Industrial Challenges for Content-Based Image Retrieval

Size: px
Start display at page:

Download "Industrial Challenges for Content-Based Image Retrieval"

Transcription

1 Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September LTU technologies Page 1

2 Agenda CBIR what is it good for? Technological challenges of CBIR Evaluating CBIR About LTU technologies Q&A LTU technologies Page 2

3 CBIR... what is it good for? Historically, (generic) CBIR is a cool technology... - convergence of information retrieval and computer vision - «user in the loop», link to web search engines - «query by example» approach - feature extraction, fast search, relevance feedback a lot of academic papers... in search of a useful application in the «real» world - worst-case scenario for entrepreneurship: technology preceding market traction LTU technologies Page 3

4 LTU technologies Page 4 Not interesting: Similar sunsets!

5 LTU technologies Page 5 Google does the job: category search

6 CBIR s redemption a powerful paradigm for object/scene recognition finding a series of images of the same scene/object user is in the loop linking the unknown world to the known world LTU technologies Page 6

7 CBIR in the «real» world Unknown world (query) Known world (reference) duplicate images B clone images similar images Image mining LTU technologies Page 7

8 User scenarios Verification: 1:1 - unrelated to information retrieval Identification: 1:N - target search - applications: stolen art, counterfeiting, media monitoring Investigation: q:n - find common ground between images - applications: child exploitation, IT forensics, intelligence Classification: A K LTU technologies Page 8

9 LTU s technology generalized CBIR Input Any digital image format, attachement, video frame, Real-time Analysis Visual Feature Extraction color, shape, texture, arrangements, moments, Image DNA Image Database / Knowledge Base Similarity Retrieval Clone Detection Output Categorization face 100% indoor 80% LTU technologies Page 9

10 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 10

11 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 11

12 Clone Detection Image clones same visual content, different graphical rendering (typically Photoshop manipulation) original old B&W negatized bad scan cropped inverted titled face erased face erased stretched reencoded LTU technologies Page 12

13 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 13

14 Cross-modal retrieval: LTU technologies Page 14

15 Technological challenges of CBIR Application «Clone» detection Visual retrieval Image annotation Problem Matching: A = B? Similarity: A ~ B? Classification: A K? Metric Matching distance Visual/semantic distance Hamming distance where A and B are images, and K is a concept LTU technologies Page 15

16 Annotation by supervised learning Classifier bank Fusion module AA BB CC Keyword DD Finite vocabulary Binary or multi-class classification LTU technologies Page 16

17 LTU technologies Page 17 Annotation by case-based reasoning

18 Evaluation of CBIR depends upon Image Content - Scenes/objects represented - Image Quality - Domain-specific knowledge User scenario - identification benchmarking database? - investigation using a series of images - classification Usage scenario - Search Acceptable max rank of «retrieved images»? precision or recall? - Classification LTU technologies Page 18

19 Evaluation within a customer project Large database with Ground Truth - provided by customer or - put together by LTU User scenario & usage scenario taken into account - in most mission-critical scenarios, maximizing recall is the main goal - precision is unimportant LTU technologies Page 19

20 The LTUtech dataset LTU has collected (mostly over the web) more than 80,000 images of 267 visual categories A visual category is a set of examples of an object - animals, CD covers, gloves, watches etc. An average of 300 images per visual category The total database size is 1.3 GB The images vary in quality, size, format We do not known the copyright of the images The database is shared with the WP3 members of the MUSCLE network LTU technologies Page 20

21 About LTU Technologies Golden Award for Technology The world s top 100 innovators MIT Technology Review Founded: 1999 from our group s research at INRIA (imedia research group) Mission: Bringing image/video indexing/retrieval to the market Europe s Top 100 Companies The Red Herring Headquartered: Paris & Washington D.C. Acquired by company JASTEC in 2005 European Information Society Technologies Prize LTU technologies Page 21

22 Value Prop: Law Enforcement & Intelligence Providing tools to automatically mine information from large, unknown sets of images Data Collection Data Analysis Content Management Seized HD Database of images w/ case information Internet Database of suspect Images P2P LTU technologies evidence Page 22

23 Key-Clients (1) Government, Police, International agencies Investigations Child protection, Stolen art Computer forensics Counterfeiting, ID theft Intelligence and monitoring Computer, Network or Media LTU technologies Page 23

24 Value Prop: Media & Intellectual Property Providing efficient access to images and tools for monitoring their usage Enroll Manage Distribute Internet 3 Keywording 1 Search 2 Monitoring LTU technologies Page 24

25 Key-Clients (2) Media and IP protection Image bank management e-commerce, media Patent and design protection Search, classification of designs Online IP protection Logos, visual assets Partners DAM software, text search engines Content filtering, Antivirus software LTU technologies Page 25

26 Summary Challenges in bringing CBIR to the market - mission-critical applications Evaluation is case-by-case - domain-specific - customer-specific LTU technologies Page 26

27 Questions & Answers Chahab Nastar CEO Paris, France cn AT LTUtech.com LTU technologies Page 27

Image mining technologies and industrial challenges. Sébastien GILLES, Ph.D. Chief scientist & co-founder sg@ltutech.com www.ltutech.

Image mining technologies and industrial challenges. Sébastien GILLES, Ph.D. Chief scientist & co-founder sg@ltutech.com www.ltutech. Image mining technologies and industrial challenges Sébastien GILLES, Ph.D. Chief scientist & co-founder sg@ltutech.com www.ltutech.com Context LTU has successfully deployed image mining softwares in very

More information

Key Pain Points Addressed

Key Pain Points Addressed Xerox Image Search 6 th International Photo Metadata Conference, London, May 17, 2012 Mathieu Chuat Director Licensing & Business Development Manager Xerox Corporation Key Pain Points Addressed Explosion

More information

Open issues and research trends in Content-based Image Retrieval

Open issues and research trends in Content-based Image Retrieval Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca schettini@disco.unimib.it www.disco.unimib.it/schettini/ IEEE Signal Processing Society

More information

Content-Based Image Retrieval

Content-Based Image Retrieval Content-Based Image Retrieval Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr Image retrieval Searching a large database for images that match a query: What kind

More information

Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg

Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

T-REDSPEED White paper

T-REDSPEED White paper T-REDSPEED White paper Index Index...2 Introduction...3 Specifications...4 Innovation...6 Technology added values...7 Introduction T-REDSPEED is an international patent pending technology for traffic violation

More information

Information Technology Systems (2012)

Information Technology Systems (2012) Information Technology Systems (2012) Sample work program April 2012 Information Technology Systems (2012) Sample work program Compiled by the Queensland Studies Authority April 2012 This work program

More information

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT

More information

Florida International University - University of Miami TRECVID 2014

Florida International University - University of Miami TRECVID 2014 Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,

More information

EHR CURATION FOR MEDICAL MINING

EHR CURATION FOR MEDICAL MINING EHR CURATION FOR MEDICAL MINING Ernestina Menasalvas Medical Mining Tutorial@KDD 2015 Sydney, AUSTRALIA 2 Ernestina Menasalvas "EHR Curation for Medical Mining" 08/2015 Agenda Motivation the potential

More information

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2

More information

Online Credit Card Application and Identity Crime Detection

Online Credit Card Application and Identity Crime Detection Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due

More information

Similarity Search in a Very Large Scale Using Hadoop and HBase

Similarity Search in a Very Large Scale Using Hadoop and HBase Similarity Search in a Very Large Scale Using Hadoop and HBase Stanislav Barton, Vlastislav Dohnal, Philippe Rigaux LAMSADE - Universite Paris Dauphine, France Internet Memory Foundation, Paris, France

More information

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval

Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information

More information

technical notes trimble realworks software

technical notes trimble realworks software technical notes trimble realworks software A POWERFUL 3D LASER SCANNING OFFICE SOFTWARE SUITE Designed for today s multifaceted scanning professional, Trimble RealWorks is a powerful office software that

More information

Multimedia Databases. Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.

Multimedia Databases. Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs. Multimedia Databases Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 0 Organizational Issues Lecture 21.10.2014 03.02.2015

More information

Industry 4.0 and Big Data

Industry 4.0 and Big Data Industry 4.0 and Big Data Marek Obitko, mobitko@ra.rockwell.com Senior Research Engineer 03/25/2015 PUBLIC PUBLIC - 5058-CO900H 2 Background Joint work with Czech Institute of Informatics, Robotics and

More information

A Statistical Text Mining Method for Patent Analysis

A Statistical Text Mining Method for Patent Analysis A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, shjun@cju.ac.kr Abstract Most text data from diverse document databases are unsuitable for analytical

More information

Trimble Realworks Software

Trimble Realworks Software TECHNICAL NOTES Trimble Realworks Software A Powerful 3D Laser Scanning Office Software Suite DESIGNED FOR TODAY S MULTIFACETED SCANNING PROFESSIONAL, TRIMBLE REALWORKS IS A POWERFUL OFFICE SOFTWARE THAT

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Advanced Analytics for Audit Case Selection

Advanced Analytics for Audit Case Selection Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach

More information

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05 Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification

More information

Virtual Environments - Basics -

Virtual Environments - Basics - Virtual Environments - Basics - What Is Virtual Reality? A Web-Based Introduction Version 4 Draft 1, September, 1998 Jerry Isdale http://www.isdale.com/jerry/vr/whatisvr.html Virtual Environments allow

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS

More information

Rich Media & HD Video Streaming Integration with Brightcove

Rich Media & HD Video Streaming Integration with Brightcove Rich Media & HD Video Streaming Integration with Brightcove IBM Digital Experience Version 8.5 Web Content Management IBM Ecosystem Development 2014 IBM Corporation Please Note IBM s statements regarding

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features

Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features Semantic Video Annotation by Mining Association Patterns from and Speech Features Vincent. S. Tseng, Ja-Hwung Su, Jhih-Hong Huang and Chih-Jen Chen Department of Computer Science and Information Engineering

More information

Big Data More Is Not Always Better For Your Big Data Strategy

Big Data More Is Not Always Better For Your Big Data Strategy Big Data More Is Not Always Better For Your Big Data Strategy Abstract Everyone is talking about Big Data. Enterprises across the globe are spending significant dollars on it and endeavor with their strategy.

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Massive Labeled Solar Image Data Benchmarks for Automated Feature Recognition

Massive Labeled Solar Image Data Benchmarks for Automated Feature Recognition Massive Labeled Solar Image Data Benchmarks for Automated Feature Recognition Michael A. Schuh1, Rafal A. Angryk2 1 Montana State University, Bozeman, MT 2 Georgia State University, Atlanta, GA Introduction

More information

Personalized Business Intelligence

Personalized Business Intelligence Personalized Business Intelligence arcplanet, 2011-03-31 Claus Nagler Head of Business Intelligence Solutions & Services Bayer Business Services GmbH Agenda 1 2 3 4 Introduction Bayer Company Profile Personalized

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt

More information

Media Graphic Arts. September 2014

Media Graphic Arts. September 2014 St. Michael-Albertville High School Teacher: Roger Bovee Media Graphic Arts September 2014 CEQ: What is Graphic? How does graphic design affect me and my decision making? How to create and manipulate graphic

More information

Web Browsing Quality of Experience Score

Web Browsing Quality of Experience Score Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

The Need for Training in Big Data: Experiences and Case Studies

The Need for Training in Big Data: Experiences and Case Studies The Need for Training in Big Data: Experiences and Case Studies Guy Lebanon Amazon Background and Disclaimer All opinions are mine; other perspectives are legitimate. Based on my experience as a professor

More information

Visual Structure Analysis of Flow Charts in Patent Images

Visual Structure Analysis of Flow Charts in Patent Images Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information

More information

Delivering Smart Answers!

Delivering Smart Answers! Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved

More information

Tracking and Recognition in Sports Videos

Tracking and Recognition in Sports Videos Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey mustafa.teke@gmail.com b Department of Computer

More information

A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal

A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal Chalermpong Somdulyawat chalermpong_s@cmu.ac.th Piyawat Pongjitpak piyawat_p@cmu.ac.th Santi Phithakkitnukoon

More information

Big Data: Image & Video Analytics

Big Data: Image & Video Analytics Big Data: Image & Video Analytics How it could support Archiving & Indexing & Searching Dieter Haas, IBM Deutschland GmbH The Big Data Wave 60% of internet traffic is multimedia content (images and videos)

More information

Driving Innovation in Licensing Through Competitive Intelligence and Big Data Analytics

Driving Innovation in Licensing Through Competitive Intelligence and Big Data Analytics Driving Innovation in Licensing Through Competitive Intelligence and Big Data Analytics John D Antonio Practice Leader, Licensing & Competitive Intelligence About Paragon We help increase asset value from

More information

Location Analytics for Financial Services. An Esri White Paper October 2013

Location Analytics for Financial Services. An Esri White Paper October 2013 Location Analytics for Financial Services An Esri White Paper October 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is

More information

Video Analytics A New Standard

Video Analytics A New Standard Benefits The system offers the following overall benefits: Tracker High quality tracking engine UDP s embedded intelligent Video Analytics software is fast becoming the standard for all surveillance and

More information

Data Visualization and Business Insights Using SAS Visual Analytics. University of Connecticut Dan Sokol Thulasi Kumar 1/13/2015

Data Visualization and Business Insights Using SAS Visual Analytics. University of Connecticut Dan Sokol Thulasi Kumar 1/13/2015 Data Visualization and Business Insights Using SAS Visual Analytics University of Connecticut Dan Sokol Thulasi Kumar 1/13/2015 New Mission The primary mission of the Office of Institutional Research and

More information

Sentiment Analysis on Big Data

Sentiment Analysis on Big Data SPAN White Paper!? Sentiment Analysis on Big Data Machine Learning Approach Several sources on the web provide deep insight about people s opinions on the products and services of various companies. Social

More information

Security in Knowledge Management [ Insiders as Security Risks ]

Security in Knowledge Management [ Insiders as Security Risks ] Security in Knowledge Management [ Insiders as Security Risks ] Dr. Rajat Mukherjee Principal Architect, Verity, Inc. rajatm@verity.com Verity, The Market Leader Verity #1 Vendor in Portal Infrastructure

More information

Spam Filtering in Online Social Networks Using Machine Learning Technique

Spam Filtering in Online Social Networks Using Machine Learning Technique Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India

More information

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

DIGITAL ASSET MANAGEMENT

DIGITAL ASSET MANAGEMENT DIGITAL ASSET MANAGEMENT WITH THE MARKETING EFFICIENCY CLOUD FROM BRANDMAKER Marketing Efficiency Cloud The Marketing Efficiency Cloud from BrandMaker is the comprehensive solution suite that creates more

More information

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

M3039 MPEG 97/ January 1998

M3039 MPEG 97/ January 1998 INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039

More information

Deep Learning Meets Heterogeneous Computing. Dr. Ren Wu Distinguished Scientist, IDL, Baidu wuren@baidu.com

Deep Learning Meets Heterogeneous Computing. Dr. Ren Wu Distinguished Scientist, IDL, Baidu wuren@baidu.com Deep Learning Meets Heterogeneous Computing Dr. Ren Wu Distinguished Scientist, IDL, Baidu wuren@baidu.com Baidu Everyday 5b+ queries 500m+ users 100m+ mobile users 100m+ photos Big Data Storage Processing

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment

Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea

More information

Complex, true real-time analytics on massive, changing datasets.

Complex, true real-time analytics on massive, changing datasets. Complex, true real-time analytics on massive, changing datasets. A NoSQL, all in-memory enabling platform technology from: Better Questions Come Before Better Answers FinchDB is a NoSQL, all in-memory

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

Pixels Description of scene contents. Rob Fergus (NYU) Antonio Torralba (MIT) Yair Weiss (Hebrew U.) William T. Freeman (MIT) Banksy, 2006

Pixels Description of scene contents. Rob Fergus (NYU) Antonio Torralba (MIT) Yair Weiss (Hebrew U.) William T. Freeman (MIT) Banksy, 2006 Object Recognition Large Image Databases and Small Codes for Object Recognition Pixels Description of scene contents Rob Fergus (NYU) Antonio Torralba (MIT) Yair Weiss (Hebrew U.) William T. Freeman (MIT)

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page

More information

Module II: Multimedia Data Mining

Module II: Multimedia Data Mining ALMA MATER STUDIORUM - UNIVERSITÀ DI BOLOGNA Module II: Multimedia Data Mining Laurea Magistrale in Ingegneria Informatica University of Bologna Multimedia Data Retrieval Home page: http://www-db.disi.unibo.it/courses/dm/

More information

Data Mining Algorithms Part 1. Dejan Sarka

Data Mining Algorithms Part 1. Dejan Sarka Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses

More information

Database Marketing, Business Intelligence and Knowledge Discovery

Database Marketing, Business Intelligence and Knowledge Discovery Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

Big Data Text Mining and Visualization. Anton Heijs

Big Data Text Mining and Visualization. Anton Heijs Copyright 2007 by Treparel Information Solutions BV. This report nor any part of it may be copied, circulated, quoted without prior written approval from Treparel7 Treparel Information Solutions BV Delftechpark

More information

Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets

Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets What is DAM? Digital asset management (DAM) consists of management tasks and decisions surrounding the

More information

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from

More information

Filling the Semantic Gap: A Genetic Programming Framework for Content-Based Image Retrieval

Filling the Semantic Gap: A Genetic Programming Framework for Content-Based Image Retrieval INSTITUTE OF COMPUTING University of Campinas Filling the Semantic Gap: A Genetic Programming Framework for Content-Based Image Retrieval Ricardo da Silva Torres rtorres@ic.unicamp.br www.ic.unicamp.br/~rtorres

More information

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,

More information

Master Technology Teacher Standards

Master Technology Teacher Standards Master Technology Teacher Standards FINAL Approved on January 4, 2002 Texas State Board for Educator Certification MASTER TECHNOLOGY TEACHER STANDARDS Standard I. Standard II. Standard III. Standard IV.

More information

Securing and Accelerating Databases In Minutes using GreenSQL

Securing and Accelerating Databases In Minutes using GreenSQL Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update

More information

Steven C.H. Hoi. School of Computer Engineering Nanyang Technological University Singapore

Steven C.H. Hoi. School of Computer Engineering Nanyang Technological University Singapore Steven C.H. Hoi School of Computer Engineering Nanyang Technological University Singapore Acknowledgments: Peilin Zhao, Jialei Wang, Hao Xia, Jing Lu, Rong Jin, Pengcheng Wu, Dayong Wang, etc. 2 Agenda

More information

How To Develop A Computer Security System

How To Develop A Computer Security System INDECT Intelligent information system supporting observation, searching and detection for security of citizens in urban environment Prof. dr hab. inż. Andrzej Dziech INDECT Coordinator Short History of

More information

Scalability and Performance Report - Analyzer 2007

Scalability and Performance Report - Analyzer 2007 - Analyzer 2007 Executive Summary Strategy Companion s Analyzer 2007 is enterprise Business Intelligence (BI) software that is designed and engineered to scale to the requirements of large global deployments.

More information

Small Steps Towards Big Data Ric Clarke, Australian Bureau of Statistics

Small Steps Towards Big Data Ric Clarke, Australian Bureau of Statistics Small Steps Towards Big Data Ric Clarke, Australian Bureau of Statistics ECB Workshop on Using Big Data, 7-8 April 2014 1 Agenda Review some basic Big Data concepts Describe the Big Data opportunity for

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS

IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS Alexander Velizhev 1 (presenter) Roman Shapovalov 2 Konrad Schindler 3 1 Hexagon Technology Center, Heerbrugg, Switzerland 2 Graphics & Media

More information

Patent data mining and effective patent portfolio management

Patent data mining and effective patent portfolio management Patent data mining and effective patent portfolio management There are many tools that help put patent mining theory into practice. Knowing how to use them can be a key element in developing a commercially

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

FOTOSTATION. The best media file organizer. It s organized

FOTOSTATION. The best media file organizer. It s organized FotoStation 7.0 FOTOSTATION The best media file organizer Find, process and share your digital assets Search locally and centrally Automate your workflow with actions Available in 12 languages It s organized

More information

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support Rok Rupnik, Matjaž Kukar, Marko Bajec, Marjan Krisper University of Ljubljana, Faculty of Computer and Information

More information

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,

More information

Reporting and Incident Management for Firewalls

Reporting and Incident Management for Firewalls Reporting and Incident Management for Firewalls The keys to unlocking your firewall s secrets Contents White Paper November 8, 2001 The Role Of The Firewall In Network Security... 2 Firewall Activity Reporting

More information

Contributing Efforts of Various String Matching Methodologies in Real World Applications

Contributing Efforts of Various String Matching Methodologies in Real World Applications International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-I E-ISSN: 2347-2693 Contributing Efforts of Various String Matching Methodologies in Real World Applications

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Final Project Report

Final Project Report CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Big Data & Scripting Part II Streaming Algorithms

Big Data & Scripting Part II Streaming Algorithms Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set

More information