(12) United States Patent (10) Patent No.: US 9,373,057 B1

Size: px
Start display at page:

Download "(12) United States Patent (10) Patent No.: US 9,373,057 B1"

Transcription

1 US B1 (12) Unted States Patent () Patent No.: Erhan et al. (45) Date of Patent: Jun. 21, 2016 (54) TRAINING A NEURAL NETWORK TO 6,934,415 B2 * 8/2005 Stentford... GO6K 9,4671 DETECT OBJECTS IN MAGES 382,205 7,142,269 B2 * 1 1/2006 Ikeno... GO2F 1 ( r ar. 349,6 (71) Applcant: Google Inc., Mountan Vew, CA (US) 7,602,944 B2 * /2009 Campbell... GO6K9/ ,240 (72) Inventors: Dumtru Erhan, Vence, CA (US); 7,660,437 B2 * 2/20 Breed... GO6K9/00369 Chrstan Szegedly, Sunnyvale, CA 382/0 (US); Dragomr Anguelov, San Francsco, CA (US) OTHER PUBLICATIONS r ar. Alexe et al., What s an object? 20 IEEE Conference on Com (73) Assgnee: Google Inc., Mountan Vew, CA (US) putervson and Pattern Recognton (CVPR), Jun. 20, pp r Carrera and Smnchsescu, "Constraned parametrc mn-cuts for ( c ) Notce: Subject to any dsclamer, the term of ths automatc object segmentaton. 20 IEEE Conference on Com patent s extended or adjusted under 35 puter Vson and Pattern Recognton (CVPR), Jun. 20, pp Dean et al., Fast, Accurate Detecton of 0,000 Object Classes on (21) Appl. No.: 14/528,815 a Sngle Machne. Proceedngs of the 2013 IEEE Conference on Computer Vson and Pattern Recognton, 2013, pp (22) Fled: Oct. 30, 2014 (Contnued) Related U.S. Applcaton Data (60) Provsonal applcaton No. 61/899,124, fled on Nov. Prmary Examner Yosef Kassa 1, (74) Attorney, Agent, or Frm Fsh & Rchardson P.C. (51) Int. Cl. (57) ABSTRACT G06K 9/00 ( ) Methods, systems, and apparatus, ncludng computer pro G06K 9/62 ( ) grams encoded on computer storage meda, for tranng a G06K 9/66 ( ) neural network to detect object n mages. One of the methods (52) U.S. Cl. ncludes recevng a tranng mage and object locaton data CPC... G06K9/6256 ( ); G06K9/6202 for the tranng mage; provdng the tranng mage to a ( ); G06K 9/66 ( ) neural network and obtanng boundng box data for the tran (58) Feld of Classfcaton Search ng mage from the neural network, wheren the boundng box USPC / , 158, 159, 278: 706/15 data comprses data defnng a pluralty of canddate bound s s s s s s p 9. p y 7O6/16 ng boxes n the tranng mage and a respectve confdence See applcaton fle for complete search hstory. score for each canddate boundng box n the tranng mage: determnng an optmal set of assgnments usng the object (56) References Cted locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments U.S. PATENT DOCUMENTS assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tran ng mage usng the optmal set of assgnments. 6,549,646 B1 * 4/2003 Yeh... GO6K 9, ,132 6,671,400 B1* 12/2003 Ekpar... HO4N 5, , Clams, 3 Drawng Sheets Neural Network Tranng System 0 Boundng Box Data 8 Object Detecton Neural Network 1 O2 Parameter Walues 1 Tranng mage 6 Tranng Images 4

2 Page 2 (56) References Cted OTHER PUBLICATIONS Endres and Hoem, Category ndependent object proposals. ECCV Proceedngs of the 11th European conference on Com puter vson: Part V, 20, pp Everngham et al., The pascal vsual object classes (voc) challenge. Internatonal Journal of ComputerVson, 88(2): , Jun. 20. Felzenszwalb et al., "Object detecton wth dscrmnatvely traned part-based models. IEEE Transactons on Pattern Analyss and Machne Intellgence, 32(9): , Sep. 20. Fschler and Elschlager, The representaton and matchng of pcto ral structures. IEEE Transactons on Computers, c-22(1): Jan Grshck et al., Dscrmnatvely traned deformable part models, release 5. Sep. 5, 2012 retreved on Nov. 3, 2014). Retreved from the Internet: URLs. lease5/>, 3 pages. Gu et al., Recognton usng regons IEEE Conference on Computer Vson and Pattern Recognton, CVPR 2009, Jun. 2009, pp Krzhevsky et al., ImageNet Classfcaton wth Deep Convolutonal Neural Networks. NIPS, pp. 1-9, Lampert et al., Beyond sldng wndows: Object localzaton by effcent subwndow search. IEEE Conference on ComputerVson and Pattern Recognton, 2008, CVPR 2008, Jun. 2008, pp Song et al., Sparselet models for effcent multclass object detec ton. ECCV12 Proceedngs of the 12th European conference on Computer Vson vol. Part II, 2012, pp Szegedy et al., Deep neural networks for object detecton. In Advances n Neural Informaton Processng Systems (NIPS), 2013, pp van de Sande et al., "Segmentaton as selectve search for object recognton IEEE Internatonal Conference on Computer Vson (ICCV), Nov. 2011, pp Zhu et al., Latent herarchcal structural learnng for object detec ton. In 20 IEEE Conference on Computer Vson and Pattern Recognton (CVPR), Jun. 20, pp * cted by examner

3 U.S. Patent Jun. 21, 2016 Sheet 1 of 3 Neural Network Tranng System 0 Boundng Box Data 8 Object Detecton Neural NetWOrk 2 Parameter Values 1 Tranng mage 6 Tranng Images 4 FIG. 1

4 U.S. Patent Jun. 21, 2016 Sheet 2 of 3 20, Receve tranng mage Process tranng mage usng neural network 204 Update parameter values for the neural network 206 FIG. 2

5 U.S. Patent Jun. 21, 2016 Sheet 3 of 3 Obtan boundng box data and object locaton data 302 ldentfy boundng boxes that correspond to object locatons 304 Update parameter values of neural network FIG. 3

6 1. TRAINING ANEURAL NETWORK TO DETECT OBJECTS IN MAGES 2 CROSS-REFERENCE TO RELATED APPLICATION Ths applcaton clams prorty to U.S. Provsonal Appl caton No. 61/899,124, fled on Nov. 1, The dsclosure of the pror applcaton s consdered part of and s ncorpo rated by reference n the dsclosure of ths applcaton. BACKGROUND Ths specfcaton relates to detectng objects n mages. Deep neural networks are machne learnng systems that employ multple layers of models, where the outputs of lower level layers are used to construct the outputs of hgher level layers. SUMMARY In general, one nnovatve aspect of the Subject matter descrbed n ths specfcaton can be emboded n methods that nclude the actons of recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dentfes one or more object locatons n the tranng mage; provdng the tranng mage to a neural net work and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data comprses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; deter mnng an optmal set of assgnments usng the object loca ton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tran ng mage usng the optmal set of assgnments. Other embodments of ths aspect nclude correspondng computer systems, apparatus, and computer programs recorded on one or more computer storage devces, each confgured to perform the actons of the methods. A system of one or more computers can be confgured to perform partcular operatons or actons by vrtue of havng Software, frmware, hardware, or a combnaton of them nstalled on the system that n operaton causes or cause the system to perform the actons. One or more computer pro grams can be confgured to perform partcular operatons or actons by vrtue of ncludng nstructons that, when executed by data processng apparatus, cause the apparatus to perform the actons. The foregong and other embodments can each optonally nclude one or more of the followng features, alone or n combnaton. Determnng the optmal set of assgnments can nclude performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. Performng the bpartte match ng can nclude: selectng as the optmal set of assgnments a set of assgnments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. The locaton loss term for a partcular set of assgnments can be based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. The locaton loss term F for the partcu lar set of assgnments X can satsfy: wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, l, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f I, s assgned to g, n the partcular set of assgnments X and Zero fl, s not assgned to g, n the partcular set of assgnments X, and l - gll s an L dstance between normalzed coordnates of h and normalzed coordnates of g. The confdence loss term for a partcular set of assgnments can be based on, for each canddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdencescore for the canddate boundng box s to a frst target confdencescore for canddate boundng boxes that are assgned to object locatons. The confdence loss term for the partcular set of assgn ments can be further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target conf dence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target con fdence score s lower than the frst target confdencescore. The confdence loss F, for the partcular set of assgn ments X can satsfy: Fo, (x,c) = -Xx log(c)- X. ( -Xx,es - c),,j whereranges from 1 to a total number of canddate boundng boxes, jranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. The neural network can be a deep convolutonal neural network. The neural network can be a deep neural network that comprses an output layer and one or more hdden layers, and tranng the neural network can nclude: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. Partcular embodments of the subject matter descrbed n ths specfcaton can be mplemented so as to realze one or more of the followng advantages. A neural network can be traned to effectvely predct multple boundng boxes n an nput mage, wth the confdence score assgned to each boundng box by the neural network accurately reflectng the lkelhood that the boundng box contans an mage of an object. Addtonally, the neural network can be traned to predct the boundng boxes and generate accurate confdence scores whle beng agnostc to the object category that the objects contaned n the boundng boxes belong to. The detals of one or more embodments of the subject matter of ths specfcaton are set forth n the accompanyng drawngs and the descrpton below. Other features, aspects,

7 3 and advantages of the Subject matter wll become apparent from the descrpton, the drawngs, and the clams. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows an example neural network tranng system. FIG. 2 s a flow dagram of an example process for tranng a neural network on a tranng mage. FIG.3 s a flow dagram of an example process for updatng the values of the parameters of a neural network usng bound ng box data and object locaton data. Lke reference numbers and desgnatons n the varous drawngs ndcate lke elements. DETAILED DESCRIPTION Ths specfcaton generally descrbes a system that can tran a neural network that s confgured to receve an nput mage and generate data defnng a predetermned number of canddate boundng boxes wthn the nput mage and, for each canddate boundng box, a confdence score that repre sents the lkelhood that the boundng box contans an mage of an object. FIG. 1 shows an example neural network tranng system 0 that s confgured to tran an object detecton neural network 2. The neural network tranng system 0 s an example of a system mplemented as computer programs on one or more computers n one or more locatons, n whch the systems, components, and technques descrbed below can be mplemented. The object detecton neural network 2 s a neural net work that s confgured to receve an nput mage and output boundng box data that defnes a predetermned number of canddate boundng boxes wthn the nput mage. Generally, the predetermned number wll be an nteger greater than one, e.g., ten, ffty, or one hundred, so that multple canddate boundng boxes are defned by the output of the object detec ton neural network 2 for each nput mage receved by the neural network. Each canddate boundng box covers a por ton of the nput mage at a respectve poston n the nput mage. The object detecton neural network 2 also outputs, as part of the boundng box data and for each canddate boundng box, a respectve confdence score that represents the lkelhood that the canddate boundng box contans an mage of an object. In partcular, the object detecton neural network 2 generates the output data for a gven nput mage n accordance wth current values of a set of parameters of the neural network, e.g., the current values for each of the param eters stored n a parameter values repostory 1. Generally, the object detecton neural network 2 s a deep neural network that ncludes an output layer and one or more hdden layers. For example, the object detecton neural network 2 may be a deep convolutonal neural network that ncludes one or more convolutonal layers, one or more fully-connected layers, and an output layer, wth each convolutonal and fully connected layer applyng a transformaton to nputs receved from the precedng layer n the network n accordance wth current values of a respectve set of parameters for the layer. Optonally, the deep convolutonal neural network can also nclude other types of neural network layers, e.g., max pool ng and regularzaton layers. The layers that make up an example deep convolutonal neural network are descrbed n more detal n Imagenet classfcaton wth deep convolu tonal neural networks, Alex Krzhevsky, Ilya Sutskever, and Geoffrey E. Hnton, NIPS, pages , The output layer of the object detecton neural network 2 receves an nput from the precedng layer and apples one or more transformatons to the receved nput to generate the data defnng the canddate boundng boxes and the corre spondng confdence scores. In some mplementatons, the output layer apples a lnear transformaton to the receved nput to generate, for each of the predetermned number of canddate boundng boxes, data dentfyng the coordnates of the vertces of the canddate boundng box wthn the nput mage. For example, the output layer can generate, for each canddate boundng box, values value that dentfy the nor malzed coordnates of the upper-left vertex of the boundng box and values that dentfy the normalzed coordnates of the lower-rght vertex of the boundng box. In these mplemen tatons, the output layer also apples a lnear transformaton and then a non-lnear transformaton to the receved nput to generate, for each of the canddate boundng boxes, a value that represents the confdence score for the boundng box. The neural network tranng system 0 trans the object detecton neural network 2 on a set of tranng mages 4 n order to determne traned values of the parameters of the object detecton neural network 2. That s, the neural net work tranng system 0 trans the neural network n order to update the values of the parameters n the parameter repos tory 1 from ntal values to traned values. Each tranng mage n the set of tranng mages 4 s assocated wth object locaton data that dentfes the locatons of one or more objects n the tranng mage,.e., data defnng one or more object locaton boundng boxes wthn the tranng mage that each ncludes an mage of a respectve object. Generally, n order to tran the neural network on a gven tranng mage, e.g., a tranng mage 6, the neural network tranng system 0 provdes the tranng mage to the object detecton neural network 2 and obtans from the object detecton neural network 2 boundng box data, e.g., bound ng box data 8 for the tranng mage 6. The boundng box data ncludes data that defnes the predetermned number of canddate boundng boxes wthn the tranng mage and the confdence score generated by the object detecton neural network 2 for each canddate boundng box. The neural network tranng system 0 updates the current values of the parameters of the object detecton neural network 2 usng the boundng box data and the object locaton data assocated wth the tranng mage that dentfes the locatons of the objects n the tranng mage. Tranng the object detecton neural network s descrbed n more detal below wth refer ence to FIGS. 2 and 3. FIG. 2 s a flow dagram of an example process 200 for tranng a neural network on a tranng mage. For conve nence, the process 200 wll be descrbed as beng performed by a system of one or more computers located n one or more locatons. For example, a neural network tranng system, e.g., the neural network tranng system 0 of FIG. 1, appro prately programmed, can perform the process 200. The system can perform the process 200 for each tranng mage n a set of tranng mages as part of a neural network tranng technque n order to tran a neural network, e.g., the object detecton neural network 2 of FIG. 1. That s, the system can perform the process 200 for each of the tranng mages n the set of tranng data n order to determne traned values of the parameters of the neural network. The system receves a tranng mage (step 202). The tran ng mage s assocated wth object locaton data that defnes one or more object boundng boxes wthn the tranng mage, wth each object boundng box contanng an mage of a respectve object. The system processes the tranng mage usng the neural network (step 204). That s, the system provdes the tranng mage to the neural network and obtans from the neural

8 5 network boundng box data for the tranng mage,.e., data dentfyng a predetermned number of canddate boundng boxes wthn the tranng mage and a confdence score for each canddate boundng box. The confdence score for a gven canddate boundng box represents the lkelhood that the boundng box contans an mage of an object. The neural network generates the boundng box data for the tranng mage n accordance wth current values of the parameters of the neural network. The system updates the values of the parameters of the neural network usng the boundng box data and the object locaton data assocated wth the tranng mage (step 206). Updatng the parameter values of the neural network s descrbed n more detal below wth reference to FIG. 3. FIG. 3 s a flow dagram of an example process 300 for updatng the values of the parameters of a neural network usng boundng box data and object locaton data. For conve nence, the process 300 wll be descrbed as beng performed by a system of one or more computers located n one or more locatons. For example, a neural network tranng system, e.g., the neural network tranng system 0 of FIG. 1, appro prately programmed, can perform the process 300. The system obtans boundng box data and object locaton data for a tranng mage (step 302). The system dentfes canddate boundng boxes dentfed by the neural network that correspond to object locatons dentfed n the object locaton data for the tranng mage (step 304). That s, the system determnes, for each object locaton, a respectve canddate boundng box that corre sponds to the object locaton. In partcular, the system per forms a bpartte matchng to generate an optmal set of assgnments that assgns a respectve canddate boundng box to each object locaton assocated wth the tranng mage. As part of the bpartte matchng, the system selects as the opt mal set of assgnments the set that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. For example, the system may select the set of assgn ments X that satsfes: x = argmn F(x, l, c), X where F(X.l.c) s the loss functon, X s a set of assgnments, 1 s a canddate boundng box, and c s the confdence score for the canddate boundng box, and where the mnmzaton s Subject to the constrant that each set of assgnments X must assgn exactly one canddate boundng box to each object locaton. In some mplementatons, the loss functon satsfes: where C. s a constant value, F, s the locaton loss and F. s the confdence loss. Generally, the locaton loss for a gven set of assgnments s based on, for each canddate boundng box that s assgned to an object locaton by the set of assgnments, the dstance n the tranng mage between the canddate boundng box and the object locaton that the canddate boundng box s assgned to. For example, the locaton loss for a gven set of assgnments X may satsfy: where ranges from 1 to the total number of canddate bound ng boxes, j ranges from 1 to the total number of object locatons, l, s the -th canddate boundng box, g, s the j-th object locaton, X, equals one fl s assgned to g, n the set of assgnments x and Zero f l s not assgned to g, n the set of assgnments X, and l; - gll s the L dstance between the normalzed coordnates of h and the normalzed coordnates of g. Generally, the confdence loss for a gven set of assgn ments s based on, for each canddate boundng box that s assgned to an object locaton by the gven set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that areassgned to object locatons, e.g., a score of one. The confdence loss for a gven set of assgnments s also based on, for each canddate boundng box that s not assgned to an object locaton by the gven set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wth the second target confdence score beng lower than the frst target confdence score e.g., the second target score beng Zero f the frst target confdence score s one. For example, the confdence loss for a gven set of assgnments X may satsfy: F.C, c)=-xx,j logo)-x (-)--s-). where ranges from 1 to the total number of canddate bound ng boxes, j ranges from 1 to the total number of object locatons, c, s the confdence score for the -th canddate boundng box, and X, equals one f l, s assgned to a j-th object locaton by the set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the set of assgnments X. The system updates the values of the parameters of the neural network usng the optmal set of assgnments (step 306). Generally, the system updates the values of the param eters of the neural network to mnmze the loss functon, gven that the set of assgnments s the optmal set of assgn ments. Thus, the system updates the values of the parameters so that the dstances between the canddate boundng boxes and the object locatons to whch the canddate boundng boxes are assgned by the optmal set of assgnments are reduced, the confdence scores for canddate boundng boxes that are assgned to an object locaton by the optmal set of assgnments are ncreased, and the confdence scores for can ddate boundng boxes that are not assgned to an object locaton by the optmal set of assgnments are decreased. In partcular, the system updates the values of the param eters by performng an teraton of a backpropagaton neural network tranng procedure, e.g., a stochastc gradent descent backpropagaton tranng technque, to determne the updated values of the parameters of the neural network. That s, the system backpropagates the error computed for the output of the output layer through to each layer below the output layer n the neural network n order to adjust the parameters of each of the neural network layers.

9 7 Thus, by performng the backpropagaton neural network tranng procedure for each tranng mage n the set of tran ng mages, the system trans the neural network to accurately determne, for an nput mage for whch object locatons are not known by the system, whch of the canddate boundng boxes dentfed by the boundng box data generated by the neural network for the nput mage are lkely to contan an mage of an object, and for each of those canddate boundng boxes, to locate the canddate boundng box accurately n the porton of the mage that contans the mage of the object. In some mplementatons, pror to dentfyng the cand date boundng boxes dentfed by the neural network for a gven tranng mage that correspond to object locatons n the tranng mage, the system clusters the object locatons to determne a set of object locaton clusters that the system can use as prors for each of the canddate boundng boxes. Add tonally, n some mplementatons, the system matches each object locaton to one of the prors rather than matchng the canddate boundng boxes to the object locatons. Embodments of the subject matter and the functonal operatons descrbed n ths specfcaton can be mplemented n dgtal electronc crcutry, n tangbly-emboded computer Software or frmware, n computer hardware, ncludng the structures dsclosed n ths specfcaton and ther structural equvalents, or n combnatons of one or more of them. Embodments of the subject matter descrbed n ths specf caton can be mplemented as one or more computer pro grams,.e., one or more modules of computer program nstructons encoded on a tangble non transtory program carrer for executon by, or to control the operaton of data processng apparatus. Alternatvely or n addton, the pro gram nstructons can be encoded on an artfcally generated propagated sgnal, e.g., a machne-generated electrcal, opt cal, or electromagnetc sgnal, that s generated to encode nformaton for transmsson to Sutable recever apparatus for executon by a data processng apparatus. The computer storage medum can be a machne-readable storage devce, a machne-readable storage substrate, a random or seral access memory devce, or a combnaton of one or more of them. The term data processng apparatus' encompasses all knds of apparatus, devces, and machnes for processng data, ncludng by way of example a programmable proces Sor, a computer, or multple processors or computers. The apparatus can nclude specal purpose logc crcutry, e.g., an FPGA (feld programmable gate array) or an ASIC (applca ton specfc ntegrated crcut). The apparatus can also nclude, n addton to hardware, code that creates an execu ton envronment for the computer program n queston, e.g., code that consttutes processor frmware, a protocol stack, a database management system, an operatng system, oracom bnaton of one or more of them. A computer program (whch may also be referred to or descrbed as a program, Software, a Software applcaton, a module, a software module, a Scrpt, or code) can be wrtten n any form of programmng language, ncludng compled or nterpreted languages, or declaratve or procedural lan guages, and t can be deployed n any form, ncludng as a stand-alone program or as a module, component, Subroutne, or other unt Sutable for use n a computng envronment. A computer program may, but need not, correspond to a fle n a fle system. A program can be stored n a porton of a fle that holds other programs or data, e.g., one or more scrpts stored n a markup language document, n a sngle fle dedcated to the program n queston, or n multple coordnated fles, e.g., fles that store one or more modules, Sub programs, or por tons of code. A computer program can be deployed to be executed on one computer or on multple computers that are located at one ste or dstrbuted across multple stes and nterconnected by a communcaton network. The processes and logc flows descrbed n ths specfca ton can be performed by one or more programmable com puters executng one or more computer programs to perform functons by operatng on nput data and generatng output. The processes and logc flows can also be performed by, and apparatus can also be mplemented as, specal purpose logc crcutry, e.g., an FPGA (feld programmable gate array) or an ASIC (applcaton specfc ntegrated crcut). Computers sutable for the executon of a computer pro gram nclude, by way of example, can be based on general or specal purpose mcroprocessors or both, or any other knd of central processng unt. Generally, a central processng unt wll receve nstructons and data from a read only memory or a random access memory or both. The essental elements of a computer are a central processng unt for performng or executng nstructons and one or more memory devces for storng nstructons and data. Generally, a computer wll also nclude, or be operatvely coupled to receve data from or transfer data to, or both, one or more mass storage devces for storng data, e.g., magnetc, magneto optcal dsks, or optcal dsks. However, a computer need not have such devces. Moreover, a computer can be embedded n another devce, e.g., a moble telephone, a personal dgtal assstant (PDA), a moble audo or vdeo player, a game console, a Global Pos tonng System (GPS) recever, or a portable storage devce, e.g., a unversal seral bus (USB) flash drve, to name just a few. Computer readable meda sutable for storng computer program nstructons and data nclude all forms of non-vola tle memory, meda and memory devces, ncludng by way of example semconductor memory devces, e.g., EPROM, EEPROM, and flash memory devces; magnetc dsks, e.g., nternal hard dsks or removable dsks; magneto optcal dsks; and CD ROM and DVD-ROM dsks. The processor and the memory can be Supplemented by, or ncorporated n, specal purpose logc crcutry. To provde for nteracton wth a user, embodments of the Subject matter descrbed n ths specfcaton can be mple mented on a computer havng a dsplay devce, e.g., a CRT (cathode ray tube) or LCD (lqud crystal dsplay) montor, for dsplayng nformaton to the user and a keyboard and a pontng devce, e.g., amouse or a trackball, by whch the user can provde nput to the computer. Other knds of devces can be used to provde for nteracton wth a user as well; for example, feedback provded to the user can be any form of sensory feedback, e.g., vsual feedback, audtory feedback, or tactle feedback; and nput from the user can be receved n any form, ncludng acoustc, speech, or tactle nput. In add ton, a computer can nteract wth a user by sendng docu ments to and recevng documents from a devce that s used by the user; for example, by sendng web pages to a web browser on a user's clent devce n response to requests receved from the web browser. Embodments of the subject matter descrbed n ths spec fcaton can be mplemented n a computng system that ncludes a back end component, e.g., as a data server, or that ncludes a mddleware component, e.g., an applcaton server, or that ncludes a front end component, e.g., a clent computer havng a graphcal user nterface or a Web browser through whch a user can nteract wth an mplementaton of the Subject matter descrbed n ths specfcaton, or any comb naton of one or more Suchback end, mddleware, or frontend components. The components of the system can be ntercon nected by any form or medum of dgtal data communcaton, e.g., a communcaton network. Examples of communcaton

10 9 networks nclude a local area network ( LAN ) and a wde area network ( WAN ), e.g., the Internet. The computng system can nclude clents and servers. A clent and server are generally remote from each other and typcally nteract through a communcaton network. The relatonshp of clent and server arses by vrtue of computer programs runnng on the respectve computers and havng a clent-server relatonshp to each other. Whle ths specfcaton contans many specfc mplemen taton detals, these should not be construed as lmtatons on the scope of any nventon or of what may be clamed, but rather as descrptons of features that may be specfc to partcular embodments of partcular nventons. Certan fea tures that are descrbed n ths specfcaton n the context of separate embodments can also be mplemented n combna ton n a sngle embodment. Conversely, varous features that are descrbed n the context of a sngle embodment can also be mplemented n multple embodments separately or n any sutable subcombnaton. Moreover, although features may be descrbed above as actng n certan combnatons and even ntally clamed as Such, one or more features from a clamed combnaton can n Some cases be excsed from the comb naton, and the clamed combnaton may be drected to a Subcombnaton or varaton of a Subcombnaton. Smlarly, whle operatons are depcted n the drawngs n a partcular order, ths should not be understood as requrng that such operatons be performed n the partcular order shown or n sequental order, or that all llustrated operatons be performed, to acheve desrable results. In certan crcum stances, multtaskng and parallel processng may be advan tageous. Moreover, the separaton of varous system modules and components n the embodments descrbed above should not be understood as requrng such separaton n all embod ments, and t should be understood that the descrbed program components and systems can generally be ntegrated together n a sngle software product or packaged nto multple soft ware products. Partcular embodments of the subject matter have been descrbed. Other embodments are wthn the scope of the followng clams. For example, the actons rected n the clams can be performed n a dfferent order and stll acheve desrable results. As one example, the processes depcted n the accompanyng fgures do not necessarly requre the par tcular order shown, or sequental order, to acheve desrable results. In certan mplementatons, multtaskng and parallel processng may be advantageous. What s clamed s: 1. A method for tranng a neural network that receves an nput mage and outputs a predetermned number of cand date boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the method comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. 2. The method of clam 1, wheren determnng the optmal set of assgnments comprses performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. 3. The method of clam 2, wheren performng the bpartte matchng comprses: selectng as the optmal set of assgnments a set of assgn ments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. 4. The method of clam3, wheren the locaton loss term for a partcular set of assgnments s based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. 5. The method of clam 4, wheren the locaton loss term F for the partcular set of assgnments X satsfes: Flo (x,1) =X 5xll-gll,,j wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, l, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f, s assgned to g, n the partcular set of assgnments x and Zero f, s not assgned to g, n the partcular set of assgnments X, and l - gll s an L dstance between normalzed coordnates of 1, and normalzed coordnates of g. 6. The method of clam3, wheren the confdence loss term for a partcular set of assgnments s based on, for each can ddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that are assgned to object locatons. 7. The method of clam 6, wheren the confdence loss term for the partcular set of assgnments s further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target confdence score s lower than the frst target confdence score. 8. The method of clam 7, wheren the confdence loss F, for the partcular set of assgnments X satsfes: F.C, c)=-xx,j logo)-x (-)--s-). whereranges from 1 to a total number of canddate bound ng boxes, j ranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th

11 11 object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. 9. The method of clam 1, wheren the neural network s a deep convolutonal neural network.. The method of clam 1, wheren the neural network s a deep neural network that comprses an output layer and one or more hdden layers, and wheren tranng the neural network comprses: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. 11. A system for tranng a neural network that receves an nput mage and outputs a predetermned number of cand date boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the system comprsng one or more computers and one or more storage devces storng nstructons that when executed by the one or more computers cause the one or more computers to perform operatons comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. 12. The system of clam 11, wheren determnng the opt mal set of assgnments comprses performng a bpartte matchng between the object locatons and the canddate boundng boxes to select the optmal set of assgnments. 13. The system of clam 12, wheren performng the bpar tte matchng comprses: Selectng as the optmal set of assgnments a set of assgn ments that mnmzes a loss functon that ncludes a localzaton loss term and a confdence loss term. 14. The system of clam 13, wheren the locaton loss term for a partcular set of assgnments s based on, for each of the object locatons, a dstance n the tranng mage between the object locaton and a canddate boundng box assgned to the object locaton by the partcular set of assgnments. 15. The system of clam 14, wheren the locaton loss term F for the partcular set of assgnments X satsfes: Flo (x,1) =X 5xll-gl,,j wheren ranges from 1 to a total number of canddate boundng boxes, j ranges from 1 to a total number of object locatons, 1, s an -th canddate boundng box, g, s a j-th object locaton, x, equals one f, s assgned to g, n the partcular set of assgnments X and Zero fl, s not assgned to g, n the partcular set of assgnments X, and l; - gll, s an L dstance between normalzed coordnates of 1, and normalzed coordnates of g. 16. The system of clam 13, wheren the confdence loss term for a partcular set of assgnments s based on, for each canddate boundng box that s assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a frst target confdence score for canddate boundng boxes that are assgned to object locatons. 17. The system of clam 16, wheren the confdence loss term for the partcular set of assgnments s further based on, for each canddate boundng box that s not assgned to any of the object locatons by the partcular set of assgnments, how close the confdence score for the canddate boundng box s to a second target confdence score for canddate boundng boxes that are not assgned to object locatons, wheren the second target confdence score s lower than the frst target confdence score. 18. The system of clam 17, wheren the confdence loss F for the partcular set of assgnments X satsfes: F.C, c)=-xx,j logo)-x (-2) st-c). whereranges from 1 to a total number of canddate bound ng boxes, j ranges from 1 to a total number of object locatons, c, s a confdence score for an -th canddate boundng box, and x, equals one fl, s assgned to a j-th object locaton by the partcular set of assgnments X and Zero fl, s not assgned to the j-th object locaton by the partcular set of assgnments X. 19. The system of clam 11, wheren the neural network s a deep neural network that comprses an output layer and one or more hdden layers, and wheren tranng the neural net work comprses: tranng the output layer by mnmzng a loss functon gven the optmal set of assgnments; and tranng the hdden layers through backpropagaton. 20. A computer storage medum encoded wth a computer program, the computer program comprsng nstructons that when executed by one or more computers cause the one or more computers to perform operatons for tranng a neural network that receves an nput mage and outputs a predeter mned number of canddate boundng boxes that each cover a respectve porton of the nput mage at a respectve poston n the nput mage and a respectve confdence score for each canddate boundng box that represents a lkelhood that the canddate boundng box contans an mage of an object, the operatons comprsng: recevng a tranng mage and object locaton data for the tranng mage, wheren the object locaton data dent fes one or more object locatons n the tranng mage; provdng the tranng mage to the neural network and obtanng boundng box data for the tranng mage from the neural network, wheren the boundng box data com prses data defnng a pluralty of canddate boundng

12 13 boxes n the tranng mage and a respectve confdence score for each canddate boundng box n the tranng mage; determnng an optmal set of assgnments usng the object locaton data for the tranng mage and the boundng box data for the tranng mage, wheren the optmal set of assgnments assgns a respectve canddate boundng box to each of the object locatons; and tranng the neural network on the tranng mage usng the optmal set of assgnments. k k k k k 14

(12) United States Patent Ogawa et al.

(12) United States Patent Ogawa et al. US007151027B1 (12) Unted States Patent Ogawa et al. (o) Patent No.: (45) Date of Patent: US 7,151,027 Bl Dec. 19, 2006 (54) METHOD AND DEVICE FOR REDUCING INTERFACE AREA OF A MEMORY DEVICE (75) Inventors:

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Detection of hand grasping an object from complex background based on machine learning co-occurrence of local image feature

Detection of hand grasping an object from complex background based on machine learning co-occurrence of local image feature Detecton of hand graspng an object from complex background based on machne learnng co-occurrence of local mage feature Shnya Moroka, Yasuhro Hramoto, Nobutaka Shmada, Tadash Matsuo, Yoshak Shra Rtsumekan

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

mon computer security problem. Some Trojans modify the Related U.S. Application Data

mon computer security problem. Some Trojans modify the Related U.S. Application Data USOO8266295B2 (12) Unted States Patent Klen et al. () Patent No.: (45) Date of Patent: US 8.266,295 B2 Sep. 11, 2012 (54) (75) (73) (*) (21) (22) (86) (87) (65) () (51) (52) SYSTEMAND METHOD FOR DETECTING

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Discriminative Dictionary Learning with Pairwise Constraints

Discriminative Dictionary Learning with Pairwise Constraints Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

(10) Patent No.: (45) Date of Patent:

(10) Patent No.: (45) Date of Patent: (12) Unted States Patent Maher et al. 111111111111111111111111111111111111111111111111111111111111111111111111111 US006301603Bl (10) Patent No.: (45) Date of Patent: US 6,301,603 Bl Oct. 9,2001 (54) SCALABLE

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg

More information

Comparing Image Representations for Training a Convolutional Neural Network to Classify Gender

Comparing Image Representations for Training a Convolutional Neural Network to Classify Gender 2013 Frst Internatonal Conference on Artfcal Intellgence, Modellng & Smulaton Comparng Image Representatons for Tranng a Convolutonal Neural Network to Classfy Gender Choon-Boon Ng, Yong-Haur Tay, Bok-Mn

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection 2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2011/ A1 Chung et al. (43) Pub. Date: Apr.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2011/ A1 Chung et al. (43) Pub. Date: Apr. US 20110087604A1 (19) Unted States (12) Patent Applcaton Publcaton (10) Pub. No.: US 2011/0087604 A1 Chung et al. (43) Pub. Date: Apr. 14, 2011 (54) MICRO-BLOGGING FOR ENTERPRISE Publcaton Class?caton

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton

More information

Ecient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem

Ecient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem Ecent Computaton of the Most Probable Moton from Fuzzy Correspondences Moshe Ben-Ezra Shmuel Peleg Mchael Werman Insttute of Computer Scence The Hebrew Unversty of Jerusalem 91904 Jerusalem, Israel Emal:

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

A Bilinear Model for Sparse Coding

A Bilinear Model for Sparse Coding A Blnear Model for Sparse Codng Davd B. Grmes and Rajesh P. N. Rao Department of Computer Scence and Engneerng Unversty of Washngton Seattle, WA 98195-2350, U.S.A. grmes,rao @cs.washngton.edu Abstract

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG*

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG* TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS W. HU*, A. G. STARR* and A. Y. T. LEUNG* * Manchester School of Engneerng, The Unversty of Manchester, Manchester M13 9PL, UK To

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

Line-based Camera Movement Estimation by Using Parallel Lines in Omnidirectional Video

Line-based Camera Movement Estimation by Using Parallel Lines in Omnidirectional Video 01 IEEE Internatonal Conference on Robotcs and Automaton RverCentre, Sant Paul, Mnnesota, USA May 14-18, 01 Lne-based Camera Movement Estmaton by Usng Parallel Lnes n Omndrectonal Vdeo Ryosuke kawansh,

More information

Classifier Swarms for Human Detection in Infrared Imagery

Classifier Swarms for Human Detection in Infrared Imagery Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Inference of Human Postures by Classification of 3D Human Body Shape

Inference of Human Postures by Classification of 3D Human Body Shape IEEE Internatonal Workshop on Analyss and Modelng of Faces and Gestures, ICCV 23 Inference of Human Postures by Classfcaton of 3D Human Body Shape Isaac COHEN, Hongxa LI Insttute for Robotcs and Intellgent

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

US 6,658,576 Bl Dec. 2, 2003

US 6,658,576 Bl Dec. 2, 2003 (12) Unted States Patent Lee 1111111111111111 11111 lllll lllll lllll lllll 111111111111111 1111111111 11111111 US006658576Bl (10) Patent No.: (45) Date of Patent: US 6,658,576 Bl Dec. 2, 2003 (54) ENERGY-CONSERVNG

More information

Detecting Irregularities in Images and in Video

Detecting Irregularities in Images and in Video Detectng Irregulartes n Images and n Vdeo Oren Boman Mchal Iran Dept. of Computer Scence and Appled Math The Wezmann Insttute of Scence 76100 Rehovot, Israel Abstract We address the problem of detectng

More information

SYSTEM 8 Diagnostic Solution Plus Ideal Starter Package

SYSTEM 8 Diagnostic Solution Plus Ideal Starter Package Ideal Starter Package The SYSTEM 8 Dagnostc Soluton Plus s the soluton to board fault-fndng problems. Equally at home wth analogue or dgtal PCBs, the system's 64 dgtal and 24 analogue test channels provde

More information

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more

More information

Multiple Image Thumbnailing

Multiple Image Thumbnailing Multple Image Thumbnalng Ganlug Coccaa, Ramondo Schettna a DISCo - Dpartmento d Informatca Sstemstca e Comuncazone, Unverstà degl stud d Mlano-Bcocca, Vale Sarca 336, Mlano, Italy ABSTRACT We have desgned

More information

University of Erlangen-Nuremberg. Cauerstrae 7, Erlangen, Germany. and edges. Each node is labeled by a feature vector that characterizes

University of Erlangen-Nuremberg. Cauerstrae 7, Erlangen, Germany. and edges. Each node is labeled by a feature vector that characterizes Deformable Templates for the Localzaton of Anatomcal Structures n Radologc Images Wolfgang Sorgel and Bernd Grod Telecommuncatons Laboratory Unversty of Erlangen-Nuremberg Cauerstrae 7, 91058 Erlangen,

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K.

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K. A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES Vabhav Mathur and Vktor K. Prasanna Department of EE-Systems Unversty of Southern Calforna Los Angeles, CA

More information

High Five: Recognising human interactions in TV shows

High Five: Recognising human interactions in TV shows PATRON-PEREZ ET AL.: RECOGNISING INTERACTIONS IN TV SHOWS 1 Hgh Fve: Recognsng human nteractons n TV shows Alonso Patron-Perez alonso@robots.ox.ac.uk Marcn Marszalek marcn@robots.ox.ac.uk Andrew Zsserman

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

An Efficient Background Updating Scheme for Real-time Traffic Monitoring

An Efficient Background Updating Scheme for Real-time Traffic Monitoring 2004 IEEE Intellgent Transportaton Systems Conference Washngton, D.C., USA, October 3-6, 2004 WeA1.3 An Effcent Background Updatng Scheme for Real-tme Traffc Montorng Suchendra M. Bhandarkar and Xngzh

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity ISSN(Onlne): 2320-9801 ISSN (Prnt): 2320-9798 Internatonal Journal of Innovatve Research n Computer and Communcaton Engneerng (An ISO 3297: 2007 Certfed Organzaton) Vol.2, Specal Issue 1, March 2014 Proceedngs

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

On Modeling Variations For Face Authentication

On Modeling Variations For Face Authentication On Modelng Varatons For Face Authentcaton Xaomng Lu Tsuhan Chen B.V.K. Vjaya Kumar Department of Electrcal and Computer Engneerng, Carnege Mellon Unversty Abstract In ths paper, we present a scheme for

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

SUMMARY... I TABLE OF CONTENTS...II INTRODUCTION...

SUMMARY... I TABLE OF CONTENTS...II INTRODUCTION... Summary A follow-the-leader robot system s mplemented usng Dscrete-Event Supervsory Control methods. The system conssts of three robots, a leader and two followers. The dea s to get the two followers to

More information