Instant Access to (Ebook) Recent Trends in Computer Applications: Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE by Jihad Mohamad Alja’am, Abdulmotaleb El Saddik, Abdul Hamid Sadka ISBN 9783319899138, 9783319899145, 3319899139, 3319899147 ebook Full Chapters
Instant Access to (Ebook) Recent Trends in Computer Applications: Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE by Jihad Mohamad Alja’am, Abdulmotaleb El Saddik, Abdul Hamid Sadka ISBN 9783319899138, 9783319899145, 3319899139, 3319899147 ebook Full Chapters
com
OR CLICK HERE
DOWLOAD EBOOK
(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles, James ISBN
9781459699816, 9781743365571, 9781925268492, 1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
ebooknice.com
(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena Alfredsson, Hans Heikne, Sanna
Bodemyr ISBN 9789127456600, 9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312
ebooknice.com
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II Success) by Peterson's
ISBN 9780768906677, 0768906679
https://ebooknice.com/product/sat-ii-success-math-1c-and-2c-2002-peterson-s-sat-
ii-success-1722018
ebooknice.com
(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT Subject Test: Math
Levels 1 & 2) by Arco ISBN 9780768923049, 0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-arco-master-
the-sat-subject-test-math-levels-1-2-2326094
ebooknice.com
(Ebook) Cambridge IGCSE and O Level History Workbook 2C - Depth Study: the United
States, 1919-41 2nd Edition by Benjamin Harrison ISBN 9781398375147, 9781398375048,
1398375144, 1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
ebooknice.com
ebooknice.com
ebooknice.com
ebooknice.com
ebooknice.com
Jihad Mohamad Alja’am
Abdulmotaleb El Saddik
Abdul Hamid Sadka Editors
Recent Trends
in Computer
Applications
Best Studies from the 2017
International Conference on Computer
and Applications, Dubai, UAE
Recent Trends in Computer Applications
Jihad Mohamad Alja’am •
Abdulmotaleb El Saddik • Abdul Hamid Sadka
Editors
123
Editors
Jihad Mohamad Alja’am Abdulmotaleb El Saddik
Computer Science and Engineering Faculty of Engineering
Qatar University University of Ottawa
Doha, Qatar Ottawa
Ontario, Canada
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Foreword
By the turn of the second millennium, it became clear that computers (and more
broadly intelligent machines) are becoming the focus of science and technology
for the next few decades to come. This book introduces the reader to the realm of
the most recent trends in the area of computer applications, with a special focus
on sustainable development, marking this important trend during the first decades
of the third millennium. The broad scope of the book is by design as the editors
and authors introduce a wide scope of application fields where modern computing
brought about several paradigm shifts in the way data is analysed, managed and
visualised.
Already a decade ago, the notion of Big Data was introduced, and since then
new scientific and technical challenges were formulated and efficient solutions
have been proposed. Big Data was later cast in the framework of decision-making
environments, in which theories, algorithms, methods and systems have been
developed to efficiently map data into decisions. Data-driven and data-intensive
computer applications have since been developed in a number of areas, including,
but not limited to, media (both audio and visual), healthcare, robotics, security,
web applications and web interfaces. Conceptually, data handling strategy can
conveniently be presented as a three-layered scheme, in which the first layer
interfaces with raw data (computer-generated, time series, sensor data, etc.) and
offers various ways to represent, clean, abstract and possibly augment the source
data. The second layer hosts methods and algorithms for analytics, management
and visualisation of the processed data. And finally, the third layer links the results
of the second layer to a specific application, that is, it interfaces with the real-
world application domain. Most of the contributions in this book cover one or
more of these layers targeting a specific application domain. As the amount of
data keeps increasing exponentially and the demand of split (real-time) decision
is becoming more imminent, the key challenges we are facing today include
scalability, efficiency and real-time performance.
The book is recommended to the tech-savvy managers as well as engineers,
technicians and researchers in various fields of computer applications. It is rather
seldom we come across a reference where such an overwhelming amount of
v
vi Foreword
vii
viii Preface
is equipped with a sufficient level of scientific originality, depth and rigour into a
cluster of technological trends and most recent research developments in multimedia
data handling and manipulation, with computer applications in perspective.
This book would not have been possible without the hard work of all the authors.
I am especially indebted to Prof. Abdul Hamid Sadka and Prof. Abdulmotaleb El
Saddik who worked hard to select the best submitted chapters to be included in
this book. I am grateful to all reviewers who spent a lot of time in the peer-review
process to improve the quality of the accepted chapters. Each reviewer has provided
excellent and professional scientific guidance for the authors to refine their works
to meet the scientific standard. I am indebted to Dr. Nabil Khelifi (Senior Editor—
Springer) who trusted me to lead this project successfully. Many thanks also for
Reyhaneh Majidi (Springer DE) who has always been very supportive. Finally, I
really appreciate the hard work of my assistant Dana Bandock who allocated an
important part of her time in the management for the successful completion of this
book.
xi
Visit https://ebooknice.com to
discover a wide range of
eBooks across various genres.
Enjoy exclusive deals and
discounts to enhance your
reading experience. Start your
digital reading journey today!
Contents
xiii
xiv Contents
1 Introduction
The first part of this chapter defines important terms and notations in the
field. The second shows a survey on the most important and recent sequential
mining algorithms according to a clear classification. Lastly, the chapter concludes
with a classification tree showing the main categories of the algorithms and their
extensions. It is important to know that this chapter provides the essential definitions
and functionalities of the algorithms. Knowing the appropriate outputs of the
algorithms will help the user in choosing the most efficient one for his/her studies.
20. Projected database: the α-projected database, denoted by SDB|α , is the collec-
tion of suffixes of sequences in SDB with regard to prefix α. Table 3 shows an
example of the projected database considering “a” as prefix.
There exist many data mining techniques such as classification, clustering, associa-
tion rule mining and others. This chapter focuses on sequential mining algorithms.
We present the state of the art of recent algorithms, elaborating a classification
based on their main objectives and principles. Thus, this classification divides
the algorithms into three primary types: SP Mining, Sequential Rule Mining and
Sequence Prediction. Each of these can be split into different criteria and strategies.
Overview on Sequential Mining Algorithms and Their Extensions 7
thus reduces the execution time. Thereby, two k-length sequences are in the same
equivalence class if they share the same k-1 length prefix.
In his first step, SPADE computes the support of length 1 sequences, and this
is done in a single database scan. In its second step, SPADE computes the support
of 2-sequences and this is done by transforming the vertical representation into a
horizontal representation in memory. This counting process is done with one scan of
data and uses a bi-dimensional matrix. The idea consists of joining (n−1) sequences
using their id-lists to obtain n-subsequences. If the size of id-list is greater than
minsup, then the sequence is frequent. The algorithm can use a breadth-first or a
depth-first search method for finding new sequences. The algorithm stops when no
more frequent sequences are found.
Sequential PAttern Mining, SPAM [12], is a memory-based algorithm and uses
vector of bytes (bitmap representation) to study the existence (1) or absence (0) of
an item in a sequence after loading the database into the memory. Candidates are
generated in a tree by an S-extension that adds an item in another transaction, and
by an I-extension that appends the item in the same transaction. The candidates are
verified by counting the bytes with a value of one with the defined minsup.
The algorithm is efficient for mining long sequential patterns. Depth-first search
is used to generate candidate sequences, and various I-step pruning and s-Step
pruning are used to reduce the search space.
The transactional data are stored using a vertical bitmap representation, which
allows for efficient support counting as well as significant bitmap compression. One
new feature introduced with SPAM is that it incrementally outputs new frequent
itemsets in an online fashion.
The Prefix-projected Sequential Pattern Mining, known as PrefixSpan [13], is
a pattern-growth-based algorithm that discovers SPs using the idea of projected
database. The algorithm studies the prefix subsequences instead of exploring all
the possible occurrences of frequent subsequences (refer to the definitions 16 and
17). Then, it performs a projection on their corresponding post-fix subsequences.
Frequent sequences will grow by mining only local frequent patterns, showing the
efficiency of this algorithm.
The Last Position Induction algorithm (LAPIN) [14] is used for the extraction
of long sequences and the reduction of the search space. It uses a lexicographical
tree as the search path with DFS strategy. LAPIN-LCI procedure tests each item in
the local candidate list and directly decides whether the item can be added to the
prefix sequence or not. It compares the item’s last position with the prefix border
position. The algorithm assumes that the last position of an item i is helpful to decide
whether this item could be appended to a frequent sequence of length k in order to
get a frequent sequence of k + 1 length.
The CM-SPAM and CM-SPADE [15] are extensions of the two well-known
algorithms SPADE and SPAM to which is added a new structure called Co-
Occurrence MAP (C-MAP). The latter is used to store co-occurrence information
by dividing them into CMAPi and CMAPs substructures. The first stores the items
that succeed each item by i-extension and the second stores the items that succeed
each item by s-extension at least minsup times. Let S be the sequence {I1 , I2 , . . . ,
Overview on Sequential Mining Algorithms and Their Extensions 9
Sequential Pattern Mining may return too many results, making it difficult for the
user to understand and analyze. Mining maximal SPs may be a solution. A Maximal
SP is a pattern that is not included in another pattern. Maximal Pattern Mining
algorithms are presented in the following.
The MaxSP [19] is inspired by the PrefixSpan algorithm. It is based on a pattern-
growth algorithm that aims to extract maximal SPs without maintaining candidates.
It has an integrated BIDE-like mechanism that checks if a pattern is maximal.
MaxSp reduces the redundancy in SPs that could be time consuming and requires a
lot of storage space.
The Vertical Maximal Sequence Patterns (VMSP) [20] is based on the SPAM
search procedure that generates the pattern and explores candidate patterns having
same prefix in a recursive manner. VMSP integrates three strategies: Efficient
Filtering of Nonmaximal Patterns (EFN), Forward Maximal Extension Checking
(FME) and Candidate Pruning by Co-Occurrence Map (CPC).
This kind of algorithm is used to reduce redundancy and thus to minimize the size
of mining results.
GoKrimp and SeqKrimp [21] are two compressing SPs mining algorithms, based
on the Krimp algorithm. They explore directly compressing patterns and avoid the
resource-consuming candidate generation. SeqKrimp uses a frequent closed SPs
mining algorithm to generate a set of candidate patterns. It gets the candidate pattern
set and returns a good subset of compressing patterns, then greedily calculates the
benefits of adding/extending a given pattern from the candidates. This procedure
is repeated until no more useful patterns can be added. GoKrimp uses the same
procedures but is an ameliorated version of SeqKrimp. It searches for a set of
sequential patterns that compresses the data most based on the minimum description
length principle; informally, the best model is the one that compresses the data
the most. What differentiates GoKrimp is that it is parameter free. Users are not
supposed to set a minimum support, which is a difficult decision in some cases.
A dependency test is provided to consider only related patterns to extend a given
pattern. This technique aims to avoid the excessive tests of all possible extensions
and makes the GoKrimp faster than SeqKrimp.
TSP (Top-K Closed Sequential Patterns) [22] uses the concept of pattern-growth
and projection-based SP mining of PrefixSpan algorithm, and then performs a multi-
pass mining to find and grow patterns. After closed pattern verification phase, the
algorithm applies the minimum length constraint verification, which reduces the
search space.
TKS (Top-K Sequential Patterns) [23] uses a vertical bitmap database repre-
sentation. It adapts the SPAM search procedure to explore the search space of
patterns to transform it to a Top-K algorithm. Then, TSK extends the most promising
patterns, meaning that it finds patterns with high support in an early stage and
discards infrequent items. Finally, the algorithm uses a PMAP (Precedence MAP)
data structure to prune the search space.
Specifying the number of sequential rules to be found may overcome the dif-
ficulty in fine-tuning sequential rules parameters like minsup and minconf. The
idea of discovering Top-K nonredundant rules comes after the difficulty and the
12 C. Bou Rjeily et al.
time-consuming task to tune the minimum support value by the user. Moreover, the
sequential rule mining algorithms usually return a high level of redundancy. To solve
both problems, the Top-K Sequential Rules Mining algorithms let the user indicate
k, which is the number of rules to be discovered.
The TopSeqRule [27] was the first to address the Top-K sequential rules mining.
It generates rules for several sequences based on the RuleGrowth search strategy
integrated with the general process for mining Top-K patterns. To optimize results,
it first generates the most promising rules and reduces the search space by increasing
minsup.
Top-K Nonredundant Sequential Rules TNS [28] is used to discover the Top-K
non-redundant sequential rules. It adopts the TopSeqRule to mine the Top-K rules
and adapts it to eliminate redundancy. The algorithm gives an approximation and
thus does not guarantee to retrieve the Top-K nonredundant rules. TNS has a positive
integer parameter called delta to increase the result’s exactitude. Results are more
exact with a higher value of delta.
This kind of algorithm returns all sequential rules with regard to the specified minsup
and minconf appearing within a window size.
TRuleGrowth [29] is an extension of the RuleGrowth with a sliding window
constraint. It is very useful in the discovery of temporal patterns (patterns that
happen within a maximum time interval). TRuleGrowth allows the user to specify
other optional parameters like the minimum antecedent length and the maximum
consequent length. These parameters define respectively the minimum number of
items appearing in the left side and the maximum number of items in the right
side of a rule, knowing that the left side is the antecedent and the right side is the
consequent.
the last x items from S in any order and in any position. CPT is more efficient
than other existent algorithms such as Prediction by Partial Matching (PPM) [31],
Dependency Graph (DG) [32] and All-K-th-Order Markov [33].
CPT+ [34] is an enhanced version of CPT where Frequent Subsequence Com-
pression (FSC), Simple Branch Compression (SBC) and Prediction with improved
Noise Reduction (PNR) strategies were added to improve prediction time and
precision.
4 Conclusion
This chapter summarizes the most recent and common algorithms on the sequential
mining paradigm. It does not aim to give a deep explanation about each algorithm,
but it mentions its purpose and gives an idea about how it works. One should
refer to the related article of each algorithm for additional details. For further
explanation and ease of understanding, this chapter also presents a classification
for the sequential mining algorithms. They are arranged by their usage. This
classification was based on three main axes: frequent sequential pattern mining,
sequential rules mining and sequence prediction. Important terms and notations in
the data mining domain were first introduced. Then, a short definition introduced
each class to let the reader have a quick idea about it. Later, the most important and
recent algorithms in each axis were investigated with a brief description about their
methods and implementations.
5 Discussion
The diagram in Fig. 1 consists of a classification tree containing the most recent
algorithms and their extensions. This tree can help researchers in choosing the
appropriate algorithm according to their needs especially when it comes to sequen-
tial pattern mining. Sequential mining is efficient for applications that are time-
based or take into consideration the order of the event. Sequential mining has proven
its efficiency through time in the economic field starting from GSP that analyzes the
transactions of customers in order to improve the income and marketing strategies.
Sequential Mining started showing its importance in medical field, making it a very
promising field for researchers and programmers.
14
Sequential Mining
algorithms in a SDB
Sequential
Pattern Sequential Sequence
Mining Rules Mining Predication
Rule Growth
LAPIN [2007] Bide+ [2007] AKOM [1999]
[2011]
Dependency
PrefixSpan Graph (DG)
CloSpan [2003] CMDeo [2005]
[2001] [1996]
RuleGen
SPAM [2002] TDAG [1994]
[2001]
SPADE [2001]
GSP [1996]
References
1. A.P. Wright, A.T. Wright, A.B. McCoy and D.F. Sittig, “The use of sequential pattern mining to
predict next prescribed medications”. Journal of biomedical informatics, 53, pp.73–80, 2015.
2. G. Bruno and P. Garza, “Temporal pattern mining for medical applications”. Data Mining:
Foundations and Intelligent Paradigms, pp.9–18. 2012
3. K. Uragaki, T. Hosaka, Y. Arahori, M. Kushima, T. Yamazaki, K. Araki and H. Yokota,
“Sequential pattern mining on electronic medical records with handling time intervals and the
efficacy of medicines”. In IEEE Symposium on Computers and Communication (ISCC), (pp.
20–25). IEEE. 2016.
4. K. Choi, S. Chung, H. Rhee and Y. Suh, Classification and sequential pattern analysis for
improving managerial efficiency and providing better medical service in public healthcare
centers. Healthcare informatics research, 16(2), pp.67–76, 2010.
5. C. Bou Rjeily, G. Badr, A. Hajjam El Hassani and E. Andres, “Sequence Prediction Algorithm
for Heart Failure Prediction”, International Conference e-Health, ISBN: 978-989-8533-65-4,
pp.109–116, 2017.
6. C. Bou Rjeily, G. Badr, A. Hajjam El Hassani and E. Andres, “Predicting Heart Failure Class
using a Sequence Prediction Algorithm”, Fourth International Conference on Advances in
Biomedical Engineering (ICABME), 2017
7. R. Agrawal, T. Imieliński, and A. Swami, “Mining association rules between sets of items in
large databases”, In ACM sigmod record(Vol. 22, No. 2, pp. 207–216). ACM, 1993.
8. P. Fournier-Viger, U. Faghihi, R. Nkambou, E. Mephu Nguifo, “CMRules: Mining Sequential
Rules Common to Several Sequences. Knowledge-based Systems”, Elsevier, 25(1): 63–76,
2012.
9. J. Han, J. Pei, Y. Yin, and R. Mao, “Mining frequent patterns without candidate generation: A
frequent-pattern tree approach”, Data mining and knowledge discovery, 8(1), pp.53–87, 2000.
10. M.J. Zaki, “SPADE: An efficient algorithm for mining frequent sequences”, Machine learning,
42(1–2), pp.31–60, 2001.
11. R. Srikant, and R. Agrawal, “Mining sequential patterns: Generalizations and performance
improvements”, In International Conference on Extending Database Technology (pp.1–17).
Springer Berlin Heidelberg, 1996.
12. J. Ayres, J. Flannick, J. Gehrke, J. and T. Yiu, “Sequential pattern mining using a bitmap
representation”, In Proceedings of the eighth ACM SIGKDD international conference on
Knowledge discovery and data mining(pp. 429–435). ACM, 2002.
13. J. Han, J. Pei, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M.C. Hsu, “Prefixspan:
Mining sequential patterns efficiently by prefix-projected pattern growth”, In proceedings of
the 17th international conference on data engineering, pp. 215–224, 2001.
14. Z. Yang, Y. Wang, and M. Kitsuregawa, M., “LAPIN: effective sequential pattern mining
algorithms by last position induction for dense databases”, In International Conference on
Database systems for advanced applications (pp. 1020–1023). Springer Berlin Heidelberg,
2007.
15. P. Fournier-Viger, A. Gomariz, M. Campos, and R. Thomas, “Fast vertical mining of sequential
patterns using co-occurrence information”, In Pacific-Asia Conference on Knowledge Discov-
ery and Data Mining (pp. 40–52). Springer International Publishing, 2014.
16. X. Yan, J. Han, R. Afshar R., “CloSpan: Mining Closed Sequential Patterns in Large Datasets”,
Proceedings of the 2003 SIAM International Conference on Data Mining, 2003.
17. J. Wang, and J. Han, “BIDE: Efficient mining of frequent closed sequences”, In Data
Engineering, 2004. Proceedings. 20th International Conference on (pp. 79-90). IEEE, 2004.
18. A. Gomariz, M. Campos, R. Marin, and B. Goethals, “Clasp: An efficient algorithm for mining
frequent closed sequences” In Pacific-Asia Conference on Knowledge Discovery and Data
Mining (pp. 50-61). Springer Berlin Heidelberg, 2013.
16 C. Bou Rjeily et al.
19. P. Fournier-Viger, C.W. Wu, and V.S. Tseng, “Mining maximal sequential patterns without can-
didate maintenance”, In International Conference on Advanced Data Mining and Applications
(pp. 169-180). Springer Berlin Heidelberg, 2013.
20. P. Fournier-Viger, C.W. Wu, A. Gomariz, and V.S. Tseng, “VMSP: Efficient vertical mining of
maximal sequential patterns”, In Canadian Conference on Artificial Intelligence (pp. 83-94).
Springer International Publishing, 2014.
21. H.T. Lam, F. Mörchen, D. Fradkin, and T. Calders, “Mining compressing sequential patterns”,
Statistical Analysis and Data Mining, 7(1), pp.34-52, 2014.
22. P. Tzvetkov, X. Yan, and J. Han, “TSP: Mining Top-k Closed Sequential Patterns”, Knowledge
and Information Systems, vol. 7, no. 4, pp. 438-457, 2005.
23. P. Fournier-Viger, A. Gomariz, T. Gueniche, E. Mwamikazi, and R. Thomas, “TKS: efficient
mining of top-k sequential patterns”, In International Conference on Advanced Data Mining
and Applications (pp. 109-120). Springer Berlin Heidelberg, 2013.
24. J. Deogun, and L. Jiang, “Prediction mining–an approach to mining association rules for
prediction”, In International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-
Soft Computing (pp. 98-108). Springer Berlin Heidelberg, 2005.
25. P. Fournier-Viger, R. Nkambou, and V.S.M. Tseng, “RuleGrowth: mining sequential rules com-
mon to several sequences by pattern-growth”, In Proceedings of the 2011 ACM symposium on
applied computing (pp. 956-961), 2011.
26. P. Fournier-Viger, T. Gueniche, S. Zida, and V.S. Tseng, “ERMiner: sequential rule mining
using equivalence classes”, In International Symposium on Intelligent Data Analysis (pp. 108-
119). Springer International Publishing, 2014.
27. P. Fournier-Viger, and V.S. Tseng, “Mining top-k sequential rules”, In International Conference
on Advanced Data Mining and Applications (pp. 180-194). Springer Berlin Heidelberg, 2011.
28. P. Fournier-Viger, and V. S Tseng, “TNS: mining top-k non-redundant sequential rules”, In
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013.
29. P. Fournier-Viger, C.W. Wu, V.S. Tseng, and R. Nkambou, “Mining sequential rules common
to several sequences with the window size constraint”, In Canadian Conference on Artificial
Intelligence (pp. 299-304). Springer Berlin Heidelberg, 2012.
30. T. Gueniche, P. Fournier-Viger, and V.S. Tseng, “Compact prediction tree: A lossless model
for accurate sequence prediction”, In International Conference on Advanced Data Mining and
Applications (pp. 177-188). Springer Berlin Heidelberg, 2013.
31. J. Cleary, I. Witten, “Data compression using adaptive coding and partial string matching”,
IEEE Trans. on Inform. Theory, vol. 24, no. 4, pp. 413-421, 1984.
32. V. N, Padmanabhan, J.C. Mogul, “Using Prefetching to Improve World Wide Web Latency”,
Computer Communications, vol. 16, pp. 358-368, 1998.
33. J. Pitkow, P. Pirolli, “Mining longest repeating subsequence to predict world wide web surfing”,
In: USENIX Symposium on Internet Technologies and Systems, Boulder, CO, pp. 13-25,
1999.
34. T. Gueniche, P. Fournier-Viger, R. Raman, and V.S. Tseng, “CPT+: Decreasing the time/space
complexity of the Compact Prediction Tree”, In Pacific-Asia Conference on Knowledge
Discovery and Data Mining (pp. 625-636). Springer International Publishing, 2015.
Object Detection Based on CNNs:
Current and Future Directions
Long Chen, Abdul Hamid Sadka, Junyu Dong, and Huiyu Zhou
1 Introduction
The goal of object detection is to learn a visual model for concepts such as cars
and use this model to localize these concepts in an image. As shown in Fig. 1,
given an image, object detection aims at predicting the bounding box and the label
of each object from the defined classes in the image. This requires the ability to
robustly model invariants against illumination changes, deformations, occlusions
and other intra-class variations. Among a number of vision tasks, object detection
is one of the fastest moving areas due to its wide applications in surveillance [1, 2]
and autonomous driving [3, 4].
L. Chen · H. Zhou
School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast,
Belfast, UK
e-mail: [email protected]; [email protected]
A. H. Sadka ()
Department of Electronic and Computer Engineering, Brunel University, London, UK
e-mail: [email protected]
J. Dong
Department of Computer Science and Technology, Ocean University of China, Qingdao, China
e-mail: [email protected]
Fig. 1 Bounding boxes and labels with corresponding class probabilities predicted by detectors
Before deep CNNs, convolutional neural networks [5], were introduced, the
progress on various visual recognition tasks had been considerably based on the use
of handcrafted features, such as SIFT [6] and HOG [7]. Handcrafted features can
be broadly divided into three categories:
1. Interest Point Detection. These methods use certain criteria to select pixels, edges
and corners as well-defined local texture features. Among them, Sobel, Prewitt,
Roberts, Canny and LoG (Laplacian of Gaussian) are typical edge detection
operators [8–11], while Harris, FAST (Features from Accelerated Segment Test),
CSS (Curvature Scale Space) and DOG (Difference of Gaussian) are typical
corner detection operators [6, 12, 13]. Interest point detection methods usually
have a certain geometric invariance which can be found at a small computational
cost.
2. Methods based on local features. These methods mainly extract local features,
which are different from global features such as colour histograms, which are
ideal for dealing with partial occlusion of target objects. Commonly used local
features include Scale-Invariant Feature Transform (SIFT) [6], HOG (Histogram
of oriented gradient) [7], Haar-like [14] and Local Binary Pattern [15, 16]. Local
features are informative, unique, with strong invariance and distinguishability.
But the calculation is generally complicated, and local features are further
developed to have better representations in recent years.
3. Methods based on multi-feature combination. A combination of interest point
and local feature extraction methods can be used to handle the deficiency of
using a single feature to represent target objects. DPM (Deformable Part-based
Random documents with unrelated
content Scribd suggests to you:
Nunc igitur sedeat sapiens et computet actus,
Quam prius adueniat iudicis illa dies.
FOOTNOTES:
590 9 magnanimi CEHDL magnatum S
591 27 Consilium CEHDL
592 43 descessit SHG descescit L decessit CED
593 87 da pinguibus CE
594 125 circumprecordia SG
595 160 Est S Et CEHDL
596 167 grossantur S grassantur HDLT crassantur CEG
597 182 dolum SCGDL suum EHT
598 184 scelus] dolus EH
599 187 rutilans albedo set SCGDL albus paries tamen EHT
600 189f.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com