One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?

Size: px
Start display at page:

Download "One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?"

Transcription

1 One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet, Robert Sabourin One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Guy Lorette Tenth International Workshop on Frontiers in Handwriting Reognition, Ot 2006, La Baule (Frane), Suvisoft, 2006 <inria > HAL Id: inria Submitted on 5 Ot 2006 HAL is a multi-disiplinary open aess arhive for the deposit and dissemination of sientifi researh douments, whether they are published or not The douments may ome from teahing and researh institutions in Frane or abroad, or from publi or private researh enters L arhive ouverte pluridisiplinaire HAL, est destinée au dépôt et à la diffusion de douments sientifiques de niveau reherhe, publiés ou non, émanant des établissements d enseignement et de reherhe français ou étrangers, des laboratoires publis ou privés

2 One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram Mohamed Cheriet Robert Sabourin Éole de Tehnologie Supérieure, Montréal, Canada milgram@liviaetsmtla mohamedheriet@etsmtla robertsabourin@etsmtla Abstrat The one against one and the one against all are the two most popular strategies for multi-lass SVM; however, aording to the literature review, it seems impossible to onlude whih one is better for handwriting reognition Thus, we ompared these two lassial strategies on two different handwritten harater reognition problems Several post-proessing methods for estimating posterior probability were also evaluated and the results were ompared with the ones obtained using MLP Finally, the one against all strategy appears signifiantly more aurate for digit reognition, while the differene between the two strategies is muh less obvious with upper-ase letters Besides, the one against one strategy is substantially faster to train and seems preferable for problems with a very large number of lasses To onlude, SVMs allow signifiantly better estimation of probabilities than MLP, whih is promising from the point of view of their inorporation into handwriting reognition systems Keywords: Support Vetor Mahine (SVM), Multi-lass Classifiation, Posterior Probability Estimation 1 Introdution In the 1990s, a new type of learning algorithm was developed: the Support Vetor Mahine (SVM) As shown in the Burges tutorial [1], SVM has several interesting properties for pattern reognition Moreover, thanks to improved omputing power and the development of fast learning algorithms, it is now possible to train SVM in real-world appliations However, although SVM has attrated a great deal of attention in the mahine learning ommunity, the multilass SVM is still an ongoing researh issue The existing methods an roughly be divided between two different approahes: the single mahine approah, whih attempts to onstrut a multi-lass SVM by solving a single optimization problem, and the divide and onquer approah, whih deomposes the multilass problem into several binary sub-problems, and builds a standard SVM for eah The most popular deomposing strategy is probably the one against all, whih onsists of building one SVM per lass, trained to distinguish the samples in a single lass from the samples in all remaining lasses Another popular strategy is the one against one, whih builds one SVM for eah pair of lasses On the other hand, more omplex deomposition shemes based on error orreting output odes (ECOC) have been introdued by Diettrih & Bakiri [2] and more reently extended by Allwein et al [3] A omparison of several multi-lass SVM methods (2 single mahine and 3 divide and onquer ) has been realized by Hsu & Lin [4] The results observed are very similar; however, the authors onlude that one against one is more pratial, beause the training proess is quiker Moreover, as to the laim put forward by Allwein et al [3] that one against one and other ECOC are more aurate than the one against all strategy, Rifkin & Klautau [5] disagree, arguing that the one against all strategy is as aurate as any other approah, assuming that the SVMs are well tuned Thus, aording to the literature review, it seems impossible to onlude whih multi-lass SVM is better for handwriting reognition For this reason, we hose to ompare the two most popular strategies, whih are one against all and one against one On the other hand, generally in handwriting reognition appliations, the lassifier only ontributes to a small part of the final deision It is essential, then, that the output of the lassifier is a alibrated onfidene measure, like posterior probability However, although standard SVMs do not provide suh probabilities, a simple post-proessing method for mapping the outputs of a single SVM into posterior probabilities has been proposed by Platt [6] and improved by Lin et al [7] Moreover, while many methods for estimating probabilities with the one against one strategy have been proposed [8, 9, 10], probability estimation with the one against all strategy has not, to the best of our knowledge, been studied The likely reason for this is that, with this strategy, mapping the outputs of eah SVM separately seems suffiient for estimating multilass probabilities; but, as we will see, this is not neessarily the best solution The remainder of this paper is organized as follows Setion 2 presents our experimental protool (database, baseline lassifier, and omparison riteria) Setion 3 desribes the one against all strategy, and ompares two post-proessing methods to estimate posterior probability Setion 4 desribes the one against one strategy, and ompares three methods for ombining the probabilities by eah SVM Finally, setion 5 ompares the two strategies in terms of omplexity and auray, and setion 6 onludes with some pratial suggestions

3 2 Experimental Protool The experiments were onduted on a personal omputer with 19 GHz CPU and 1 Go of RAM All the SVMs were trained with the LIBSVM software [11] We used the C-SVM with a Gaussian kernel The kernel parameter γ and the regularization parameter C were empirially optimized by minimizing the on the validation dataset 21 Database We used the NIST-SD19 database [12], whih ontains the full-page binary images of Handprinted Sample Forms (HSF) from 3,600 writers In our experiments, we used only the images of isolated handwritten digits and upperase letters The number of samples in eah dataset is reported in Table 1 The training datasets ontain exatly the same number of examples in eah lass, whih are the first images from the hsf_{0,1,2,3} orpus The validation datasets are omposed of the remaining images from hsf_{0,1,2,3} for the digit database and of all images from the hsf_4 orpus for the letter database Finally, the testing datasets are omposed of all the images from the hsf_7 orpus Table 1 Number of samples in eah dataset Digit Letter Training 195,000 43,160 Validation 28,123 11,941 Testing 60,089 12,092 We hose to use the same feature extration proedure as Oliveira et al [13] Indeed, this feature spae has been used on the same digit dataset and made it possible to obtain an aurate lassifiation Aording to this method, eah image is divided into six zones: 3 rows and 2 olumns In eah zone, 22 omponents are extrated: 13 onavity measures, 8 orresponding to the histogram of the ontour diretions and one related to the surfae of the harater Finally, we obtained 132 disriminative features, normalized to between 0 and 1 22 Baseline Classifier We have eleted to use a Multi-Layer Pereptron (MLP) as the baseline lassifier beause this type of artifiial neural network makes it possible to estimate aurate posterior probabilities and has been widely inorporated into handwriting reognition systems For our experimentation, we used the same type of topology as Oliveira et al [13], in whih an MLP is used for reognizing handwritten numerial strings The network used has one hidden layer The neurons of the input and the output layers are fully onneted to the neurons of the hidden layer, and the transfer funtion is the sigmoid funtion Furthermore, the network is trained with a sequential gradient desent with momentum applied to a sum-of-squares error funtion The s obtained with MLP are reported in Table 2 and ompared with another lassial lassifier: the k-nearest Neighbor Table 2 Error rate obtained on the testing dataset Digit Letter k-nn 135% 760% MLP 080% 381% Let us note that the number of hidden neurons (h = 80 for digit, and h = 100 for letter) and the number of neighbors (k = 1 for digit, and k = 3 for letter) are fixed using the validation dataset 23 Comparison Criteria To ompare the different approahes in terms of auray, the simplest way would be to evaluate the on the testing dataset, but this value is often not aurate enough For this reason, an error funtion is generally used for omparing the various probability estimates We hose to use the negative log-likelihood: n log ˆP ( k x k ), (1) k=1 where k denotes the label of the sample x k In addition, we propose to use a third measure based on the rejet option Indeed, if the posterior probabilities of the data lasses are known exatly, then, as Chow demonstrated in [14], the optimal rejet option is to rejet a sample x if: max ( P( j x) ) < T (2) j =1,, Then, the threshold T defines the rate of samples rejeted and onsequently the among the samples aepted Thus, a omplete desription of reognition performane is given by the error-rejet tradeoff, whih is obtained by varying T An example is shown in Figure 1 However, in real appliations, suh probabilities are affeted by signifiant estimate errors, and the better the probabilities estimate is, the better the error-rejet tradeoff is Thus, we propose to evaluate the rejetion rate neessary to derease the to a speifi value (01% for digits and 05% for letters) Figure 1: Error-rejet tradeoff obtained with the baseline lassifier on the digit dataset

4 3 The One Against All Strategy 31 Desription The one against all strategy onsists of onstruting one SVM per lass, whih is trained to distinguish the samples of one lass from the samples of all remaining lasses Usually, lassifiation of an unknown pattern is done aording to the maximum output among all SVMs 32 Probability Estimation The most intuitive approah to estimate posterior probability with the one against all strategy is to separately map the outputs of eah SVM into probability using the method proposed by Platt [6], whih onsist of using an additional sigmoid: 1 ˆP ( j f j ) = 1+ exp A j f j + B j, (3) where f j denotes the output of the SVM trained to separate the lass j from all the others Then, for eah sigmoid the parameters A j and B j are optimized by minimizing the loal negative log-likelihood: n t k log( p k ) + ( 1 t k )log( 1 p k ), (4) k=1 where, p k denotes the output of the sigmoid and t k the probability target To solve this optimization problem, Platt [6] proposes using a model-trust minimization algorithm based on the Levenberg-Marquardt algorithm However, Lin et al [7] showed that there are some problems with this algorithm and propose using another minimization algorithm based on Newton s method with baktraking line searh However, nothing guarantees that: ˆP j f j = 1 (5) j=1 For this reason, it seems preferable to normalize the probabilities as follows: ˆP ˆP ( j x) ( j f j ) = (6) ˆP j ' f j ' j '=1 Another approah to estimate posterior probability with the one against all strategy would be to exploit the outputs of all SVMs to estimate overall probabilities In order to do this, we propose using the softmax funtion, whih an be regarded as a generalization of the sigmoid funtion for the multi-lass ase Thus, in the same spirit as Platt s algorithm, we use a parametri form of the softmax funtion: exp( A j f j ( x) + B j ) ˆP( j x) =, (7) exp A j ' f j ' x j '=1 ( + B j ' ) and derive the parameters A j and B j by minimizing the global negative log-likelihood (Eq 1) Thus, it is neessary to onstrut a dataset of SVM outputs, whih will be used to fix the parameters of sigmoid and softmax funtions The easiest way to do this is to use the same training samples used to fit SVMs; but, as pointed out by Platt [6], using the same data twie, an sometimes lead to a disastrously biased estimate Therefore, it is preferable to derive an unbiased training set of the SVM outputs A first solution would be to use a validation dataset; but, in our ase, the number of samples in eah lass is not proportional to the prior probability For this reason, it seems preferable to use ross-validation Then, the training dataset was split into four parts Eah of four SVMs is trained on permutations of three out of four parts, and the SVM outputs are evaluated on the remaining fourth part Finally, the union of all four sets of SVM outputs forms an unbiased dataset, whih an be used to fix the parameters of funtions Furthermore, one the parameters are fixed, the final SVM is trained on the entire training set 33 Experimental Results Firstly, we tested the one against all strategy with the lassial deision making, whih diretly exploits the SVM outputs The s obtained on the testing datasets are 063% with digits and 324% with letters Thereafter, we implemented the two approahes for mapping the SVM outputs into probabilities The results obtained on the testing dataset are reported in Table 3 and Table 4 Considering these results, a number of remarks an be derived First, the two post-proessing methods allow a slight redution of the on the letter dataset, while no improvement is observed on the digit dataset Seond, as we thought, the is not aurate enough in omparing the various estimates Indeed, while the s obtained with the two methods are similar, the rejetion rates and the negative log-likelihood () are signifiantly different Finally, it appears that it is better for posterior probability estimation to optimize globally a softmax funtion than loally several sigmoid funtions Table 3 Results obtained with the one against all strategy on the digit dataset - no rejetion - rejetion rate - 01% of error - sigmoid 064% 373% 1,517 softmax 063% 230% 1,310 Table 4 Results obtained with the one against all strategy on the letter dataset - no rejetion - rejetion rate - 05% of error - sigmoid 317% 1317% 1,570 softmax 318% 1007% 1,375

5 4 The One Against One Strategy 41 Desription The one against one strategy, also known as pairwise oupling, all pairs or round robin, onsists in onstruting one SVM for eah pair of lasses Thus, for a problem with lasses, (-1)/2 SVMs are trained to distinguish the samples of one lass from the samples of another lass Usually, lassifiation of an unknown pattern is done aording to the maximum voting, where eah SVM votes for one lass 42 Probability Estimation After mapping the output of eah SVM into probability with a sigmoid funtion, the task is to express the global posterior probabilities ˆP( j x) as funtions of the loal posterior probabilities, ˆP j where f j, j ' denotes the output of the SVM trained to distinguish lass ω j from lass ω j Various methods have been proposed in the literature We hose to ompare three of these: Method 1 Prie et al [8] onsidered that for all lasses j : P( j, j ' x) ( 2)P( j x) = 1, (8) j '=1, j ' j where j, j ' denotes the union of lasses j and j ' Then, using: P( j x) ˆP j P( j, j ' x), (9) it is possible to derive the following expression: 1 ˆP( j x) = 1 j'=1, j' j ˆP j f j, j' 2 (10) However, sine nothing guarantees that the sum of all the probabilities is 1, we must divide eah estimate ˆP( j x) by ˆP( j x) Method 2 j=1 In a different way, Hastie & Tibshirani [9] proposed using an iterative algorithm to estimate the posterior probabilities = ˆP( j x), whih minimizes the Kullbak-Leibler distane between r jj ' = ˆP j and µ jj ' = + ', that is: n jj ' r jj ' log r jj ' + (1 r jj ' )log 1 r jj ' µ jj ' 1 µ, (11) j< j ' jj ' where n jj ' denotes the number of training samples in the lasses j and j ' To this end, they start with simple non-iterative estimates: j = 2 ( + 1) r jj ' j '=1, j '" j µ, (12) and repeat ( j = 1, 2,,,1, ) until onvergene: 1 µ jj ' + ', j ' j 2! 3 p j '=1 j ' j '=1, j ' j j '=1, j ' j n jj ' r jj ' n jj ' µ jj ' In pratie, we used the following stopping ondition: ( (t) + (t + 1) ) , (13) j=1 where (t) denotes the atual values of and (t 1) the previous values of Method 3 More reently, Hamamura et al [10] proposed a ombination based on the assumption that disriminant funtions are independent of one another Then, sine prior probabilities are all the same, posterior probabilities an be estimated by: ˆP( j x) = j '=1, j ' j j ''=1 j '=1, j ' j '' 43 Experimental Results ˆP j ˆP ( j '' f j '', j ' ) (14) Firstly, we tested the one against one strategy with the lassial voting rule The s obtained on the testing datasets are 071% with digits and 329% with letters Thereafter, we implemented the three methods for ombining probabilities The results obtained on the testing dataset are reported in Table 5 and Table 6 Considering these results, two remarks an be made First, the last method is less aurate than the first two, whih yield signifiantly better rejetion rates and negative log-likelihoods on the two datasets Seond, although the results obtained with the first two methods are omparable, the first method seems slightly more aurate than the seond Indeed, the first method yields better on the letter dataset and better negative log-likelihoods on the two datasets Moreover, the first method has the advantage of being non-iterative and is thus faster than the seond method

6 Table 5 Results obtained with the one against one strategy on the digit dataset - no rejetion - rejetion rate - 01% of error - method 1 070% 349% 1,483 method 2 069% 337% 1,604 method 3 070% 431% 1,825 Table 8 Comparison in terms of auray on the letter dataset - no rejetion - rejetion rate - 05% of error - MLP 381% 2283% 2,923 SVM - OAO 322% 1122% 1,421 SVM - OAA 318% 1007% 1,375 Table 6 Results obtained with the one against one strategy on the letter dataset - no rejetion - rejetion rate - 05% of error - method 1 322% 1122% 1,421 method 2 337% 1136% 1,548 method 3 329% 1389% 2,197 5 Comparison of the two strategies We an now try to answer to the question raised in our title With this in mind, we ompared the two strategies in terms of auray, but also in terms of omplexity 51 Comparison in terms of auray The results obtained on the testing dataset are reported in Table 7 and Table 8, and the error-rejet tradeoffs are shown in Figure 2 and Figure 3 Conerning the one against all strategy (OAA) the softmax funtion is used for probability estimation, while the method 1 is used for ombining the probabilities of the one against one strategy (OAO) Table 7 Comparison in terms of auray on the digit dataset - no rejetion - rejetion rate - 01% of error - MLP 080% 630% 2,591 SVM - OAO 070% 349% 1,483 SVM - OAA 063% 230% 1,310 Figure 2: Comparison of the error-rejet tradeoff obtained on the digit dataset Figure 3: Comparison of the error-rejet tradeoff obtained on the letter dataset Considering these results, two onlusions an be made First, in agreement with the literature, SVMs allow more aurate lassifiation than a lassial MLP Seond, in disagreement with Allwein et al [3], in our experiments, the one against all strategy is more aurate than the one against one Indeed, if the differene between the two strategies is small on the letter dataset, it is signifiant on the digit dataset 52 Comparison in terms of omplexity Two types of omplexity must be onsidered: The omplexity of the training proess It an seem logial that the total training time with the one against one strategy is larger than with the one against all, beause it is neessary to train more binary lassifiers; but it is not true when the binary lassifiers are SVMs Indeed, the training time of an SVM inreases more than linearly with the number of training samples Thus, sine eah sub-problem involves a small number of training samples and is easier to solve, it is quiker to train the (-1)/2 SVMs of the one against one strategy than the SVMs of the one against all strategy In ours experiments, the total training time is approximately divided by 12 with letters (see Table 9) and by 50 with digits (see Table 10) The omplexity of the deision making proess Again, it an seem logial that the deision making with the one against one strategy is more omplex than with the one against all, beause it is neessary to evaluate more deision funtions; but, as previously, it is not neessarily true with SVMs Indeed, the omplexity of an SVM s deision making is diretly linked to the

7 number of support vetors (SVs), and although the deision making is more ompliated in the multi-lass ase, it is reasonable to onsider that the omplexity is proportional to the total number of support vetors 1 However, in our experiments the one against all strategy uses more support vetors than the one against one (48% more for digits, and 21% more for letters) Table 9 Comparison of the two strategies in terms of omplexity on the digit dataset OAO OAA number of SVMs total training time 36 min 32 h 17 number of SVs 5,753 8,514 Table 10 Comparison of the two strategies in terms of omplexity on the letter dataset OAO OAA number of SVMs total training time 4 min 51 min number of SVs 9,152 11,109 6 Conlusion Finally, our answer to the title question will depend on what the problem is! Indeed, it is not reasonable to laim that one strategy is always better that the other; but aording to the appliation onstraints, the number of lasses, and the number of training samples, it will be one or the other of the two strategies that will be more suitable to solve the lassifiation problem Thus, onsidering the onlusions of the previous setion, some suggestions an be made as to whih strategy is best for a speifi problem For problems with few lasses, like digit reognition, the one against all strategy seems signifiantly more aurate; while for problems with more lasses, like Latin letter reognition, the differene of auray between the two strategies seems muh less signifiant Lastly, for problems with a very large number of lasses, like Chinese or Japanese ideogram reognition, we suspet that the unbalane of the number of the samples auses problem with the one against all strategy, espeially when it has few training samples per lass Moreover, the one against one strategy, whih is more modular, is more suitable for speeding up the deision making proess by ombining with other lassifiers [15] Furthermore, if the number of training samples is very large, the training time an 1 Notes that in the multi-lass ase, the total number of support vetors is not neessarily equal to the sum of the number of support vetors of eah SVM, beause a training sample an be a support vetor for several SVMs beome problemati, and then the one against one strategy appears more suitable for pratial use To onlude, we have shown in this paper that appropriate post-proessing make it possible to estimate aurate posterior probabilities with SVMs Thus, these promising results open the way to new perspetives with respet to inorporating SVMs into handwriting reognition systems Referenes [1] CJC Burges, "A tutorial on support vetor mahines for pattern reognition", Data Mining and Knowledge Disovery, vol 2, pp , 1998 [2] TG Dietterih and G Bakiri, "Solving Multilass Learning Problems via Error-Correting Output Codes", Journal of Artifiial Intelligene Researh, vol 2, pp , 1995 [3] EL Allwein, RE Shapire, and Y Singer, "Reduing Multilass to Binary: A Unifying Approah for Margin Classifiers", Journal of Mahine Learning Researh, vol 1, pp , 2000 [4] C-W Hsu and C-J Lin, "A omparison of methods for multi-lass support vetor mahines", IEEE transations on Neural Networks, vol 13, pp , 2002 [5] R Rifkin and A Klautau, "In defene of one-vs-all lassifiation", Journal of Mahine Learning Researh, vol 5, pp , 2004 [6] JC Platt, "Probabilities for SV Mahines", in Advanes in Large Margin Classifiers, A Smola, P Bartlett, B Shölkopf, and D Shuurmans, Eds, MIT Press, pp 61-74, 1999 [7] H-T Lin, C-J Lin, and RC Weng, "A note on Platt's probabilisti outputs for support vetor mahines", Tehnial Report, National Taiwan University, 2003 [8] D Prie, S Knerr, L Personnaz, and G Dreyfus, "Pairwise Neural Network Classifiers with Probabilisti Outputs", in Neural Information Proessing Systems, MIT Press, pp , 1995 [9] T Hastie and R Tibshirani, "Classifiation by pairwise oupling", The Annals of Statistis, vol 26, pp , 1998 [10] T Hamamura, H Mizutani, and B Irie, "A multilass lassifiation method based on multiple pairwise lassifiers", International Conferene on Doument Analysis and Reognition, pp , Edinburgh, Sotland, August 3-6, 2003 [11] C-C Chang and C-J Lin, "LIBSVM: a library for support vetor mahines", Tehnial Report, National Taiwan University, 2001 [12] PJ Grother, "NIST Speial Database 19-Handprinted Forms and Charaters Database", Tehnial Report, National Institute of Standards and Tehnology, 1995 [13] LS Oliveira, R Sabourin, F Bortolozzi, and CY Suen, "Automati reognition of handwritten numerial strings: a reognition and verifiation strategy", IEEE Transations on Pattern Analysis and Mahine Intelligene, vol 24, pp , 2002 [14] CK Chow, "On optimum reognition error and rejet tradeoff", IEEE Transations on Information Theory, vol 16, pp 41-46, 1970 [15] J Milgram, M Cheriet, and R Sabourin, "Speeding Up the Deision Making of Support Vetor Classifiers", International Workshop on Frontiers in Handwriting Reognition, pp 57-62, Tokyo, Japan, Otober 26-29, 2004

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

We P9 16 Eigenray Tracing in 3D Heterogeneous Media

We P9 16 Eigenray Tracing in 3D Heterogeneous Media We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting

More information

Weak Dependence on Initialization in Mixture of Linear Regressions

Weak Dependence on Initialization in Mixture of Linear Regressions Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information

More information

A Unified Subdivision Scheme for Polygonal Modeling

A Unified Subdivision Scheme for Polygonal Modeling EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Adapting K-Medians to Generate Normalized Cluster Centers

Adapting K-Medians to Generate Normalized Cluster Centers Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Spatial-Aware Collaborative Representation for Hyperspectral Remote Sensing Image Classification

Spatial-Aware Collaborative Representation for Hyperspectral Remote Sensing Image Classification Spatial-Aware Collaborative Representation for Hyperspetral Remote Sensing Image ifiation Junjun Jiang, Member, IEEE, Chen Chen, Member, IEEE, Yi Yu, Xinwei Jiang, and Jiayi Ma Member, IEEE Representation-residual

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Hyperspectral Images Classification Using Energy Profiles of Spatial and Spectral Features

Hyperspectral Images Classification Using Energy Profiles of Spatial and Spectral Features journal homepage: www.elsevier.om Hyperspetral Images Classifiation Using Energy Profiles of Spatial and Spetral Features Hamid Reza Shahdoosti a a Hamedan University of ehnology, Department of Eletrial

More information

Deep Rule-Based Classifier with Human-level Performance and Characteristics

Deep Rule-Based Classifier with Human-level Performance and Characteristics Deep Rule-Based Classifier with Human-level Performane and Charateristis Plamen P. Angelov 1,2 and Xiaowei Gu 1* 1 Shool of Computing and Communiations, Lanaster University, Lanaster, LA1 4WA, UK 2 Tehnial

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

3D Model Based Pose Estimation For Omnidirectional Stereovision

3D Model Based Pose Estimation For Omnidirectional Stereovision 3D Model Based Pose Estimation For Omnidiretional Stereovision Guillaume Caron, Eri Marhand and El Mustapha Mouaddib Abstrat Robot vision has a lot to win as well with wide field of view indued by atadioptri

More information

Multi-modal Clustering for Multimedia Collections

Multi-modal Clustering for Multimedia Collections Multi-modal Clustering for Multimedia Colletions Ron Bekkerman and Jiwoon Jeon Center for Intelligent Information Retrieval University of Massahusetts at Amherst, USA {ronb jeon}@s.umass.edu Abstrat Most

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

The HuMAnS toolbox, a homogenous framework for motion capture, analysis and simulation

The HuMAnS toolbox, a homogenous framework for motion capture, analysis and simulation The HuMAnS toolbox, a homogenous framework for motion apture, analysis and simulation Pierre-Brie Wieber, Florene Billet, Laurene Boissieux, Roger Pissard-Gibollet To ite this version: Pierre-Brie Wieber,

More information

Micro-Doppler Based Human-Robot Classification Using Ensemble and Deep Learning Approaches

Micro-Doppler Based Human-Robot Classification Using Ensemble and Deep Learning Approaches Miro-Doppler Based Human-Robot Classifiation Using Ensemble and Deep Learning Approahes Sherif Abdulatif, Qian Wei, Fady Aziz, Bernhard Kleiner, Urs Shneider Department of Biomehatroni Systems, Fraunhofer

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging 0-708: Probabilisti Graphial Models 0-708, Spring 204 Disrete sequential models and CRFs Leturer: Eri P. Xing Sribes: Pankesh Bamotra, Xuanhong Li Case Study: Supervised Part-of-Speeh Tagging The supervised

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems with Appliations 39 (2012) 2842 2855 Contents lists available at SiVerse SieneDiret Expert Systems with Appliations journal homepage: www.elsevier.om/loate/eswa An automated vision system

More information

Hello neighbor: accurate object retrieval with k-reciprocal nearest neighbors

Hello neighbor: accurate object retrieval with k-reciprocal nearest neighbors Hello neighbor: aurate objet retrieval with -reiproal nearest neighbors Danfeng Qin Stephan Gammeter Luas Bossard Till Qua,2 Lu van Gool,3 ETH Zürih 2 Kooaba AG 3 K.U. Leuven {ind,gammeter,bossard,tua,vangool}@vision.ee.ethz.h

More information

Diffusion Kernels on Graphs and Other Discrete Structures

Diffusion Kernels on Graphs and Other Discrete Structures Diffusion Kernels on Graphs and Other Disrete Strutures Risi Imre Kondor ohn Lafferty Shool of Computer Siene Carnegie Mellon University Pittsburgh P 523 US KONDOR@CMUEDU LFFERTY@CSCMUEDU bstrat The appliation

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Face and Facial Feature Tracking for Natural Human-Computer Interface

Face and Facial Feature Tracking for Natural Human-Computer Interface Fae and Faial Feature Traking for Natural Human-Computer Interfae Vladimir Vezhnevets Graphis & Media Laboratory, Dept. of Applied Mathematis and Computer Siene of Mosow State University Mosow, Russia

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

Naïve Bayes Slides are adapted from Sebastian Thrun (Udacity ), Ke Chen Jonathan Huang and H. Witten s and E. Frank s Data Mining and Jeremy Wyatt,

Naïve Bayes Slides are adapted from Sebastian Thrun (Udacity ), Ke Chen Jonathan Huang and H. Witten s and E. Frank s Data Mining and Jeremy Wyatt, Naïve Bayes Slides are adapted from Sebastian Thrun (Udaity ), Ke Chen Jonathan Huang and H. Witten s and E. Frank s Data Mining and Jeremy Wyatt, Bakground There are three methods to establish a lassifier

More information

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING

INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING Fadi Bayoud, Jan Skaloud, Bertrand Merminod Eole Polytehnique Fédérale de Lausanne (EPFL) Geodeti Engineering Laoratory

More information

Shape Outlier Detection Using Pose Preserving Dynamic Shape Models

Shape Outlier Detection Using Pose Preserving Dynamic Shape Models Shape Outlier Detetion Using Pose Preserving Dynami Shape Models Chan-Su Lee Ahmed Elgammal Department of Computer Siene, Rutgers University, Pisataway, NJ 8854 USA CHANSU@CS.RUTGERS.EDU ELGAMMAL@CS.RUTGERS.EDU

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

Visualization of patent analysis for emerging technology

Visualization of patent analysis for emerging technology Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young

More information

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies ACM Symposium on Solid Modeling and Appliations (2004) P. Brunet, N. Patrikalakis (Editors) Plumber: a method for a multi-sale deomposition of 3D shapes into tubular primitives and bodies M. Mortara G.

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology

More information

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,

More information

Adaptive Implicit Surface Polygonization using Marching Triangles

Adaptive Implicit Surface Polygonization using Marching Triangles Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.

More information

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/

More information