Results of the MUSCLE CIS Coin Competition 2006
|
|
- Cory Magdalen McDowell
- 7 years ago
- Views:
Transcription
1 Results of the MUSCLE CIS Coin Competition 2006 Michael Nölle 1 and Michael Rubik 2 1 Video and Safety Technology, 2 High Performance Image Processing ARC Seibersdorf research GmbH, A-2444 Seibersdorf michael.noelle@arcs.ac.at Allan Hanbury PRIP, Institute of Computer-Aided Automation Vienna University of Technology Favoritenstraße 9/1832, A-1040 Vienna, Austria hanbury@prip.tuwien.ac.at Abstract We present the history and structure of the MUSCLE Coin Images Seibersdorf (CIS) benchmark, as well as the results of the CIS coin recognition competition Introduction It is important to evaluate computer vision algorithms objectively on data for which the ground truth is known. Various evaluation campaigns exist, especially in the domains of object recognition (PASCAL Visual Object Classes Challenge [2]) and image retrieval (ImageCLEF [7] and ImagEVAL [3]). We present in this paper the results of the Coin Images Seibersdorf (CIS) Coin Recognition Competition This competion used a large database of images of coins ( training and test images, competition images) with a large number of classes (over 600 coin classes with over 2000 face classes). The two objectives of the campaign were to: use a dataset of images in a narrower image domain [8], allowing a completely objective creation of the ground truth. create a classification task with a large number of classes. This work was supported by the European Union Network of Excellence MUSCLE (FP ).
2 The evaluation campaigns listed above use a set of images belonging to a wide domain [8], a set of photographs of arbitrary scenes. For such a wide domain, it is usually difficult to create a completely objective ground truth. In image retrieval, for example, different people may consider different images to be relevant for a specific query image. For object recognition, some objects may be missed in an image. Through the use in this benchmark of a narrower image domain a set of images where each image contains only one well lit coin face it is possible to create ground truth with minimal uncertainty. Object recognition campaigns generally use a low number of classes (e.g. 10 categories in the PASCAL Visual Object Classes Challenge 2006). These problems can be solved by using a collection of two-class classifiers, such as support vector machines. This approach is less tractable with the 692 classes in the CIS coin benchmark. The paper is organized as follows. Sections 2 and 3 describe the history and structure of the benchmark and competition. The competition results are presented in Section 4. Section 5 concludes. 2 History The changeover from 12 European currencies to the Euro in 2001 created a unique situation. Great volumes of money had to be physically returned to the national banks of the member states. In Austria alone the charitable donations amounted to several hundred tons of cash. Unfortunately, the coins could only be collected as a potpourri of currencies. The sheer volume of material called for an automatic coin recognition and sorting system which was designed and built at ARC Seibersdorf research GmbH. The system, called Dagobert [6, 4], successfully sorted the coins between the middle of 2003 and the end of 2004, thereby returning their face value for the charity organizations. In order to built Dagobert and to perform the recognition task a training data set had to be collected. The training data together with several tens of thousands images of test coins were published in 2005 and constitutes the MUSCLE Coin Image Seibersdorf, short CIS, Benchmark [5], which is available on the MUSCLE Benchmark site [1]. 3 Structure of the Benchmark and Competition The structure of the benchmark and the structure and organisation of the competition based on the benchmark are presented in this section. 3.1 Benchmark The benchmark consists of classified and validated test coins, corresponding to images, as the front and back of each coin is imaged. These are divided into 692 coin classes with different coin face classes. There are more coin face classes than coin classes as some coins changed their appearance over time, when new coin series were issued or when coins with a design to mark a special occasion were minted. These changes could be a different image or different text printed on the coin. Small differences such as minor changes in design are
3 encoded as coin face sub-classes in the data. Additional information consisting of the thickness and diameter of each coin is also provided in a text file and encoded into the first row of each image. These measurements were made by light sensors and are of limited accuracy. 3.2 Competition The benchmark was used as training and test data, and was available for download from six months before the program submission deadline. Executable programs were submitted and run on unseen competition data. The competition data consisted of coins ( images). 362 of the 692 coin types in the training data appeared in the competition set. For every known coin face, there are up to 30 example images in the training data. A coin face in the competition data is taken as known if it corresponds to one of the coin faces present in the benchmark set. 242 of the coins in the competition set are not in the benchmark set. These were to be classified as unknown. The thickness and diameter measurements were also available for the competition data. The coin face sub-classes were not to be taken into account for the competition. It was required that the submitted coin classification programs meet the following criteria: At least 70% of the coins in the competition dataset must be correctly classified. This requirement is not too difficult to meet: the coin which appears the most often (10 Groschen) makes up 30% of the set, the 10 most often occurring coins make up more than 50% of the set. The 40 most often occurring coins make up more than 70% of the set. A program must not take more than 8 hours to process a run of 5000 coins. The final score on the competition dataset was calculated as follows: 1 point for every correctly classified coin, cc (also for unknown coins which are classified as unknown) 0 points for every known coin which is not classified, cu (classified as unknown) 100 points for every wrongly classified coin, cw (a known coin which is wrongly classified or an unknown coin which is classified into one of the known classes). This is due to the specification of the problem: wrongly classified and hence wrongly sorted coins result in an excessive manual workload to correct the mis-classifications. It is therefore recommended that in case of doubt to classify a coin as unknown. 25 points for every coin type in the training set which is correctly classified at least once, co. This ensures that an algorithm that can only recognise a smaller number of coin types does not do so well. This gives a formula to calculate the final score: S = cc 1 + cu 0 + co 25 cw 100. (1)
4 cc cu co cw S (Eq. 1) CIS Maastricht Freiburg Table 1: Results of the MUSCLE CIS coin competition Benchmark cc correctly classified coin, cu known coins classified as unknown, co number of coin classes classified at least once, cw coins incorrectly classified. The top row gives the maximum number of points available in the competition. 4 Results A summary of the competition entries as well as how well they performed is presented here. More details on the algorithms are available in the further papers in these proceedings. 4.1 Participants Seven institutes registered during the initial registration period, which ran until two months before the program submission deadline. Three institutes submitted programs, of which two functioned correctly on the test data. These functioning programs were submitted by: Marco Reisert, Olaf Ronneberger and Hans Burkhardt of the Albert-Ludwig University in Freiburg, Germany and L. J. P. van der Maaten and P. J. Boon of Maastricht University, the Netherlands. 4.2 Evaluation The CIS competition dataset 2006 contains coins from 362 classes. 242 coins are unknown with respect to the training data set. Table 1 gives an overview of the results of the competition. Both programs met most of the criteria for the benchmark, i.e. a running program which performed the task within the time limit given. The Maastricht program failed by a small margin to classify at least 70% of the coins correctly. The recognition results from Freiburg are quite outstanding and the group clearly wins the competition. In particular there are no wrong classifications, which is very important in real life applications. The competition data 2006 as well as the ground truth and the detailed results are published on the MUSCLE Benchmark site. 5 Conclusion and future activities Now that we have a set of features for which it is known that good classification is possible, we would like to open these to the machine learning community as a test bed on which to develop algorithms which can handle a large number of classes. At the moment the images are classified by coin type. It would also be possible, for example, to relabel the coin images based on the designs printed on the coins. This would create classes
5 of faces, crowns, crosses, etc. A second coin recognition competition is planned for Here we will concentrate on classification in the presence of occlusion. The call for participation as well as the detailed specification of the MUSCLE CIS Coin Competition 2007 will be made available through the MUSCLE Benchmark site [1]. References [1] Muscle benchmark site. 2, 5 [2] M. Everingham, A. Zisserman, C. Williams, L. Van Gool, M. Allan, C. Bishop, O. Chapelle, N. Dalal, T. Deselaers, G. Dorko, S. Duffner, J. Eichhorn, J. Farquhar, M. Fritz, C. Garcia, T. Griffiths, F. Jurie, D. Keysers, M. Koskela, J. Laaksonen, D. Larlus, B. Leibe, H. Meng, H. Ney, B. Schiele, C. Schmid, E. Seemann, J. Shawe-Taylor, A. Storkey, S. Szedmak, B. Triggs, I. Ulusoy, V. Viitaniemi, and J. Zhang. The 2005 PASCAL visual object classes challenge. In Selected Proceedings of the First PASCAL Challenges Workshop. Springer- Verlag, 2006 (in press). 1 [3] Christian Fluhr, Pierre-Alain Moëllic, and Patrick Hède. ImagEVAL: Usage-oriented multimedia information retrieval evaluation. In Proceedings of the second MUSCLE/ImageCLEF Workshop on Image and Video Retrieval Evaluation, pages 3 8, Alicante, Spain, September [4] Reinhold Huber, Herbert Ramoser, Konrad Mayer, Harald Penz, and Michael Rubik. Classification of coins using an eigenspace approach. Pattern Recogn. Lett., 26(1):61 75, [5] Michael Nölle and Allan Hanbury. MUSCLE Coin Images Seibersdorf (CIS) Benchmark Competition IAPR Newsletter, 28(2):18 19, April [6] Michael Nölle, Harald Penz, Michael Rubik, Konrad Mayer, Igor Hollnder, and Reinhard Granec. Dagobert a new coin recognition and sorting system. In Proceedings of the 7th International Conference on Digital Image Computing - Techniques and Applications (DICTA 03). 2 [7] C. Peters, P. Clough, J. Gonzalo, G. J. F. Jones, M. Kluck, and B. Magnini, editors. Multilingual Information Access for Text, Speech and Images, volume 3491 of LNCS. Springer, [8] Arnold W. M. Smeulders, Marcel Worring, Simone Santini, Amarnath Gupta, and Ramesh Jain. Content-based image retrieval at the end of the early years. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(12): , December , 2
Bringing the algorithms to the data: cloud based benchmarking for medical image analysis
Bringing the algorithms to the data: cloud based benchmarking for medical image analysis Allan Hanbury 1, Henning Müller 2, Georg Langs 3, Marc André Weber 4, Bjoern H. Menze 5, and Tomas Salas Fernandez
More informationCOIN-O-MATIC: A fast system for reliable coin classification
COIN-O-MATIC: A fast system for reliable coin classification e-mail: L.J.P. van der Maaten P.J. Boon MICC-IKAT, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31)43-3883901
More informationApproaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval
Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information
More information3D Model based Object Class Detection in An Arbitrary View
3D Model based Object Class Detection in An Arbitrary View Pingkun Yan, Saad M. Khan, Mubarak Shah School of Electrical Engineering and Computer Science University of Central Florida http://www.eecs.ucf.edu/
More informationInteractive Flag Identification Using a Fuzzy-Neural Technique
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Interactive Flag Identification Using a Fuzzy-Neural Technique 1. Introduction Eduardo art, Sung-yuk Cha, Charles Tappert
More informationAn Efficient Gradient based Registration Technique for Coin Recognition
An Efficient Gradient based Registration Technique for Coin Recognition Marco Reisert, Olaf Ronneberger, Hans Burkhardt e-mail: Albert-Ludwig University Georges Koehler Allee 52 Tel. 0761/203-8267 reisert@informatik.uni-freiburg.de
More informationCIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet
CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet Muhammad Atif Qureshi 1,2, Arjumand Younus 1,2, Colm O Riordan 1,
More informationVEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS
VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS Norbert Buch 1, Mark Cracknell 2, James Orwell 1 and Sergio A. Velastin 1 1. Kingston University, Penrhyn Road, Kingston upon Thames, KT1 2EE,
More informationCees Snoek. Machine. Humans. Multimedia Archives. Euvision Technologies The Netherlands. University of Amsterdam The Netherlands. Tree.
Visual search: what's next? Cees Snoek University of Amsterdam The Netherlands Euvision Technologies The Netherlands Problem statement US flag Tree Aircraft Humans Dog Smoking Building Basketball Table
More informationThe Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationUniversity of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task
University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task Graham McDonald, Romain Deveaud, Richard McCreadie, Timothy Gollins, Craig Macdonald and Iadh Ounis School
More informationIntroducing diversity among the models of multi-label classification ensemble
Introducing diversity among the models of multi-label classification ensemble Lena Chekina, Lior Rokach and Bracha Shapira Ben-Gurion University of the Negev Dept. of Information Systems Engineering and
More informationMIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS
More informationData Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
More informationExplain the characteristics of different types of cost classifications and their use in costing.
Costs and Revenues Mapping of your evidence to outcomes and criteria Title (and reference number) Level 3 Principles of Costing (K) Learning outcomes learners will: Assessment criteria learners can: Your
More informationA Sarsa based Autonomous Stock Trading Agent
A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA achal@cs.utexas.edu Abstract This paper describes an autonomous
More informationHow To Create A Text Classification System For Spam Filtering
Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar
More informationMusic Mood Classification
Music Mood Classification CS 229 Project Report Jose Padial Ashish Goel Introduction The aim of the project was to develop a music mood classifier. There are many categories of mood into which songs may
More informationScalable Object Detection by Filter Compression with Regularized Sparse Coding
Scalable Object Detection by Filter Compression with Regularized Sparse Coding Ting-Hsuan Chao, Yen-Liang Lin, Yin-Hsi Kuo, and Winston H Hsu National Taiwan University, Taipei, Taiwan Abstract For practical
More informationIndustrial Challenges for Content-Based Image Retrieval
Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September 2005 www.ltutech.com LTU technologies Page 1 Agenda CBIR what is it good for? Technological challenges
More informationMining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
More informationPedestrian Detection with RCNN
Pedestrian Detection with RCNN Matthew Chen Department of Computer Science Stanford University mcc17@stanford.edu Abstract In this paper we evaluate the effectiveness of using a Region-based Convolutional
More informationWeb 3.0 image search: a World First
Web 3.0 image search: a World First The digital age has provided a virtually free worldwide digital distribution infrastructure through the internet. Many areas of commerce, government and academia have
More informationLecture 2: The SVM classifier
Lecture 2: The SVM classifier C19 Machine Learning Hilary 2015 A. Zisserman Review of linear classifiers Linear separability Perceptron Support Vector Machine (SVM) classifier Wide margin Cost function
More informationJournal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
More informationTypical programme structures for MSc programmes in the School of Computing Science
Typical programme structures for MSc programmes in the School of Computing Science 1 If you have a good degree in a subject other than computing: MSc Information Technology MSc Software Development 2 MSc
More informationKHRESMOI. Medical Information Analysis and Retrieval
KHRESMOI Medical Information Analysis and Retrieval Integrated Project Budget: EU Contribution: Partners: Duration: 10 Million Euro 8 Million Euro 12 Institutions 9 Countries 4 Years 1 Sep 2010-31 Aug
More informationMachine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
More informationMachine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer
Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next
More informationA.I. in health informatics lecture 1 introduction & stuff kevin small & byron wallace
A.I. in health informatics lecture 1 introduction & stuff kevin small & byron wallace what is this class about? health informatics managing and making sense of biomedical information but mostly from an
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationActive Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
More informationSearch Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
More informationCATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER
TECHNICAL SCIENCES Abbrev.: Techn. Sc., No 15(2), Y 2012 CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER Piotr Artiemjew, Przemysław Górecki, Krzysztof Sopyła
More informationThe goal is multiply object tracking by detection with application on pedestrians.
Coupled Detection and Trajectory Estimation for Multi-Object Tracking By B. Leibe, K. Schindler, L. Van Gool Presented By: Hanukaev Dmitri Lecturer: Prof. Daphna Wienshall The Goal The goal is multiply
More informationXQ:Maileon. Product Brochure. Advanced E-Mail-Marketing Technologies. Product Information. XQ:Maileon. Send better emails better
Advanced E-Mail-Marketing Technologies XQ:Maileon Product Brochure Product Information XQ:Maileon Send better emails better XQ:Maileon : High-end Email Marketing XQ:Maileon : Content Management XQ:Maileon
More informationIntroduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
More informationFOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS
FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS Leslie C.O. Tiong 1, David C.L. Ngo 2, and Yunli Lee 3 1 Sunway University, Malaysia,
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationData Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
More informationHow To Solve The Kd Cup 2010 Challenge
A Lightweight Solution to the Educational Data Mining Challenge Kun Liu Yan Xing Faculty of Automation Guangdong University of Technology Guangzhou, 510090, China catch0327@yahoo.com yanxing@gdut.edu.cn
More informationKnowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
More informationHelpDesk Product sheet
Product sheet Artologik is the tool for those who are looking for an easy to use but powerful program for support and ticket handling. With Artologik, it is easy to handle entered into the database, anyone
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationBig Data Anwendungen in Industrie und Forschung
Big Data Anwendungen in Industrie und Forschung Dr. Reinhard Stumptner +43 7236 3343 851 reinhard.stumptner@scch.at www.scch.at Das SCCH ist eine Initiative der Das SCCH befindet sich im SCCH Key Facts
More informationHow to Define Local Audit Periods and Add Local Audits
How to Define Local Audit Periods and Add Local Audits Scope: Organisation Administrators, Region Administrators, Organisation Group Administrators Screen overview - 1) TOP LEVEL MENU 2) ADD NEW BUTTON
More informationDublin City University at CLEF 2004: Experiments with the ImageCLEF St Andrew s Collection
Dublin City University at CLEF 2004: Experiments with the ImageCLEF St Andrew s Collection Gareth J. F. Jones, Declan Groves, Anna Khasin, Adenike Lam-Adesina, Bart Mellebeek. Andy Way School of Computing,
More informationBig Trouble. Does Big Data spell. for Lawyers? Presented to Colorado Bar Association, Communications & Technology Law Section Denver, Colorado
Does Big Data spell Big Trouble for Lawyers? Paul Karlzen Director HR Information & Analytics April 1, 2015 Presented to Colorado Bar Association, Communications & Technology Law Section Denver, Colorado
More informationExtend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia
More informationMachine Learning and Financial Advice
Faculty of Science Machine Learning and Financial Advice Christian Igel Department of Computer Science igel@diku.dk Slide 1/24 Outline 1 Machine Learning at DIKU 2 Example Applications in Finance 3 Risks
More informationDomain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
More informationSimultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University
More informationA Logistic Regression Approach to Ad Click Prediction
A Logistic Regression Approach to Ad Click Prediction Gouthami Kondakindi kondakin@usc.edu Satakshi Rana satakshr@usc.edu Aswin Rajkumar aswinraj@usc.edu Sai Kaushik Ponnekanti ponnekan@usc.edu Vinit Parakh
More informationInteractive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
More informationClassification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
More informationI WANT TO EXPAND & SECURE MY FUTURE WITH DIGITAL PRINTING
I WANT TO EXPAND & SECURE MY FUTURE WITH DIGITAL PRINTING COMMERCIAL PRINTER PRODUCTION PRINTING COMMERCIAL PRINTER PRODUCTION PRINTING 2 THE FUTURE LOOKS BRIGHT WITH DIGITAL PRINTING Konica Minolta successfully
More informationSoftware Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication
01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright
More informationMachine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
More informationActive Learning with Boosting for Spam Detection
Active Learning with Boosting for Spam Detection Nikhila Arkalgud Last update: March 22, 2008 Active Learning with Boosting for Spam Detection Last update: March 22, 2008 1 / 38 Outline 1 Spam Filters
More information203.4770: Introduction to Machine Learning Dr. Rita Osadchy
203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:
More informationA Software Framework for Risk-Aware Business Process Management
A Software Framework for Risk-Aware Business Management Raffaele Conforti 1, Marcello La Rosa 1,2, Arthur H.M. ter Hofstede 1,4, Giancarlo Fortino 3, Massimiliano de Leoni 4, Wil M.P. van der Aalst 4,1,
More informationKeep Decypha-ing! What s in it for You?
What s in it for You? Decypha is a comprehensive financial platform offering decision-enabling intelligence on the MENA region and even beyond. It has been designed using global best practices for investment
More informationIMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS
IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS Alexander Velizhev 1 (presenter) Roman Shapovalov 2 Konrad Schindler 3 1 Hexagon Technology Center, Heerbrugg, Switzerland 2 Graphics & Media
More informationA MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
More informationData Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
More informationData Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent
More informationBig Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More informationSales Performance Management Using Salesforce.com and Tableau 8 Desktop Professional & Server
Sales Performance Management Using Salesforce.com and Tableau 8 Desktop Professional & Server Author: Phil Gilles Sales Operations Analyst, Tableau Software March 2013 p2 Executive Summary Managing sales
More informationHow To Become A Data Scientist
Programme Specification Awarding Body/Institution Teaching Institution Queen Mary, University of London Queen Mary, University of London Name of Final Award and Programme Title Master of Science (MSc)
More informationCS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht milos@cs.pitt.edu 539 Sennott
More informationChapter 7. Feature Selection. 7.1 Introduction
Chapter 7 Feature Selection Feature selection is not used in the system classification experiments, which will be discussed in Chapter 8 and 9. However, as an autonomous system, OMEGA includes feature
More informationSPONSORS PACKAGES AND BENEFITS
SPONSORS PACKAGES AND BENEFITS Sponsorship benefits: Reinforce your brand Establish trust with customers and prospects Establish brand loyalty What we offer: Media exposure: we will mention you during
More informationRegistration and management system software available as open source
www.visceral.eu Registration and management system software available as open source Deliverable number D1.4 Dissemination level Public Delivery date 5 May 2015 Status Author(s) Final Oscar Alfonso Jiménez
More informationREVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
More informationDevelopment of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
More informationUniversities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/
promoting access to White Rose research papers Universities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/ This is an author produced version of a paper published in Advances in Information
More informationTECHNIQUES FOR OPTIMIZING THE RELATIONSHIP BETWEEN DATA STORAGE SPACE AND DATA RETRIEVAL TIME FOR LARGE DATABASES
Techniques For Optimizing The Relationship Between Data Storage Space And Data Retrieval Time For Large Databases TECHNIQUES FOR OPTIMIZING THE RELATIONSHIP BETWEEN DATA STORAGE SPACE AND DATA RETRIEVAL
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationA Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method
More informationHello and welcome to Feefo! Onboarding. Step One: Set up
This document provides a step by step guide to starting your journey with Feefo. It will explain how the process works, from your initial sign-up, through to Onboarding and your subsequent time with Feefo.
More informationBoosting. riedmiller@informatik.uni-freiburg.de
. Machine Learning Boosting Prof. Dr. Martin Riedmiller AG Maschinelles Lernen und Natürlichsprachliche Systeme Institut für Informatik Technische Fakultät Albert-Ludwigs-Universität Freiburg riedmiller@informatik.uni-freiburg.de
More informationMining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
More informationData Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
More informationClassifying Manipulation Primitives from Visual Data
Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if
More informationMAKING DECISIONS ABOUT MONEY INCLUSION IRELAND. Promoting the rights of people with an intellectual disability
MAKING DECISIONS ABOUT MONEY INCLUSION IRELAND Promoting the rights of people with an intellectual disability Contents CONTENTS What is Money? 2 What countries use the Euro? 3 Where do people get money
More informationIntroduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
More informationMachine Learning at DIKU
Faculty of Science Machine Learning at DIKU Christian Igel Department of Computer Science igel@diku.dk Slide 1/12 Machine learning Machine learning is a branch of computer science and applied statistics
More informationReporting of Transfers of Value to HCPs and HCOs Methodological Note for Reporting of 2015 Data in 2016
Reporting of Transfers of Value to HCPs and HCOs Methodological Note for Reporting of 2015 Data in 2016 AstraZeneca Österreich GmbH Schwarzenbergplatz 7, 1030 Wien Firmenbuch FN 51184x, HG Wien Contents
More informationHuman behavior analysis from videos using optical flow
L a b o r a t o i r e I n f o r m a t i q u e F o n d a m e n t a l e d e L i l l e Human behavior analysis from videos using optical flow Yassine Benabbas Directeur de thèse : Chabane Djeraba Multitel
More informationComputer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification
Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images
More informationJOB DESCRIPTION. 1. Management and day to day upkeep of our social media channels, website and other digital platforms (including video and audio)
JOB DESCRIPTION Post: Reporting to: Hours: Digital Communications and Marketing Assistant Head of Communications and Marketing 36 hours/52 weeks per annum Salary: Circa 22k to 25k Primary Job Purpose:
More informationFundamentals of Function Point Analysis
Fundamentals of Function Point Analysis By David@SoftwareMetrics.Com Abstract Systems continue to grow in size and complexity. They are becoming more and more difficult to understand. Improvement of coding
More informationIntroduction. Selim Aksoy. Bilkent University saksoy@cs.bilkent.edu.tr
Introduction Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr What is computer vision? What does it mean, to see? The plain man's answer (and Aristotle's, too)
More informationSegmentation of building models from dense 3D point-clouds
Segmentation of building models from dense 3D point-clouds Joachim Bauer, Konrad Karner, Konrad Schindler, Andreas Klaus, Christopher Zach VRVis Research Center for Virtual Reality and Visualization, Institute
More informationBig Data-Anwendungsbeispiele aus Industrie und Forschung
Big Data-Anwendungsbeispiele aus Industrie und Forschung Dr. Patrick Traxler +43 7236 3343 898 Patrick.traxler@scch.at www.scch.at Das SCCH ist eine Initiative der Das SCCH befindet sich im Organizational
More informationDocument Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
More informationNAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
More informationMLLP Transcription and Translation Platform
MLLP Transcription and Translation Platform Alejandro Pérez González de Martos, Joan Albert Silvestre-Cerdà, Juan Daniel Valor Miró, Jorge Civera, and Alfons Juan Universitat Politècnica de València, Camino
More information