons be performed, to acheve desrable results. In certan crcum stances, multtaskng and parallel processng may be advan tageous. Moreover, the separaton of varous system modules and components n the embodments descrbed above should not be understood as requrng such separaton n all embod ments, and t should be understood that the descrbed program components and systems can generally be ntegrated together n a sngle software product or packaged nto multple soft ware products. Partcular embodments of the subject matter have been descrbed. Other embodments are wthn the scope of the followng clams. For example, the actons rected n the clams can be performed n a dfferent order and stll acheve desrable results. As one example, the processes depcted n the accompanyng fgures do not necessarly requre the par tcular order shown, or sequental order, to acheve desrable results. In certan mplementatons, multtaskng and parallel processng may be advantageous. What s clamed s: 1. A method for tranng a neural network that receves an nput mage and outputs a predetermned number of cand date boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the method comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. 2. The method of clam 1, wheren determnng the optmal set of assgnments comprses performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. 3. The method of clam 2, wheren performng the bpartte matchng comprses: selectng as the optmal set of assgnments a set of assgn ments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. 4. The method of clam3, wheren the locaton loss term for a partcular set of assgnments s based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. 5. The method of clam 4, wheren the locaton loss term F for the partcular set of assgnments X satsfes: Flo (x,1) =X 5xll-gll,,j wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, l, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f, s assgned to g, n the partcular set of assgnments x and Zero f, s not assgned to g, n the partcular set of assgnments X, and l - gll s an L dstance between normalzed coordnates of 1, and normalzed coordnates of g. 6. The method of clam3, wheren the confdence loss term for a partcular set of assgnments s based on, for each can ddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that are assgned to object locatons. 7. The method of clam 6, wheren the confdence loss term for the partcular set of assgnments s further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target confdence score s lower than the frst target confdence score. 8. The method of clam 7, wheren the confdence loss F, for the partcular set of assgnments X satsfes: F.C, c)=-xx,j logo)-x (-)--s-). whereranges from 1 to a total number of canddate bound ng boxes, j ranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th
11 11 object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. 9. The method of clam 1, wheren the neural network s a deep convolutonal neural network.. The method of clam 1, wheren the neural network s a deep neural network that comprses an output layer and one or more hdden layers, and wheren tranng the neural network comprses: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. 11. A system for tranng a neural network that receves an nput mage and outputs a predetermned number of cand date boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the system comprsng one or more computers and one or more storage devces storng nstructons that when executed by the one or more computers cause the one or more computers to perform operatons comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. 12. The system of clam 11, wheren determnng the opt mal set of assgnments comprses performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. 13. The system of clam 12, wheren performng the bpar tte matchng comprses: Selectng as the optmal set of assgnments a set of assgn ments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. 14. The system of clam 13, wheren the locaton loss term for a partcular set of assgnments s based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. 15. The system of clam 14, wheren the locaton loss term F for the partcular set of assgnments X satsfes: Flo (x,1) =X 5xll-gl,,j wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, 1, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f, s assgned to g, n the partcular set of assgnments X and Zero fl, s not assgned to g, n the partcular set of assgnments X, and l; - gll, s an L dstance between normalzed coordnates of 1, and normalzed coordnates of g. 16. The system of clam 13, wheren the confdence loss term for a partcular set of assgnments s based on, for each canddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that are assgned to object locatons. 17. The system of clam 16, wheren the confdence loss term for the partcular set of assgnments s further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target confdence score s lower than the frst target confdence score. 18. The system of clam 17, wheren the confdence loss F for the partcular set of assgnments X satsfes: F.C, c)=-xx,j logo)-x (-2) st-c). whereranges from 1 to a total number of canddate bound ng boxes, j ranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. 19. The system of clam 11, wheren the neural network s a deep neural network that comprses an output layer and one or more hdden layers, and wheren tranng the neural net work comprses: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. 20. A computer storage medum encoded wth a computer program, the computer program comprsng nstructons that when executed by one or more computers cause the one or more computers to perform operatons for tranng a neural network that receves an nput mage and outputs a predeter mned number of canddate boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the operatons comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng
12 13 boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. k k k k k 14
(12) United States Patent Ogawa et al.
US007151027B1 (12) Unted States Patent Ogawa et al. (o) Patent No.: (45) Date of Patent: US 7,151,027 Bl Dec. 19, 2006 (54) METHOD AND DEVICE FOR REDUCING INTERFACE AREA OF A MEMORY DEVICE (75) Inventors:
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationDetection of hand grasping an object from complex background based on machine learning co-occurrence of local image feature
Detecton of hand graspng an object from complex background based on machne learnng co-occurrence of local mage feature Shnya Moroka, Yasuhro Hramoto, Nobutaka Shmada, Tadash Matsuo, Yoshak Shra Rtsumekan
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationETAtouch RESTful Webservices
ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................
More informationActive Contours/Snakes
Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng
More informationmon computer security problem. Some Trojans modify the Related U.S. Application Data
USOO8266295B2 (12) Unted States Patent Klen et al. () Patent No.: (45) Date of Patent: US 8.266,295 B2 Sep. 11, 2012 (54) (75) (73) (*) (21) (22) (86) (87) (65) () (51) (52) SYSTEMAND METHOD FOR DETECTING
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationDiscriminative Dictionary Learning with Pairwise Constraints
Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More information(10) Patent No.: (45) Date of Patent:
(12) Unted States Patent Maher et al. 111111111111111111111111111111111111111111111111111111111111111111111111111 US006301603Bl (10) Patent No.: (45) Date of Patent: US 6,301,603 Bl Oct. 9,2001 (54) SCALABLE
More informationA Gradient Difference based Technique for Video Text Detection
A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg
More informationComparing Image Representations for Training a Convolutional Neural Network to Classify Gender
2013 Frst Internatonal Conference on Artfcal Intellgence, Modellng & Smulaton Comparng Image Representatons for Tranng a Convolutonal Neural Network to Classfy Gender Choon-Boon Ng, Yong-Haur Tay, Bok-Mn
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationA Gradient Difference based Technique for Video Text Detection
2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationUS A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2011/ A1 Chung et al. (43) Pub. Date: Apr.
US 20110087604A1 (19) Unted States (12) Patent Applcaton Publcaton (10) Pub. No.: US 2011/0087604 A1 Chung et al. (43) Pub. Date: Apr. 14, 2011 (54) MICRO-BLOGGING FOR ENTERPRISE Publcaton Class?caton
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More informationA RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood
A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,
More informationHigh level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization
What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton
More informationEcient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem
Ecent Computaton of the Most Probable Moton from Fuzzy Correspondences Moshe Ben-Ezra Shmuel Peleg Mchael Werman Insttute of Computer Scence The Hebrew Unversty of Jerusalem 91904 Jerusalem, Israel Emal:
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationA Bilinear Model for Sparse Coding
A Blnear Model for Sparse Codng Davd B. Grmes and Rajesh P. N. Rao Department of Computer Scence and Engneerng Unversty of Washngton Seattle, WA 98195-2350, U.S.A. grmes,rao @cs.washngton.edu Abstract
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationTWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG*
TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS W. HU*, A. G. STARR* and A. Y. T. LEUNG* * Manchester School of Engneerng, The Unversty of Manchester, Manchester M13 9PL, UK To
More informationObject-Based Techniques for Image Retrieval
54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the
More informationLine-based Camera Movement Estimation by Using Parallel Lines in Omnidirectional Video
01 IEEE Internatonal Conference on Robotcs and Automaton RverCentre, Sant Paul, Mnnesota, USA May 14-18, 01 Lne-based Camera Movement Estmaton by Usng Parallel Lnes n Omndrectonal Vdeo Ryosuke kawansh,
More informationClassifier Swarms for Human Detection in Infrared Imagery
Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationLECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming
CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationFitting: Deformable contours April 26 th, 2018
4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationInference of Human Postures by Classification of 3D Human Body Shape
IEEE Internatonal Workshop on Analyss and Modelng of Faces and Gestures, ICCV 23 Inference of Human Postures by Classfcaton of 3D Human Body Shape Isaac COHEN, Hongxa LI Insttute for Robotcs and Intellgent
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationUS 6,658,576 Bl Dec. 2, 2003
(12) Unted States Patent Lee 1111111111111111 11111 lllll lllll lllll lllll 111111111111111 1111111111 11111111 US006658576Bl (10) Patent No.: (45) Date of Patent: US 6,658,576 Bl Dec. 2, 2003 (54) ENERGY-CONSERVNG
More informationDetecting Irregularities in Images and in Video
Detectng Irregulartes n Images and n Vdeo Oren Boman Mchal Iran Dept. of Computer Scence and Appled Math The Wezmann Insttute of Scence 76100 Rehovot, Israel Abstract We address the problem of detectng
More informationSYSTEM 8 Diagnostic Solution Plus Ideal Starter Package
Ideal Starter Package The SYSTEM 8 Dagnostc Soluton Plus s the soluton to board fault-fndng problems. Equally at home wth analogue or dgtal PCBs, the system's 64 dgtal and 24 analogue test channels provde
More informationMOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN
MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more
More informationMultiple Image Thumbnailing
Multple Image Thumbnalng Ganlug Coccaa, Ramondo Schettna a DISCo - Dpartmento d Informatca Sstemstca e Comuncazone, Unverstà degl stud d Mlano-Bcocca, Vale Sarca 336, Mlano, Italy ABSTRACT We have desgned
More informationUniversity of Erlangen-Nuremberg. Cauerstrae 7, Erlangen, Germany. and edges. Each node is labeled by a feature vector that characterizes
Deformable Templates for the Localzaton of Anatomcal Structures n Radologc Images Wolfgang Sorgel and Bernd Grod Telecommuncatons Laboratory Unversty of Erlangen-Nuremberg Cauerstrae 7, 91058 Erlangen,
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationA HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K.
A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES Vabhav Mathur and Vktor K. Prasanna Department of EE-Systems Unversty of Southern Calforna Los Angeles, CA
More informationHigh Five: Recognising human interactions in TV shows
PATRON-PEREZ ET AL.: RECOGNISING INTERACTIONS IN TV SHOWS 1 Hgh Fve: Recognsng human nteractons n TV shows Alonso Patron-Perez alonso@robots.ox.ac.uk Marcn Marszalek marcn@robots.ox.ac.uk Andrew Zsserman
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationSecure and Fast Fingerprint Authentication on Smart Card
SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,
More informationAn Efficient Background Updating Scheme for Real-time Traffic Monitoring
2004 IEEE Intellgent Transportaton Systems Conference Washngton, D.C., USA, October 3-6, 2004 WeA1.3 An Effcent Background Updatng Scheme for Real-tme Traffc Montorng Suchendra M. Bhandarkar and Xngzh
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationDLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.
DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationEfficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity
ISSN(Onlne): 2320-9801 ISSN (Prnt): 2320-9798 Internatonal Journal of Innovatve Research n Computer and Communcaton Engneerng (An ISO 3297: 2007 Certfed Organzaton) Vol.2, Specal Issue 1, March 2014 Proceedngs
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationOn Modeling Variations For Face Authentication
On Modelng Varatons For Face Authentcaton Xaomng Lu Tsuhan Chen B.V.K. Vjaya Kumar Department of Electrcal and Computer Engneerng, Carnege Mellon Unversty Abstract In ths paper, we present a scheme for
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationSUMMARY... I TABLE OF CONTENTS...II INTRODUCTION...
Summary A follow-the-leader robot system s mplemented usng Dscrete-Event Supervsory Control methods. The system conssts of three robots, a leader and two followers. The dea s to get the two followers to
More information