Face Recognition Software using the LDA Algorithm
|
|
- Vincent Fox
- 7 years ago
- Views:
Transcription
1 Face Recognition Software using the LDA Algorithm Sumit Sampat, Mohammad Murtuza, and Mohammad Anwar Abstract: The essential task in face recognition system is dimensionality reduction. We implement the linear discriminant analysis or Fisherfaces method to reduce the dimensionality and recognize facial images. LDA algorithm addresses the small sample size problem found in the Eigenfaces approach. Advantages of alternative approaches such as D-LDA and DF-LDA are discussed. We use only frontal images in the FERET dataset. We also discuss software we developed that implements LDA. Finally, we analyze the results for a varying set of images. Index Terms: Eigenfaces, Fisherfaces, linear discriminant analysis (LDA), Direct LDA, Direct Fractional LDA, principle component analysis (PCA), FERET dataset, face recognition, biometrics. 1. Introduction A number of biometrics have been proposed for making human recognition an automated task. Face is an important biometric and a large amount of research is being done in face recognition. First let us distinguish between face recognition and face verification. The latter deals with confirming a persons identity and is a one to one problem whereas the former deals in establishing a person s identity and is a one to many problem. [3] A number of algorithms have been proposed for face recognition in the appearance based approach to avoid difficulties with threedimensional (3-D) modeling. Principle component analysis (PCA) or Eigenfaces and linear discriminant analysis (LDA) are powerful tools used for data reduction and feature extraction. [1] The Eigenface method is based on the linearly projecting the image space to a low dimensional feature space. However the Eigenface approach uses principal component analysis (PCA) for dimensionality reduction. This yields projection directions that maximize the total scatter across all classes, i.e., across all images of all faces. Eigenfaces focus on the most expressive features (MEF) which mainly achieves object reconstruction. Thus, in PCA significant discriminatory information is lost. [2] Fisherfaces or the linear discriminant analysis (LDA) focuses on the most discriminant features (MDF) to achieve better classification accuracy. LDA maximizes the between class scatter and minimizes the within class scatter to 1
2 separate classes and have images of the same class closer to each other. [1], [2] Degenerated scatter matrices exist due to the so called small sample size (SSS) problem. The SSS problem widely exists in face recognition tasks where the number of training samples is smaller than the dimensionality of the samples. The traditional solution to the SSS problem requires the incorporation of a PCA step into the LDA framework. In this approach, the PCA is used as a preprocessing step for dimensionality reduction to discard the null space matrix of the training data set LDA is then performed on the lower dimensional PCA subspace. Some amount of information is lost due to the PCA step. To overcome this problem an alternative algorithm D-LDA is proposed which eliminates the PCA step. Thus, significant discriminatory information is preserved. A fractional LDA (F-LDA) step is further applied to reduce the dimension in a few fractional steps allowing for relevant distances to be accurately weighted. The combination of both these algorithms gives rise to a new direct fractional LDA (DF- LDA) algorithm. However, we concentrate on the traditional LDA or Fisherfaces approach and analyze its performance. [1] 2. Fisherfaces Approach A set of L training images x 1, x 2 x L of size 150 x 130 (height x width) are the input to the face recognition task. This matrix is represented as a vector of length N (height x width) obtaining a dimensionality of for the images in the FERET dataset. A set of c classes is arbitrarily chosen, which in our case is 20, 40 or 60 to analyze the performance of the LDA algorithm. L i is the number of images in each class and varies for each class. Thus, there are x i L images which belong to X i c classes. The idea is to reduce the dimensionality using the PCA step from N to N-c and then perform LDA to reduce the dimensionality of the subspace to c-1. Initially, it is necessary to calculate the mean of each class μ i and the overall mean μ of all images. Mean of each class μ i, L 1 i µ i = x j (1) L i j= 1 Mean of overall images μ, 1 c i µ = µ (2) c i= 1 Mean centered images Ф are calculated by subtracting the images from the overall mean μ. Ф = X μ (3) The PCA step is now applied to reduce the dimensionality to N-c Eigenvectors of the mean centered images E are calculated and the Eigenspace is calculated by multiplying the eigenvectors E with the mean centered images Ф. 2
3 LDA maximizes the ratio between the between class scatter matrix S B and the within class scatter matrix S W for better classification. The between class scatter matrix S B is computed as c S = L ( µ µ )( µ µ ) Τ (4) B i i i i= 1 The within class scatter matrix S w is computed as c T w k i k i i= 1 xk Xi (5) S = ( x µ )( x µ ) The size of the scatter matrices is N x N. Since S w is non singular its inverse exists. Thus we, need to calculate the eigenvectors of S w -1 S B. Since the size of this matrix is N x N the eigenvectors U of this matrix based on c-1 largest eigenvalues are computed. The Fisherfaces Ω are calculated by multiplying the eigenvectors U with the mean centered images Ф. The Fisherfaces are projected on the PCA subspace on the reduced Fisherspace. [1], [2], [4] 3. LDA Analysis Tool The FERET Dataset is an image database that consists of over 14,000 images of 1,200 individuals. Pictures of these individuals were taken at various angles and expressions. Our analysis of the Linear Discriminant Analysis (LDA) algorithm focused on the frontal position subset. As a reference, we used Colorado State University s source to implement the standard LDA algorithm [5]. We ported some of the source to the.net framework for rapid development of our LDA analysis tool. Our program features a visual interface for training, testing, image distance graphing, 2d and 3d plotting, and a webcam interface. Each image needs to normalized before they can be trained. Figure 1 is an example of a before and after picture of a normalized image. The reason for normalizing is to get rid of background noise, unnecessary detail, and equalizing the image s histogram. Figure 1. Results of normalization an image. After images are normalized they are ready to be trained and tested on. Our tool allows the user to visually pick which images they want to train and test. The first step is to create a SRT file which is a text file with a list of images. Each line in the training SRT files is a class, and class can consist of multiple images of the same person. Figure 3
4 A1 in the appendix shows the user interface. After training, a training file is saved which stores the eigenvalues, the mean of training images, and basis vectors [5]. The next step is to create a testing SRT file which is the union of test images and trained images from the previous step. After testing, distance files are generated for each image and its Euclidean distance to all other images in the set. To visualize the distance from each image to each class in the set, we created a concentric circle graph where each circle s radius is the distance from an image to other classes. This is done by calculated the average distance of a class and plotting its point as the radius of a circle with the origin being the current image plotted at (0,0). Figure A2 in the appendix display s this feature in detail. In order to view how images are clustered together in subspace you need to plot each image and maintain distances between each point. This is done using principle coordinate analysis. We used distpcoa [6] to read in the distance matrix of a testing session which is the concatenation of all the distance files contents to form a matrix. The output is a 2 and 3 dimensional axis listing for each image. A simple proof of method is shown in figure Figure 2. An example of using a distance matrix of a triangle and using distpcoa to find a set of points in subspace while maintaining the original distances between points. After the two and three dimensional coordinates are generated, we plot them accordingly onto a 2d and 3d plot as shown in figure 3. a b c a b c Distance matrix 2d coordinates generated by distpcoa x y a b c Verifying original distance d(a,b)=sqrt(( )^2+( )^2)=3 d(b,c)=sqrt(( )^2+( )^2)=5 d(a,c)=sqrt(( )^2+( )^2)=4 4
5 Figure 3. 2d plot of a 400 images grouped into 60 classes. There are some clear clusters and some with clusters overlapping. Figure A3 in the appendix shows the user interface for this graph and a 3d graph. We decided to include a webcam interface to allow anyone to test their own face with the LDA algorithm analysis system. Any windows compatible webcam can be used. After capturing a picture of the user, they manually set the eye coordinates on their face and add it to an eye coordinates list. Figure A4 in the appendix shows the webcam user interface. From there they normalize the image to prepare it so it can be accepted for training and testing (Figure A5 in the appendix). 4. Experimental Results We trained and tested 20, 40, and 60 classes from the FERET database. Each image is 130x150 pixels, making N = 19500, which is the size of the subspace and the total number of pixels in the image. Table 1 shows our analysis of the LDA algorithm with the frontal images from the FERET dataset. As the number of classes grow, the better the classifying of a test image in the trained subspace as shown in Figure 4. Correct Test Image Classifying Success Rate 84% 82% 80% 78% 76% 74% 72% 70% Classes Figure 4. Increasing the number of classes for training and testing results in better recognition. 5. Conclusion The feature extraction method utilized here is the well known linear discriminant analysis or Fisherfaces approach. This method is applied to the FERET dataset and is analyzed on 20, 40 and 60 classes. The results are discussed in the experimental section and it shows that the accuracy increases as the number of classes increase. Only frontal images were used. Thus the experiment can be extended to different poses. The presence of glasses and various expressions are considered. And the classes trained images test images correct wrong total % success % Table The 201 number of classes 41 and 32 their corresponding 9 41 number 78% of training/test 60 images 305 and the 90 success rate % 5
6 performance is analyzed on the dataset. The algorithm has limitations wherein significant discriminatory information is lost due to the PCA step. Alternative methods such as DF- LDA can be applied for better classification accuracy to avoid the mentioned problem. 6. References [1] Juwei Lu, Kostantinos N. Plataniotis, and Anastasios N. Venetsanopoulos, Face Recognition Using LDA-Based Algorithms, IEEE TRANSACTIONS ON NUERAL NETWORKS, vol. 14, No. 1, pp , January [2] Peter N. Belhumeur, Joao P. Hespanha, and David J. Kriegman, Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, Vol. 19, No. 7, pp , July [3] Jain, Anil K.; Bolle, Ruud.; Pankanti, Sharath, Biometrics : Personal Identification in Networked Society, [4] Dr. Pavlidis, Cosc 6397 Lectures, University of Houston, Spring [5]. Evaluation of Face Recognition Algorithms. Colorado State University. [6]. Legendre, Pierre. DistCoA Algorithm. o/distpcoa.html 6
7 Screenshot Appendix Figure A1. In the training step, the user can visually select the files they want to train and which files they want to leave out for testing. Above, the highlighted files are the files selected for training, the others are left for testing. 7
8 Figure A2. Image to class distance graph the current image is represented by the letter x on the graph. Each concentric circle is the normalized class distance from the current image. In this example, image 90009ahmed_2 is represented by x and it is correctly closest to class 9. The last class listed in the second list box proves this as the distance is the minimum of all classes listed. The highlighted images (test images) are calculated by taking the symmetric difference of the training SRT file listing and the testing SRT file listing. The training file are user selected files for training, and the testing file are all files in the image set. By taking the symmetric difference, you are left with test images. 8
9 Figure A3. 2d and 3d plots for a 60 class training/testing session. This allows the user to see the clustering of images into classes and visualize how the algorithm is doing when trying to maximize the between class scatter and minimizing the with class scatter. 9
10 Figure A4. The webcam feature allows anyone with a webcam to capture their face and create their own eye-ordinate files which is later used for normalizing. The eye coordinates are selected by clicking on the picture s right and left eye. 10
11 Figure A5. After capturing pictures, it is necessary to normalize them to get rid of the background, noise, and to focus only on the face as shown above. 11
Adaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
More informationSYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
More informationPrincipal components analysis
CS229 Lecture notes Andrew Ng Part XI Principal components analysis In our discussion of factor analysis, we gave a way to model data x R n as approximately lying in some k-dimension subspace, where k
More informationComponent Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
More informationA comparative study on face recognition techniques and neural network
A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University mrahma12@masonlive.gmu.edu In modern times, face
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationIndex Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
More informationUnsupervised and supervised dimension reduction: Algorithms and connections
Unsupervised and supervised dimension reduction: Algorithms and connections Jieping Ye Department of Computer Science and Engineering Evolutionary Functional Genomics Center The Biodesign Institute Arizona
More informationComparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
More informationEM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationOrthogonal Diagonalization of Symmetric Matrices
MATH10212 Linear Algebra Brief lecture notes 57 Gram Schmidt Process enables us to find an orthogonal basis of a subspace. Let u 1,..., u k be a basis of a subspace V of R n. We begin the process of finding
More information15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
More informationby the matrix A results in a vector which is a reflection of the given
Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More information1816 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006. Principal Components Null Space Analysis for Image and Video Classification
1816 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006 Principal Components Null Space Analysis for Image and Video Classification Namrata Vaswani, Member, IEEE, and Rama Chellappa, Fellow,
More informationFacebook Friend Suggestion Eytan Daniyalzade and Tim Lipus
Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationSubspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft
More informationWhat is the Right Illumination Normalization for Face Recognition?
What is the Right Illumination Normalization for Face Recognition? Aishat Mahmoud Dan-ali Department of Computer Science and Engineering The American University in Cairo AUC Avenue, P.O. Box 74, New Cairo
More informationSupervised Feature Selection & Unsupervised Dimensionality Reduction
Supervised Feature Selection & Unsupervised Dimensionality Reduction Feature Subset Selection Supervised: class labels are given Select a subset of the problem features Why? Redundant features much or
More informationStatistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results
Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results Kresimir Delac 1, Mislav Grgic 2 and Sonja Grgic 2 1 Croatian Telecom, Savska 32, Zagreb, Croatia,
More informationPalmprint Recognition with PCA and ICA
Abstract Palmprint Recognition with PCA and ICA Tee Connie, Andrew Teoh, Michael Goh, David Ngo Faculty of Information Sciences and Technology, Multimedia University, Melaka, Malaysia tee.connie@mmu.edu.my
More informationFeature Selection vs. Extraction
Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small
More informationILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis
ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM Qian Tao, Raymond Veldhuis Signals and Systems Group, Faculty of EEMCS University of Twente, the Netherlands
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationA Comparison of Photometric Normalisation Algorithms for Face Verification
A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,
More informationReview Jeopardy. Blue vs. Orange. Review Jeopardy
Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?
More informationPrincipal Gabor Filters for Face Recognition
Principal Gabor Filters for Face Recognition Vitomir Štruc, Rok Gajšek and Nikola Pavešić Abstract Gabor filters have proven themselves to be a powerful tool for facial feature extraction. An abundance
More informationManifold Learning Examples PCA, LLE and ISOMAP
Manifold Learning Examples PCA, LLE and ISOMAP Dan Ventura October 14, 28 Abstract We try to give a helpful concrete example that demonstrates how to use PCA, LLE and Isomap, attempts to provide some intuition
More informationIllumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Shireesha Chintalapati #1, M. V. Raghunadh *2 Department of E and CE NIT Warangal, Andhra
More informationPrentice Hall Mathematics: Course 1 2008 Correlated to: Arizona Academic Standards for Mathematics (Grades 6)
PO 1. Express fractions as ratios, comparing two whole numbers (e.g., ¾ is equivalent to 3:4 and 3 to 4). Strand 1: Number Sense and Operations Every student should understand and use all concepts and
More informationIndependent Comparative Study of PCA, ICA, and LDA on the FERET Data Set
Independent Comparative Study of PCA, ICA, and LDA on the FERET Data Set Kresimir Delac, Mislav Grgic, Sonja Grgic University of Zagreb, FER, Unska 3/XII, Zagreb, Croatia Received 28 December 2004; accepted
More informationThink of the beards as a layer on top of the face rather than part of the face itself. Using
Tyler Ambroziak Ryan Fox CS 638-1 (Dyer) Spring 2010 Virtual Barber Abstract What would you look like without a beard? Or how about with a different type of beard? Think of the beards as a layer on top
More informationFuzzy based Pixel wise Information Extraction for Face Recognition
Fuzzy based Pixel wise Information Extraction for Face Recognition Virendra P. Vishwakarma, Member, IACSIT, Sujata Pandey, Member, IEEE and M. N. Gupta Abstract This paper brings out a new approach of
More informationLinear Algebra Review. Vectors
Linear Algebra Review By Tim K. Marks UCSD Borrows heavily from: Jana Kosecka kosecka@cs.gmu.edu http://cs.gmu.edu/~kosecka/cs682.html Virginia de Sa Cogsci 8F Linear Algebra review UCSD Vectors The length
More informationHow To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
More information1 Introduction to Matrices
1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationA Nonparametric Statistical Comparison of Principal Component and Linear Discriminant Subspaces for Face Recognition
A Nonparametric Statistical Comparison of Principal Component and Linear Discriminant Subspaces for Face Recognition J Ross Beveridge, Kai She and Bruce A Draper Geof H Givens Computer Science Department
More informationAccess control: adaptation and real time implantation of a face recognition method.
Access control: adaptation and real time implantation of a face recognition method. J. Mitéran, J.P. Zimmer, F. Yang, M. Paindavoine. Laboratory Le2i, University of Burgundy, Aile des Sciences de l'ingénieur,
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationFrom Few to Many: Illumination Cone Models for Face Recognition Under Variable Lighting and Pose. Abstract
To Appear in the IEEE Trans. on Pattern Analysis and Machine Intelligence From Few to Many: Illumination Cone Models for Face Recognition Under Variable Lighting and Pose Athinodoros S. Georghiades Peter
More informationChapter ML:XI (continued)
Chapter ML:XI (continued) XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained
More informationTHREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering
More informationServer Load Prediction
Server Load Prediction Suthee Chaidaroon (unsuthee@stanford.edu) Joon Yeong Kim (kim64@stanford.edu) Jonghan Seo (jonghan@stanford.edu) Abstract Estimating server load average is one of the methods that
More informationT-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577
T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier Santosh Tirunagari : 245577 January 20, 2011 Abstract This term project gives a solution how to classify an email as spam or
More informationData Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining
Data Mining: Exploring Data Lecture Notes for Chapter 3 Introduction to Data Mining by Tan, Steinbach, Kumar What is data exploration? A preliminary exploration of the data to better understand its characteristics.
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationBig Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
More informationFinal Project Report
CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes
More informationARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationSimilarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
More informationSupervised and unsupervised learning - 1
Chapter 3 Supervised and unsupervised learning - 1 3.1 Introduction The science of learning plays a key role in the field of statistics, data mining, artificial intelligence, intersecting with areas in
More informationStatistical Data Mining. Practical Assignment 3 Discriminant Analysis and Decision Trees
Statistical Data Mining Practical Assignment 3 Discriminant Analysis and Decision Trees In this practical we discuss linear and quadratic discriminant analysis and tree-based classification techniques.
More informationImage Analytics on Big Data In Motion Implementation of Image Analytics CCL in Apache Kafka and Storm
Image Analytics on Big Data In Motion Implementation of Image Analytics CCL in Apache Kafka and Storm Lokesh Babu Rao 1 C. Elayaraja 2 1PG Student, Dept. of ECE, Dhaanish Ahmed College of Engineering,
More informationCROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES
Proceedings of the 2 nd Workshop of the EARSeL SIG on Land Use and Land Cover CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES Sebastian Mader
More informationOrthogonal Projections
Orthogonal Projections and Reflections (with exercises) by D. Klain Version.. Corrections and comments are welcome! Orthogonal Projections Let X,..., X k be a family of linearly independent (column) vectors
More informationCapacity of an RCE-based Hamming Associative Memory for Human Face Recognition
Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition Paul Watta Department of Electrical & Computer Engineering University of Michigan-Dearborn Dearborn, MI 48128 watta@umich.edu
More informationGraphical Representation of Multivariate Data
Graphical Representation of Multivariate Data One difficulty with multivariate data is their visualization, in particular when p > 3. At the very least, we can construct pairwise scatter plots of variables.
More informationOpen-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
More informationHigh-Dimensional Data Visualization by PCA and LDA
High-Dimensional Data Visualization by PCA and LDA Chaur-Chin Chen Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan Abbie Hsu Institute of Information Systems & Applications,
More informationFactor Analysis. Chapter 420. Introduction
Chapter 420 Introduction (FA) is an exploratory technique applied to a set of observed variables that seeks to find underlying factors (subsets of variables) from which the observed variables were generated.
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationEnvironmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
More informationTensor Methods for Machine Learning, Computer Vision, and Computer Graphics
Tensor Methods for Machine Learning, Computer Vision, and Computer Graphics Part I: Factorizations and Statistical Modeling/Inference Amnon Shashua School of Computer Science & Eng. The Hebrew University
More informationComputer Vision Based Employee Activities Analysis
Volume 03 Issue 05, September 2014 Computer Vision Based Employee Activities Analysis Md. Zahangir Alom, Nabil Tahmidul Karim, Shovon Paulinus Rozario *, Md. Rezwanul Hoque, Md. Rumman Bin Ashraf, Saikat
More informationNeural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
More informationPredicting Flight Delays
Predicting Flight Delays Dieterich Lawson jdlawson@stanford.edu William Castillo will.castillo@stanford.edu Introduction Every year approximately 20% of airline flights are delayed or cancelled, costing
More informationTutorial on Exploratory Data Analysis
Tutorial on Exploratory Data Analysis Julie Josse, François Husson, Sébastien Lê julie.josse at agrocampus-ouest.fr francois.husson at agrocampus-ouest.fr Applied Mathematics Department, Agrocampus Ouest
More informationNonlinear Iterative Partial Least Squares Method
Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for
More informationIris Sample Data Set. Basic Visualization Techniques: Charts, Graphs and Maps. Summary Statistics. Frequency and Mode
Iris Sample Data Set Basic Visualization Techniques: Charts, Graphs and Maps CS598 Information Visualization Spring 2010 Many of the exploratory data techniques are illustrated with the Iris Plant data
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationAdaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering
IV International Congress on Ultra Modern Telecommunications and Control Systems 22 Adaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering Antti Juvonen, Tuomo
More informationMulti-class Classification: A Coding Based Space Partitioning
Multi-class Classification: A Coding Based Space Partitioning Sohrab Ferdowsi, Svyatoslav Voloshynovskiy, Marcin Gabryel, and Marcin Korytkowski University of Geneva, Centre Universitaire d Informatique,
More informationVision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu gramos@clemson.edu dshu@clemson.edu Abstract A vehicle tracking and grouping algorithm is presented in this work
More informationMAT 242 Test 2 SOLUTIONS, FORM T
MAT 242 Test 2 SOLUTIONS, FORM T 5 3 5 3 3 3 3. Let v =, v 5 2 =, v 3 =, and v 5 4 =. 3 3 7 3 a. [ points] The set { v, v 2, v 3, v 4 } is linearly dependent. Find a nontrivial linear combination of these
More informationData, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationNOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
More informationFace Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationColour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
More informationLow-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
More informationGalaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
More informationAutomatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
More information3 An Illustrative Example
Objectives An Illustrative Example Objectives - Theory and Examples -2 Problem Statement -2 Perceptron - Two-Input Case -4 Pattern Recognition Example -5 Hamming Network -8 Feedforward Layer -8 Recurrent
More informationData Exploration Data Visualization
Data Exploration Data Visualization What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include Helping to select
More informationLINEAR ALGEBRA. September 23, 2010
LINEAR ALGEBRA September 3, 00 Contents 0. LU-decomposition.................................... 0. Inverses and Transposes................................. 0.3 Column Spaces and NullSpaces.............................
More informationAPPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder
APPM4720/5720: Fast algorithms for big data Gunnar Martinsson The University of Colorado at Boulder Course objectives: The purpose of this course is to teach efficient algorithms for processing very large
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationDocument Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
More informationA Scheme of Human Face Recognition in Complex Environments
A Scheme of Human Face Recognition in Complex Environments WEI CUI A thesis submitted to Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of Computer
More informationExtend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia
More information