Illumination Normalization for Robust Face Recognition Against Varying Lighting Conditions

Size: px
Start display at page:

Download "Illumination Normalization for Robust Face Recognition Against Varying Lighting Conditions"

Transcription

1 llumnaton Normalzaton for Robust Face Recognton Aganst Varyng Lghtng Condtons Shguang Shan, Wen Gao, Bo Cao, Debn Zhao C-SVSON JDL, nsttute of Computng echnology, CAS, P.O.Box 274, Beng, Chna, 18 Computer College, Harbn nsttute of echnology, P.O.Box 321, Harbn, Chna, 151 {sgshan, wgao, bcao, Abstract Evaluatons of the state-of-the-art of both academc face recognton algorthms and commercal systems have shown that recognton performance of most current technologes degrades due to the varatons of llumnaton. hs paper nvestgates several llumnaton normalzaton methods and proposes some novel solutons. he man contrbuton of ths paper ncludes: (1) A Gamma ntensty Correcton (GC) method s proposed to normalze the overall mage ntensty at the gven llumnaton level; (2) A Regon-based strategy combnng GC and the Hstogram Equalzaton (HE) s proposed to further elmnate the sde-lghtng effect; (3) A Quotent llumnaton Relghtng (QR) method s presented to synthesze mages under a pre-defned normal lghtng condton from the provded face mages captured under non-normal lghtng condton. hese methods are evaluated and compared on the Yale llumnaton face database B and Harvard llumnaton face database. Consderable mprovements are observed. Some conclusons are gven at last. 1. ntroducton Face recognton technologes have a varety of ongong and potental applcatons n publc securty, law enforcement and commerce, such as mug-shot database matchng, dentty authentcaton for credt card or drver lcense, access control, nformaton securty, and ntellgent survellance. n addton, there are many emergng felds that can beneft from face recognton technology, such as the new generaton ntellgent humancomputer nterfaces and e-servces, ncludng e-home, tele-shoppng and tele-bankng. Related research actvtes have sgnfcantly ncreased over the past few years [1,2, 3]. As for the early researches, both geometrc feature based methods and template-matchng methods were regarded as typcal technologes, whch were compared by Brunell and Poggo n And the result of the comparson revealed that template matchng outperforms the geometrc feature based ones [2]. herefore, snce the 199s, appearance based methods have been playng a domnant role n the area, from whch a number of technologes were derved: holstc appearance feature based, and analytc local feature based. Popular methods belongng to the former paradgm nclude Egenface [4, 5], Fsherface [6], Probablstc and Bayesan matchng [7, 8, 9], subspace LDA [1], and Actve Shape/Appearance Models (ASMs/AAMs)[11,12,13] based methods. Local Feature Analyss (LFA)[14] and Elastc Bunch Graph Matchng (EBGM)[5, 15] are typcal nstances of the latter category, among whch LFA has been developed to the most successful commercal face recognton system, named Facet, by dentx Corp. FERE evaluaton has provded extensve comparsons of these algorthms [16, 17] as well as a knd of evaluaton protocol for face recognton systems. More recently, Support Vector Machne (SVM) has also been appled to face recognton successfully [18]. However, face recognton remans a dffcult, unsolved problem n general. he performance of almost all current face recognton systems, both the best academc results and the most successful commercal systems, s heavly subect to the varatons n the magng condtons. t has been dscovered by the FERE and FRV2 test that pose and llumnaton varatons are among the several bottlenecks for a practcal face recognton system [16]. So far, no revolutonary and practcal solutons are avalable for these problems. However, some solutons to pose and llumnaton problems do have emerged ncludng nvarant feature based methods [19], 3D lnear llumnaton subspace [6], lnear obect class [2], llumnaton and pose manfold [21], Symmetrc Shape-From-Shadng [1], photometrc algnment [22], Quotent mage [23], llumnaton cones [24], Lambertan Reflectance and Lnear Subspace [25], lght-felds [26] and parametrc lnear subspace [27] and ndvdual PCA combnng the syntheszed mages [28, 29]. Generally, the approaches for copng wth varaton n appearance due to llumnaton fall nto three categores: nvarant features, varaton modelng, and canoncal form [28]. he frst approach seeks to utlze features that are nvarant to the changes n appearance. Examples of such Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

2 representaton consdered by early researchers are edge maps, mage ntensty dervatves, and mages convolved wth 2D Gabor-lke flers. However, Adn s emprcal study shows that None of the representatons consdered s suffcent by tself to overcome mage varatons because of a change n the drecton of llumnaton [19]. Most recently, the Quotent mage [23] s reported to be nvarant to llumnaton and may be used to recognze faces when lghtng condtons change. he dea of varaton modelng s to learn the extent of the varaton n some sutable subspace or manfold. Recognton s then conducted by choosng the subspace or manfold closest to the novel mage. Currently, ths paradgm has been recognzed as the domnant [2, 21, 22, 24, 25, 26, 27]. n addton, snce subspaces/manfolds must be learnt by suffcent examples, some work has been done to enlarge a small learn set by vrtually remagng the nput face mage [28, 29, 31]. he canoncal form approaches attempt to normalze the varaton n appearance, ether by mage transformatons or by syntheszng a new mage from the gven mage n some normalzed form. Recognton s then performed usng ths canoncal form. Examples of ths approach nclude [1, 3]. he most commonly used Hstogram Equalzaton (HE) belongs to ths category too. hs paper nvestgates several llumnaton normalzaton methods belongng to the canoncal form framework. he man contrbuton of ths paper ncludes: (1) We present a Gamma ntensty Correcton (CC) method to normalze the overall mage ntensty to a gven ntensty level; (2) Regon-based strategy s proposed to further elmnate the sde-lghtng effect by combnng GC and Hstogram Equalzaton (HE); (3) A Quotent llumnaton Relghtng (QR) method s nvestgated to synthesze an mage under normal lghtng condton from the provded face mages captured under known nonnormal lghtng condton. hese methods are then compared on the Yale face database B and Harvard face database, n whch faces are captured under wellcontrolled llumnaton condtons. he experments show that QR can sgnfcantly mprove the performance of the face recognton systems as long as the lghtng modes of the mages are known. However, generally, the regonbased method combnng HE wth GC s practcally effectve when t s hard to estmate the lghtng modes of the nput mages. hs paper s organzed as follows: n Secton 2, the general computatonal framework for llumnaton normalzaton s dscussed followed by one nstance, GC, as well as ts combnaton wth the regon-based strategy. Secton 3 manly descrbes the proposed QR methods. Experments and conclusons are gven n the followng two sectons. 2.General Computatonal Framework For llumnaton Normalzaton Frstly, we formulate the general computatonal framework for llumnaton normalzaton method. Let fk be any gven face mage of the face f, captured under some unknown lghtng condton k. llumnaton normalzaton method attempts to obtan a face mage fo whch s the mage of the same face f captured under the pre-defned known lghtng condton,, by fndng a transform,, satsfyng: = ). (1) fo ( fk After ths transform, all the face mages to be processed are vrtually captured under the same lghtng condton. herefore, the recognton system s expected to be nsenstve to the varyng lghtng. n fact, the commonly used Hstogram Equalzaton (HE) can be categorzed nto ths framework. n the followng, we propose Gamma ntensty Correcton (GC) method. 2.1 Gamma ntensty Correcton (GC) Gamma correcton s a technque commonly used n the feld of Computer Graphcs. t concerns how to dsplay an mage accurately on a computer screen. mages that are not properly corrected can look ether bleached out, or too dark. Gamma correcton can control the overall brghtness of an mage by changng the Gamma parameter. Unlke the tradtonal Gamma correcton technque n Computer Graphcs, but motvated by ts dea, we propose the Gamma ntensty Correcton (GC) method to correct the overall brghtness of the face mages to a pre-defned canoncal face mages. t s formulated as followng: Predefne a canoncal face mage,, whch should be lghted under some normal lghtng condton. hen, gven any face mage,, captured under some unknown lghtng condton. ts canoncal mage s computed by a Gamma transform pxel by pxel over the mage poston y: * = G( ; γ ), (2) where the Gamma coeffcent γ * s computed by the followng optmzaton process, whch ams at mnmzng the dfference between the transformed mage and the predefned normal face mage : * 2 γ = arg mn [ G( ; γ ) ( ], (3) where γ y s the gray-level of the mage poston y; and G 1 γ ( ; γ ) c =, Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

3 s the Gamma transform; c s a gray stretch parameter, and γ s the Gamma coeffcent. From equaton 2 and 3, ntutvely, the GC s expected to make the overall brghtness of the nput mages best ft that of the pre-defned normal face mages. hus, ts ntutve effect s that the overall brghtness of all the processed face mages s adusted to the same level as that of the common normal face. See the experments part for ts ntutve effect. 2.2 Regon-based Strategy for HE and GC t s obvous that both HE and GC are global transforms over the whole mage area. herefore, they are doomed to fal when sde lghtng exsts. o partly solve ths problem, we propose to process the face mages based on dfferent local regons, that s, performng HE or GC n some pre-defned face regons n order to better allevate the hghlght, shadng and shadow effect caused by the unequal llumnaton. deally, t s expected to strctly partton the face accordng to the structure of the facal organs, for nstance, as llustrated n Fgure 1. Fgure 1. An example of deal regon partton However, complex regon partton needs complcated regon segmentaton approach, whch s often mpractcal. And, snce the possble sde lghtng manly cause the nonsymmetry between the left and rght part of the face, as well as the ntensty varance between the top regon and the bottom regon. n our strategy, we smply partton the face nto four regons accordng to the gven eye centers as shown n Fgure 2. Fgure 2. he four regons for llumnaton normalzaton After the coarse partton of the face regons, HE or GC can be conducted n the four regons separately. Hereafter, we abbrevate the regon-based HE to RHE, and the regon-based GC to RGC. he effects of the RHE and RGC can be seen from Fgure 4 and Fgure 7 n the expermental part. 3. Quotent llumnaton Relghtng (QR) Both HE and GC are gray-level transform approaches wthout consderng the magng model. herefore, as we can see from Fgure 4 and Fgure 7, they cannot essentally remove the sde lghtng effect. n ths secton, we present a Quotent llumnaton Relghtng (QR) method based on some of the concepts n the well-known Quotent mage method proposed by Shashua etc [23] most recently. 3.1 Background and Defntons As a class of obect, faces can be regarded as Lambertan surface,.e., the face mage can be descrbed by the product of the albedo and the cosne angle between a pont lght source and the surface normal: ( = ρ( s (4) where ρ ( 1 s the surface reflectance assocated wth pont y n the mage, s the surface normal drecton assocated wth pont y n the mage, and s s the lght source drecton (pont lght source) and whose magntude s the lght source ntensty [23]. Based on ths Lambertan model, Shashua further defnes the deal class of Obects [23] as a collecton of 3D obects that have the same shape but dffer n the surface albedo functon. hough faces do have dfferent 3D shapes, however Shashua et al show that one can tolerate sgnfcant shape changes wthout notceable degradaton n performance even there s no need to establsh any dense algnment among the mages beyond the algnment of the center of mass and scale. Based on these assumptons, recognton problem and re-renderng problem s further defned by ntroducng a bootstrap set n [23]. n ths paper, we propose the Quotent llumnaton relghtng method based on the deal class of obects. 3.2 Quotent llumnaton Defnton 1. deal class of Obects [23]. An deal class s a collecton of 3D obects that have the same shape but dffer n the surface albedo functon. he mage space of such a class s represented by: ρ ( x, s (5) where ρ ( s the albedo of obect of the class, s the surface normal of the obect (the same for all obects of the class), and s s the lght source drecton, whch can vary arbtrarly. Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

4 Defnton 2. Quotent llumnaton. Let S (pont lght source) be the pre-defned canoncal lghtng condton. he quotent llumnaton for the lghtng condton S of an deal class of obects (whose shape s n) s: R ( where y range over the whole mage. = (6) Obvously, the Quotent llumnaton s completely ndependent of the surface reflectance (albedo), and depends only on the varance of the lghtng condton from the pre-defned canoncal lghtng one (consderng all the shapes s assumed to be the same). hus, quotent llumnaton can be computed easly by calculatng the quotent between the mages of the obect of the deal class of obects as explaned by Equ.7: ρ ( ( R ( = =, (7) ρ ( ( where y range over the whole mage, s the mage of obect captured under the -th lghtng condton, and s the mage of the same obect captured under the canoncal lghtng condton. Equaton 7 provdes a practcal way to compute the Quotent llumnaton drectly from face mages wthout needng to separate the reflectance from the lghtng. However, as s well known, faces are not strctly deal class of obects snce the 3D shapes of faces are dfferent despte ther approxmate smlarty. herefore, a learn set to cover all knds of 3D face shapes s expected. Defnton 3. Quotent llumnaton Bootstrap Set. Quotent llumnaton bootstrap set s a set of pars of face mages captured under some non-canoncal lghtng condton and under the pre-defned canoncal lghtng condton,.e., {(, ) = 1,2,..., N; 1,2,..., L}. = Gven such a bootstrap set, Quotent llumnaton can be statstcally modeled, or computed smply as the mean over all the faces n the set, for nstance: N 1 ( R ( =, =1,, L N = 1 ( where y range over the whole mage. 3.3 Quotent llumnaton Relghtng (QR) After defnng the deal class of obects and Quotent llumnaton, for face obect case, llumnaton normalzaton s formulated as followng. Gven an nput face mage we assume that t s the mage of the -th face taken under -th lghtng condton. Our goal s to relght the face to obtan,.e., the mage of the face taken under the canoncal lghtng condton. hs can be done by the followng Proposton. Proposton 1. Gven an mage of arbtrary face,. Assume that t s lghted by the -th known lghtng condton, and the -th quotent llumnaton R has been computed too. hen, ts canoncal mage captured under the pre-defned -th lghtng condton can be derved by: ( ( R ( =, (8) where y range over the whole mage. Proof. Accordng to Equaton 5, 6 and 7, we have: ρ ( ( R ( = = =. ρ( ( So: ( ( R ( =, where y range over the whole mage. Proposton 1 provdes a drect and smple way for llumnaton normalzaton provded that the drecton of the lghtng source of the mage can be known. See Fgure 4 and 7 for ts ntutve effect, obvously, QR has sgnfcantly elmnate the unequal brghtness effect caused by the strong sde lghtng. 4. Experments n ths secton, we present the experments to evaluate the above-mentoned llumnaton normalzaton methods usng two publc face database specalzed on llumnaton varaton,.e., the Yale face database B and the Harvard face database. Lghtng condtons n both of the database have been systematcally controlled. 4.1 Classfcaton method Snce our goal s to compare the performances of dfferent llumnaton normalzaton methods, the dstance measurement and classfcaton method are not mportant for us. herefore, the smplest normalzed correlaton,.e., cosne of the angle between two mage vectors, s exploted as the dstance measurement,.e., the smlarty between two mages and k s defned as: Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

5 Φ (, ) = cos( <, > ) = k k And for all experments, classfcaton s performed usng the nearest neghbor classfer. n addton, as we can see from the example mages n the followng sectons, all the faces are cropped to remove the background and the har. 4.2 Results on Yale face database B Yale face database B s publcly avalable for studyng pose and llumnaton problem n face recognton. Snce ths paper manly deals wth the llumnaton problem, we only choose the 64 frontal mages captured under 64 dfferent lghtng condtons for each of the ten persons. Example mages of one person n frontal pose are shown n fgure 3. he mages are dvded nto fve subsets accordng to the angle that the lght source drecton makes wth the camera axs Subset 1(up to 12 o ), Subset 2(up to 25 o ), Subset 3(up to 5 o ), Subset 4(up to 77 o ), and Subset 5(up to 9 o ). See [24] for detals. Experments are then conducted on the database wth the above-mentoned llumnaton normalzaton methods ncludng: HE: Hstogram equalzaton globally over the mages; RHE: Regon-based Hstogram equalzaton; GC: Gamma ntensty Correcton globally. he mean face of all the mages from the subset 1 of the ten persons (7 mages totall s used as the pre-defned canoncal mage. RGC: Regon-based GC. ts canoncal mage s the same as for GC; GC+RHE: perform RHE after GC; RGC+RHE: perform RHE after RGC; RHE+RGC: perform RGC after RHE; HE+RGC: perform RGC after HE; QR: Quotent llumnaton Relghtng. For each person, the mage captured under the frontal lght source (A+E+) s chosen as the normal lght mode. he Quotent llumnatons for the remanng 63 non-frontal lghtng modes aganst the normal one for each person are computed accordng to the Leave-one-out strategy,.e., when computng the 63 quotent llumnatons for one person, only the remanng nne persons mages are used as the Quotent mage Bootstrap Set. he effect of these processng methods s llustrated n Fgure 4 (and Fgure 7), from whch ntutve effect can be observed for ther performance aganst extreme lghtng condtons. k k Subset 1. Subset 2. Subset 3. Subset 4. Subset 5. Fgure 3. Example mages of an ndvdual l n frontal pose from the Yale face database B wth the varablty due to llumnaton. Orgnal HE GC RHE RGC GC+RHE RGC+RHE QR Fgure 4. he processed mages after dfferent llumnaton on normalzaton methods for one mage n the Yale face database B. he acronym label below each mage shows the processng method. Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

6 All these methods are then compared by recognton experments. n all the experments, the Subset 1 (7 mages for each person) s chosen as the gallery and each of the mages n the remanng 4 subsets are matched n the gallery to fnd a nearest neghbor based on cosne smlarty. he expermental results are llustrated n able 1 and Fgure 5. able 1. Recognton rate comparsons of dfferent llumnaton normalzaton methods on Yale Face Database B (Subset 1 contanng 7 mages s used as the gallery for each person) Subset No. (otal Number of probes*) Methods 2 (118) 3 (118) 4 (138) 5 (189) Mean (563) Non GC RGC HE RHE RHE+RGC HE+RGC GC+RHE RGC+RHE QR *Note: otally 7 mages n our verson of the face database are absent. Harvard face database, whch s also specalzed on llumnaton. n each mage n the database, one subect held hs/her head steady whle beng llumnated by a domnant lght source. he space of lght source drectons, whch can be parameterzed by sphercal angles, was then sampled n 15 o ncrements. n the database, there are totally 66 mages of totally 1 subects, and they are dvded nto 5 subsets accordng to the greater of the longtudnal and lattudnal angles of the lght source drecton from the camera axs Subset 1(15 o ), Subset 2(3 o ), Subset 3(45 o ), Subset 4(6 o ), and Subset 5(75 o ). See [6] for detals. Subset 1 Subset Non HE RHE GC RGC RHE+RGC HE+RGC GC+RHE RGC+RHE QR Subset 2 Subset 3 Subset 4 Subset 5 Average Fgure 5 Recognton rate comparsons of dfferent llumnaton normalzaton methods on Yale Face Database B Note that these experments are all the nterpolaton of the varyng llumnaton snce subset 1 contans faces lghted under lght sources wth smaller angles, whle those of the mages n the other subsets are much greater. 4.3 Results on Harvard face database o further verfy the expermental results on the Yale face database B, smlar experments are organzed on the Subset 3 Subset 4 Subset 5 Fgure 6. Example mages of an ndvdual n frontal pose from the Harvard face database wth the varablty due to llumnaton. Smlar experments as n secton 4.2 are then conducted. he tested llumnaton normalzaton methods are all the same as n secton 4.2. he effect of these processng methods s llustrated n Fgure 7. All these Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

7 methods are then compared by recognton experments. n all the experments, the Subset 1 (6 mages for each person) s chosen as the gallery, and each of the mages n the remanng 4 subsets are matched n the gallery to fnd a nearest neghbor based on cosne smlarty. he expermental results are llustrated n able 2 and Fgure 8. Orgnal HE GC Non HE RHE GC RGC RHE+RGC HE+RGC GC+RHE RGC+RHE QR Subset 2 Subset 3 Subset 4 Subset 5 Average Fgure 8 Recognton rate comparsons of dfferent llumnaton on normalzaton methods on Harvard Face Database. RHE RGC HE+RGC 5. Conclusons and Future Work RHE+RGC RGC+RHE QR Fgure 7. he processed mages after dfferent llumnaton normalzaton methods for one mage n the Harvard face database. he acronym label below each mage shows the processng method. able 2. Recognton rate comparsons of dfferent llumnaton normalzaton methods on Harvard Face Database. For each methods, subset 1 contanng 6 mages s used as the gallery for each person. Subset No. (otal Number of Probes*) 2 (9) 3 (13) 4 (17) 5 (21) Mean (591) Non GC HE RGC RHE RHE+RGC HE+RGC GC+RHE RGC+RHE QR *Note: otally 9 mages n our verson of the face database are absent. he expermental results both on Yale and Harvard face database n Secton 4 reveal a number of nterestng ponts: (1) Smple llumnaton normalzaton method, e.g. the HE or the proposed GC can generally mprove the recognton performance compared wth the nonpreprocessng case; (2) Regon-based HE and/or GC can sgnfcantly mprove the recognton rate compared wth the nonpreprocessng case snce t can elmnate the heavy sde lghtng effects. (3) f the lght mode of the nput mage s known or can be estmated, the proposed QR methods can further consderably mprove the performance of the recognton system even compared wth the Regonbased HE combnng GC. Note that the terrfc performance of QR s based on the assumpton that the lghtng modes of the mages are known or can be estmated. hs s a strong constrant n a practcal applcaton system. herefore, one of our future works wll be the clusterng and classfcaton (estmaton) of the lghtng condtons for a practcal QR method. n contrast, the RHE combed wth RGC methods are more general and practcal to be exploted n a recognton system effcently, snce they need not the llumnaton estmaton procedure. Acknowledgement hs research s partly sponsored by Natonal H-ech Program of Chna (No.21AA11419 and No. 22AA1181), SVSON ech. Co., Ltd. And the authors would also gve thanks to those who provded the publc face databases. Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

8 References [1] A.Samal, P.A..yenGar Automatc Recognton and Analyss of Human Faces and Facal Expressons: A Survey, Pattern Recognton, 25(1), pp65-77, 1992 [2] R. Brunell and. Poggo, Face Recognton: Features versus emplate, PAM, 15(1), pp , 1993 [3] R.Chellappa, C.L.Wlson ect. Human and Machne Recognton of faces: A survey, Proc. of the EEE, 83(5), pp75-74, [4] M.urk and A.Pentland. Egenfaces for Recognton Journal of cogntve neuroscence, 3(1), pp71-86, [5] J.Zhang, Y.Yan, M.Lades, Face Recognton: Egenface, Elastc Matchng and Neural Nets, Proceedngs of the EEE, vol.85, no. 9, pp1422~1435, Sep [6] P.N.Belhumeur, J.P.Hespanha and D.J.Kregman. Egenfaces vs Fsherfaces: recognton usng class specfc lnear proecton. PAM, vol.2, No.7, [7] B.Moghaddam and A.Pentland, Probablstc Vsual Learnng for Obect Detecton, Proc. nt'l Conf. Computer Vson, pp , [8] B.Moghaddam, W.Wahd and A.Pentland. Beyond Egenfaces: Probablstc Matchng for Face Recognton, the 3rd EE nt. Con. On Auto. Face- and Gesture- Recognton, Nara, Japan, [9] B.Moghaddam,.Jebara, A.Pentland, Bayesan Face Recognton, Pattern Recognton Vol.33(2), pp , 2 [1]W.Zhao and R.Chellappa, Robust mage-based 3D Face Recognton, CAR-R-932, N , CS-R- 491, Center for Auto Research, UMD, 2.1 [11]A.Lants, C.J.aylor,.F.Cootes. Automatc nterpretaton and codng of face mages usng flexble models. EEE ransactons on Pattern Analyss & Machne ntellgence, vol.19, no.7, pp , July 1997 [12].F.Cootes, G.J.Edwards, C.J.aylor, Actve Appearance Models, ECCV, vol.2, pp , [13]G. Edwards,. Cootes, and C. aylor, Advances n Actve Appearance Models, Proc. nt'l Conf. Computer Vson, pp , [14]P.Penev and J.Atck, Local Feature Analyss: A General Statstcal heory for Obect Representaton, Network: Computaton n Neural Systems, vol.7, pp.477-5, 1996 [15]L.Wskott, J.M.Fellous, N.Kruger and C.V.D.Malsburg, Face Recognton by Elastc Bunch Graph Matchng, EEE rans. On PAM, 19(7), pp , [16]P.J.Phllps, H.Moon, etc. he FERE Evaluaton Methodology for Face-Recognton Algorthms, EEE PAM, Vol.22, No.1, pp19-114, 2 [17]A.Pentland, Lookng at People: Sensng for Ubqutous and Wearable Computng, EEE rans. On PAM, Vol.22, No.1, pp17-119, Jan. 2 [18]G.Guo, S.Z.L and K.Chan, Face Recognton by Support Vector Machnes, FG 2, pp196-21, Grenoble, 2.3 [19]Y.Adn, Y. Moses, S.Ullman, Face Recognton: he Problem of Compenstng for changes n llumnaton Drecton, EEE PAM, Vol.19, No.7, pp , 1997 [2].Vetter and.poggo, Lnear Obect Classes And mage Synthess From A Sngle Example mage, EEE rans. On PAM, Vol.19, pp , 1997 [21]H.Murase, S.Nayar, Vsual Learnng and recognton of 3D obect from appearance, JCV, 14:5-24, 1995 [22]A.Shashua, On Photometrc ssues n 3D vsual recognton from a sngle 2D mage, nternatonal Journal of Computer Vson, 21(1/2), , 1997 [23]A.Shashua and.rkln-ravv, he Quotent mage: Class-Based Re-Renderng And Recognton Wth Varyng llumnatons, EEE rans. on PAM, pp , 21.2 [24]A.S.Georghades, P.N.Belhumeur and D.J.Kregman, From Few to Many: llumnaton Cone Models for Face Recognton under Dfferng Pose And Lghtng, EEE PAM, Vol.23, No.6, pp643-66, June 21 [25]R.Basr, D. Jacobs, Lambertan Reflectance and Lnear Subspaces, CCV21, Beckman nsttute. Vol.2, p383-39, [26]R.Gross,.Matthews, S.Baker, Egen Lght-Felds and Face Recognton Across Pose, Proc. of FG2 [27]K.Okada, C.Malsburg, Pose-nvarant Face Recognton wth Parametrc Lnear Subspaces, Proc. of FG2 [28].Sm,.Kanade, Combnng Models and Exemplars for Face Recognton: An llumnatng Example,n Proceedngs of Workshop on Models versus Exemplars n Computer Vson, CVPR 21. [29]S.Shan, W.Gao, D.Zhao, Face dentfcaton From A Sngle Example mage Based On Face-Specfc Subspace (FSS), Proc. of EEE CASSP22, Vol.2, pp Florda, USA, 22.5 [3]W.Gao, S.Shan, X.Cha, X.Fu, Vrtual Face mage Generaton For llumnaton And Pose nsenstve Face Recognton, Proc. of CASSP23, Vol.V, pp , HongKong, 23 [31]P.J.Phllps, Y.Vard, Effcent llumnaton Normalzaton of Facal mages, PRL, 17(1996), Proceedngs of the EEE nternatonal Workshop on Analyss and Modelng of Faces and Gestures (AMFG 3) /3 $ EEE

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

Bypassing Synthesis: PLS for Face Recognition with Pose, Low-Resolution and Sketch

Bypassing Synthesis: PLS for Face Recognition with Pose, Low-Resolution and Sketch Bypassng Synthess: PLS for Face Recognton wth Pose, Low-Resoluton and Setch Abhshe Sharma Insttute of Advanced Computer Scence Unversty of Maryland, USA bhoaal@umacs.umd.edu Davd W Jacobs Insttute of Advanced

More information

An interactive system for structure-based ASCII art creation

An interactive system for structure-based ASCII art creation An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

A machine vision approach for detecting and inspecting circular parts

A machine vision approach for detecting and inspecting circular parts A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Learning from Multiple Outlooks

Learning from Multiple Outlooks Learnng from Multple Outlooks Maayan Harel Department of Electrcal Engneerng, Technon, Hafa, Israel She Mannor Department of Electrcal Engneerng, Technon, Hafa, Israel maayanga@tx.technon.ac.l she@ee.technon.ac.l

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Microarray data normalization and transformation

Microarray data normalization and transformation revew Mcroarray data normalzaton and transformaton John Quackenbush do:38/ng3 Nature Publshng Group http://wwwnaturecom/naturegenetcs Underlyng every mcroarray experment s an expermental queston that one

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Detecting Global Motion Patterns in Complex Videos

Detecting Global Motion Patterns in Complex Videos Detectng Global Moton Patterns n Complex Vdeos Mn Hu, Saad Al, Mubarak Shah Computer Vson Lab, Unversty of Central Florda {mhu,sal,shah}@eecs.ucf.edu Abstract Learnng domnant moton patterns or actvtes

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Suspect Vehicle Tracking System Based on Video

A Suspect Vehicle Tracking System Based on Video 3rd Internatonal Conference on Multmeda Technology ICMT 2013) A Suspect Vehcle Trackng System Based on Vdeo Yad Chen 1, Tuo Wang Abstract. Vdeo survellance systems are wdely used n securty feld. The large

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Techniques for multi-resolution image registration in the presence of occlusions 1

Techniques for multi-resolution image registration in the presence of occlusions 1 Technques for mult-resoluton mage regstraton n the presence of occlusons organ cgure Harold S. Stone morganm@mt.edu, hstone@research.n.nec.com Abstract Ths paper descrbes and compares technques for regsterng

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Vehicle Detection, Classification and Position Estimation based on Monocular Video Data during Night-time

Vehicle Detection, Classification and Position Estimation based on Monocular Video Data during Night-time Vehcle Detecton, Classfcaton and Poston Estmaton based on Monocular Vdeo Data durng Nght-tme Jonas Frl, Marko H. Hoerter, Martn Lauer and Chrstoph Stller Keywords: Automotve Lghtng, Lght-based Drver Assstance,

More information

Automated Mobile ph Reader on a Camera Phone

Automated Mobile ph Reader on a Camera Phone Automated Moble ph Reader on a Camera Phone B.Y. Loh, N.K. Vuong, S. Chan and C.. Lau AbstractA robust classfcaton algorthm that apples color scence and mage processng technques s developed to automatcally

More information

A Multi-mode Image Tracking System Based on Distributed Fusion

A Multi-mode Image Tracking System Based on Distributed Fusion A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn

More information

An Algorithm for Data-Driven Bandwidth Selection

An Algorithm for Data-Driven Bandwidth Selection IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 2, FEBRUARY 2003 An Algorthm for Data-Drven Bandwdth Selecton Dorn Comancu, Member, IEEE Abstract The analyss of a feature space

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Hallucinating Multiple Occluded CCTV Face Images of Different Resolutions

Hallucinating Multiple Occluded CCTV Face Images of Different Resolutions In Proc. IEEE Internatonal Conference on Advanced Vdeo and Sgnal based Survellance (AVSS 05), September 2005 Hallucnatng Multple Occluded CCTV Face Images of Dfferent Resolutons Ku Ja Shaogang Gong Computer

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion 212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate

More information

BRNO UNIVERSITY OF TECHNOLOGY

BRNO UNIVERSITY OF TECHNOLOGY BRNO UNIVERSITY OF TECHNOLOGY FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INTELLIGENT SYSTEMS ALGORITHMIC AND MATHEMATICAL PRINCIPLES OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEMS B.SC. THESIS AUTHOR

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Section C2: BJT Structure and Operational Modes

Section C2: BJT Structure and Operational Modes Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

2. Existing work about dissymmetry. 3. The computation of dissymmetry maps. 3.1. Symmetry, chirality and mid-plane

2. Existing work about dissymmetry. 3. The computation of dissymmetry maps. 3.1. Symmetry, chirality and mid-plane Statstcal Analyss of Normal and Abnormal Dssymmetry n Volumetrc Medcal Images Jean-Phlppe Thron, Sylvan Prma, Gérard Subsol EPIDAURE Project, INRIA 2004, route des Lucoles, BP 93 06902 Sopha Antpols Cedex,

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

3D Head Tracking Based on Recognition and Interpolation Using a Time-Of- Flight Depth Sensor

3D Head Tracking Based on Recognition and Interpolation Using a Time-Of- Flight Depth Sensor 3D Head Tracng Based on Recognton and Interpolaton Usng a Tme-Of- Flght Depth Sensor Salh Bura Götür 1 and Carlo Tomas 1,2 1 Canesta Inc., 2 Due Unversty bgotur@canesta.co tomas@cs.due.edu Abstract Ths

More information

Abstract. Clustering ensembles have emerged as a powerful method for improving both the

Abstract. Clustering ensembles have emerged as a powerful method for improving both the Clusterng Ensembles: {topchyal, Models jan, of punch}@cse.msu.edu Consensus and Weak Parttons * Alexander Topchy, Anl K. Jan, and Wllam Punch Department of Computer Scence and Engneerng, Mchgan State Unversty

More information

Example-based head tracking

Example-based head tracking MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Example-based head trackng S. Nyog TR96-34 December 1996 Abstract We want to estmate the pose of human heads. Ths estmaton nvolves a nonlnear

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Disagreement-Based Multi-System Tracking

Disagreement-Based Multi-System Tracking Dsagreement-Based Mult-System Trackng Quannan L 1, Xnggang Wang 2, We Wang 3, Yuan Jang 3, Zh-Hua Zhou 3, Zhuowen Tu 1 1 Lab of Neuro Imagng, Unversty of Calforna, Los Angeles 2 Huazhong Unversty of Scence

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION

3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION 3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION L. Jang, B. Zhu, X. Cheng, Y. Luo, Y. Tao ABSTRACT. Machne vson methods are wdely used n apple defect detecton and

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information