Dynamic Multi-View Hashing for Online Image Retrieval

Size: px
Start display at page:

Download "Dynamic Multi-View Hashing for Online Image Retrieval"

Transcription

1 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 Dynaic Multi-View Hashing for Online Iage Retrieval Liang Xie 1, Jialie Shen 2, Jungong Han 3, Lei Zhu 4, Ling Shao 5 1 Wuhan University of echnology, China 2 Northubria University, United Kingdo 3 Lancaster University, United Kingdo 4 he University of Queensland, Australia 5 University of East Anglia, United Kingdo whutxl@hotail.co, {jialie, jungonghan77, leizhu0608}@gail.co, ling.shao@ieee.org Abstract Advanced hashing technique is essential in large s- cale online iage retrieval and organization, where iage contents are frequently changed. While traditional ulti-view hashing ethod has achieve proising effectiveness, its batch-based learning based schee largely leads to very expensive updating cost. Meanwhile, existing online hashing schee generally focuses on single-view data. Good effectiveness can not be expected when searching over real online iages, which typically have ultiple views. Further, both types of hashing ethods only can generate hash codes with fixed length. hus they have liited capability on coprehensive characterization of streaing iage data. In this paper, we propose dynaic ulti-view hashing, which can adaptively augent hash codes according to dynaic changes of iage. Meanwhile, leverages online learning to generate hash codes. It can increase the code length when current code is not able to represent new iages effectively. Moreover, to gain further iproveent on overall perforance, each view is assigned with a weight, which can be efficiently updated in the online learning process. In order to avoid the frequent updating of code length and view weights, an intelligent buffering schee is designed to preserve significant data to aintain good effectiveness of. Experiental results on t- wo real-world iage datasets deonstrate superior perforance of DWVH over several state-of-theart hashing ethods. 1 Introduction With the explosive growth of online iage repositories, techniques to facilitate fast and effective large scale content access are getting ore and ore attentions. In recent years, hashing has eerged as a proising technology to support large-scale iage retrieval [Mu et al., 2010; Zhen and Yeung, 2012a; Guo et al., 2017b; Wu et al., 2017; Corrsponding Author Zhu et al., 2017]. Except various visual features, the Web iages are associated with various text inforation such as tags or short coents. In order to iprove Web iage search perforance, various ulti-view hashing ethods have been recently proposed [Zhang et al., 2011; Wu et al., 2014; 2015; Xie et al., 2016; Liu et al., 2017; Lin et al., 2017b; 2017a; Guo et al., 2017a]. Multi-view hashing integrates the advantages of hashing technology and ulti-view learning, it enjoys better perforance than single-view hashing, and can support the queries fro different views such as visual features or text features. Web iage database is highly dynaic and frequently updated. raditional ulti-view hashing ethods are developed based on batch-based learning, which is very expensive in ters of updating cost. Multi-view hashing ethods ay accuulate all data to retrain the hash codes and functions when new iages arrive, however their tie coplexity will be extreely high and unaffordable. Recently, several online hashing ethods [Leng et al., 2015; Cakir and Sclaroff, 2015b] are proposed to support effective search over dynaic iage databases. However, their perforance is far beyond satisfactory. When applying existing ulti-view hashing and online hashing ethods for web iage retrieval, they generally suffer fro several issues. Existing online hashing ethods ai at generating the binary codes with fixed length, which is not suited to the dynaic iage data. In real world, the contents of new iage data could be seantically different fro the old one. When new iage data is inserted into the database, longer codes should be required to preserve ore discriinative inforation to support search over updated iage database. According to previous results [Zhou et al., 2014], longer hash code can lead to ore coprehensive iage representation and better search perforance. For exaple, Wikipedia dataset [Rasiwasia et al., 2010] consisting of 2866 iages only needs 32 bits codes to achieve the best perforance. However, for NUS-WIDE having iages, at least 128 bits are required to achieve the best perforance. However, larger code length does not ean the better perforance, in that hashing for data with sall size ay get trapped in local inia [Zhen and Yeung, 2012b]. herefore, general hashing ethods usually choose an appropriate code length for a particular database, which is not suitable to dynaic database, whose size is continuously changed. o solve this proble, the code length for dynaic iage 3133

2 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 database needs to be intelligently augented to guarantee hashing perforance. Another proble is how to easure iportance of different views in the online learning of hash codes. Although each view will contribute to the final hash codes, they can not be equally treated. For exaple, text feature usually contains ore seantic inforation than visual feature [Caicedo et al., 2012], thus it should be assigned with the higher weight. Several ulti-view hashing ethods take the view weights into account and thus they achieve significant perforance iproveent. However, to the best of our knowledge, none of existing online hashing ethods focus on developing intelligent schee to estiate optial weighs for different views. In this paper, we propose a novel unsupervised online hashing ethod: Dynaic Multi-view Hashing to support the effective and efficient dynaic online iage retrieval. owards this goal, uses a dynaic hashing schee, where length of hashing codes can be adaptively augented. In, a dictionary is used to construct the hash codes of iages. When a new data cannot be represented by current dictionary, it will be added to augent the dictionary. Moreover, applies ulti-view features for hashing, and proper weight is assigned to each view. In the online learning process, to avoid the frequent updating of dictionary and odality weights, a buffer is used to preserve significant iages for purpose of subsequential updating. he core technical contributions of our work can be suarized as follows: In, the code length can be dynaically augented with the changes of iage data. As a result, can better represent the streaing iages. In addition, users are not required to predefine the appropriate code length which will be autoatically obtained by. can effectively estiate proper weights for different views to reflect their different iportance in hashing. Previous online hashing ethods generally don t have weighting schee. An intelligent buffer schee is designed for the online learning process of, which enables highly efficient learning process of hash codes and view weights. Experiental results on real-world iage datasets show the superiority of in ters of both search efficiency and accuracy. he reainder of this paper is organized as follows: Section 2 introduces related work; Section 3 coprehensively introduces the proposed ulti-view hashing ethod; Section 4 introduces the experiental configurations and reports the experiental results and ain findings. Finally, Section 5 concludes the paper with future work. 2 Related Work Multi-view Hashing - In recent years, uch attention has been paid for ulti-view hashing. Most ulti-view hashing ethods can be divided to two categories according to the query types supported. Several ulti-view hashing ethods cobine all features to construct database hash codes, but they require that query has the sae features as database Database Dynaic Hash Codes Buffer Iage Hash Function ext Hash Funciton Multi-view Dictionary Learning Figure 1: he overall illustration of. Visual Query ext Query New Iage data. his type of ulti-view hashing usually ais to gain the effective cobination of ulti-view features. Coposite Hashing with Multiple Inforation Sources CHMIS [Zhang et al., 2011] uses graphs of ulti-views features to learn the hash codes, and each view is assigned with a weight for cobination. Since graph learning is inefficient, anchor graph is adopted to accelerate the learning process. Multi-view Anchor Graph Hashing MVAGH [Ki and Choi, 2013] exploits anchors to construct graphs for hashing. Multiview Alignent Hashing MAH [Liu et al., 2015] cobines atrix factorization with anchor graph learning for hashing, and it achieves good perforance based on ulti-view features. Multi-view ethods also can support queries based on different views. his type of ulti-view hashing is also called as cross-view hashing. Generally, cross-view hashing ethods ai at odeling the correlation of different views. Crossview Hashing CVH [Kuar and Udupa, 2011] optiizes the haing distance of different views, it can be regarded as an extended version of Canonical Correlation Analysis C- CA. Inter-edia Hashing [Song et al., 2013] both optiizes the intra-edia and inter-edia consistency. Seantic Correlation Maxiization SCM [Zhang and Li, 2014] axiizes the seantic correlation between iage and text features, and it further considers the quantization loss of hash codes. Seantic opic Multiodal Hashing SMH [Zhou et al., 2014] firstly generates text topics and iage concepts, and then correlates the in a coon hash space. Online Hashing is ore practical than traditional batchbased learning ethods, in that any new iages in realworld are generated. In recent three years, a few online hashing ethods are proposed. Online Kernel Hashing OKH [Huang et al., 2013] and Adaptive Hashing [Cakir and Sclaroff, 2015a] are supervised ethods, they use siilar iage pairs as training data. Although they can effectively p- reserve the correlation of iages in hash codes, they require labeled training exaples which are difficult to collect. Online Sketching Hashing OSH [Leng et al., 2015] is unsupervised online hashing ethod, thus it is not relied on labeled data. he ain disadvantage of existing online hashing ethods is that they are not designed for ulti-view features, so they cannot perfor well for the retrieval of ulti-view iages. 3 Dynaic Multi-View Hashing consists of two ain odules: online learning process and search process. Figure 1 illustrates the overall structure of. In the dynaic hash codes, blue area, red area 3134

3 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 and yellow area denote the old codes, hash codes of new data and the augented codes respectively. he database consists of any iages having both visual and text contents. When new iage arrives, ultiple kinds of visual features and one text feature are extracted and cobined via ulti-view dictionary learning. he differentiation threshold L t deterines whether the iage can be represented by current hash codes. If not, it is added to the buffer, and the buffer data are used to augent hash codes till no ore space is available in the buffer. In the following sections, ore details about L t will be presented. 3.1 Model Forulation In, at step t, the database contains old iage features added at previous steps Xt 1 M, where M is the nuber of views. Xt 1 R t 1 d, and d is the diension of th view feature. he old iages are represented with hash codes H t 1 {0, 1} t 1 C, where C is the code length. hen new iage x t M is added into the database, and Xt = [Xt 1, x t ]. Our goal is to learn new hash codes h t {0, 1} 1 C to represent new iage. he hash function also needs to be learnt to project any views into the learned hash space. owards the goal, the kernel dictionary representation is gained to construct hash codes. Dictionary learning is effective in learning hash codes [Yu et al., 2014; Zhang et al., ], and the kernel projection will ake the hash codes preserve ore discriinative inforation. hus, at tie t, the dictionary consists of a subset of the database saples with uti-view features. For each view, its corresponding dictionary is denoted as Dt = [x a 1,..., x a C ]. Assuing each saple can be constructed fro its hash codes and dictionary, we have the following forulation: in L t Ht, Dt M = α 2 H t ϕ Dt ϕ Xt 2 F + λ H t 2 F s.t. i=1 α = 1 1 where ϕ is a kernel projection function, λ is the regularization paraeter, α = [α 1,..., α M ] denotes the view weights. 3.2 Online Learning Basic process At each step t, when new iage is added into the database, the overall objective function can be reforulated as: in L t Ht, Dt M = L t 1 Ht 1, Dt M + lt ht, Dt M If dictionary Dt M is not changed, Dt = Dt 1, the constraint L t 1 Ht 1, Dt M has been satisfied by previous learning steps. hus, We only need to consider the optiization of l t ht, Dt M, and the objective function is: in l t ht, Dt M = α 2 h t ϕ Dt ϕ x t 2 F + λ h t 2 F 3 2 After applying the kernel trick, the objective function 3 can be rewritten as: α 2 h t K t h t 2h t zt + ktt + λh t h t 4 where K t R C C is the kernel atrix of the dictionary D t, and K t i, j = ϕx a i ϕx a j, z t i = ϕx t ϕx a i, a i is the index of i th dictionary eleent. k tt = ϕx t ϕx t. By setting the derivative of Eq.4 to zeros, we can obtain h t as: where K t = M h t = z t Kt + λi 1 5 α 2 K t, z t = M α 2 z t. For each odality, if vector ϕ x t is linearly independent on vectors of dictionary ϕ Dt. hen h t coputed by Eq.5 cannot satisfy Eq.3, and x t should be added into the dictionary. herefore, we have to deterine the linear dependence of new vectors. By substituting Eq.5 into Eq.3, it can be transfored to: l t ht, Dt 1 M M = α 2 ktt zt h t + λh t h t 6 We use a threshold ρ to deterine the linear dependence. If l t ht, D t 1 M < ρ, then the approxiate linear dependence described by Eq.3 can be satisfied. And we do not need to change dictionary. If l t ht, D t 1 M ρ, then new hash codes cannot be effectively represented by current dictionary. As a result, both dictionary and hash codes need to be augented, and the odal weights should be recoputed accordingly. Dictionary augent with buffer schee Considering the worst case that new iage is always very d- ifferent to database iages and cannot be represented by current dictionary, we have to frequently update the dictionary, which is obviously inefficient. herefore, a buffer schee is applied to avoid the frequent updating process. he buffer schee relaxes the restrict linear dependence in Eq.3. At each step t, if the new iage satisfies l t ht, Dt 1 M ρ, then iage t is added into the buffer with axiu size B ax. After the updating, in case that the buffer is full, iage b will be selected fro the buffer with highest value of l t. hen we augent the dictionary with iage b and update the view weights α. he dictionary is updated with Dt = [Dt 1, x b ], and the hash codes constructed fro dictionary have to be augented accordingly. We should optiize the following overall objective function: in L t Ht, Dt M = L t\b Ht\b, Dt M + lb hb, Dt M s.t. α =

4 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 Where H t\b denotes the hash codes of database iages except b. Since iage b is linearly independent on other dictionary iages, we can only use it to represent itself. herefore we have h b = [0, 1], and l b hb, D t M = 0. hen Eq.7 can be siplified as: + M L t Ht, Dt M = λ r Ht Ht H t\b K t Ht\b 2H t\b α 2 r Z t\b + K t\b 8 After the dictionary is augented, the new K t and Z t\b can be coputed as: [ ] K t = K t 1 zb z b k bb [ Zt\b = Zt 1\b, k ] X t\b, x b 9 Lea 1. If H t\b = [ H t 1\b, 0 ], then the following equation is satisfied: L t Ht\b, Dt M = Lt 1 Ht 1\b, Dt 1 M 10 Proof. Fro Eq.9, we can obtain: H t\b K t Ht\b = [ H t 1\b, 0 ] [ K t 1 zb z b k bb Siilarly, we have: ] [ H t 1\b 0 = H t 1\b K t 1 H t 1\b 11 H t\b Z t\b = Ht 1\b Z t 1\b 12 Based on above two equations and Eq.8, we can easily obtain that each eleent in L t and L t 1 is equivalent, thus Eq.10 is satisfied. heore 1. he objective function [ L t Ht, ] Dt M will be decreased after we set H t = Ht\b, h b, and H t\b = [ Ht 1\b, 0 ] and h b = [0, 1]. Proof. According to Lea 1 and Eq.7, we can obtain that L t Ht, D t M = Lt 1 Ht 1\b, D t 1 M + l b hb, D t M, and lb hb, D t M = 0 can be satisfied by h b = [0, 1]. Before the dictionary augent, iage b in the buffer always has a high l b hb, D t 1 M which describes the linear dependence, where h b denote old codes of b. It is obviously that l b hb, D t 1 M > ρ > 0 = l b hb, D t M. Finally we have Lt Ht, D t M < L t 1 Ht 1, D t 1 M. herefore, the objective function can be decreased. heore 1 confirs that our objective function is consistently decreased by the buffer schee. By specially considering the iage with largest l b and reduce it to 0 by using dictionary augent, the objective functions L t can be largely decreased. If the buffer is full and we augent the codes, then we preserve half iages with highest l to ensure that ] Algorith 1 Online learning process of at step t. Input: x t M,Dt 1 M, K t 1 M, α Output: H t, Dt M, K t M, α 1: Copute h t by Eq.5; 2: Copute l t h t, Dt 1 M by Eq.6 3: if l t h t, Dt 1 M < δ then 4: H t = [Ht 1, sgnh t ] ; 5: K t = K t 1 and D t = D t 1; 6: else if l t h t, D t 1 M >= δ then 7: Add t into the buffer, and use Algorith 2 to optiize H t, α and K t ; 8: end if Algorith 2 Augent dictionary with buffer schee. Input: Buffer, H t, Dt 1 M, K t 1 M, α Output: H t, Dt M, K t M, α 1: Add iage t and corresponding l t h t, Dt 1 M into buffer; 2: Buffer size B = B + 1; 3: if B = B ax then 4: Select iage b in buffer with highest l b ; 5: Reove 1/2 of buffer data with lowest l; 6: Augent dictionary Dt = [Dt 1, x b ] ; 7: Update K t according to Eq.9; 8: Update H t\b = [ H t 1\b, 0 ] ; 9: Update h b = [0, 1]; 10: Update α according to Eq.13 11: else if B < B ax then 12: K t = K t 1, Dt = Dt 1; 13: end if high l can be preserved for further process to decrease objective function. he frequency of augenting depends on the buffer size, if buffer size is large, then the learning process is ore efficient, but objective function can not be effectively decreased. hus we should ake a tradeoff between learning efficiency and effect by adjusting the buffer size. At last, the view weights need to be updated to further reduce the objective function 7. by using the lagrange ultiplier for Eq.7, we can copute α by: where δ = r α = 1/δ M i=1 1/δ i 13 H t K t Ht 2H t Zt + Ktt he basic online learning process and dictionary augentation process are shown in Algorith 1 and 2 respectively. is efficient in learning hash codes. Fro Algorith 1 we can find that the only the hash codes of new data is coputed, and the old codes are not needed to update. Although Algorith 2 updates the old hash codes of previous. 3136

5 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI MAH OSH x 10 4 x 10 4 a Iage query b ext query Figure 2: he scores of MIR Flickr at different database sizes x 10 4 c Multi-view query MAH OSH x 10 5 x 10 5 a Iage query b ext query Figure 3: he scores of NUS-WIDE at different database sizes x 10 5 c Multi-view query data, they are only augented with all zero eleents, which can be efficiently ipleented. he tie coplexity of D- MVH is independent of database size, it only relies on buffer size B and code length C. Extension to visual and text features In real-world applications, users ay not use all the views as query and be likely to choose parts of the. Besides the ulti-view features, we specifically consider the case of visual features and only text feature. For the query based on visual features, its hash codes can be coputed as:h v = M 1 Kt 1. Where view 1 to M 1 are the sgn αz 2 v visual features and view M is text feature. If the query only contains text feature e.g. several keywords, we can copute 1 its hash codes ash te = sgn zte M Kt. 4 Experients 4.1 Datasets We use two ulti-view iage datasets: MIR Flickr [Huiskes and Lew, 2008] and NUS-WIDE [Chua et al., 2009] to copare the hashing perforance in the online scenario. MIR Flickr contains iages collected fro Flickr. All iages are annotated with 38 class labels which are used as the ground truth. In the retrieval process, iages which share at least one sae label are considered as relevant. We select 1% iages as queries, and the rest iages are added to the database sequentially. We use 3 visual features [Guillauin et al., 2010], including 100- D Hue histogra, 1000-D SIF BoVW, 4096-D RGB histogra and 512-D GIS. Each iage is associated with text tags, thus we use 457-D BoW as text feature. NUS-WIDE contains iages collected fro Flickr, each iages is labeled by 81 concepts which can be used for evaluation. We select 1% iages as queries and the rest iages fors the streaing database. We use 3 visual features, including 500-D SIF BoVW, 64- D color histogra, 144-D color correlogra, 73-D edge direction histogra, 128-D wavelet texture and 225-D block-wise color. Each iage is associated with text tags, thus we also use 1000-D BoW as text feature. 4.2 Experiental Settings In the ipleentation of, we use Gaussian kernel for all visual features, and histogra intersection kernel for text feature. does not contain any paraeters to set. he regularization λ is set to 10 3, it is used to avoid the atrix singularity and has little influence on the results. he axiu buffer size is set to 1000 on MIR Flickr and 5000 on NUS-WIDE respectively, the threshold ρ is set to. Since our ethods does not use any supervised inforation, we copare our ethod with several representative unsupervised hashing ethods, including Online Sketching Hashing OSH [Leng et al., 2015], Collective Matrix Factorization Hashing [Ding et al., 2014], Multiview Alignent Hashing MAH [Liu et al., 2015] and Inter-edia Hashing [Song et al., 2013]. OSH cannot support any single-view or partial-view query such as text query and iage query. can only cope with two views, thus we concatenate all visual features into a visual feature. MAH cannot support visual or text query, it only supports ultiview query. supports visual and text query, but cannot support ulti-view query. Mean average precision [Song et al., 2013] is used to easure the effect of retrieval, and scores are coputed on the top 50 retrieved docuents of each query. Moreover, we evaluate the learning tie of all ethods to easure 3137

6 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 able 1: Learning tie and code length at different sizes on NUS-WIDE. Database size OSH tie s tie s code length the efficiency of retrieval. Learning tie is coputed as the total tie of learning hash codes and functions, thus it accuulates the tie of all learning processes fro first step to current step. All the experients are conducted on a coputer with Intel CoreM i5 2.6GHz 2 processors and 12.0GB RAM Multi view Query Iage Query ext Query Seconds Experiental Results In the experients, we consider three types of queries: visual query, text query and ulti-view query. he visual query contains all visual features, text query contains only one text feature, and ulti-view query consists of all features. On MIR Flickr, iages are added to database sequentially, thus we have to evaluate the hashing perforance at different database size. More specifically, we evaluate the scores at t = {2.5, 5, 7.5, 10, 12.5, 15, 17.5, 20, 22.5, 25} he code length of DVMH is changed with the increase of database size, therefore is not appropriate to evaluate the perforance of other ethods at various code lengths. According to previous results [Ding et al., 2014], we choose the best code length as 64 bits. In order to ake a fair coparison, will not increase the code length when it reaches 64 bits. Figure 2 shows the scores of MIR Flickr at different database sizes. In iage query and text query, we copare with and. In ulti-view query, we copare with, MAH and OSH. Fro this figure we can find that obtains higher scores than other ethods. In iage and ulti-view query, the scores are increased with the data size. his phenoenon illustrates the effectiveness of our dynaic schee where code length is adaptively augented. With the augentation of code length, the perforance of can be consistently iproved. Siilar to MIR Flickr, on NUS-WIDE we evaluate the scores at different sizes, the best code length of copared ethods is set to 128 bits. he code length of will not increase when it reaches 128 bits. Figure 3 shows the scores at different database sizes. Siilar to the results of MIR Flickr, outperfors other ulti-view hashing ethods. On all types of queries, the socres of are iproved with the increase of data size. he increase of scores on NUS-WIDE are ore significant than MIR Flickr, the reason is that NUS-WIDE contains uch ore iages, thus the increase of code length are ore benefit to NUS-WIDE. Note that on NUS-WIDE, we use all 81 labels for evaluation, other works such as [Ding et al., 2014] use a reduced version which only contains 10 labels. herefore the overall scores reported in this paper are relatively lower Buffer Buffer a Scores b raining tie Figure 4: Effects of buffer size on NUS-WIDE. 4.4 Efficiency Analysis we also copare the learning tie of to online hashing ethod OSH. able 1 shows the learning tie of two ethods, and the code length of at different sizes. We can find that consues less learning tie than OSH. uses the buffer schee to avoid the frequent updating process. It is ore efficient than OSH while guarantees the hashing perforance. In addition, we can find that the code length of is dynaically changed with the increase of data size. 4.5 Effects of Buffer At last we evaluate the effects of buffer size. able 4 shows the coparison of and training tie with buffer size {500,1000,3000, 5000, 7000, 10000}. All the results are e- valuated at the final step of NUS-WIDE, where all iages are included in database. We can find that the results are relatively steady at different buffer size, which deonstrates the robustness of. Moreover, both s- cores and training tie decrease with the buffer size, thus we can choose a proper size by considering the tradeoff between scores and training tie. 5 Conclusions In this paper we propose Dynaic Multi-view Hashing D- MVH for online retrieval of streaing iage data. can adaptively augent code length to preserve ore inforation of new iage. It constructs hash codes by a dynaic dictionary, when new data cannot be effectively represented by current hash codes, can augent the dictionary to better represent this data. o avoid the frequent updating of dictionary. A buffer schee is designed and only data which are significantly different to current dictionary eleents are considered for updating. Experiental results on MIR Flickr and NUS-WIDE deonstrate the efficiency and effectiveness of copared to representative online hashing and ulti-view hashing ethods

7 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 References [Caicedo et al., 2012] Juan C Caicedo, Jaafar BenAbdallah, Fabio A González, and Olfa Nasraoui. Multiodal representation, indexing, autoated annotation and retrieval of iage collections via non-negative atrix factorization. Neurocoputing, 761:50 60, [Cakir and Sclaroff, 2015a] Fatih Cakir and Stan Sclaroff. Adaptive hashing for fast siilarity search. In CVPR, pages , [Cakir and Sclaroff, 2015b] Fatih Cakir and Stan Sclaroff. Online supervised hashing. In ICIP, pages , [Chua et al., 2009] at-seng Chua, Jinhui ang, Richang Hong, Haojie Li, Zhiping Luo, and Yantao Zheng. Nus-wide: a realworld web iage database fro national university of singapore. In ACM CIVR, page 48, [Ding et al., 2014] Guiguang Ding, Yuchen Guo, and Jile Zhou. Collective atrix factorization hashing for ultiodal data. In CVPR, pages , [Guillauin et al., 2010] Matthieu Guillauin, Jakob Verbeek, and Cordelia Schid. Multiodal sei-supervised learning for iage classification. In CVPR, pages , [Guo et al., 2017a] Y. Guo, G. Ding, J. Han, and Y. Gao. Zero-shot learning with transferred saples. IEEE rans. Iage Processing, 2617: , [Guo et al., 2017b] Yuchen Guo, Guiguang Ding, Li Liu, Jungong Han, and Ling Shao. Learning to hash with optiized anchor ebedding for scalable retrieval. IEEE rans. Iage Processing, 263: , [Huang et al., 2013] Long-Kai Huang, Qiang Yang, and Wei-Shi Zheng. Online hashing. In IJCAI, [Huiskes and Lew, 2008] Mark J Huiskes and Michael S Lew. he ir flickr retrieval evaluation. In ACM ICMR, pages 39 43, [Ki and Choi, 2013] Saehoon Ki and Seungjin Choi. Multiview anchor graph hashing. In Acoustics, Speech and Signal Processing ICASSP, 2013 IEEE International Conference on, pages , [Kuar and Udupa, 2011] Shaishav Kuar and Raghavendra Udupa. Learning hash functions for cross-view siilarity search. In IJCAI, page 1360, [Leng et al., 2015] Cong Leng, Jiaxiang Wu, Jian Cheng, Xiao Bai, and Hanqing Lu. Online sketching hashing. In CVPR, pages , [Lin et al., 2017a] Z. Lin, G. Ding, J. Han, and L. Shao. End-to-end feature-aware label space encoding for ultilabel classification with any classes. IEEE rans. Neural Networks and Learning Systes, [Lin et al., 2017b] Z. Lin, G. Ding, J. Han, and J. Wang. Crossview retrieval via probability-based seantics-preserving hashing. IEEE rans. Cybernetics, [Liu et al., 2015] Li Liu, Mengyang Yu, and Ling Shao. Multiview alignent hashing for efficient iage search. Iage Processing, IEEE ransactions on, 243: , [Liu et al., 2017] Li Liu, Zijia Lin, Ling Shao, Fuin Shen, Guiguang Ding, and Jungong Han. Sequential discrete hashing for scalable cross-odality siilarity retrieval. IEEE rans. Iage Processing, 261: , [Mu et al., 2010] Yadong Mu, Jialie Shen, and Shuicheng Yan. Weakly-supervised hashing in kernel space. In CVPR, pages , [Rasiwasia et al., 2010] Nikhil Rasiwasia, Jose Costa Pereira, E- anuele Coviello, Gabriel Doyle, Gert RG Lanckriet, Roger Levy, and Nuno Vasconcelos. A new approach to cross-odal ultiedia retrieval. In ACM MM, pages , [Song et al., 2013] Jingkuan Song, Yang Yang, Yi Yang, Zi Huang, and Heng ao Shen. Inter-edia hashing for large-scale retrieval fro heterogeneous data sources. In ACM SIGMOD, pages , [Wu et al., 2014] Fei Wu, Zhou Yu, Yi Yang, Siliang ang, Yin Zhang, and Yueting Zhuang. Sparse ulti-odal hashing. Multiedia, IEEE ransactions on, 162: , [Wu et al., 2015] Botong Wu, Qiang Yang, Wei-Shi Zheng, Yizhou Wang, and Jingdong Wang. Quantized correlation hashing for fast cross-odal search. In IJCAI, [Wu et al., 2017] Gengshen Wu, Li Liu, Yuchen Guo, Guiguang D- ing, Jungong Han, Jialie Shen, and Ling Shao. Unsupervised deep video hashing with balanced rotation. In IJCAI, [Xie et al., 2016] Liang Xie, Jialie Shen, and Lei Zhu. Online cross-odal hashing for web iage retrieval. In AAAI, pages , [Yu et al., 2014] Zhou Yu, Fei Wu, Yi Yang, Qi ian, Jiebo Luo, and Yueting Zhuang. Discriinative coupled dictionary hashing for fast cross-edia retrieval. In ACM SIGIR, pages , [Zhang and Li, 2014] Dongqing Zhang and Wu-Jun Li. Large-scale supervised ultiodal hashing with seantic correlation axiization. In AAAI, pages , [Zhang et al., ] Yin Zhang, Weiing Lu, Yang Liu, and Fei Wu. Kernelized sparse hashing for scalable iage retrieval. Neurocoputing, 172. [Zhang et al., 2011] Dan Zhang, Fei Wang, and Luo Si. Coposite hashing with ultiple inforation sources. In ACM SIGIR, pages , [Zhen and Yeung, 2012a] Yi Zhen and Dit-Yan Yeung. Coregularized hashing for ultiodal data. In NIPS 25, pages [Zhen and Yeung, 2012b] Yi Zhen and Dit-Yan Yeung. A probabilistic odel for ultiodal hash function learning. In ACM SIGKDD, pages , [Zhou et al., 2014] Jile Zhou, Guiguang Ding, and Yuchen Guo. Latent seantic sparse hashing for cross-odal siilarity search. In ACM SIGIR, pages , [Zhu et al., 2017] Lei Zhu, Jialie Shen, Liang Xie, and Zhiyong Cheng. Unsupervised visual hashing with seantic assistant for content-based iage retrieval. IEEE rans. Knowl. Data Eng., 292: ,

Dynamic Multi-View Hashing for Online Image Retrieval

Dynamic Multi-View Hashing for Online Image Retrieval Dynamic Multi-View Hashing for Online Image Retrieval Paper ID:888 Abstract Advanced hashing technique is essential to facilitate effective organization and retrieval over online image collections, where

More information

Online Cross-Modal Hashing for Web Image Retrieval

Online Cross-Modal Hashing for Web Image Retrieval Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-6) Online Cross-Modal Hashing for Web Image Retrieval Liang ie Department of Mathematics Wuhan University of Technology, China

More information

Manifold Regularized Transfer Distance Metric Learning

Manifold Regularized Transfer Distance Metric Learning HAIBO SHI, YONG LUO, CHAO XU, YONGGANG WEN: MTDML 1 Manifold Regularized Transfer Distance Metric Learning Haibo Shi 1 shh@pku.edu.cn Yong Luo 2 yluo180@gail.co Chao Xu 1 xuchao@cis.pku.edu.cn Yonggang

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Unsupervised Deep Hashing via Binary Latent Factor Models for Large-scale Cross-modal Retrieval

Unsupervised Deep Hashing via Binary Latent Factor Models for Large-scale Cross-modal Retrieval Unsupervised Deep Hashing via Binary Latent Factor Models for Large-scale Cross-modal Retrieval Gengshen Wu 1, Zijia Lin 2, Jungong Han 1, Li Liu 3, Guiguang Ding 4, Baochang Zhang 5, Jialie Shen 6 1 Lancaster

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing 203 IEEE Conference on Coputer Vision and Pattern Recognition Copressed Hashing Yue Lin Rong Jin Deng Cai Shuicheng Yan Xuelong Li State Key Lab of CAD&CG, College of Coputer Science, Zhejiang University,

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION 10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan

More information

! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr

! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr Miniu Redundancy and Maxiu Relevance Feature election and Its Applications Hanchuan Peng Janelia Far Research Capus, Howard Hughes Medical Institute What is RMR feature selection Applications in cancer

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Massive amounts of high-dimensional data are pervasive in multiple domains,

Massive amounts of high-dimensional data are pervasive in multiple domains, Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

Detecting Anomalous Structures by Convolutional Sparse Models

Detecting Anomalous Structures by Convolutional Sparse Models Detecting Anoalous Structures by Convolutional Sparse Models Diego Carrera, Giacoo Boracchi Dipartiento di Elettronica, Inforazione e Bioingegeria Politecnico di Milano, Italy {giacoo.boracchi, diego.carrera}@polii.it

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation Quantitative Coparison of Sinc-Approxiating Kernels for Medical Iage Interpolation Erik H. W. Meijering, Wiro J. Niessen, Josien P. W. Plui, Max A. Viergever Iage Sciences Institute, Utrecht University

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

Real Time Displacement Measurement of an image in a 2D Plane

Real Time Displacement Measurement of an image in a 2D Plane International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882 Volue 5, Issue 3, March 2016 176 Real Tie Displaceent Measureent of an iage in a 2D Plane Abstract Prashant

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and

More information

Scalable search-based image annotation

Scalable search-based image annotation Multiedia Systes DOI 17/s53-8-128-y REGULAR PAPER Scalable search-based iage annotation Changhu Wang Feng Jing Lei Zhang Hong-Jiang Zhang Received: 18 October 27 / Accepted: 15 May 28 Springer-Verlag 28

More information

Spectral Clustering with Two Views

Spectral Clustering with Two Views Spectral Clustering with Two Views Virginia R. de Sa Departent of Cognitive Science, 55 University of California, San Diego 95 Gilan Dr. La Jolla, CA 993-55 desa@ucsd.edu Abstract In this paper we develop

More information

An Automatic Method for Summary Evaluation Using Multiple Evaluation Results by a Manual Method

An Automatic Method for Summary Evaluation Using Multiple Evaluation Results by a Manual Method An Autoatic Method for Suary Evaluation Using Multiple Evaluation Results by a Manual Method Hidetsugu Nanba Faculty of Inforation Sciences, Hiroshia City University 3-4-1 Ozuka, Hiroshia, 731-3194 Japan

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

On computing global similarity in images

On computing global similarity in images On coputing global siilarity in iages S Ravela and R Manatha Coputer Science Departent University of Massachusetts, Aherst, MA 01003 Eail: ravela,anatha @csuassedu Abstract The retrieval of iages based

More information

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016)

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Method for Marking and Positioning Corrosions in the Autoobile Engine Cylinder Cavity fro the Ultrasonic Phased Array

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Computer Vision and Image Understanding

Computer Vision and Image Understanding Coputer Vision and Iage Understanding 117 (2013) 453 465 Contents lists available at SciVerse ScienceDirect Coputer Vision and Iage Understanding journal hoepage: www.elsevier.co/locate/cviu Pooling in

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Asynchronous Distributed Data Parallelism for Machine Learning

Asynchronous Distributed Data Parallelism for Machine Learning Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

The research on end-effector position and orientation error distribution of SCARA industrial robot

The research on end-effector position and orientation error distribution of SCARA industrial robot International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volue 3 Issue 6 ǁ June 2015 ǁ PP.13-20 The research on end-effector position and orientation

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

HUMAN pose estimation is an important problem in computer

HUMAN pose estimation is an important problem in computer JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 7 Robust 3D Huan Pose Estiation fro Single Iages or Video Sequences Chunyu Wang, Student Meber, IEEE, Yizhou Wang, Meber, IEEE, Zhouchen Lin, Meber,

More information

Beta Process Multiple Kernel Learning

Beta Process Multiple Kernel Learning Beta Process Multiple Kernel Learning Bingbing Ni Advanced Digital Sciences Center Singapore 86 bingbing.ni@adsc.co.sg Teng Li Anhui University Hefei 009, P. R. China tenglwy@gail.co Pierre Moulin UIUC

More information

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Supplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions

Supplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions Suppleentary Section In this section, we include ore details about our algorith, labeling functions, datasets as well as additional results and coparisons, which could not be included in the ain paper

More information

GAN-OPC: Mask Optimization with Lithography-guided Generative Adversarial Nets

GAN-OPC: Mask Optimization with Lithography-guided Generative Adversarial Nets GAN-OPC: Mask Optiization with Lithography-guided Generative Adversarial Nets Haoyu Yang hyyang@cse.cuhk.edu.hk Shuhe Li shli@cse.cuhk.edu.hk Yuzhe Ma yza@cse.cuhk.edu.hk ABSTRACT Bei Yu byu@cse.cuhk.edu.hk

More information

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

MiPPS: A Generative Model for Multi-Manifold Clustering

MiPPS: A Generative Model for Multi-Manifold Clustering Manifold Learning and its Applications: Papers fro the AAAI Fall Syposiu (FS-9-) MiPPS: A Generative Model for Multi-Manifold Clustering Oluwasani Koyejo and Joydeep Ghosh Electrical and Coputer Engineering

More information

arxiv: v1 [cs.dc] 3 Oct 2018

arxiv: v1 [cs.dc] 3 Oct 2018 Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu

More information

Support Vector Machine Based Robotic Traversability Prediction with Vision Features

Support Vector Machine Based Robotic Traversability Prediction with Vision Features International Journal of Coputational Intelligence Systes, Vol. 6, No. (July, 0), 96-608 Support Vector Machine Based Robotic Traversability Prediction with Vision Features Jianwei Cui, Yan Guo, Huatao

More information

Modal Masses Estimation in OMA by a Consecutive Mass Change Method.

Modal Masses Estimation in OMA by a Consecutive Mass Change Method. Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,

More information

@FMI c Kyung Moon Sa Co.

@FMI c Kyung Moon Sa Co. Annals of Fuzzy Matheatics and Inforatics Volue 1, No. 1, (January 2011), pp. 55-70 ISSN 2093-9310 http://www.afi.or.kr @FMI c Kyung Moon Sa Co. http://www.kyungoon.co Multi-granulation rough set: fro

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Learning Integrated Holism-Landmark Representations for Long-Term Loop Closure Detection

Learning Integrated Holism-Landmark Representations for Long-Term Loop Closure Detection Learning Integrated Holis-Landark Representations for Long-Ter Loop Closure Detection Fei Han, Hua Wang, Hao Zhang Departent of Coputer Science, Colorado School of Mines, Golden, CO 8040 fhan@ines.edu,

More information

Classification and Prediction of Motion Trajectories using Spatiotemporal Approximations

Classification and Prediction of Motion Trajectories using Spatiotemporal Approximations Classification and Prediction of Motion Trajectories using Spatioteporal Approxiations Andrew Naftel & Shehzad Khalid School of Inforatics University of Manchester Manchester, M6 1QD a.naftel@anchester.ac.uk;

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Debiasing Crowdsourced Batches

Debiasing Crowdsourced Batches Debiasing Crowdsourced Batches Honglei Zhuang, Aditya Paraeswaran, Dan Roth and Jiawei Han Departent of Coputer Science University of Illinois at Urbana-Chapaign {hzhuang3, adityagp, danr, hanj}@illinois.edu

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

The Method of Flotation Froth Image Segmentation Based on Threshold Level Set

The Method of Flotation Froth Image Segmentation Based on Threshold Level Set Advances in Molecular Iaging, 5, 5, 38-48 Published Online April 5 in SciRes. http://www.scirp.org/journal/ai http://dx.doi.org/.436/ai.5.54 The Method of Flotation Froth Iage Segentation Based on Threshold

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information