Industrial Challenges for Content-Based Image Retrieval
|
|
- Sharyl Francis
- 8 years ago
- Views:
Transcription
1 Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September LTU technologies Page 1
2 Agenda CBIR what is it good for? Technological challenges of CBIR Evaluating CBIR About LTU technologies Q&A LTU technologies Page 2
3 CBIR... what is it good for? Historically, (generic) CBIR is a cool technology... - convergence of information retrieval and computer vision - «user in the loop», link to web search engines - «query by example» approach - feature extraction, fast search, relevance feedback a lot of academic papers... in search of a useful application in the «real» world - worst-case scenario for entrepreneurship: technology preceding market traction LTU technologies Page 3
4 LTU technologies Page 4 Not interesting: Similar sunsets!
5 LTU technologies Page 5 Google does the job: category search
6 CBIR s redemption a powerful paradigm for object/scene recognition finding a series of images of the same scene/object user is in the loop linking the unknown world to the known world LTU technologies Page 6
7 CBIR in the «real» world Unknown world (query) Known world (reference) duplicate images B clone images similar images Image mining LTU technologies Page 7
8 User scenarios Verification: 1:1 - unrelated to information retrieval Identification: 1:N - target search - applications: stolen art, counterfeiting, media monitoring Investigation: q:n - find common ground between images - applications: child exploitation, IT forensics, intelligence Classification: A K LTU technologies Page 8
9 LTU s technology generalized CBIR Input Any digital image format, attachement, video frame, Real-time Analysis Visual Feature Extraction color, shape, texture, arrangements, moments, Image DNA Image Database / Knowledge Base Similarity Retrieval Clone Detection Output Categorization face 100% indoor 80% LTU technologies Page 9
10 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 10
11 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 11
12 Clone Detection Image clones same visual content, different graphical rendering (typically Photoshop manipulation) original old B&W negatized bad scan cropped inverted titled face erased face erased stretched reencoded LTU technologies Page 12
13 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 13
14 Cross-modal retrieval: LTU technologies Page 14
15 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 15
16 Annotation by supervised learning Classifier bank Fusion module AA BB CC Keyword DD Finite vocabulary Binary or multi-class classification LTU technologies Page 16
17 LTU technologies Page 17 Annotation by case-based reasoning
18 Evaluation of CBIR depends upon Image Content - Scenes/objects represented - Image Quality - Domain-specific knowledge User scenario - identification benchmarking database? - investigation using a series of images - classification Usage scenario - Search Acceptable max rank of «retrieved images»? precision or recall? - Classification LTU technologies Page 18
19 Evaluation within a customer project Large database with Ground Truth - provided by customer or - put together by LTU User scenario & usage scenario taken into account - in most mission-critical scenarios, maximizing recall is the main goal - precision is unimportant LTU technologies Page 19
20 The LTUtech dataset LTU has collected (mostly over the web) more than 80,000 images of 267 visual categories A visual category is a set of examples of an object - animals, CD covers, gloves, watches etc. An average of 300 images per visual category The total database size is 1.3 GB The images vary in quality, size, format We do not known the copyright of the images The database is shared with the WP3 members of the MUSCLE network LTU technologies Page 20
21 About LTU Technologies Golden Award for Technology The world s top 100 innovators MIT Technology Review Founded: 1999 from our group s research at INRIA (imedia research group) Mission: Bringing image/video indexing/retrieval to the market Europe s Top 100 Companies The Red Herring Headquartered: Paris & Washington D.C. Acquired by company JASTEC in 2005 European Information Society Technologies Prize LTU technologies Page 21
22 Value Prop: Law Enforcement & Intelligence Providing tools to automatically mine information from large, unknown sets of images Data Collection Data Analysis Content Management Seized HD Database of images w/ case information Internet Database of suspect Images P2P LTU technologies evidence Page 22
23 Key-Clients (1) Government, Police, International agencies Investigations Child protection, Stolen art Computer forensics Counterfeiting, ID theft Intelligence and monitoring Computer, Network or Media LTU technologies Page 23
24 Value Prop: Media & Intellectual Property Providing efficient access to images and tools for monitoring their usage Enroll Manage Distribute Internet 3 Keywording 1 Search 2 Monitoring LTU technologies Page 24
25 Key-Clients (2) Media and IP protection Image bank management e-commerce, media Patent and design protection Search, classification of designs Online IP protection Logos, visual assets Partners DAM software, text search engines Content filtering, Antivirus software LTU technologies Page 25
26 Summary Challenges in bringing CBIR to the market - mission-critical applications Evaluation is case-by-case - domain-specific - customer-specific LTU technologies Page 26
27 Questions & Answers Chahab Nastar CEO Paris, France cn AT LTUtech.com LTU technologies Page 27
Image mining technologies and industrial challenges. Sébastien GILLES, Ph.D. Chief scientist & co-founder sg@ltutech.com www.ltutech.
Image mining technologies and industrial challenges Sébastien GILLES, Ph.D. Chief scientist & co-founder sg@ltutech.com www.ltutech.com Context LTU has successfully deployed image mining softwares in very
More informationKey Pain Points Addressed
Xerox Image Search 6 th International Photo Metadata Conference, London, May 17, 2012 Mathieu Chuat Director Licensing & Business Development Manager Xerox Corporation Key Pain Points Addressed Explosion
More informationOpen issues and research trends in Content-based Image Retrieval
Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca schettini@disco.unimib.it www.disco.unimib.it/schettini/ IEEE Signal Processing Society
More informationContent-Based Image Retrieval
Content-Based Image Retrieval Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr Image retrieval Searching a large database for images that match a query: What kind
More informationSteven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg
Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationT-REDSPEED White paper
T-REDSPEED White paper Index Index...2 Introduction...3 Specifications...4 Innovation...6 Technology added values...7 Introduction T-REDSPEED is an international patent pending technology for traffic violation
More informationInformation Technology Systems (2012)
Information Technology Systems (2012) Sample work program April 2012 Information Technology Systems (2012) Sample work program Compiled by the Queensland Studies Authority April 2012 This work program
More informationGRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING
MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT
More informationFlorida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
More informationEHR CURATION FOR MEDICAL MINING
EHR CURATION FOR MEDICAL MINING Ernestina Menasalvas Medical Mining Tutorial@KDD 2015 Sydney, AUSTRALIA 2 Ernestina Menasalvas "EHR Curation for Medical Mining" 08/2015 Agenda Motivation the potential
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationOnline Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
More informationSimilarity Search in a Very Large Scale Using Hadoop and HBase
Similarity Search in a Very Large Scale Using Hadoop and HBase Stanislav Barton, Vlastislav Dohnal, Philippe Rigaux LAMSADE - Universite Paris Dauphine, France Internet Memory Foundation, Paris, France
More informationUsing LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.
White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationApproaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval
Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information
More informationtechnical notes trimble realworks software
technical notes trimble realworks software A POWERFUL 3D LASER SCANNING OFFICE SOFTWARE SUITE Designed for today s multifaceted scanning professional, Trimble RealWorks is a powerful office software that
More informationMultimedia Databases. Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.
Multimedia Databases Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 0 Organizational Issues Lecture 21.10.2014 03.02.2015
More informationIndustry 4.0 and Big Data
Industry 4.0 and Big Data Marek Obitko, mobitko@ra.rockwell.com Senior Research Engineer 03/25/2015 PUBLIC PUBLIC - 5058-CO900H 2 Background Joint work with Czech Institute of Informatics, Robotics and
More informationA Statistical Text Mining Method for Patent Analysis
A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, shjun@cju.ac.kr Abstract Most text data from diverse document databases are unsuitable for analytical
More informationTrimble Realworks Software
TECHNICAL NOTES Trimble Realworks Software A Powerful 3D Laser Scanning Office Software Suite DESIGNED FOR TODAY S MULTIFACETED SCANNING PROFESSIONAL, TRIMBLE REALWORKS IS A POWERFUL OFFICE SOFTWARE THAT
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More informationAdvanced Analytics for Audit Case Selection
Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach
More informationEnsemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05
Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification
More informationVirtual Environments - Basics -
Virtual Environments - Basics - What Is Virtual Reality? A Web-Based Introduction Version 4 Draft 1, September, 1998 Jerry Isdale http://www.isdale.com/jerry/vr/whatisvr.html Virtual Environments allow
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationMIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS
More informationRich Media & HD Video Streaming Integration with Brightcove
Rich Media & HD Video Streaming Integration with Brightcove IBM Digital Experience Version 8.5 Web Content Management IBM Ecosystem Development 2014 IBM Corporation Please Note IBM s statements regarding
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationSemantic Video Annotation by Mining Association Patterns from Visual and Speech Features
Semantic Video Annotation by Mining Association Patterns from and Speech Features Vincent. S. Tseng, Ja-Hwung Su, Jhih-Hong Huang and Chih-Jen Chen Department of Computer Science and Information Engineering
More informationBig Data More Is Not Always Better For Your Big Data Strategy
Big Data More Is Not Always Better For Your Big Data Strategy Abstract Everyone is talking about Big Data. Enterprises across the globe are spending significant dollars on it and endeavor with their strategy.
More informationMaster s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
More informationMassive Labeled Solar Image Data Benchmarks for Automated Feature Recognition
Massive Labeled Solar Image Data Benchmarks for Automated Feature Recognition Michael A. Schuh1, Rafal A. Angryk2 1 Montana State University, Bozeman, MT 2 Georgia State University, Atlanta, GA Introduction
More informationPersonalized Business Intelligence
Personalized Business Intelligence arcplanet, 2011-03-31 Claus Nagler Head of Business Intelligence Solutions & Services Bayer Business Services GmbH Agenda 1 2 3 4 Introduction Bayer Company Profile Personalized
More informationWebSphere Business Monitor
WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt
More informationMedia Graphic Arts. September 2014
St. Michael-Albertville High School Teacher: Roger Bovee Media Graphic Arts September 2014 CEQ: What is Graphic? How does graphic design affect me and my decision making? How to create and manipulate graphic
More informationWeb Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationMonitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
More informationA MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationThe Need for Training in Big Data: Experiences and Case Studies
The Need for Training in Big Data: Experiences and Case Studies Guy Lebanon Amazon Background and Disclaimer All opinions are mine; other perspectives are legitimate. Based on my experience as a professor
More informationVisual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
More informationDelivering Smart Answers!
Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved
More informationTracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey mustafa.teke@gmail.com b Department of Computer
More informationA Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal
A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal Chalermpong Somdulyawat chalermpong_s@cmu.ac.th Piyawat Pongjitpak piyawat_p@cmu.ac.th Santi Phithakkitnukoon
More informationBig Data: Image & Video Analytics
Big Data: Image & Video Analytics How it could support Archiving & Indexing & Searching Dieter Haas, IBM Deutschland GmbH The Big Data Wave 60% of internet traffic is multimedia content (images and videos)
More informationDriving Innovation in Licensing Through Competitive Intelligence and Big Data Analytics
Driving Innovation in Licensing Through Competitive Intelligence and Big Data Analytics John D Antonio Practice Leader, Licensing & Competitive Intelligence About Paragon We help increase asset value from
More informationLocation Analytics for Financial Services. An Esri White Paper October 2013
Location Analytics for Financial Services An Esri White Paper October 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is
More informationVideo Analytics A New Standard
Benefits The system offers the following overall benefits: Tracker High quality tracking engine UDP s embedded intelligent Video Analytics software is fast becoming the standard for all surveillance and
More informationData Visualization and Business Insights Using SAS Visual Analytics. University of Connecticut Dan Sokol Thulasi Kumar 1/13/2015
Data Visualization and Business Insights Using SAS Visual Analytics University of Connecticut Dan Sokol Thulasi Kumar 1/13/2015 New Mission The primary mission of the Office of Institutional Research and
More informationSentiment Analysis on Big Data
SPAN White Paper!? Sentiment Analysis on Big Data Machine Learning Approach Several sources on the web provide deep insight about people s opinions on the products and services of various companies. Social
More informationSecurity in Knowledge Management [ Insiders as Security Risks ]
Security in Knowledge Management [ Insiders as Security Risks ] Dr. Rajat Mukherjee Principal Architect, Verity, Inc. rajatm@verity.com Verity, The Market Leader Verity #1 Vendor in Portal Infrastructure
More informationSpam Filtering in Online Social Networks Using Machine Learning Technique
Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India
More informationWhite Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.
White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
More informationDocument Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
More informationSemantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
More informationDIGITAL ASSET MANAGEMENT
DIGITAL ASSET MANAGEMENT WITH THE MARKETING EFFICIENCY CLOUD FROM BRANDMAKER Marketing Efficiency Cloud The Marketing Efficiency Cloud from BrandMaker is the comprehensive solution suite that creates more
More informationSearch and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationM3039 MPEG 97/ January 1998
INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039
More informationDeep Learning Meets Heterogeneous Computing. Dr. Ren Wu Distinguished Scientist, IDL, Baidu wuren@baidu.com
Deep Learning Meets Heterogeneous Computing Dr. Ren Wu Distinguished Scientist, IDL, Baidu wuren@baidu.com Baidu Everyday 5b+ queries 500m+ users 100m+ mobile users 100m+ photos Big Data Storage Processing
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationFeasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea
More informationComplex, true real-time analytics on massive, changing datasets.
Complex, true real-time analytics on massive, changing datasets. A NoSQL, all in-memory enabling platform technology from: Better Questions Come Before Better Answers FinchDB is a NoSQL, all in-memory
More informationIBM Content Analytics: Rapid insight for crime investigation
IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from
More informationPixels Description of scene contents. Rob Fergus (NYU) Antonio Torralba (MIT) Yair Weiss (Hebrew U.) William T. Freeman (MIT) Banksy, 2006
Object Recognition Large Image Databases and Small Codes for Object Recognition Pixels Description of scene contents Rob Fergus (NYU) Antonio Torralba (MIT) Yair Weiss (Hebrew U.) William T. Freeman (MIT)
More informationWebSphere Business Monitor
WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page
More informationModule II: Multimedia Data Mining
ALMA MATER STUDIORUM - UNIVERSITÀ DI BOLOGNA Module II: Multimedia Data Mining Laurea Magistrale in Ingegneria Informatica University of Bologna Multimedia Data Retrieval Home page: http://www-db.disi.unibo.it/courses/dm/
More informationData Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
More informationDatabase Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationBig Data Text Mining and Visualization. Anton Heijs
Copyright 2007 by Treparel Information Solutions BV. This report nor any part of it may be copied, circulated, quoted without prior written approval from Treparel7 Treparel Information Solutions BV Delftechpark
More informationDigital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets
Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets What is DAM? Digital asset management (DAM) consists of management tasks and decisions surrounding the
More informationNUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER
NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from
More informationFilling the Semantic Gap: A Genetic Programming Framework for Content-Based Image Retrieval
INSTITUTE OF COMPUTING University of Campinas Filling the Semantic Gap: A Genetic Programming Framework for Content-Based Image Retrieval Ricardo da Silva Torres rtorres@ic.unicamp.br www.ic.unicamp.br/~rtorres
More informationFace Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
More informationMaster Technology Teacher Standards
Master Technology Teacher Standards FINAL Approved on January 4, 2002 Texas State Board for Educator Certification MASTER TECHNOLOGY TEACHER STANDARDS Standard I. Standard II. Standard III. Standard IV.
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationSteven C.H. Hoi. School of Computer Engineering Nanyang Technological University Singapore
Steven C.H. Hoi School of Computer Engineering Nanyang Technological University Singapore Acknowledgments: Peilin Zhao, Jialei Wang, Hao Xia, Jing Lu, Rong Jin, Pengcheng Wu, Dayong Wang, etc. 2 Agenda
More informationHow To Develop A Computer Security System
INDECT Intelligent information system supporting observation, searching and detection for security of citizens in urban environment Prof. dr hab. inż. Andrzej Dziech INDECT Coordinator Short History of
More informationScalability and Performance Report - Analyzer 2007
- Analyzer 2007 Executive Summary Strategy Companion s Analyzer 2007 is enterprise Business Intelligence (BI) software that is designed and engineered to scale to the requirements of large global deployments.
More informationSmall Steps Towards Big Data Ric Clarke, Australian Bureau of Statistics
Small Steps Towards Big Data Ric Clarke, Australian Bureau of Statistics ECB Workshop on Using Big Data, 7-8 April 2014 1 Agenda Review some basic Big Data concepts Describe the Big Data opportunity for
More informationMobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
More informationIMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS
IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS Alexander Velizhev 1 (presenter) Roman Shapovalov 2 Konrad Schindler 3 1 Hexagon Technology Center, Heerbrugg, Switzerland 2 Graphics & Media
More informationPatent data mining and effective patent portfolio management
Patent data mining and effective patent portfolio management There are many tools that help put patent mining theory into practice. Knowing how to use them can be a key element in developing a commercially
More informationTemplate-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
More informationFOTOSTATION. The best media file organizer. It s organized
FotoStation 7.0 FOTOSTATION The best media file organizer Find, process and share your digital assets Search locally and centrally Automate your workflow with actions Available in 12 languages It s organized
More informationDMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support
DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support Rok Rupnik, Matjaž Kukar, Marko Bajec, Marjan Krisper University of Ljubljana, Faculty of Computer and Information
More informationISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
More informationReporting and Incident Management for Firewalls
Reporting and Incident Management for Firewalls The keys to unlocking your firewall s secrets Contents White Paper November 8, 2001 The Role Of The Firewall In Network Security... 2 Firewall Activity Reporting
More informationContributing Efforts of Various String Matching Methodologies in Real World Applications
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-I E-ISSN: 2347-2693 Contributing Efforts of Various String Matching Methodologies in Real World Applications
More informationServer Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
More informationFinal Project Report
CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes
More informationNetwork Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
More informationBig Data & Scripting Part II Streaming Algorithms
Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set
More information