Topological Data Analysis Applications to Computer Vision
|
|
|
- Jasper Gray
- 10 years ago
- Views:
Transcription
1 Topological Data Analysis Applications to Computer Vision Vitaliy Kurlin, Microsoft Research Cambridge and Durham University, UK
2 Topological Data Analysis quantifies topological structures in raw data. Topological persistence and simplification by Edelsbrunner, Letscher, Zomorodian, FOCS 00. Goal: also use machine learning and statistics.
3 Learning topology of data Stages of Topological Data Analysis (TDA): We need fast and stable under noise invariants.
4 What are data in theory? Data are finite metric spaces: noisy clouds of unorganized points with pairwise distances. A shape can be represented by a noisy sample, but we need a small structured description. Computer Vision: image in! description out.
5 Computer Vision problems Input: a matrix of grayscale (or RGB) values. Questions: how many objects, what are their boundaries, how do they relate to each other?
6 Image recognition: error 6.6% ImageNet database: > 14M images, > 21K classes. Best algorithm: deep neural network with 60M parameters. Animals: 2.8M in 3822 classes (723 per class). If we perturb 2% of pixels: a dog! an ostrich.
7 Life story of a cloud: scale = 0
8 Life story of a cloud: scale 1.1
9 Life story of a cloud: scale = 1.5
10 Life story of a cloud: scale = 2
11 Life story of a cloud: scale 2.6
12 From a cloud to some shape Def : the -offset of a cloud C R 2 is the union of closed balls C = [ p2c B(p; ) of a radius. Filtration C = C 0 C C +1 = R 2.
13 Complexes on data points Instead of balls, build complexes on points: add edges, triangles, tetrahedra, high-dim simplices. Def: the Čech complex Čh( ) has vertices at points of C and simplices spanned by vertices v 1,...,v k if \ k i=1 B(v i; ) 6= ;. The Vietoris-Rips complex VR( ) has simplices spanned by v 1,...,v k if distances d(v i, v j ) apple.
14 Preserving a homotopy type Nerve lemma: any union of balls [ n i=1 B(v i; ) continuously deforms to the complex Čh( ).
15 Single edge clustering of C A manual choice of the scale is needed: all points with d(p, q) apple 2 are in one cluster. Persistent components of VR 1 ( ) living over a long interval of are more natural clusters of C.
16 Past drawbacks of topology The scale for a cloud C R 2 can be unclear. Usual homology isn t stable under noise, which changes the number dim H 0 of components. But homology respects continuous f : X! Y, which always induce linear f k : H k (X)! H k (Y ).
17 Persistent homology Any filtration S( 1 ) S( 2 ) S( m ) of complexes induces linear maps in homology: H k (S( 1 ))! H k (S( 2 ))!!H k (S( m )). For i apple j, the persistent homology group is H i,j k = Im {H k(s( i ))! H k (S( j ))}, i,j k = rk Hi,j k µ i,j i,j 1 i,j k =( k k ) ( i 1,j 1 i 1,j k k ) lin. ind. classes were born in S( i ), died entering S( j ).
18 Barcodes are life spans H k (S( 1 ))! H k (S( 2 ))!!H k (S( m )) decomposes over Z 2 as a sum of easy modules 0! Z 2 (birth i ) id! id! Z 2 (death j )! 0 represented by a bar [ i, j ) in the scale -axis. µ i,j k is the number of bars with b = i, d = j. Classification of finitely generated modules ) all persistent homology is described the bar code, the bars [ i, j ) with multiplicities µ i,j k.
19 Bar code of a 1-variable function For f : M! R, we take S( ) =f 1 ( 1, ]. Components of sublevel sets have life intervals [b, d) =[birth,death) that form the bar code of f.
20 0D persistence diagram PD PD{S( )} {0 apple x apple y} R 2 is formed by {x = y} and (birth, death) with multiplicities.
21 1D persistence of -offsets C Pairs with high persistence are true contours. Pairs near the diagonal reflect noisy contours.
22 Bottleneck distance on diagrams Let P be {(x, x) 2 R 2 }[{a multi-set of points}. Def : d B (P, Q) =inf sup a2p a (a) over all 1-1 maps : P! Q is the bottleneck distance.
23 Stability of persistence Th (C-S, E, H 07): sublevel sets of f, g : R d! R have diagrams with d B (PD f, PD g ) apple f g 1. "-perturbation of f deforms PD f by at most ".
24 Computing persistence Standard algorithm: if a filtration {S( )} has u updates (simplices), find a normal form of the boundary matrix of a complex in time O(u 3 ). Th (M, M, S 11): the persistence diagram PD{S( )} of a filtration can be found in time O(M(u)+u 2 log 2 u), where M(u) =O(u ) is the time for multiplication of two u u matrices. Dimension 0: components of graphs are found via the union-find structure in time O(m (m)), where the largest graph G has m edges.
25 Delaunay triangulation DT(C) Def: for C = {p 1,...,p n } R 2, the Voronoi cell is V (p i )={q 2 R 2 : d(q, p i ) apple d(q, p j ), j 6= i}. Def: a Delaunay triangulation DT(C) is dual to the Voronoi cells and is found in time O(n log n).
26 -complexes C( ) on a cloud C Def: the -complex C( ) DT(C) has edges of length apple 2 and triangles of circumradius apple. C(0) C( ) C(+1) =DT(C).
27 From -offsets to -complexes Th (Edelsbrunner 95): any C deforms to C( ).
28 Graphs C ( ) dual to -complexes Cycles of C( ) R 2 correspond to connected components of the graph C ( ) dual to C( ). If is decreasing, then C( ) is shrinking from DT(C), the dual graph C ( ) is growing.
29 A union-find structure on C ( ) A cycle of C( ) is broken at an edge e $ 2 components of C ( ) merge at the edge e. O(n (n)) time for a union-find structure, where (n) is the slow inverse Ackermann function.
30 Running time for counting holes Corollary: for any n points C R 2, the 1-dim persistent homology (# independent cycles) of offsets C can be computed in time O(n log n).
31 Barcode and staircase: real cloud Right: rank H 1 (C ) for all. P(3 holes) 24%, P(2 holes) 13%, P(8 holes) 11%,...
32 Noisy samples of real shapes Def : C is any "-sample of X if C X ", X C ", so " is an upper bound of some arbitrary noise. Def :ashape is a compact subset X R 2. A hole is a bounded component of R 2 X. min (X) : when #holes of X starts changing. max (X) : when #holes of X stops changing.
33 Guarantees for counting holes Th (VK, CVPR 14): if C is an "-sample of an unknown shape X, min (X) > 1 2 max(x)+4", no new holes appear in X when is increasing, then our algorithm correctly finds # holes of X. Idea : diagram of X has a widest diagonal gap {y x < min }, which may become only a little bit thinner due to stability of persistence. We know how many holes a cloud C probably has. Question: where are these holes?
34 Maps and hand-drawn sketches Problem: complete all closed contours or paint all regions that they enclose (a segmentation). Motivations (and pictures) are from E. Saund. Finding perceptually closed paths. T-PAMI 03.
35 Computer Graphics application There can be no single ideal solution, but any user quickly drawing a sketch on a tablet might be happy with our fast automatic best guess : make contours close so that I can paint regions (a scale is easy to find, but we can t ask for it).
36 Input of auto-completion Input: a dotted 2D image of n sparse points without any user-defined parameters, no scale. Often a sequence of points is given, we solve the problem for any unstructured cloud C R 2.
37 Output of auto-completion Required output: most persistent contours.
38 Counting holes in C may be easy The graph G has H 1 of rank 36, hence any "-sample C of G will probably have 36 holes. How can we see that there are 36 holes in C?
39 Using stability of persistence We can find the widest diagonal gap separating 36 points from the rest of persistence diagram.
40 An initial segmentation of C Acute Delaunay triangle is a center of gravity. We attach all adjacent non-acute triangles to get an initial segmentation on the right hand side.
41 Harder than counting cycles Initial regions $ red dots in PD (too many). We separate 36 dots above the widest diagonal gap. We merge remaining dots with low persistence.
42 Merging initial regions When building PD{C }, we keep the adjacency relation for each older region (homology class that survives) and younger region that dies.
43 Simple vs non-simple graphs Def: G R 2 is simple if the boundary L of any bounded region in R 2 G has a radius (L) such that L is circular for < (L) and L for (L), so the hole in L dies at = (L).
44 Diagrams of simple graphs The diagram PD{G } of any simple graph has only (birth, death) =(0, ) in the vertical axis. For any "-sample C of G, a diagonal gap in PD{C } can become thinner by at most 4".
45 Noisy input! correct output Th (VK 14): let G R 2 be a simple graph with 0 < 1 apple apple m and 1 > 7" + max{ i+1 i }. For any "-sample C of G, the algorithm finds m expected contours, they are in the 2"-offset G 2".
46 Idea: the widest gap survives 1 > 7" + max{ i+1 i } says that the diagonal gap {0 < y x < 1 } is widest under noise. Also " max{birth} above the widest gap in PD{C }, hence all edges in a persistent contour L G have half-lengths apple ", so L C " G 2".
47 Fun: character recognition Handwritten characters can be topologically classified by comparing persistent homology arising from directional sweeps: we may count components in horizontal or vertical filtrations. Their 0-dim persistence diagrams are different.
48 Summary: TDA & applications unstructured data are a finite metric space on which we build simplicial complexes {filtration}!persistence diagram, which is stable under noise in the data or filtration counting holes in noisy 2D clouds in time O(n log n) with theoretical guarantees auto-completion of closed contours in 2D with a close geometric approximation
A fast and robust algorithm to count topologically persistent holes in noisy clouds
A fast and robust algorithm to count topologically persistent holes in noisy clouds Vitaliy Kurlin Durham University Department of Mathematical Sciences, Durham, DH1 3LE, United Kingdom [email protected],
Geometry and Topology from Point Cloud Data
Geometry and Topology from Point Cloud Data Tamal K. Dey Department of Computer Science and Engineering The Ohio State University Dey (2011) Geometry and Topology from Point Cloud Data WALCOM 11 1 / 51
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
Part-Based Recognition
Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
Data Fusion Enhancing NetFlow Graph Analytics
Data Fusion Enhancing NetFlow Graph Analytics EMILIE PURVINE, BRYAN OLSEN, CLIFF JOSLYN Pacific Northwest National Laboratory FloCon 2016 Outline Introduction NetFlow Windows Event Log data Remote Desktop
Visualization of General Defined Space Data
International Journal of Computer Graphics & Animation (IJCGA) Vol.3, No.4, October 013 Visualization of General Defined Space Data John R Rankin La Trobe University, Australia Abstract A new algorithm
Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
ORIENTATIONS. Contents
ORIENTATIONS Contents 1. Generators for H n R n, R n p 1 1. Generators for H n R n, R n p We ended last time by constructing explicit generators for H n D n, S n 1 by using an explicit n-simplex which
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar
A HYBRID APPROACH FOR AUTOMATED AREA AGGREGATION
A HYBRID APPROACH FOR AUTOMATED AREA AGGREGATION Zeshen Wang ESRI 380 NewYork Street Redlands CA 92373 [email protected] ABSTRACT Automated area aggregation, which is widely needed for mapping both natural
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
CS 5614: (Big) Data Management Systems. B. Aditya Prakash Lecture #18: Dimensionality Reduc7on
CS 5614: (Big) Data Management Systems B. Aditya Prakash Lecture #18: Dimensionality Reduc7on Dimensionality Reduc=on Assump=on: Data lies on or near a low d- dimensional subspace Axes of this subspace
Shortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
Solving Geometric Problems with the Rotating Calipers *
Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Similarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
High-dimensional labeled data analysis with Gabriel graphs
High-dimensional labeled data analysis with Gabriel graphs Michaël Aupetit CEA - DAM Département Analyse Surveillance Environnement BP 12-91680 - Bruyères-Le-Châtel, France Abstract. We propose the use
1 Local Brouwer degree
1 Local Brouwer degree Let D R n be an open set and f : S R n be continuous, D S and c R n. Suppose that the set f 1 (c) D is compact. (1) Then the local Brouwer degree of f at c in the set D is defined.
Computational Geometry. Lecture 1: Introduction and Convex Hulls
Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
Medical Information Management & Mining. You Chen Jan,15, 2013 [email protected]
Medical Information Management & Mining You Chen Jan,15, 2013 [email protected] 1 Trees Building Materials Trees cannot be used to build a house directly. How can we transform trees to building materials?
Data Mining. Cluster Analysis: Advanced Concepts and Algorithms
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 More Clustering Methods Prototype-based clustering Density-based clustering Graph-based
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
B490 Mining the Big Data. 2 Clustering
B490 Mining the Big Data 2 Clustering Qin Zhang 1-1 Motivations Group together similar documents/webpages/images/people/proteins/products One of the most important problems in machine learning, pattern
Visualization of 2D Domains
Visualization of 2D Domains This part of the visualization package is intended to supply a simple graphical interface for 2- dimensional finite element data structures. Furthermore, it is used as the low
Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park
NSF GRANT # 0727380 NSF PROGRAM NAME: Engineering Design Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park Atul Thakur
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Arrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
Intersection of a Line and a Convex. Hull of Points Cloud
Applied Mathematical Sciences, Vol. 7, 213, no. 13, 5139-5149 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ams.213.37372 Intersection of a Line and a Convex Hull of Points Cloud R. P. Koptelov
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Topological Data Analysis
INF563 Topological Data Analysis Steve Oudot, Mathieu Carrière {firstname.lastname}@inria.fr Context: The data deluge - Les donnees de ce type apparaissent dans des contextes scientifiques et industrie
Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014
Beyond Watson: Predictive Analytics and Big Data U.S. National Security Agency Research Directorate - R6 Technical Report February 3, 2014 300 years before Watson there was Euler! The first (Jeopardy!)
3. Reaction Diffusion Equations Consider the following ODE model for population growth
3. Reaction Diffusion Equations Consider the following ODE model for population growth u t a u t u t, u 0 u 0 where u t denotes the population size at time t, and a u plays the role of the population dependent
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
Modélisation et résolutions numérique et symbolique
Modélisation et résolutions numérique et symbolique via les logiciels Maple et Matlab Jeremy Berthomieu Mohab Safey El Din Stef Graillat [email protected] Outline Previous course: partial review of what
How To Create A Surface From Points On A Computer With A Marching Cube
Surface Reconstruction from a Point Cloud with Normals Landon Boyd and Massih Khorvash Department of Computer Science University of British Columbia,2366 Main Mall Vancouver, BC, V6T1Z4, Canada {blandon,khorvash}@cs.ubc.ca
Topological Data Analysis
Proceedings of Symposia in Applied Mathematics Topological Data Analysis Afra Zomorodian Abstract. Scientific data is often in the form of a finite set of noisy points, sampled from an unknown space, and
Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
A quick trip through geometrical shape comparison
A quick trip through geometrical shape comparison Patrizio Frosini 1,2 1 Department of Mathematics, University of Bologna, Italy 2 ARCES - Vision Mathematics Group, University of Bologna, Italy [email protected]
The Value of Visualization 2
The Value of Visualization 2 G Janacek -0.69 1.11-3.1 4.0 GJJ () Visualization 1 / 21 Parallel coordinates Parallel coordinates is a common way of visualising high-dimensional geometry and analysing multivariate
Fast approximation of the maximum area convex. subset for star-shaped polygons
Fast approximation of the maximum area convex subset for star-shaped polygons D. Coeurjolly 1 and J.-M. Chassery 2 1 Laboratoire LIRIS, CNRS FRE 2672 Université Claude Bernard Lyon 1, 43, Bd du 11 novembre
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
UNIFORMLY DISCONTINUOUS GROUPS OF ISOMETRIES OF THE PLANE
UNIFORMLY DISCONTINUOUS GROUPS OF ISOMETRIES OF THE PLANE NINA LEUNG Abstract. This paper discusses 2-dimensional locally Euclidean geometries and how these geometries can describe musical chords. Contents
Server Load Prediction
Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible
Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume *
Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Xiaosong Yang 1, Pheng Ann Heng 2, Zesheng Tang 3 1 Department of Computer Science and Technology, Tsinghua University, Beijing
How To Understand And Understand The Theory Of Computational Finance
This course consists of three separate modules. Coordinator: Omiros Papaspiliopoulos Module I: Machine Learning in Finance Lecturer: Argimiro Arratia, Universitat Politecnica de Catalunya and BGSE Overview
Taking Inverse Graphics Seriously
CSC2535: 2013 Advanced Machine Learning Taking Inverse Graphics Seriously Geoffrey Hinton Department of Computer Science University of Toronto The representation used by the neural nets that work best
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis]
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis] Stephan Spiegel and Sahin Albayrak DAI-Lab, Technische Universität Berlin, Ernst-Reuter-Platz 7,
Performance Metrics for Graph Mining Tasks
Performance Metrics for Graph Mining Tasks 1 Outline Introduction to Performance Metrics Supervised Learning Performance Metrics Unsupervised Learning Performance Metrics Optimizing Metrics Statistical
Efficient Storage, Compression and Transmission
Efficient Storage, Compression and Transmission of Complex 3D Models context & problem definition general framework & classification our new algorithm applications for digital documents Mesh Decimation
. Learn the number of classes and the structure of each class using similarity between unlabeled training patterns
Outline Part 1: of data clustering Non-Supervised Learning and Clustering : Problem formulation cluster analysis : Taxonomies of Clustering Techniques : Data types and Proximity Measures : Difficulties
Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants
Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society
Introduction to Topology
Introduction to Topology Tomoo Matsumura November 30, 2010 Contents 1 Topological spaces 3 1.1 Basis of a Topology......................................... 3 1.2 Comparing Topologies.......................................
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
PSEUDOARCS, PSEUDOCIRCLES, LAKES OF WADA AND GENERIC MAPS ON S 2
PSEUDOARCS, PSEUDOCIRCLES, LAKES OF WADA AND GENERIC MAPS ON S 2 Abstract. We prove a Bruckner-Garg type theorem for the fiber structure of a generic map from a continuum X into the unit interval I. We
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Clustering and mapper
June 17th, 2014 Overview Goal of talk Explain Mapper, which is the most widely used and most successful TDA technique. (At core of Ayasdi, TDA company founded by Gunnar Carlsson.) Basic idea: perform clustering
Solving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
Chapter 4: Artificial Neural Networks
Chapter 4: Artificial Neural Networks CS 536: Machine Learning Littman (Wu, TA) Administration icml-03: instructional Conference on Machine Learning http://www.cs.rutgers.edu/~mlittman/courses/ml03/icml03/
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Neural Gas for Surface Reconstruction
Neural Gas for Surface Reconstruction Markus Melato, Barbara Hammer, Kai Hormann IfI Technical Report Series IfI-07-08 Impressum Publisher: Institut für Informatik, Technische Universität Clausthal Julius-Albert
Part II Redundant Dictionaries and Pursuit Algorithms
Aisenstadt Chair Course CRM September 2009 Part II Redundant Dictionaries and Pursuit Algorithms Stéphane Mallat Centre de Mathématiques Appliquées Ecole Polytechnique Sparsity in Redundant Dictionaries
1 Norms and Vector Spaces
008.10.07.01 1 Norms and Vector Spaces Suppose we have a complex vector space V. A norm is a function f : V R which satisfies (i) f(x) 0 for all x V (ii) f(x + y) f(x) + f(y) for all x,y V (iii) f(λx)
Metric Spaces. Chapter 1
Chapter 1 Metric Spaces Many of the arguments you have seen in several variable calculus are almost identical to the corresponding arguments in one variable calculus, especially arguments concerning convergence
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Data Exploration Data Visualization
Data Exploration Data Visualization What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include Helping to select
ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite
ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
TOPOLOGY AND DATA GUNNAR CARLSSON
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 46, Number 2, April 2009, Pages 255 308 S 0273-0979(09)01249-X Article electronically published on January 29, 2009 TOPOLOGY AND DATA GUNNAR
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Wii Remote Calibration Using the Sensor Bar
Wii Remote Calibration Using the Sensor Bar Alparslan Yildiz Abdullah Akay Yusuf Sinan Akgul GIT Vision Lab - http://vision.gyte.edu.tr Gebze Institute of Technology Kocaeli, Turkey {yildiz, akay, akgul}@bilmuh.gyte.edu.tr
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
CS3220 Lecture Notes: QR factorization and orthogonal transformations
CS3220 Lecture Notes: QR factorization and orthogonal transformations Steve Marschner Cornell University 11 March 2009 In this lecture I ll talk about orthogonal matrices and their properties, discuss
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Support Vector Machine. Tutorial. (and Statistical Learning Theory)
Support Vector Machine (and Statistical Learning Theory) Tutorial Jason Weston NEC Labs America 4 Independence Way, Princeton, USA. [email protected] 1 Support Vector Machines: history SVMs introduced
Design of LDPC codes
Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code
We shall turn our attention to solving linear systems of equations. Ax = b
59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system
Learning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal
Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
NMR Measurement of T1-T2 Spectra with Partial Measurements using Compressive Sensing
NMR Measurement of T1-T2 Spectra with Partial Measurements using Compressive Sensing Alex Cloninger Norbert Wiener Center Department of Mathematics University of Maryland, College Park http://www.norbertwiener.umd.edu
Nonlinear Iterative Partial Least Squares Method
Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for
Statistical machine learning, high dimension and big data
Statistical machine learning, high dimension and big data S. Gaïffas 1 14 mars 2014 1 CMAP - Ecole Polytechnique Agenda for today Divide and Conquer principle for collaborative filtering Graphical modelling,
Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina [email protected]
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina [email protected] 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
