Learning Pedestrian Dynamics from the Real World

Size: px
Start display at page:

Download "Learning Pedestrian Dynamics from the Real World"

Transcription

1 Learning Pedestrian Dynamics from the Real World Paul Scovanner University of Central Florida Orlando, FL Marshall F. Tappen University of Central Florida Orlando, FL Abstract In this paper we describe a method to learn parameters which govern pedestrian motion by observing video data. Our learning framework is based on variational mode learning and allows us to efficiently optimize a continuous pedestrian cost model. We show that this model can be trained on automatic tracking results, and provides realistic and accurate pedestrian motions. 1. Introduction Systems for predicting pedestrian movement are becoming increasingly important in a variety of research areas. They are used in virtual environments for generating realistic crowd movement [13. In simulators, they can be used to evaluate structures for crowd flow or evacuation [9, 3. More recently, they have been used to detect anomalous events [10. In this paper, we present a system for predicting pedestrian movements that can be trained by observing human movements in a natural environment. Our system is unique in that a pedestrian s movements are formulated as a series of continuous optimizations. This formulation overcomes significant issues with previous attempts at learning behavioral models from video such as [2, 8. Specifically, our model does not require the discretization of the space of possible locations, like [2 and is able to learn more complicated models with more parameters than the models from [8. Section 3 discusses the benefits of our proposed approach in more detail. This model can both produce qualitatively accurate simulations of pedestrian movement, such as the simulations shown in Figure 1, and provide predictions of pedestrian movement that are quantitatively more accurate than standard methods for predicting movement. Section 7 describes these results in more detail. An overview of our model is given in Section 4 and the details of our learning method are given in Sections 5 and 6. We evaluate our method both quantitatively and qualitatively in Section 7. Figure 1. This work focuses on learning a model of pedestrian movement from real-world pedestrian tracks taken from video data. This image shows an example of a two pedestrians paths, shown in black, and the system s predicted paths for those pedestrians, shown in red. The system accurately models the deflections in the pedestrians paths due to other pedestrians. 2. Modeling Pedestrian Behavior Before describing our model and learning procedure in detail, this section will briefly review previously proposed models of pedestrian movement. We refer the reader to [13 for a more comprehensive review of different approaches. One of the first pedestrian modeling methods to describe how a people path with regard to their surroundings was the social force model (SFM), proposed by Helbing and Molnár [4. At its core, the SFM operates on the assumption that the scene, the person s preferences, and other pedestrians exert forces on a person, which help to determine his or her path. This model allows a large scale view of large crowds of people to be modeled by describing the characteristics of individual people using a combination of relatively simple forces. This basic model has been extended to more accurately describe various kinds of crowds [9, 3. The social force model, and its relatives, take an agent-based approach to crowd movement. In contrast, 2009 IEEE 12th International Conference on Computer Vision (ICCV) /09/$ IEEE 381

2 other models describe large crowds as a fluid which obeys certain physical properties and gives no explicit regard to the tendencies of the parts which make up the whole [6. These methods are popular for simulation and stability detection in extremely large crowds. Also, there is a sort of hybrid approach to these two methods of describing crowd behavior, often called the continuum approach. This approach was introduced by Hughes [5 and was further developed by Treuille et. al. [13. The continuum approach takes a similar form as the SFM, however it calculates the forces with respect to the environment (pedestrian density of a specific region, velocity of the average person at that location, discomfort experienced by being at such location) and then assumes that pedestrians will move according to both these shared forces, and the forces guiding them towards their goal. In this sense the continuum model is also similar to the floor fields of [1. We wish to note the difference between the models proposed here and work on modeling pedestrian tracks, such as [11. The primary difference is that work like [11 models the tracks that people are likely to take without explaining why they take that track. These models can predict where a pedestrian is likely to be in a given scene, but do not explain why he or she is there. Instead, the models considered in this paper describe the pedestrian s underlying motivations to predict how and why the pedestrian moves Learning Pedestrian Models Models of pedestrian movement are typically handspecified. Relatively little work has focused on the problem of using real-world data to produce accurate models. Here we review the two major attempts at learning a pedestrian movement model Discrete Choice Model In [2, Antonini et al. model pedestrian behavior as a series of discrete choices. In this model, both time and space are discretized. At each time instant, the pedestrian chooses the next location from a set of possible discrete locations. This choice is made using a multi-class linear classifier. This leads to a straightforward formulation of the learning problem, however discretizing the possible destinations introduces issues. The most pressing issue is the difficult balance between making the grid too coarse, which affects the accuracy of the prediction, and making the grid too fine, which enhances accuracy but requires substantially more computation. Their work proposes an adaptive spacial discretization approach to overcome the difficulties associated with a fixed grid, but this increases the complexity of implementation Learning Social Force Models The second approach, described in [8, uses a classic social force model, similar to that proposed in [3. The goal of their work is to find parameters of the model such that the simulated movements match tracks in video. This is accomplished using an unspecified evolutionary algorithm to optimize two parameters in the model. In their work, the learning algorithm is not described, so it is unclear how well the learning will scale up to models with many parameters. 3. Model Overview Our model is similar in aspects to the previous two approaches, but its unique formulation overcomes issues in both approaches. Similar to the work of [2, our model is built on pedestrians choosing the next location at each discrete time step. However, in our model, that decision is made by optimizing a function that is continuous in space. This eliminates the need for complicated discretization schemes. Our approach is similar to [8, in that we also learn the parameters of a continuous model. A key difference in our approach lies in how the model is specified. Here, we pose the pedestrian s movement as an energy minimization problem. This enables us to build on previous work on learning parameters for energy functions, such as [12. Posing the pedestrian s movement as a series of continuous optimizations makes it possible to differentiate the predicted paths with respect to the parameters of the model. This enables us to use standard gradient-based optimization algorithms to optimize the model parameters. The availability of robust learning algorithms enables us to use more complicated models. The models described in this paper use 17 parameters. 4. Pedestrian Model We pose the problem of predicting a pedestrian s path as a series of energy minimization steps. The pedestrian s path is modeled as a set of discrete steps. While the path is discretized in time, it is not discretized in space. An energy, or cost, is assigned to each possible (continuous) location that the pedestrian might move to. At the next discrete time step, the pedestrian moves to the location that minimizes this energy. We denote this cost as E(x t ) where x t is a 2D vector containing the pedestrian s location at time t. We assume that the path a pedestrian takes is influenced by the following four general motivations. An energy function will describe each of these motivations. The motivations are 1. A desire to not move too far in a short amount of 382

3 4.1. Movement Cost The movement cost, or cost for moving too far in too short a time, prevents a pedestrian from jumping to a location that is too far away. This cost penalizes all movement, however it balances with other energies to allow reasonable speeds of movement while significantly penalizing physically impossible speeds. E LM (x t+1 )=w(θ 1 )(x t+1 x t ) 2 (2) The term w(θ 1 ) is the weight assigned to this component. In practice, we use an exponential function to compute w(θ) for all of the components, making w(θ 1 ) = exp(θ 1 ). We use the exponential function to ensure that all weights are positive. Figure 2. The avoidance forces can be seen here as a field which is overlayed on a frame of the video containing four pedestrians. The arrows display the direction and magnitude of the gradient of this avoidance field. time. We refer to this at the limited movement term and the energy function expressing this motivation will be denoted as E LM (x t ). 2. A desire to remain at a constant speed and direction. This motivation will be represented by E CV (x t ), where CV stands for constant velocity. 3. A desire to reach one s destination, represented by E Dest (x t ) 4. A desire to avoid other pedestrians in the scene, expressed by E AV (x t ) The complete energy E(x) is a weighted combination of these components. If the weight of each component is expressed within the components (see the following subsections), then the complete energy can be written as: E(x t )=E LM (x t )+E CV (x t )+E Dest (x t )+E AV (x t ) (1) The following sections describe each of the energy components listed above. During training, our learning algorithm optimizes a vector of parameters, θ. These weights are expressed within each of the energy functions. Section 6 and the following sections will describe how these parameters can be found by training on object tracking data Constant Velocity In our model, a pedestrian also seeks to maintain a constant velocity and direction. This is expressed as an energy function over possible values of x t+1, which is the location of the next step. This function is constructed as a smoothed approximation of the radius between x t+1 and the point that the pedestrian would have reached if maintaining a constant velocity. This point is computed by extrapolating from the previous two steps in the pedestrian s path. The ɛ term, which smooths the function to prevent discontinuity in the derivative at its minimum, is set to E CV (x t+1 )=w(θ 2 ) x t+1 (2x t x t 1 ) 2 + ɛ (3) 4.3. Destination We hypothesize that pedestrians have some destination in mind and they eventually are observed reaching that destination. We do not have a strong final destination in our scene so we assume the point where the person exits the scene to be their destination. In applications such as video analysis, destinations may be known and therefore could be used. In real-time tracking applications the destination of the individuals will likely not be known and this force may be left out of the cost calculation. Similar to the constant velocity component, described above, we use a smoothed approximation to the radius: E Dest (x t+1 )=w(θ 3 ) x t+1 d 2 + ɛ (4) The point d is the destination found from the track. In Section 7.1 we will show how this model can be used without a destination cost to accurately predict a pedestrian s path several time steps ahead. 383

4 4.4.1 Constructing the Avoidance Component from Terms Figure 3. The avoidance energy is made up of the sum of avoidance terms at different locations and with different sizes. This function is created from a collection of rotated exponential functions. This makes it convenient to compute convex upper-bounds on this function Avoidance The previous energies modeled where a pedestrian would like to walk, but it is also important that the model be able to predict areas that the pedestrian would like to avoid. Avoidance is incorporated into the model with a repulsive energy function that goes to zero as one moves away from the center of the function. The complete avoidance energy is the sum of avoidance terms at different locations and of different sizes. Figure 3 shows the shape of each individual avoidance term. The kth avoidance term in the avoidance energy, E AV, is a repulsive function, which will be denoted R( ). This repulsive function is centered at location p, with size parameter σ, has the form R(x; p,σ)= 1 N φ γ log exp ( γe ri). (5) i=1 where r i = 1 σ ((x x p x ) cos(φ i ) + (x y p y ) sin(φ i )). The scalars x x and x y are the x and y components of x, with a similar notation for p. The angles φ 1...φ Nφ are uniformly spaced between 0 and 2π. The scalar γ is fixed for all avoidance terms. It affects the sharpness of the fall-off. In practice, we use the value γ =20. The combination of these avoidance functions creates a sort of avoidance field which is visualized in Figure 2. The value of this function at a point x can be thought of as the smooth approximation of the minimum value at x of a set of rotated exponential functions. We use this function for the avoidance energy rather than a more typical function, like a Gaussian, because this function make it possible to learn the model parameters. As will be discussed in Section 5.1.2, it is possible to use Jensen s inequality to compute a convex upper bound on this function. This enables us to use the Variational Mode Learning strategy from [12 to learn the model parameters. If the there are N o obstacles, o 1...o No, at time t, an avoidance term is created for each obstacle. This avoidance term itself is the sum of multiple copies of the repulsive function described above. A pedestrian may not avoid just the current location of another individual, but also the location of the individual in the near future. To account for this, repulsive functions are placed at the individual s current location and his predicted location 2, 4, 6, 8, 10, and 12 steps in the future. These predicted avoidance locations, denoted as p 1, p 2,...are found by assuming that the individual maintains constant velocity. In addition, it is unknown how far away an individual must be before affecting a pedestrian s path. Therefore, we place repulsive functions with different values of σ at each predicted location of the individual. Thus, if there are N p predicted locations for each individual and N σ different size parameters, the avoidance energy due to a single individual will consist of N p N σ repulsive functions. To control the number of parameters in the model, we assign weights to each predicted position, θ 4i, and each size parameter θ 5j. These two weights are combined to produce the weight of each repulsive function in the avoidance energy. In practice, we multiply the weight due to size by the weight due to predicted position. Combining these weights, the avoidance energy due to a single individual can be expressed as N p N σ E AV (x t+1 )= w(θ 4i )w(θ 5j )R(x t+1 ; p i,σ j ) i=1 j=1 (6) If multiple individuals are present in the scene, then the avoidance energy is the sum of the each individuals avoidance energy. In the experiments in this paper N p is 7 and N σ is 7, resulting in a total of 17 parameters. 5. Optimization for Generating Pedestrian Tracks In our model, a pedestrian s track is generated by optimizing the pedestrian s energy function E( ) to choose the next location. In this section, we describe how this optimization is performed. As Section 6 will explain, this optimization is structured to make it possible to compute the derivatives of the predicted path with respect to the model parameters. This makes it possible to minimize a loss function measuring the difference between the predicted pedestrian paths and ground-truth paths. The optimization procedure uses a modified version of Newton s method, without the backtracking 384

5 line search, to minimize E( ). Traditionally, Newton s method can be viewed as fitting a second-order Taylor approximation to E( ) at a point, then moving in the direction of the minimum of the approximation. In our implementation, instead of approximating the function directly, a tight, convex upper bound on E( ) is approximated insted. The following subsections describe how these upper-bounds are computed. Utilizing upper-bounds is necessary because the avoidance penalties described in Section 4.4 make E( ) non-convex. Thus, the optimization steps will fail if a point is encountered where the Hessian matrix at that point has negative eigenvalues 1. Using a convex upper bound on E( ) ensures that this will not happen. While convergence is not guaranteed without the line-search, in our experiments we have not encountered any situations where the optimization does not converge. Below, the optimization steps are described algorithmically. The variables x t and x t 1 denote the current and previous locations of the pedestrian. N I is the number of optimization iterations. The result of the optimization is the pedestrian s next step, denoted x t+1.in the course of computing the next steps, a number of intermediate locations are computed. These intermediate locations are denoted using the variable z. Using these variables, the optimization consists of the following steps: 1 Initialize z 0 x t ; 2 for j =1...N I do 3 Compute Ê(z j) by replacing the E AV, E Dest and E CV terms with convex upper bounds, computed at z j 1 ; 4 Compute 2 Ê(z j ) and ΔÊ(z j); ( 1 z j z j 1 2 Ê(z j )) Δ Ê(z j ); end x t+1 z NI ; 5.1. Computing Upper Bounds In Step 3 of the optimization, upper bounds are computed for all of the non-quadratic terms in E(x). This sections describes how these upper bounds are computed Upper-bounds for E Dest and E CV Both E Dest and E CV have the form r 2 + ɛ where r 2 is some scalar distance. In the case of E Dest,itisthe distance to the destination, while for E CV, it is the distance to the point that pedestrian would move to if trav- 1 Intuitively, a second-order approximation at the center of an avoidance term will be a quadratic function pointing downward. Minimizing this approximation will produce values at +/ eling with a constant velocity. For these two energies, we upper bound r 2 + ɛ at a point r 0 with the function [ 1 r 2 (r0 2 (r0 ) 2 + ɛ + ) 2 + ɛ 1 (r 0 ) 2 (7) 2 (r0 ) 2 + ɛ Upper Bounds for E AV The upper bounds for the avoidance terms, described in Section 4.4, can be found using Jensen s Inequality: E AV (x) N φ i=1 exp( γe r i ) Nφ j=1 exp( γe r j ) e ri + K (8) where each term r i has the same definition as in Section 4.4 and r i is the value of r i computed at the point x where the upper bound is being computed. The term K denotes constant terms. These terms can be ignored as our goal is to minimize this upper bound. 6. Learning Model Parameters Our goal is to choose the parameters θ that make the predicted pedestrian tracks match tracks observed in video as closely as possible. To accomplish this, we define a loss function L(x, t) that measures the difference between a predicted track x and the ground truth track t. Here we use a smoothed version of the L 1 difference between the ground-truth track and the predicted track: N s L(x, t) = xt t t 2 + ɛ (9) i=1 where x t and t t are locations at time t in the overall track, and N s is the number of samples in the track. Because the loss depends on x, the loss can be minimized with gradient-based optimization methods if the derivatives of x can be computed with respect to the parameters θ. The optimization strategy described in Section 5 is designed to make these computations possible. Computing the gradient of the loss is possible because an intermediate value during the optimization, z j is related to the previous value, z j 1, by multiplication with an inverse matrix. Thus, the Jacobian matrix zj relating z j and z j 1 can be found. Using this Jacobian, combined with zj 1, it is then possible to compute zj. These basic steps can be repeated until the derivative of each step x t with respect to the parameters θ has been computed. With these derivatives, it is trivial to compute the derivative of the loss with respect to θ. As in Variational Mode Learning, because each optimization step is differentiable, the gradient of the result of the optimization can be computed by repeated application of the chain rule, similar to back-propagation in neural networks. 385

6 For clarity, the following section shows how these derivatives can be calculated for the model parameters. The algorithm for computing the derivative of the loss function with respect to the parameters θ is: 1 Initialize x 0 to the initial point on the track; 2 Initialize x0 to a 2 N θ matrix, where N θ is the number of parameters; 3 for t =1...N S do 4 z 0 xt 1 ; 5 for j =1...N I do Compute zj z x t 1, j 6, and zj x t 2 ; 7 Compute zj (See below for explanation); 8 z j zj z j 9 10 end 11 x t z N I ; L end + zj ; zj + zj x t 1 x t 1 + zj x t 2 x t 2 ; L + L x t x t The matrix zj appears because the energy function is the sum of a set of component energy functions, each with its own weight, w c. These weights are generated from the parameters θ. The terms z j x t 1 and zj x t 2 appear because of the inertial and constant velocity components of the energy function. These components involve the location of previous steps in the pedestrian track Deriving Derivatives for E Dest Space does not allow for a full derivation of all of the derivatives, so only the derivation of terms for E Dest will be shown here. We refer the reader to [12 for more information about deriving the derivatives. The Newton step in the optimization procedure described in Section 5 can be thought of as minimizing a second-order approximation of Ê( ), the upper bound on E( ). In this section, the solution to this second order approximation will be denoted as z j = A 1 h, where z j is one of the intermediate steps in the optimization. Because E( ) is the sum of the individual component functions, such as E Dest, the second-order approximation of E( ) is the sum of the second order approximations of the individual energy components. Thus A is actually the sum of matrices, with one matrix for each of the energy components. The vector h is likewise a sum. The contribution of ÊDest to A can be found by noting that the upper bound on the destination component, Ê Dest, is itself quadratic. It can be expressed in the form (z j d) Ê Dest (z j ; z j 1 )= 1 2 eθ3 (z j d) T [ a 0 0 a (10) where d is the destination of the pedestrian, a = ( z j 1 d 2 + ɛ) 1, and the term e θ3 is the weight assigned to this component of the energy function. The exponential is used to ensure that all weights are positive. Differentiation of this quadratic system makes it possible to compute the contribution to A and h, which will be as denoted A Dest and h Dest,as A Dest = e θ3 [ a 0 0 a h Dest = e θ3 [ a 0 0 a d (11) As the second-order approximation Ê( ) is the sum of components from the different motivations, the derivative zj is the sum of terms corresponding to each of these components. We denote the contribution of the destination component E Dest ( ) as z Dest [ j a = e θ3 A 1 diag(z j d) (12) z [ a where a = using a as defined above and a diag(z j d) is a diagonal matrix with the vector (z j d) placed along the diagonal. The derivation of this contribution can be found in the Appendix. The derivative zj fashion: z j = A 1 7. Evaluation can be computed in a similar [ e θ 3 a 0 0 e θ3 a (z j d) (13) To evaluate this model of pedestrian movement, we gathered a dataset of 92 pedestrian tracks. In our study we used individuals moving through hallways as our training and testing data. For this experiment groundtruthing the pedestrian tracks was done manually to eliminate errors that may be caused by automatic tracking methods, though the experiments in Section 7.1 will use tracks generated by an unsupervised algorithm. The location given to each person was his or her location on the ground plane, or simply where he or she was standing at each point in time. Using a simple homography we mapped the image coordinates to real world coordinates and all learning/prediction was done in the real world coordinate system. A point on the top of the head such as used by [8 would be easier to track, however these points would not be moving on the same plane, as different people are 386

7 Figure 4. Examples of pedestrian paths, shown in black, and predicted paths, shown in red. The model accurately predicts the deflection of pedestrians due to oncoming obstacles. different heights causing errors in the mapping between coordinate systems. One third of the tracks were used for training and two-thirds were used for testing. In our first experiment, we used the model to predict each pedestrian s path, given the individual s initial position, velocity, and the locations of the obstacles. Figure 4 shows predicted and actual tracks of different individuals. The model accurately predicts the deflection of pedestrians from obstacles. Figure 6 shows the primary failure mode of the model. A few of the tracks in our dataset include meetings between people, or groups of people walking together. Often when this happens, prediction suffers because the model is expecting pedestrians to be repelled by other pedestrians locations, rather than be attracted to them. This fact may be able to be used to classify the tracks in which meetings occur. Similar work in detection of anomalous events using social models has shown promise in this area [ Predicting Position from Noisy Tracking When tracks are lost in many tracking applications, they are assumed to continue in their previously known direction. Here, we show how our model can be used to predict a pedestrian s future position in the case where the position cannot be obtained from image data. Because the system will not be working from whole tracks, the destination is not known, and for these experiments the corresponding θ 3 parameter is held to, thus w(θ 3 )=0. The model is trained to independently predict, at every time step, the next single step as accurately as possible. This model was trained using tracks automatically generated by the algorithm described in [7. We compared the predictions from our model against predictions formed using only the assumption that the pedestrian maintains their last known trajectory. In these predictions, the pedestrian follows a straight-line defined by the previous two steps. We also experimented with splines fit to the previous path, but found that the straight-line prediction performed better. Length Baseline Our Improvement Model Model % % % % % % Table 1. Length denotes the number of time steps the model must predict; Baseline Model is a model which assumes pedestrians will continue in their current trajectory; Our Model denotes a model trained as described by this paper without the Destination cost; Improvement is the percentage decrease in error from the baseline model to our model. The units of the distances for both models are in an arbitrary coordinate system where 24 units corresponds to approximately 1.5 ft. w(θ) Weights of Learned Avoidance Terms Time Offset Figure 5. Learned parameter values corresponding to the multiple avoidance locations. A time offset of 2 corresponds to.8 seconds. Table 1 shows the total error of the various methods over several time lengths. The error in the estimates of future position are significantly reduced by using the pedestrian model, which has avoidance terms in addition to the constant velocity assumption. Notice that our model offers greater improvement, the farther ahead that the prediction must be made. Quantitative results on manually labeled tracks also showed significant improvements of 10% over the baseline Avoidance Field As discussed in Section 4.4, multiple values for the σ parameter are each given their own weight, essentially learning the size of the radius of influence that one pedestrian exerts on another in the scene. Similarly, multiple avoidance locations are also used to aid in the accuracy of the model. The combination of these avoidance terms creates a sort of field, which is visualized in Figure

8 Figure 6. An example of the limitation of the current model. In this case, the pedestrian is walking as part of a group. Because group interaction is not currently modeled, the model incorrectly treats the group s members as obstacles. Most of the system s large errors in prediction come from group behavior. Extending this model to consider group interactions is an area of future research. After training, the θ 4 weights showed that the pedestrians will prefer to avoid the predicted future location of a person even more then they will avoid the actual person. Figure 5 shows the corresponding weights of the avoidance terms. 8. Conclusion We have presented a method for automatically learning parameters for pedestrian models from real world observations. We have used automatically detected tracks to train a model which describes pedestrian movements. We have shown how this model can improve existing detection and tracking methods. We have shown how to pose the problem as an energy minimization problem and shown how training can produce accurate results which can be used in a variety of tasks. Acknowledgements This work was supported by grant HM through the NGA NURI program. References [1 S. Ali and M. Shah. Floor fields for tracking in high density crowd scenes. ECCV, [2 G. Antonini, S. Martinez, M. Bierlaire, and J. Thiran. Behavioral priors for detection and tracking of pedestrians in video sequences. IJCV, [3 D. Helbing, I. Farkas, and T. Vicsek. Simulating dynamical features of escape panic. Nature, [4 D. Helbing and P. Molnár. Social force model for pedestrian dynamics. Physical Review E, [5 R. Hughes. A continuum theory for the flow of pedestrians. Transportation Research Part B, [6 R. Hughes. The flow of human crowds. Annual Review of Fluid Mechanics, [7 O. Javed and M. Shah. Tracking and object classification for automated surveillance. In ECCV, [8 A. Johansson, D. Helbing, and P. Shukla. Specification of a microspopic pedestrian model by evolutionary adjustment to video tracking data. Advances in Complex Systems, [9 T. Lakoba, D. Kaup, and N. Finkelstein. Modifications of the helbing-molnár-farkas-vicsek social force model for pedestian evolution. SIMULATION, [10 R. Mehran and M. Shah. Abnormal crowd behavior detection using social force model. CVPR, [11 C. Stauffer and W. Grimson. Adaptive background mixture models for real-time tracking. CVPR, [12 M. Tappen. Utilizing variational optimization to learn markov random fields. CVPR, [13 A. Treuille, S. Cooper, and Z. Popović. Continuum crowds. ACM SIGGRAPH, Appendix: Derivations from Section 6 In this appendix, we describe the details in deriving the derivatives from Section 6.1, using the notation from that section. When computing the derivatives, we will rely on the identity A 1 We will begin by finding zj rule, this is equal to A 1 3 h + A this sum is can be rewritten as A 1 3 h = A 1 1 A = A A 1 (14) 1 h [ e θ a 0 0 e θ a = A 1 [ e θ a 0 0 e θ a The derivation of the second term, straightforward, leading to Equation 13.. Using the product 3. The first term in A 1 h z j (15) 1 h A 3 The derivative zdest j is computed in a similar fashion. Defining a matrix W =, the primary dif- [ a 0 0 a ficulty is that W must be differentiated with respect to both components of z j 1. Following a process similar to that just shown, A 1 z x h = e θ3 1 W A j 1 z x A 1 h j 1 = e θ3 1 W A z x z j j 1 = e θ3 A 1 a diag(z j ) (16) z x j 1 where a is defined as in Section 6.1 and z x j 1 is the component of that vector that refers to the x, or horizontal, position of the pedestrian. Expressing the derivative in this form makes it convenient to compute the derivative with respect to both components of z j 1 : A 1 h = e θ3 A 1 a diag(z j ) (17) The entire derivative zdest j similar set of steps to find A 1 is can be found by using a h 388

Using Subspace Constraints to Improve Feature Tracking Presented by Bryan Poling. Based on work by Bryan Poling, Gilad Lerman, and Arthur Szlam

Using Subspace Constraints to Improve Feature Tracking Presented by Bryan Poling. Based on work by Bryan Poling, Gilad Lerman, and Arthur Szlam Presented by Based on work by, Gilad Lerman, and Arthur Szlam What is Tracking? Broad Definition Tracking, or Object tracking, is a general term for following some thing through multiple frames of a video

More information

Driven Cavity Example

Driven Cavity Example BMAppendixI.qxd 11/14/12 6:55 PM Page I-1 I CFD Driven Cavity Example I.1 Problem One of the classic benchmarks in CFD is the driven cavity problem. Consider steady, incompressible, viscous flow in a square

More information

COMPUTER VISION > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE

COMPUTER VISION > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE COMPUTER VISION 2017-2018 > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE OUTLINE Optical flow Lucas-Kanade Horn-Schunck Applications of optical flow Optical flow tracking Histograms of oriented flow Assignment

More information

Animation Lecture 10 Slide Fall 2003

Animation Lecture 10 Slide Fall 2003 Animation Lecture 10 Slide 1 6.837 Fall 2003 Conventional Animation Draw each frame of the animation great control tedious Reduce burden with cel animation layer keyframe inbetween cel panoramas (Disney

More information

Humanoid Robotics. Least Squares. Maren Bennewitz

Humanoid Robotics. Least Squares. Maren Bennewitz Humanoid Robotics Least Squares Maren Bennewitz Goal of This Lecture Introduction into least squares Use it yourself for odometry calibration, later in the lecture: camera and whole-body self-calibration

More information

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Peter Englert Machine Learning and Robotics Lab Universität Stuttgart Germany

More information

Simulation of Agent Movement with a Path Finding Feature Based on Modification of Physical Force Approach

Simulation of Agent Movement with a Path Finding Feature Based on Modification of Physical Force Approach Simulation of Agent Movement with a Path Finding Feature Based on Modification of Physical Force Approach NURULAQILLA KHAMIS Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia,

More information

Improving Vision-Based Distance Measurements using Reference Objects

Improving Vision-Based Distance Measurements using Reference Objects Improving Vision-Based Distance Measurements using Reference Objects Matthias Jüngel, Heinrich Mellmann, and Michael Spranger Humboldt-Universität zu Berlin, Künstliche Intelligenz Unter den Linden 6,

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps

Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps Oliver Cardwell, Ramakrishnan Mukundan Department of Computer Science and Software Engineering University of Canterbury

More information

Abnormal Crowd Behavior Detection using Social Force Model

Abnormal Crowd Behavior Detection using Social Force Model Abnormal Crowd Behavior Detection using Social Force Model Ramin Mehran Computer Vision Lab, University of Central Florida Alexis Oyama University of Nevada at Reno oyamaa@unr.nevada.edu ramin@cs.ucf.edu

More information

Multiple Model Estimation : The EM Algorithm & Applications

Multiple Model Estimation : The EM Algorithm & Applications Multiple Model Estimation : The EM Algorithm & Applications Princeton University COS 429 Lecture Dec. 4, 2008 Harpreet S. Sawhney hsawhney@sarnoff.com Plan IBR / Rendering applications of motion / pose

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

Bagging for One-Class Learning

Bagging for One-Class Learning Bagging for One-Class Learning David Kamm December 13, 2008 1 Introduction Consider the following outlier detection problem: suppose you are given an unlabeled data set and make the assumptions that one

More information

THE preceding chapters were all devoted to the analysis of images and signals which

THE preceding chapters were all devoted to the analysis of images and signals which Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to

More information

arxiv: v1 [cs.cv] 2 May 2016

arxiv: v1 [cs.cv] 2 May 2016 16-811 Math Fundamentals for Robotics Comparison of Optimization Methods in Optical Flow Estimation Final Report, Fall 2015 arxiv:1605.00572v1 [cs.cv] 2 May 2016 Contents Noranart Vesdapunt Master of Computer

More information

Convexization in Markov Chain Monte Carlo

Convexization in Markov Chain Monte Carlo in Markov Chain Monte Carlo 1 IBM T. J. Watson Yorktown Heights, NY 2 Department of Aerospace Engineering Technion, Israel August 23, 2011 Problem Statement MCMC processes in general are governed by non

More information

Irradiance Gradients. Media & Occlusions

Irradiance Gradients. Media & Occlusions Irradiance Gradients in the Presence of Media & Occlusions Wojciech Jarosz in collaboration with Matthias Zwicker and Henrik Wann Jensen University of California, San Diego June 23, 2008 Wojciech Jarosz

More information

Recent Developments in Model-based Derivative-free Optimization

Recent Developments in Model-based Derivative-free Optimization Recent Developments in Model-based Derivative-free Optimization Seppo Pulkkinen April 23, 2010 Introduction Problem definition The problem we are considering is a nonlinear optimization problem with constraints:

More information

Collision Avoidance with Unity3d

Collision Avoidance with Unity3d Collision Avoidance with Unity3d Jassiem Ifill September 12, 2013 Abstract The primary goal of the research presented in this paper is to achieve natural crowd simulation and collision avoidance within

More information

Segmentation: Clustering, Graph Cut and EM

Segmentation: Clustering, Graph Cut and EM Segmentation: Clustering, Graph Cut and EM Ying Wu Electrical Engineering and Computer Science Northwestern University, Evanston, IL 60208 yingwu@northwestern.edu http://www.eecs.northwestern.edu/~yingwu

More information

Multiple Model Estimation : The EM Algorithm & Applications

Multiple Model Estimation : The EM Algorithm & Applications Multiple Model Estimation : The EM Algorithm & Applications Princeton University COS 429 Lecture Nov. 13, 2007 Harpreet S. Sawhney hsawhney@sarnoff.com Recapitulation Problem of motion estimation Parametric

More information

Path Planning. Marcello Restelli. Dipartimento di Elettronica e Informazione Politecnico di Milano tel:

Path Planning. Marcello Restelli. Dipartimento di Elettronica e Informazione Politecnico di Milano   tel: Marcello Restelli Dipartimento di Elettronica e Informazione Politecnico di Milano email: restelli@elet.polimi.it tel: 02 2399 3470 Path Planning Robotica for Computer Engineering students A.A. 2006/2007

More information

1.2 Numerical Solutions of Flow Problems

1.2 Numerical Solutions of Flow Problems 1.2 Numerical Solutions of Flow Problems DIFFERENTIAL EQUATIONS OF MOTION FOR A SIMPLIFIED FLOW PROBLEM Continuity equation for incompressible flow: 0 Momentum (Navier-Stokes) equations for a Newtonian

More information

Robotic Motion Planning: Review C-Space and Start Potential Functions

Robotic Motion Planning: Review C-Space and Start Potential Functions Robotic Motion Planning: Review C-Space and Start Potential Functions Robotics Institute 16-735 http://www.cs.cmu.edu/~motionplanning Howie Choset http://www.cs.cmu.edu/~choset What if the robot is not

More information

10. Cartesian Trajectory Planning for Robot Manipulators

10. Cartesian Trajectory Planning for Robot Manipulators V. Kumar 0. Cartesian rajectory Planning for obot Manipulators 0.. Introduction Given a starting end effector position and orientation and a goal position and orientation we want to generate a smooth trajectory

More information

CS 231A Computer Vision (Fall 2012) Problem Set 3

CS 231A Computer Vision (Fall 2012) Problem Set 3 CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest

More information

Robots are built to accomplish complex and difficult tasks that require highly non-linear motions.

Robots are built to accomplish complex and difficult tasks that require highly non-linear motions. Path and Trajectory specification Robots are built to accomplish complex and difficult tasks that require highly non-linear motions. Specifying the desired motion to achieve a specified goal is often a

More information

EE795: Computer Vision and Intelligent Systems

EE795: Computer Vision and Intelligent Systems EE795: Computer Vision and Intelligent Systems Spring 2012 TTh 17:30-18:45 FDH 204 Lecture 14 130307 http://www.ee.unlv.edu/~b1morris/ecg795/ 2 Outline Review Stereo Dense Motion Estimation Translational

More information

CSE 490R P1 - Localization using Particle Filters Due date: Sun, Jan 28-11:59 PM

CSE 490R P1 - Localization using Particle Filters Due date: Sun, Jan 28-11:59 PM CSE 490R P1 - Localization using Particle Filters Due date: Sun, Jan 28-11:59 PM 1 Introduction In this assignment you will implement a particle filter to localize your car within a known map. This will

More information

Nonrigid Surface Modelling. and Fast Recovery. Department of Computer Science and Engineering. Committee: Prof. Leo J. Jia and Prof. K. H.

Nonrigid Surface Modelling. and Fast Recovery. Department of Computer Science and Engineering. Committee: Prof. Leo J. Jia and Prof. K. H. Nonrigid Surface Modelling and Fast Recovery Zhu Jianke Supervisor: Prof. Michael R. Lyu Committee: Prof. Leo J. Jia and Prof. K. H. Wong Department of Computer Science and Engineering May 11, 2007 1 2

More information

Modern Methods of Data Analysis - WS 07/08

Modern Methods of Data Analysis - WS 07/08 Modern Methods of Data Analysis Lecture XV (04.02.08) Contents: Function Minimization (see E. Lohrmann & V. Blobel) Optimization Problem Set of n independent variables Sometimes in addition some constraints

More information

Perceptron: This is convolution!

Perceptron: This is convolution! Perceptron: This is convolution! v v v Shared weights v Filter = local perceptron. Also called kernel. By pooling responses at different locations, we gain robustness to the exact spatial location of image

More information

Introduction to Optimization

Introduction to Optimization Introduction to Optimization Second Order Optimization Methods Marc Toussaint U Stuttgart Planned Outline Gradient-based optimization (1st order methods) plain grad., steepest descent, conjugate grad.,

More information

ROTATION INVARIANT SPARSE CODING AND PCA

ROTATION INVARIANT SPARSE CODING AND PCA ROTATION INVARIANT SPARSE CODING AND PCA NATHAN PFLUEGER, RYAN TIMMONS Abstract. We attempt to encode an image in a fashion that is only weakly dependent on rotation of objects within the image, as an

More information

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 20 CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 2.1 CLASSIFICATION OF CONVENTIONAL TECHNIQUES Classical optimization methods can be classified into two distinct groups:

More information

Apprenticeship Learning for Reinforcement Learning. with application to RC helicopter flight Ritwik Anand, Nick Haliday, Audrey Huang

Apprenticeship Learning for Reinforcement Learning. with application to RC helicopter flight Ritwik Anand, Nick Haliday, Audrey Huang Apprenticeship Learning for Reinforcement Learning with application to RC helicopter flight Ritwik Anand, Nick Haliday, Audrey Huang Table of Contents Introduction Theory Autonomous helicopter control

More information

Unsupervised Trajectory Modelling using Temporal Information via Minimal Paths.

Unsupervised Trajectory Modelling using Temporal Information via Minimal Paths. Unsupervised Trajectory Modelling using Temporal Information via Minimal Paths. B. Cancela, A. Iglesias, M. Ortega, M. G. Penedo VARPA Group, Universidade da Coruña Campus de Elviña s/n, A Coruña, Spain

More information

Challenge Problem 5 - The Solution Dynamic Characteristics of a Truss Structure

Challenge Problem 5 - The Solution Dynamic Characteristics of a Truss Structure Challenge Problem 5 - The Solution Dynamic Characteristics of a Truss Structure In the final year of his engineering degree course a student was introduced to finite element analysis and conducted an assessment

More information

CSE 490R P3 - Model Learning and MPPI Due date: Sunday, Feb 28-11:59 PM

CSE 490R P3 - Model Learning and MPPI Due date: Sunday, Feb 28-11:59 PM CSE 490R P3 - Model Learning and MPPI Due date: Sunday, Feb 28-11:59 PM 1 Introduction In this homework, we revisit the concept of local control for robot navigation, as well as integrate our local controller

More information

Crowd simulation. Taku Komura

Crowd simulation. Taku Komura Crowd simulation Taku Komura Animating Crowds We have been going through methods to simulate individual characters What if we want to simulate the movement of crowds? Pedestrians in the streets Flock of

More information

Image Registration Lecture 4: First Examples

Image Registration Lecture 4: First Examples Image Registration Lecture 4: First Examples Prof. Charlene Tsai Outline Example Intensity-based registration SSD error function Image mapping Function minimization: Gradient descent Derivative calculation

More information

Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1

Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1 Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1, Zhi Zhai, Greg Madey Dept. of Computer Science and Engineering University of Notre Dame Notre

More information

11/3/2011. What You ll See in This Chapter. Word Cloud. How Much Calculus is Needed? A Modest Proposal. Ian Parberry University of North Texas

11/3/2011. What You ll See in This Chapter. Word Cloud. How Much Calculus is Needed? A Modest Proposal. Ian Parberry University of North Texas What You ll See in This Chapter Chapter 11: Mechanics 1: Linear Kinematics & Calculus Fletcher Dunn Valve Software Ian Parberry University of North Texas This chapter gives a taste of linear kinematics

More information

A Brief Look at Optimization

A Brief Look at Optimization A Brief Look at Optimization CSC 412/2506 Tutorial David Madras January 18, 2018 Slides adapted from last year s version Overview Introduction Classes of optimization problems Linear programming Steepest

More information

Machine learning based automatic extrinsic calibration of an onboard monocular camera for driving assistance applications on smart mobile devices

Machine learning based automatic extrinsic calibration of an onboard monocular camera for driving assistance applications on smart mobile devices Technical University of Cluj-Napoca Image Processing and Pattern Recognition Research Center www.cv.utcluj.ro Machine learning based automatic extrinsic calibration of an onboard monocular camera for driving

More information

Subspace Clustering with Global Dimension Minimization And Application to Motion Segmentation

Subspace Clustering with Global Dimension Minimization And Application to Motion Segmentation Subspace Clustering with Global Dimension Minimization And Application to Motion Segmentation Bryan Poling University of Minnesota Joint work with Gilad Lerman University of Minnesota The Problem of Subspace

More information

Automatic visual recognition for metro surveillance

Automatic visual recognition for metro surveillance Automatic visual recognition for metro surveillance F. Cupillard, M. Thonnat, F. Brémond Orion Research Group, INRIA, Sophia Antipolis, France Abstract We propose in this paper an approach for recognizing

More information

13. Learning Ballistic Movementsof a Robot Arm 212

13. Learning Ballistic Movementsof a Robot Arm 212 13. Learning Ballistic Movementsof a Robot Arm 212 13. LEARNING BALLISTIC MOVEMENTS OF A ROBOT ARM 13.1 Problem and Model Approach After a sufficiently long training phase, the network described in the

More information

Colored Point Cloud Registration Revisited Supplementary Material

Colored Point Cloud Registration Revisited Supplementary Material Colored Point Cloud Registration Revisited Supplementary Material Jaesik Park Qian-Yi Zhou Vladlen Koltun Intel Labs A. RGB-D Image Alignment Section introduced a joint photometric and geometric objective

More information

This chapter explains two techniques which are frequently used throughout

This chapter explains two techniques which are frequently used throughout Chapter 2 Basic Techniques This chapter explains two techniques which are frequently used throughout this thesis. First, we will introduce the concept of particle filters. A particle filter is a recursive

More information

Prediction of Pedestrian Trajectories Final Report

Prediction of Pedestrian Trajectories Final Report Prediction of Pedestrian Trajectories Final Report Mingchen Li (limc), Yiyang Li (yiyang7), Gendong Zhang (zgdsh29) December 15, 2017 1 Introduction As the industry of automotive vehicles growing rapidly,

More information

Machine-learning Based Automated Fault Detection in Seismic Traces

Machine-learning Based Automated Fault Detection in Seismic Traces Machine-learning Based Automated Fault Detection in Seismic Traces Chiyuan Zhang and Charlie Frogner (MIT), Mauricio Araya-Polo and Detlef Hohl (Shell International E & P Inc.) June 9, 24 Introduction

More information

Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling

Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling Moritz Baecher May 15, 29 1 Introduction Edge-preserving smoothing and super-resolution are classic and important

More information

Skybox. Ruoqi He & Chia-Man Hung. February 26, 2016

Skybox. Ruoqi He & Chia-Man Hung. February 26, 2016 Skybox Ruoqi He & Chia-Man Hung February 26, 206 Introduction In this project, we present a method to construct a skybox from a series of photos we took ourselves. It is a graphical procedure of creating

More information

CHAPTER 1. Introduction

CHAPTER 1. Introduction ME 475: Computer-Aided Design of Structures 1-1 CHAPTER 1 Introduction 1.1 Analysis versus Design 1.2 Basic Steps in Analysis 1.3 What is the Finite Element Method? 1.4 Geometrical Representation, Discretization

More information

Planar Robot Kinematics

Planar Robot Kinematics V. Kumar lanar Robot Kinematics The mathematical modeling of spatial linkages is quite involved. t is useful to start with planar robots because the kinematics of planar mechanisms is generally much simpler

More information

(x, y, z) m 2. (x, y, z) ...] T. m 2. m = [m 1. m 3. Φ = r T V 1 r + λ 1. m T Wm. m T L T Lm + λ 2. m T Hm + λ 3. t(x, y, z) = m 1

(x, y, z) m 2. (x, y, z) ...] T. m 2. m = [m 1. m 3. Φ = r T V 1 r + λ 1. m T Wm. m T L T Lm + λ 2. m T Hm + λ 3. t(x, y, z) = m 1 Class 1: Joint Geophysical Inversions Wed, December 1, 29 Invert multiple types of data residuals simultaneously Apply soft mutual constraints: empirical, physical, statistical Deal with data in the same

More information

SteerFit: Automated Parameter Fitting for Steering Algorithms Supplementary Document

SteerFit: Automated Parameter Fitting for Steering Algorithms Supplementary Document Eurographics/ ACM SIGGRAPH Symposium on Computer Animation (2014) Vladlen Koltun and Eftychios Sifakis (Editors) SteerFit: Automated Parameter Fitting for Steering Algorithms Supplementary Document Glen

More information

THE HALF-EDGE DATA STRUCTURE MODELING AND ANIMATION

THE HALF-EDGE DATA STRUCTURE MODELING AND ANIMATION THE HALF-EDGE DATA STRUCTURE MODELING AND ANIMATION Dan Englesson danen344@student.liu.se Sunday 12th April, 2011 Abstract In this lab assignment which was done in the course TNM079, Modeling and animation,

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

PROBLEM FORMULATION AND RESEARCH METHODOLOGY

PROBLEM FORMULATION AND RESEARCH METHODOLOGY PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter

More information

Silhouette-based Multiple-View Camera Calibration

Silhouette-based Multiple-View Camera Calibration Silhouette-based Multiple-View Camera Calibration Prashant Ramanathan, Eckehard Steinbach, and Bernd Girod Information Systems Laboratory, Electrical Engineering Department, Stanford University Stanford,

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

Applications. Human and animal motion Robotics control Hair Plants Molecular motion

Applications. Human and animal motion Robotics control Hair Plants Molecular motion Multibody dynamics Applications Human and animal motion Robotics control Hair Plants Molecular motion Generalized coordinates Virtual work and generalized forces Lagrangian dynamics for mass points

More information

Learning and Inferring Depth from Monocular Images. Jiyan Pan April 1, 2009

Learning and Inferring Depth from Monocular Images. Jiyan Pan April 1, 2009 Learning and Inferring Depth from Monocular Images Jiyan Pan April 1, 2009 Traditional ways of inferring depth Binocular disparity Structure from motion Defocus Given a single monocular image, how to infer

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction The central problem in computer graphics is creating, or rendering, realistic computergenerated images that are indistinguishable from real photographs, a goal referred to as photorealism.

More information

Announcements. Edges. Last Lecture. Gradients: Numerical Derivatives f(x) Edge Detection, Lines. Intro Computer Vision. CSE 152 Lecture 10

Announcements. Edges. Last Lecture. Gradients: Numerical Derivatives f(x) Edge Detection, Lines. Intro Computer Vision. CSE 152 Lecture 10 Announcements Assignment 2 due Tuesday, May 4. Edge Detection, Lines Midterm: Thursday, May 6. Introduction to Computer Vision CSE 152 Lecture 10 Edges Last Lecture 1. Object boundaries 2. Surface normal

More information

A Probabilistic Approach to the Hough Transform

A Probabilistic Approach to the Hough Transform A Probabilistic Approach to the Hough Transform R S Stephens Computing Devices Eastbourne Ltd, Kings Drive, Eastbourne, East Sussex, BN21 2UE It is shown that there is a strong relationship between the

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Occluded Facial Expression Tracking

Occluded Facial Expression Tracking Occluded Facial Expression Tracking Hugo Mercier 1, Julien Peyras 2, and Patrice Dalle 1 1 Institut de Recherche en Informatique de Toulouse 118, route de Narbonne, F-31062 Toulouse Cedex 9 2 Dipartimento

More information

An Orthogonal Curvilinear Terrain-Following Coordinate for Atmospheric Models!

An Orthogonal Curvilinear Terrain-Following Coordinate for Atmospheric Models! Solution of Partial Differential Equations on the Sphere! An Orthogonal Curvilinear Terrain-Following Coordinate for Atmospheric Models! Yiyuan Li 1, Bin Wang 1, Donghai Wang 2! 1. Institute of Atmospheric

More information

Graphics and Interaction Transformation geometry and homogeneous coordinates

Graphics and Interaction Transformation geometry and homogeneous coordinates 433-324 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation

More information

Computer Vision I. Announcements. Fourier Tansform. Efficient Implementation. Edge and Corner Detection. CSE252A Lecture 13.

Computer Vision I. Announcements. Fourier Tansform. Efficient Implementation. Edge and Corner Detection. CSE252A Lecture 13. Announcements Edge and Corner Detection HW3 assigned CSE252A Lecture 13 Efficient Implementation Both, the Box filter and the Gaussian filter are separable: First convolve each row of input image I with

More information

COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates

COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation

More information

Lecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa

Lecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa Instructors: Parth Shah, Riju Pahwa Lecture 2 Notes Outline 1. Neural Networks The Big Idea Architecture SGD and Backpropagation 2. Convolutional Neural Networks Intuition Architecture 3. Recurrent Neural

More information

COMPUTATIONAL INTELLIGENCE (INTRODUCTION TO MACHINE LEARNING) SS18. Lecture 2: Linear Regression Gradient Descent Non-linear basis functions

COMPUTATIONAL INTELLIGENCE (INTRODUCTION TO MACHINE LEARNING) SS18. Lecture 2: Linear Regression Gradient Descent Non-linear basis functions COMPUTATIONAL INTELLIGENCE (INTRODUCTION TO MACHINE LEARNING) SS18 Lecture 2: Linear Regression Gradient Descent Non-linear basis functions LINEAR REGRESSION MOTIVATION Why Linear Regression? Simplest

More information

Lecture VI: Constraints and Controllers. Parts Based on Erin Catto s Box2D Tutorial

Lecture VI: Constraints and Controllers. Parts Based on Erin Catto s Box2D Tutorial Lecture VI: Constraints and Controllers Parts Based on Erin Catto s Box2D Tutorial Motion Constraints In practice, no rigid body is free to move around on its own. Movement is constrained: wheels on a

More information

Video Alignment. Literature Survey. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin

Video Alignment. Literature Survey. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Literature Survey Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This literature survey compares various methods

More information

A new Eulerian computational method for the propagation of short acoustic and electromagnetic pulses

A new Eulerian computational method for the propagation of short acoustic and electromagnetic pulses A new Eulerian computational method for the propagation of short acoustic and electromagnetic pulses J. Steinhoff, M. Fan & L. Wang. Abstract A new method is described to compute short acoustic or electromagnetic

More information

Segmentation with non-linear constraints on appearance, complexity, and geometry

Segmentation with non-linear constraints on appearance, complexity, and geometry IPAM February 2013 Western Univesity Segmentation with non-linear constraints on appearance, complexity, and geometry Yuri Boykov Andrew Delong Lena Gorelick Hossam Isack Anton Osokin Frank Schmidt Olga

More information

Contents. I Basics 1. Copyright by SIAM. Unauthorized reproduction of this article is prohibited.

Contents. I Basics 1. Copyright by SIAM. Unauthorized reproduction of this article is prohibited. page v Preface xiii I Basics 1 1 Optimization Models 3 1.1 Introduction... 3 1.2 Optimization: An Informal Introduction... 4 1.3 Linear Equations... 7 1.4 Linear Optimization... 10 Exercises... 12 1.5

More information

Task selection for control of active vision systems

Task selection for control of active vision systems The 29 IEEE/RSJ International Conference on Intelligent Robots and Systems October -5, 29 St. Louis, USA Task selection for control of active vision systems Yasushi Iwatani Abstract This paper discusses

More information

Motion. 1 Introduction. 2 Optical Flow. Sohaib A Khan. 2.1 Brightness Constancy Equation

Motion. 1 Introduction. 2 Optical Flow. Sohaib A Khan. 2.1 Brightness Constancy Equation Motion Sohaib A Khan 1 Introduction So far, we have dealing with single images of a static scene taken by a fixed camera. Here we will deal with sequence of images taken at different time intervals. Motion

More information

2.3 Projectile Motion

2.3 Projectile Motion Figure 1 An Olympic ski jumper uses his own body as a projectile. projectile an object that moves along a two-dimensional curved trajectory in response to gravity projectile motion the motion of a projectile

More information

Outline. Level Set Methods. For Inverse Obstacle Problems 4. Introduction. Introduction. Martin Burger

Outline. Level Set Methods. For Inverse Obstacle Problems 4. Introduction. Introduction. Martin Burger For Inverse Obstacle Problems Martin Burger Outline Introduction Optimal Geometries Inverse Obstacle Problems & Shape Optimization Sensitivity Analysis based on Gradient Flows Numerical Methods University

More information

Random projection for non-gaussian mixture models

Random projection for non-gaussian mixture models Random projection for non-gaussian mixture models Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract Recently,

More information

A Short SVM (Support Vector Machine) Tutorial

A Short SVM (Support Vector Machine) Tutorial A Short SVM (Support Vector Machine) Tutorial j.p.lewis CGIT Lab / IMSC U. Southern California version 0.zz dec 004 This tutorial assumes you are familiar with linear algebra and equality-constrained optimization/lagrange

More information

Motion Estimation. There are three main types (or applications) of motion estimation:

Motion Estimation. There are three main types (or applications) of motion estimation: Members: D91922016 朱威達 R93922010 林聖凱 R93922044 謝俊瑋 Motion Estimation There are three main types (or applications) of motion estimation: Parametric motion (image alignment) The main idea of parametric motion

More information

Chapter 3 Path Optimization

Chapter 3 Path Optimization Chapter 3 Path Optimization Background information on optimization is discussed in this chapter, along with the inequality constraints that are used for the problem. Additionally, the MATLAB program for

More information

1 Trajectories. Class Notes, Trajectory Planning, COMS4733. Figure 1: Robot control system.

1 Trajectories. Class Notes, Trajectory Planning, COMS4733. Figure 1: Robot control system. Class Notes, Trajectory Planning, COMS4733 Figure 1: Robot control system. 1 Trajectories Trajectories are characterized by a path which is a space curve of the end effector. We can parameterize this curve

More information

Expanding gait identification methods from straight to curved trajectories

Expanding gait identification methods from straight to curved trajectories Expanding gait identification methods from straight to curved trajectories Yumi Iwashita, Ryo Kurazume Kyushu University 744 Motooka Nishi-ku Fukuoka, Japan yumi@ieee.org Abstract Conventional methods

More information

Motion Capture & Simulation

Motion Capture & Simulation Motion Capture & Simulation Motion Capture Character Reconstructions Joint Angles Need 3 points to compute a rigid body coordinate frame 1 st point gives 3D translation, 2 nd point gives 2 angles, 3 rd

More information

The exam is closed book, closed notes except your one-page (two-sided) cheat sheet.

The exam is closed book, closed notes except your one-page (two-sided) cheat sheet. CS 189 Spring 2015 Introduction to Machine Learning Final You have 2 hours 50 minutes for the exam. The exam is closed book, closed notes except your one-page (two-sided) cheat sheet. No calculators or

More information

Factorization with Missing and Noisy Data

Factorization with Missing and Noisy Data Factorization with Missing and Noisy Data Carme Julià, Angel Sappa, Felipe Lumbreras, Joan Serrat, and Antonio López Computer Vision Center and Computer Science Department, Universitat Autònoma de Barcelona,

More information

Structure from Motion. Prof. Marco Marcon

Structure from Motion. Prof. Marco Marcon Structure from Motion Prof. Marco Marcon Summing-up 2 Stereo is the most powerful clue for determining the structure of a scene Another important clue is the relative motion between the scene and (mono)

More information

Physics for Scientists & Engineers 2

Physics for Scientists & Engineers 2 Geometric Optics Physics for Scientists & Engineers 2 Spring Semester 2005 Lecture 36! The study of light divides itself into three fields geometric optics wave optics quantum optics! In the previous chapter,

More information

IMPROVING SPATIO-TEMPORAL FEATURE EXTRACTION TECHNIQUES AND THEIR APPLICATIONS IN ACTION CLASSIFICATION. Maral Mesmakhosroshahi, Joohee Kim

IMPROVING SPATIO-TEMPORAL FEATURE EXTRACTION TECHNIQUES AND THEIR APPLICATIONS IN ACTION CLASSIFICATION. Maral Mesmakhosroshahi, Joohee Kim IMPROVING SPATIO-TEMPORAL FEATURE EXTRACTION TECHNIQUES AND THEIR APPLICATIONS IN ACTION CLASSIFICATION Maral Mesmakhosroshahi, Joohee Kim Department of Electrical and Computer Engineering Illinois Institute

More information

Prof. Fanny Ficuciello Robotics for Bioengineering Visual Servoing

Prof. Fanny Ficuciello Robotics for Bioengineering Visual Servoing Visual servoing vision allows a robotic system to obtain geometrical and qualitative information on the surrounding environment high level control motion planning (look-and-move visual grasping) low level

More information

An Efficient Method for Solving the Direct Kinematics of Parallel Manipulators Following a Trajectory

An Efficient Method for Solving the Direct Kinematics of Parallel Manipulators Following a Trajectory An Efficient Method for Solving the Direct Kinematics of Parallel Manipulators Following a Trajectory Roshdy Foaad Abo-Shanab Kafr Elsheikh University/Department of Mechanical Engineering, Kafr Elsheikh,

More information