The course program document outlines the schedule for a one-day tutorial on comparison of optimization methods. The schedule includes sessions on discrete models in computer vision, message passing algorithms, quadratic pseudo-boolean optimization, transformation and move-making methods, and recent advances such as dual decomposition and higher-order models. All materials from the tutorial will be made available online after the conference at the listed URL.
Presentation held by Tom Bert, Senior Product Manager Digital Cinema at Barco, on the occasion of the Big Screen Experience Program during the IBC tradeshow and conference in Amsterdam in September 2016. The program allowed for cinema professionals to explore the latest developments in the industry.
Fuzzy Logic Analysis using GeoMedia by Bhaskar Reddy PulsaniMapWindow GIS
Site selection process is a screening technique, used to select appropriate sites for dumping waste. Screening is done by considering the restrictions that have to be met when selecting a site. Two Screening methodologies i.e. Boolean and Fuzzy were used for delineating dumping zones. Boolean defines a two valued logic with sharp delineation of boundaries where as fuzzy provides a smooth transition between the boundaries to handle the concept of vagueness.
Implementation of membership functions for Fuzzy Logic analysis requires a lot of steps for manual process. As most of the process is generic for different layers, the analysis procedure was automated by customizing the application. Therefore, for site selection, a manual and automated fuzzy logic analysis was performed by making use of GeoMedia.
This document defines storage area networks (SANs) and discusses their architecture, technologies, management, security and benefits. A SAN consists of storage devices connected via a dedicated network that allows servers to access storage independently. Fibre Channel is the most widely used technology but iSCSI and FCIP allow block storage over IP networks. Effective SAN management requires coordination across storage, network and system levels. Security measures like authentication, authorization and encryption help protect data in this shared storage environment.
This document discusses various topics related to criminal justice programs and profiling of serial killers. It includes outlines on profiling serial killers and the SARA problem solving model. It also covers classical, biological, social and psychological theories of crime. Various criminal justice organizations and conferences are mentioned. Case studies related to Ted Bundy are discussed in the context of criminal justice programs and profiling.
This document provides an agenda for hardening Windows 2003 web servers. It covers various topics including physical security, OS installation, account policies, local policies, services configuration, user accounts, IP policies, permissions, hardening IIS, and additional hardening techniques. The goal is to create a secure environment and maintain security by configuring the OS, services, user accounts, permissions and IIS according to security best practices.
Core collectors are a type of spy that uses street smarts, cultural knowledge, language skills, and subject matter expertise to gather information. In the United States, the Central Intelligence Agency employs spies, called clandestine service agents, to work for the CIA's National Clandestine Service. Clandestine service agents earn between $52,976 to $81,204 per year, similar to the average income of $68,820 for detectives and crime investigators.
The document outlines various security concepts including attacks, services, mechanisms, and methods of defense for network security. It discusses security attacks like interruption, interception, modification, and fabrication. It also covers security services like confidentiality, authentication, integrity, non-repudiation, and availability. Finally, it mentions methods of defense such as encryption, software and hardware controls, policies, and physical controls.
This lecture will cover sets and set operations from the textbook "Discrete Mathematics & Its Applications" by Kenneth H. Rosen. The topics to be discussed are sets and set operations, with the lecture focusing on defining what sets are and exploring operations that can be performed on sets such as unions, intersections, and complements. Multiple examples of sets and set operations will be examined in detail during the lecture.
The document discusses trends in various industries and demographic groups. It provides statistics on year-over-year growth and key demographics for several companies including Abbott Laboratories, Pacific Life, CVS Caremark, and trends for age groups ranging from 13-70 years old. Unknown terms are used that make the overall meaning difficult to discern from the document.
Presentation about nice functional programming things you can do with python. and some simple techniques you can use to do a good and functional design
The document discusses Android development and UI design. It introduces some common widgets in Android like TextView, buttons, and different layouts like linear, relative and table layouts. It also discusses activities, services, intents and the Android component and manifest files.
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
World War 2 involved extensive spying and intelligence gathering efforts. The US established the Coordinator of Information in 1941 to collect and analyze national security data, but the FBI was reluctant to share information. After the Pearl Harbor attacks, it was clear that intelligence coordination needed improvement. The Office of Strategic Services was formed in 1942 to conduct clandestine operations like training foreign troops and sending operatives behind enemy lines. Notable OSS agent Moe Berg was a Major League Baseball player who used his language skills and undercover abilities on missions in Yugoslavia, Norway, and Italy. The military also had their own intelligence operations such as code breaking and interrogating prisoners of war. After the war, the OSS was dissolved and re
Sorayya Khan's novel "City of Spies" tells the story of 11-year-old Aliya Shah, who is struggling with her identity between her Pakistani father and Dutch mother in 1970s Pakistan. As political unrest grows under General Zia's regime, Aliya observes the arrests of Zulfiqar Ali Bhutto and the impact on those close to her like her servant's son Hanif. When anti-American protests erupt, Aliya's American friend Lizzy and her family are forced to leave the country. The novel explores Aliya's coming-of-age and search for identity amid the country's turmoil during this volatile period in Pakistan's history.
Internet servers hosting online applications need to be scalable to handle large numbers of simultaneous users. There are three main techniques for load balancing across replicated servers: DNS rotation, cooperative offloading using TCP handoff, and load balancing routers. DNS rotation requires few changes but has rigid policies while cooperative offloading and load balancing routers can be more adaptive but require changes to servers, clients, or routers.
XML Publisher is a reporting platform for Oracle Fusion Applications that allows business users to create reports without technical assistance. It uses XML data sources, templates, and an engine to generate reports. The process involves creating an application engine to supply sample data and schemas, developing an RTF template, defining the data source and report in PeopleSoft, updating the application engine for full data, and running it to output reports. Advanced features include bursting, content libraries, and translations. While it provides a flexible single toolset, some XML/XSL knowledge is needed for complex reports and Excel output is basic.
The double lives of spies in the civil war power pointAlyssa Fabia
Rose O'Neal Greenhow and Elizabeth Van Lew both spied for opposing sides during the American Civil War while living in the enemy capital. Rose spied for the Confederacy in Washington D.C., passing messages through her spy ring. She was eventually caught and imprisoned. Elizabeth Van Lew spied for the Union from Richmond, using her home to hide escaping Union soldiers and pass them messages and supplies despite the danger. Both women lived double lives and took great risks to aid their respective causes during the war.
Given what a beautiful and mature functional programming language R is, there is a surprising, though understandable, lack of visibility of functional programming techniques in R. This is a talk given to the Mumbai R meetup group in October/November, 2014, meant to introduce the audience to Functional Programming in R.
The document provides an overview of an introductory lecture for an Industrial Information Systems course, outlining the topics to be covered which include database design, architecture design methods, and web application implementation; it also provides the course schedule, textbook information, communication methods, grading policy, and advice for student success.
This book provides style and usage guidelines for programmers using Fortran. It is intended for anyone using Fortran, from beginners to experts. The book describes best practices for formatting, naming conventions, documentation, programming principles, input/output handling, and other aspects of the Fortran language. It focuses primarily on Fortran 2003 but also describes features of Fortran 90/95 and 2008.
Windows Server 2008 is a powerful web application and services platform that provides improved manageability, lower infrastructure costs, and powerful hosting of applications and services. New features include increased scalability, a server core installation option, support for additional web technologies like PHP, and enhanced media delivery options. Administration is simplified through tools like the unified Server Manager and powerful new APIs for automation.
This document provides guidance on taking effective notes in history class. It instructs students to use graphic organizers divided into sections for the title, notes, and vocabulary when taking notes from textbooks or presentations. It directs students to summarize what they've learned in 3 to 6 sentences at the bottom of the organizer. The document also distinguishes between primary and secondary sources, noting that primary sources were created during the time period studied while secondary sources interpret and analyze primary sources. It emphasizes using primary sources in class whenever possible and analyzing them for potential bias.
The document discusses relations and their application to databases in the relational data model. It defines binary and n-ary relations, and explains how databases can be represented as n-ary relations with records as n-tuples consisting of fields. Primary keys are introduced as fields that uniquely identify each record. Common relational operations like projection and join are explained, with examples provided to illustrate how they transform relations.
Driving Moore's Law with Python-Powered Machine Learning: An Insider's Perspe...PyData
People talk about a Moore's Law for gene sequencing, a Moore's Law for software, etc. This is talk is about *the* Moore's Law, the bull that the other "Laws" ride; and how Python-powered ML helps drive it. How do we keep making ever-smaller devices? How do we harness atomic-scale physics? Large-scale machine learning is key. The computation drives new chip designs, and those new chip designs are used for new computations, ad infinitum. High-dimensional regression, classification, active learning, optimization, ranking, clustering, density estimation, scientific visualization, massively parallel processing -- it all comes into play, and Python is powering it all.
Decision Forests and discriminant analysispotaters
This document summarizes a tutorial on randomised decision forests and tree-structured algorithms. It discusses how tree-based algorithms like boosting and random forests can be used for tasks like object detection, tracking and segmentation. It also describes techniques for speeding up computation, such as converting boosted classifiers to decision trees and using multiple classifier systems. The tutorial is structured in two parts, covering tree-structured algorithms and randomised forests.
The document outlines various security concepts including attacks, services, mechanisms, and methods of defense for network security. It discusses security attacks like interruption, interception, modification, and fabrication. It also covers security services like confidentiality, authentication, integrity, non-repudiation, and availability. Finally, it mentions methods of defense such as encryption, software and hardware controls, policies, and physical controls.
This lecture will cover sets and set operations from the textbook "Discrete Mathematics & Its Applications" by Kenneth H. Rosen. The topics to be discussed are sets and set operations, with the lecture focusing on defining what sets are and exploring operations that can be performed on sets such as unions, intersections, and complements. Multiple examples of sets and set operations will be examined in detail during the lecture.
The document discusses trends in various industries and demographic groups. It provides statistics on year-over-year growth and key demographics for several companies including Abbott Laboratories, Pacific Life, CVS Caremark, and trends for age groups ranging from 13-70 years old. Unknown terms are used that make the overall meaning difficult to discern from the document.
Presentation about nice functional programming things you can do with python. and some simple techniques you can use to do a good and functional design
The document discusses Android development and UI design. It introduces some common widgets in Android like TextView, buttons, and different layouts like linear, relative and table layouts. It also discusses activities, services, intents and the Android component and manifest files.
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
World War 2 involved extensive spying and intelligence gathering efforts. The US established the Coordinator of Information in 1941 to collect and analyze national security data, but the FBI was reluctant to share information. After the Pearl Harbor attacks, it was clear that intelligence coordination needed improvement. The Office of Strategic Services was formed in 1942 to conduct clandestine operations like training foreign troops and sending operatives behind enemy lines. Notable OSS agent Moe Berg was a Major League Baseball player who used his language skills and undercover abilities on missions in Yugoslavia, Norway, and Italy. The military also had their own intelligence operations such as code breaking and interrogating prisoners of war. After the war, the OSS was dissolved and re
Sorayya Khan's novel "City of Spies" tells the story of 11-year-old Aliya Shah, who is struggling with her identity between her Pakistani father and Dutch mother in 1970s Pakistan. As political unrest grows under General Zia's regime, Aliya observes the arrests of Zulfiqar Ali Bhutto and the impact on those close to her like her servant's son Hanif. When anti-American protests erupt, Aliya's American friend Lizzy and her family are forced to leave the country. The novel explores Aliya's coming-of-age and search for identity amid the country's turmoil during this volatile period in Pakistan's history.
Internet servers hosting online applications need to be scalable to handle large numbers of simultaneous users. There are three main techniques for load balancing across replicated servers: DNS rotation, cooperative offloading using TCP handoff, and load balancing routers. DNS rotation requires few changes but has rigid policies while cooperative offloading and load balancing routers can be more adaptive but require changes to servers, clients, or routers.
XML Publisher is a reporting platform for Oracle Fusion Applications that allows business users to create reports without technical assistance. It uses XML data sources, templates, and an engine to generate reports. The process involves creating an application engine to supply sample data and schemas, developing an RTF template, defining the data source and report in PeopleSoft, updating the application engine for full data, and running it to output reports. Advanced features include bursting, content libraries, and translations. While it provides a flexible single toolset, some XML/XSL knowledge is needed for complex reports and Excel output is basic.
The double lives of spies in the civil war power pointAlyssa Fabia
Rose O'Neal Greenhow and Elizabeth Van Lew both spied for opposing sides during the American Civil War while living in the enemy capital. Rose spied for the Confederacy in Washington D.C., passing messages through her spy ring. She was eventually caught and imprisoned. Elizabeth Van Lew spied for the Union from Richmond, using her home to hide escaping Union soldiers and pass them messages and supplies despite the danger. Both women lived double lives and took great risks to aid their respective causes during the war.
Given what a beautiful and mature functional programming language R is, there is a surprising, though understandable, lack of visibility of functional programming techniques in R. This is a talk given to the Mumbai R meetup group in October/November, 2014, meant to introduce the audience to Functional Programming in R.
The document provides an overview of an introductory lecture for an Industrial Information Systems course, outlining the topics to be covered which include database design, architecture design methods, and web application implementation; it also provides the course schedule, textbook information, communication methods, grading policy, and advice for student success.
This book provides style and usage guidelines for programmers using Fortran. It is intended for anyone using Fortran, from beginners to experts. The book describes best practices for formatting, naming conventions, documentation, programming principles, input/output handling, and other aspects of the Fortran language. It focuses primarily on Fortran 2003 but also describes features of Fortran 90/95 and 2008.
Windows Server 2008 is a powerful web application and services platform that provides improved manageability, lower infrastructure costs, and powerful hosting of applications and services. New features include increased scalability, a server core installation option, support for additional web technologies like PHP, and enhanced media delivery options. Administration is simplified through tools like the unified Server Manager and powerful new APIs for automation.
This document provides guidance on taking effective notes in history class. It instructs students to use graphic organizers divided into sections for the title, notes, and vocabulary when taking notes from textbooks or presentations. It directs students to summarize what they've learned in 3 to 6 sentences at the bottom of the organizer. The document also distinguishes between primary and secondary sources, noting that primary sources were created during the time period studied while secondary sources interpret and analyze primary sources. It emphasizes using primary sources in class whenever possible and analyzing them for potential bias.
The document discusses relations and their application to databases in the relational data model. It defines binary and n-ary relations, and explains how databases can be represented as n-ary relations with records as n-tuples consisting of fields. Primary keys are introduced as fields that uniquely identify each record. Common relational operations like projection and join are explained, with examples provided to illustrate how they transform relations.
Driving Moore's Law with Python-Powered Machine Learning: An Insider's Perspe...PyData
People talk about a Moore's Law for gene sequencing, a Moore's Law for software, etc. This is talk is about *the* Moore's Law, the bull that the other "Laws" ride; and how Python-powered ML helps drive it. How do we keep making ever-smaller devices? How do we harness atomic-scale physics? Large-scale machine learning is key. The computation drives new chip designs, and those new chip designs are used for new computations, ad infinitum. High-dimensional regression, classification, active learning, optimization, ranking, clustering, density estimation, scientific visualization, massively parallel processing -- it all comes into play, and Python is powering it all.
Decision Forests and discriminant analysispotaters
This document summarizes a tutorial on randomised decision forests and tree-structured algorithms. It discusses how tree-based algorithms like boosting and random forests can be used for tasks like object detection, tracking and segmentation. It also describes techniques for speeding up computation, such as converting boosted classifiers to decision trees and using multiple classifier systems. The tutorial is structured in two parts, covering tree-structured algorithms and randomised forests.
Tracing Tuples Across Dimensions: A Comparison of Scatterplots and Parallel C...Kimberly Aguada
This document summarizes a study that compared scatter plots and parallel coordinate plots for the task of value retrieval across multiple data dimensions and densities. The study involved two controlled experiments with participants to evaluate completion time and error distance for the different visualization techniques. The main findings were: 1) Scatter plots performed better than parallel coordinates for lower dimensions and densities; 2) There was a tradeoff between dimensions and density, with parallel coordinates improving relative to scatter plots at higher dimensions, and being more affected by increases in density. The study helps understand the comparative advantages of the different techniques.
This document discusses approximate query processing using sampling to enable interactive queries over large datasets. It describes BlinkDB, a framework that creates and maintains samples from underlying data to return fast, approximate query answers with error bars. BlinkDB verifies the correctness of the error bars it returns by periodically replacing samples and using diagnostics to check the accuracy without running many queries. The document discusses challenges like selecting appropriate samples, estimating errors, and verifying results to balance speed, accuracy and correctness for interactive analysis of big data.
Rietveld refinement is a technique for determining crystal structures from powder diffraction data. It involves minimizing the difference between observed and calculated powder diffraction patterns through least squares refinement of structural and instrumental parameters. GSAS is a software package that performs Rietveld refinement across multiple diffraction data types. It allows refinement of parameters related to lattice constants, atomic positions, thermal motion, and instrumental profile shapes. EXPGUI provides a graphical user interface for GSAS, while EXPEDT is the text-based interface that allows access to all GSAS capabilities.
This document summarizes structured prediction and structured large margin estimation approaches. It discusses how structured prediction can model complex, correlated outputs like sequences, trees, and matchings. It presents a min-max formulation that casts structured prediction as a linear program for inference, allowing joint training with large margin methods. This provides tractable learning for problems like conditional random fields, context-free grammars, and associative Markov networks.
1) The document discusses using data in deep learning models, including understanding the limitations of data and how it is acquired.
2) It describes techniques for image matching using multi-view geometry, including finding corresponding points across images and triangulating them to determine camera pose.
3) Recent works aim to improve localization of objects in images using multiple instance learning approaches that can learn without full supervision or through more stable optimization methods like linearizing sampling operations.
This document discusses the importance of using accurate models and metrics in signal integrity simulations to optimize PCB design performance and reduce costs. It provides examples of how simulations can show that expensive clock termination resistors or thicker PCB stacks are not needed, saving money. Metrics like noise margin and timing margin are needed to analyze waveform quality. Good models of transmission lines, I/O buffers, and packages are also important for accurate results. The key is using both high-quality models and performance metrics in simulations to validate designs before production.
This document provides an overview of JPEG image compression and forensic analysis of JPEG images. It discusses:
1. The JPEG standard for lossy image compression, how it works by applying discrete cosine transform, quantization, and entropy coding to remove spatial redundancy in images.
2. Key aspects of the JPEG compression process including color space conversion to YCbCr, subsampling of chroma channels, use of quantization tables to discard more high-frequency DCT coefficients at higher compression levels.
3. How traces of JPEG compression like double compression artifacts can be analyzed forensically to estimate a photo's compression history or detect tampering.
This document proposes using CELP-based features for environmental sound recognition (ESR). Conventional features like MFCCs do not perform well for ESR due to unstructured sounds. CELP features like linear prediction coefficients, pitch, gain, and codebook pulses capture sound properties better. Experimental results show CELP and CELP+MFCC outperform MFCC for ESR by 10%, with CELP providing low complexity and real-time extraction. CELP features are more suitable than MFCCs for ESR due to capturing long and short-term prediction in an unstructured setting while maintaining simplicity.
This document summarizes a talk on energy minimization for labeling problems with label costs and model fitting. It discusses standard MRF and CRF models used in computer vision, as well as adding label costs to these models. Optimization techniques like alpha expansion are used to approximate solutions. The document also discusses model fitting problems with an infinite number of labels using the PEARL framework of proposing labels, expanding, and reestimating labels. Applications discussed include image segmentation, geometric model fitting, and motion estimation.
Real Time Human Posture Detection with Multiple Depth SensorsWassim Filali
This thesis presents a comprehensive study of the state-of-the-art in human posture reconstruction, its contexts, and associated applications. The underlying research focuses on utilization of computer vision techniques for human activity recognition based on embedded system technologies and intelligent camera systems. It also focuses on human posture reconstruction as it plays a key role in subsequent activity recognition. In this work, we have relied on the latest technological advances in sensor technology, specifically on the advent of Kinect, an RGB-D sensor from Microsoft, to realize a low-level sensor fusion algorithm to fuse the outputs of multiple depth sensors for human posture reconstruction.
In this endeavor, the different challenges encountered are: (1) occlusions when using a single sensor; (2) the combinatorial complexity of learning a high dimensional space corresponding to human postures; and finally, (3) embedded systems constraints. The proposed system addresses and consequently resolves each of these challenges.
The fusion of multiple depth sensors gives better result than individual sensors as the fusion alleviates the majority of occlusions by resolving many incoherencies thus by guaranteeing improved robustness and completeness on the observed scene. In this manuscript, we have elaborated the low-level fusion strategy which makes up the main contribution of this thesis. We have adopted a learning technique based on decision forests. Our algorithm is applied on our own learning dataset acquired with our multi-platform kinect coupled to a commercial motion capture system.
The two main principal features are sensor data fusion and supervised learning. Specifically, the data fusion technique is described by acquisition, segmentation, and voxelization which generates a 3D reconstruction of the occupied space. The supervised learning is based on decision forests and uses appropriate descriptors extracted from the reconstructed data. Various experiments including specific parameter learning (tuning) runs have been realized.
Qualitative and quantitative comparative human articulation reconstruction precision evaluations against the state-of-the-art strategies have also been carried out.
The different algorithms have been implemented on a personal computer environment which helped to analyze the essential parts that needs hardware embedded integration. The hardware integration consisted of studying and comparing multiple approaches. FPGA is a platform that meets both the performance and embeddability criteria as it provides resources that reduce CPU cost. This allowed us to make a contribution which constitutes a hierarchically prioritized design via a layer of intermediary modules. Comparative studies have also been done using background subtraction implementation as a benchmark integrated on PC, GPU, and FPGA (the FPGA implementation has been presented in detail).
The document provides an introduction to using MATLAB for chemical engineering applications. It discusses that MATLAB makes tasks like solving linear algebra problems, ordinary differential equations, and numerical analysis easier through its built-in functions and programming capabilities. It then covers several key topics in MATLAB including using it to work with polynomials, solve ODEs, and use the Simulink block diagram environment to model dynamic systems. The document emphasizes that learning to program in MATLAB is an important skill that will benefit engineers in their work and career.
Yen-Yu Lin presents research on video synthesis through frame interpolation. His lab uses deep learning models like DVF to predict intermediate frames between two consecutive frames. However, existing methods produce artifacts or over-smoothed results. The proposed approach uses a two-stage training procedure with cycle consistency loss to address this. It first pre-trains DVF, then fine-tunes with cycle loss to make the model robust to lack of data and produce higher quality frames. Experimental results show the approach outperforms state-of-the-art methods on standard datasets.
- Fourier shell correlation (FSC) is used to estimate resolution in cryo-EM by measuring the correlation between two independent half maps in Fourier space shells.
- True resolution varies locally within cryo-EM maps and a single number does not fully describe map quality.
- Map and model validation are important to assess whether the map and model accurately represent the structure and are not affected by model bias.
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...cscpconf
In this paper we present a comparison between standard computer vision techniques and Deep
Learning approach for automatic metal corrosion (rust) detection. For the classic approach, a
classification based on the number of pixels containing specific red components has been
utilized. The code written in Python used OpenCV libraries to compute and categorize the
images. For the Deep Learning approach, we chose Caffe, a powerful framework developed at
“Berkeley Vision and Learning Center” (BVLC). The test has been performed by classifying
images and calculating the total accuracy for the two different approaches.
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...csandit
In this paper we present a comparison between stand
ard computer vision techniques and Deep
Learning approach for automatic metal corrosion (ru
st) detection. For the classic approach, a
classification based on the number of pixels contai
ning specific red components has been
utilized. The code written in Python used OpenCV li
braries to compute and categorize the
images. For the Deep Learning approach, we chose Ca
ffe, a powerful framework developed at
“Berkeley Vision and Learning Center” (BVLC). The
test has been performed by classifying
images and calculating the total accuracy for the t
wo different approaches.
Nearest neighbor models are conceptually just about the simplest kind of model possible. The problem is that they generally aren’t feasible to apply. Or at least, they weren’t feasible until the advent of Big Data techniques. These slides will describe some of the techniques used in the knn project to reduce thousand-year computations to a few hours. The knn project uses the Mahout math library and Hadoop to speed up these enormous computations to the point that they can be usefully applied to real problems. These same techniques can also be used to do real-time model scoring.
This document summarizes a student project on OFDM transmitters and receivers. It includes an introduction to OFDM that describes its use of orthogonal subcarriers. It also compares single carrier modulation to multi-carrier modulation using OFDM. The document outlines the basic OFDM transmitter and receiver block diagrams. It discusses the constellation mapper, IFFT block, cyclic prefix, and design approaches for these blocks. Simulation results are presented comparing transmitted and received signals. BER performance is evaluated for different modulation schemes like QPSK and QAM. The document concludes that OFDM provides high bandwidth efficiency and overcomes interference through the IFFT and cyclic prefix.
Mylyn helps address information overload and context loss when multi-tasking. It integrates tasks into the IDE workflow and uses a degree-of-interest model to monitor user interaction and provide a task-focused UI with features like view filtering, element decoration, automatic folding and content assist ranking. This creates a single view of all tasks that are centrally managed within the IDE.
This document provides an overview of OpenCV, an open source computer vision and machine learning software library. It discusses OpenCV's core functionality for representing images as matrices and directly accessing pixel data. It also covers topics like camera calibration, feature point extraction and matching, and estimating camera pose through techniques like structure from motion and planar homography. Hints are provided for Android developers on required permissions and for planar homography estimation using additional constraints rather than OpenCV's general homography function.
This document provides information about the Computer Vision Laboratory 2012 course at the Institute of Visual Computing. The course focuses on computer vision on mobile devices and will involve 180 hours of project work per person. Students will work in groups of 1-2 people on topics like 3D reconstruction from silhouettes or stereo images on mobile devices. Key dates are provided for submitting a work plan, mid-term presentation, and final report. Contact information is given for the lecturers and teaching assistant.
This document summarizes a presentation on natural image statistics given by Siwei Lyu at the 2009 CIFAR NCAP Summer School. The presentation covered several key topics:
1) It discussed the motivation for studying natural image statistics, which is to understand representations in the visual system and develop computer vision applications like denoising.
2) It reviewed common statistical properties found in natural images like 1/f power spectra and non-Gaussian distributions.
3) Maximum entropy and Bayesian models were presented as approaches to model these statistics, with Gaussian and independent component analysis discussed as specific examples.
4) Efficient coding principles from information theory were introduced as a framework for understanding neural representations that aim to decorrelate and
Camera calibration involves determining the internal camera parameters like focal length, image center, distortion, and scaling factors that affect the imaging process. These parameters are important for applications like 3D reconstruction and robotics that require understanding the relationship between 3D world points and their 2D projections in an image. The document describes estimating internal parameters by taking images of a calibration target with known geometry and solving the equations that relate the 3D target points to their 2D image locations. Homogeneous coordinates and projection matrices are used to represent the calibration transformations mathematically.
Brunelli 2008: template matching techniques in computer visionzukun
The document discusses template matching techniques in computer vision. It begins with an overview that defines template matching and discusses some common computer vision tasks it can be used for, like object detection. It then covers topics like detection as hypothesis testing, training and testing techniques, and provides a bibliography.
The HARVEST Programme evaluates feature detectors and descriptors through indirect and direct benchmarks. Indirect benchmarks measure repeatability and matching scores on the affine covariant testbed to evaluate how features persist across transformations. Direct benchmarks evaluate features on image retrieval tasks using the Oxford 5k dataset to measure real-world performance. VLBenchmarks provides software for easily running these benchmarks and reproducing published results. It allows comparing features and selecting the best for a given application.
This document summarizes VLFeat, an open source computer vision library. It provides concise summaries of VLFeat's features, including SIFT, MSER, and other covariant detectors. It also compares VLFeat's performance to other libraries like OpenCV. The document highlights how VLFeat achieves state-of-the-art results in tasks like feature detection, description and matching while maintaining a simple MATLAB interface.
This document summarizes and compares local image descriptors. It begins with an introduction to modern descriptors like SIFT, SURF and DAISY. It then discusses efficient descriptors such as binary descriptors like BRIEF, ORB and BRISK which use comparisons of intensity value pairs. The document concludes with an overview section.
This document discusses various feature detectors used in computer vision. It begins by describing classic detectors such as the Harris detector and Hessian detector that search scale space to find distinguished locations. It then discusses detecting features at multiple scales using the Laplacian of Gaussian and determinant of Hessian. The document also covers affine covariant detectors such as maximally stable extremal regions and affine shape adaptation. It discusses approaches for speeding up detection using approximations like those in SURF and learning to emulate detectors. Finally, it outlines new developments in feature detection.
The document discusses modern feature detection techniques. It provides an introduction and agenda for a talk on advances in feature detectors and descriptors, including improvements since a 2005 paper. It also discusses software suites and benchmarks for feature detection. Several application domains are described, such as wide baseline matching, panoramic image stitching, 3D reconstruction, image search, location recognition, and object tracking.
System 1 and System 2 were basic early systems for image matching that used color and texture matching. Descriptor-based approaches like SIFT provided more invariance but not perfect invariance. Patch descriptors like SIFT were improved by making them more invariant to lighting changes like color and illumination shifts. The best performance came from combining descriptors with color invariance. Representing images as histograms of visual word occurrences captured patterns in local image patches and allowed measuring similarity between images. Large vocabularies of visual words provided more discriminative power but were costly to compute and store.
This document summarizes a research paper on internet video search. It discusses several key challenges: [1] the large variation in how the same thing can appear in images/videos due to lighting, viewpoint etc., [2] defining what defines different objects, and [3] the huge number of different things that exist. It also notes gaps in narrative understanding, shared concepts between humans and machines, and addressing diverse query contexts. The document advocates developing powerful yet simple visual features that capture uniqueness with invariance to irrelevant changes.
The document discusses computer vision techniques for object detection and localization. It describes methods like selective search that group image regions hierarchically to propose object locations. Large datasets like ImageNet and LabelMe that provide training examples are also discussed. Performance on object detection benchmarks like PASCAL VOC is shown to improve significantly over time. Evaluation standards for concept detection like those used in TRECVID are presented. The document concludes that results are impressively improving each year but that the number of detectable concepts remains limited. It also discusses making feature extraction more efficient using techniques like SURF that take advantage of integral images.
This document provides an outline and overview of Yoshua Bengio's 2012 tutorial on representation learning. The key points covered include:
1) The tutorial will cover motivations for representation learning, algorithms such as probabilistic models and auto-encoders, and analysis and practical issues.
2) Representation learning aims to automatically learn good representations of data rather than relying on handcrafted features. Learning representations can help address challenges like exploiting unlabeled data and the curse of dimensionality.
3) Deep learning algorithms attempt to learn multiple levels of increasingly complex representations, with the goal of developing more abstract, disentangled representations that generalize beyond local patterns in the data.
Advances in discrete energy minimisation for computer visionzukun
This document discusses string algorithms and data structures. It introduces the Knuth-Morris-Pratt algorithm for finding patterns in strings in O(n+m) time where n is the length of the text and m is the length of the pattern. It also discusses common string data structures like tries, suffix trees, and suffix arrays. Suffix trees and suffix arrays store all suffixes of a string and support efficient pattern matching and other string operations in linear time or O(m+logn) time where m is the pattern length and n is the text length.
This document provides a tutorial on how to use Gephi software to analyze and visualize network graphs. It outlines the basic steps of importing a sample graph file, applying layout algorithms to organize the nodes, calculating metrics, detecting communities, filtering the graph, and exporting/saving the results. The tutorial demonstrates features of Gephi including node ranking, partitioning, and interactive visualization of the graph.
EM algorithm and its application in probabilistic latent semantic analysiszukun
The document discusses the EM algorithm and its application in Probabilistic Latent Semantic Analysis (pLSA). It begins by introducing the parameter estimation problem and comparing frequentist and Bayesian approaches. It then describes the EM algorithm, which iteratively computes lower bounds to the log-likelihood function. Finally, it applies the EM algorithm to pLSA by modeling documents and words as arising from a mixture of latent topics.
This document describes an efficient framework for part-based object recognition using pictorial structures. The framework represents objects as graphs of parts with spatial relationships. It finds the optimal configuration of parts through global minimization using distance transforms, allowing fast computation despite modeling complex spatial relationships between parts. This enables soft detection to handle partial occlusion without early decisions about part locations.
Iccv2011 learning spatiotemporal graphs of human activities zukun
The document presents a new approach for learning spatiotemporal graphs of human activities from weakly supervised video data. The approach uses 2D+t tubes as mid-level features to represent activities as segmentation graphs, with nodes describing tubes and edges describing various relations. A probabilistic graph mixture model is used to model activities, and learning estimates the model parameters and permutation matrices using a structural EM algorithm. The learned models allow recognizing and segmenting activities in new videos through robust least squares inference. Evaluation on benchmark datasets demonstrates the ability to learn characteristic parts of activities and recognize them under weak supervision.
How to Use Owl Slots in Odoo 17 - Odoo SlidesCeline George
In this slide, we will explore Owl Slots, a powerful feature of the Odoo 17 web framework that allows us to create reusable and customizable user interfaces. We will learn how to define slots in parent components, use them in child components, and leverage their capabilities to build dynamic and flexible UIs.
Dashboard Overview in Odoo 18 - Odoo SlidesCeline George
Odoo 18 introduces significant enhancements to its dashboard functionalities, offering users a more intuitive and customizable experience. The updated dashboards provide real-time insights into various business operations, enabling informed decision-making.
POS Reporting in Odoo 18 - Odoo 18 SlidesCeline George
To view all the available reports in Point of Sale, navigate to Point of Sale > Reporting. In this section, you will find detailed reports such as the Orders Report, Sales Details Report, and Session Report, as shown below.
Happy Summer Everyone. This is also timeless for future viewing.
You all have been upgraded from ‘Guest’ Students to ‘Graduate’ Students. Do Welcome Back. For new guests, please see our free weekly workshops from Spring ‘25’
Blessings, Love, and Namaste’.
Do Welcome to Summer ‘25’ for LDMMIA.
TY, for surviving our First Season/Term of our Reiki Yoga Workshops. These presentations/workshop are designed for your energy wellness.
Also, professional expansion for Summer ‘25’. All updates will be uploaded here and digital notes within our Merch Shop. (I am Completely, using the suggestions of AI for my Biz style. Its spooky accurate. So far, AI has been very helpful for office and studio admin. I even updated my AI avatars. Similar to my SL Meta avatar.)
Do take Care of yourselves. This is only a Bonus Checkin. The Next Workshop will be Lecture/Session 8. I will complete by Friday.
https://ldm-mia.creator-spring.com/
Order Lepidoptera: Butterflies and Moths.pptxArshad Shaikh
Lepidoptera is an order of insects comprising butterflies and moths. Characterized by scaly wings and a distinct life cycle, Lepidoptera undergo metamorphosis from egg to larva (caterpillar) to pupa (chrysalis or cocoon) and finally to adult. With over 180,000 described species, they exhibit incredible diversity in form, behavior, and habitat, playing vital roles in ecosystems as pollinators, herbivores, and prey. Their striking colors, patterns, and adaptations make them a fascinating group for study and appreciation.
Introduction to Online CME for Nurse Practitioners.pdfCME4Life
Online CME for nurse practitioners provides a flexible, cost-effective way to stay current with evidence-based practices and earn required credits without interrupting clinical duties. Accredited platforms offer a wide range of self-paced courses—complete with interactive case studies, downloadable resources, and immediate digital certificates—that fit around demanding schedules. By choosing trusted providers, practitioners gain in-depth knowledge on emerging treatments, refine diagnostic and patient-management skills, and build professional credibility. Know more at https://cme4life.com/the-benefits-of-online-cme-for-nurse-practitioners/
♥☽✷♥
Make sure to catch our weekly updates. Updates are done Thursday to Fridays or its a holiday/event weekend.
Thanks again, Readers, Guest Students, and Loyalz/teams.
This profile is older. I started at the beginning of my HQ journey online. It was recommended by AI. AI was very selective but fits my ecourse style. I am media flexible depending on the course platform. More information below.
AI Overview:
“LDMMIA Reiki Yoga refers to a specific program of free online workshops focused on integrating Reiki energy healing techniques with yoga practices. These workshops are led by Leslie M. Moore, also known as LDMMIA, and are designed for all levels, from beginners to those seeking to review their practice. The sessions explore various themes like "Matrix," "Alice in Wonderland," and "Goddess," focusing on self-discovery, inner healing, and shifting personal realities.”
♥☽✷♥
“So Life Happens-Right? We travel on. Discovering, Exploring, and Learning...”
These Reiki Sessions are timeless and about Energy Healing / Energy Balancing.
A Shorter Summary below.
A 7th FREE WORKSHOP
REiki - Yoga
“Life Happens”
Intro Reflections
Thank you for attending our workshops. If you are new, do welcome. We have been building a base for advanced topics. Also, this info can be fused with any Japanese (JP) Healing, Wellness Plans / Other Reiki /and Yoga practices.
Power Awareness,
Our Defense.
Situations like Destiny Swapping even Evil Eyes are “stealing realities”. It’s causing your hard earned luck to switch out. Either way, it’s cancelling your reality all together. This maybe common recently over the last decade? I noticed it’s a sly easy move to make. Then, we are left wounded, suffering, accepting endless bad luck. It’s time to Power Up. This can be (very) private and quiet. However; building resources/EDU/self care for empowering is your business/your right. It’s a new found power we all can use for healing.
Stressin out-II
“Baby, Calm down, Calm Down.” - Song by Rema, Selena Gomez (Video Premiered Sep 7, 2022)
Within Virtual Work and VR Sims (Secondlife Metaverse) I love catching “Calm Down” On the radio streams. I love Selena first. Second, It’s such a catchy song with an island feel. This blends with both VR and working remotely.
Its also, a good affirmation or mantra to *Calm down* lol.
Something we reviewed in earlier Workshops.
I rarely mention love and relations but theres one caution.
When we date, almost marry an energy drainer/vampire partner; We enter doorways of no return. That person can psychic drain U during/after the relationship. They can also unleash their demons. Their dark energies (chi) can attach itself to you. It’s SYFI but common. Also, involving again, energy awareness. We are suppose to keep our love life sacred. But, Trust accidents do happen. The Energies can linger on. Also, Reiki can heal any breakup damage...
(See Pres for more info. Thx)
Coleoptera, commonly known as beetles, is the largest order of insects, comprising approximately 400,000 described species. Beetles can be found in almost every habitat on Earth, exhibiting a wide range of morphological, behavioral, and ecological diversity. They have a hardened exoskeleton, with the forewings modified into elytra that protect the hind wings. Beetles play important roles in ecosystems as decomposers, pollinators, and food sources for other animals, while some species are considered pests in agriculture and forestry.
The PDF titled "Critical Thinking and Bias" by Jibi Moses aims to equip a diverse audience from South Sudan with the knowledge and skills necessary to identify and challenge biases and stereotypes. It focuses on developing critical thinking abilities and promoting inclusive attitudes to foster a more cohesive and just society. It defines bias as a tendency or prejudice affecting perception and interactions, categorizing it into conscious and unconscious (implicit) biases. The content highlights the impact of societal and cultural conditioning on these biases, particularly within the South Sudanese context.
"Hymenoptera: A Diverse and Fascinating Order".pptxArshad Shaikh
Hymenoptera is a diverse order of insects that includes bees, wasps, ants, and sawflies. Characterized by their narrow waists and often social behavior, Hymenoptera play crucial roles in ecosystems as pollinators, predators, and decomposers, with many species exhibiting complex social structures and communication systems.
Search Engine Optimization (SEO) for Website Successmuneebrana3215
Unlock the essentials of Search Engine Optimization (SEO) with this concise, visually driven PowerPoint. Inside you’ll find:
✅ Clear definitions and core concepts of SEO
✅ A breakdown of On‑Page, Off‑Page, and Technical SEO
✅ Actionable best‑practice checklists for keyword research, content optimization, and link building
✅ A quick‑start toolkit featuring Google Analytics, Search Console, Ahrefs, SEMrush, and Moz
✅ Real‑world case study demonstrating a 70 % organic‑traffic lift
✅ Common challenges, algorithm updates, and tips for long‑term success
Whether you’re a digital‑marketing student, small‑business owner, or PR professional, this deck will help you boost visibility, build credibility, and drive sustainable traffic. Download, share, and start optimizing today!
How to Setup Lunch in Odoo 18 - Odoo guidesCeline George
In Odoo 18, the Lunch application allows users a convenient way to order food and pay for their meal directly from the database. Lunch in Odoo 18 is a handy application designed to streamline and manage employee lunch orders within a company.
Active Surveillance For Localized Prostate Cancer A New Paradigm For Clinical...wygalkelceqg
Active Surveillance For Localized Prostate Cancer A New Paradigm For Clinical Management 2nd Ed Klotz
Active Surveillance For Localized Prostate Cancer A New Paradigm For Clinical Management 2nd Ed Klotz
Active Surveillance For Localized Prostate Cancer A New Paradigm For Clinical Management 2nd Ed Klotz
3. Why is good optimization important?
Input: Image sequence
[Data courtesy from Oliver Woodford]
Output: New view
Problem: Minimize a binary 4-connected pair-wise MRF
(choose a colour-mode at each pixel)
[Fitzgibbon et al. ‘03+
4. Why is good optimization important?
Ground Truth Graph Cut with truncation Belief Propagation ICM, Simulated
[Rother et al. ‘05+
Annealing
QPBOP [Boros ’06, Rother ‘07+
Global Minimum
5. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
• Multi-label, 4-connected MRFs *Szeliski et al. ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
• Multi-label, highly-connected MRFs *Kolmogorov et al. ‘06+
6. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
• Multi-label, 4-connected MRFs *Szeliski et al. ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
• Multi-label, highly-connected MRFs *Kolmogorov et al. ‘06+
7. Random MRFs
o Three important factors:
o Connectivity (av. degree of a node)
o Unary strength: E(x) = w ∑ θi (xi) + ∑ θij (xi,xj)
o Percentage of non-submodular terms (NS)
8. Computer Vision Problems
perc. unlabeled (sec) Energy (sec)
Conclusions:
• Connectivity is a crucial factor
• Simple methods like Simulated
Annealing sometimes best
9. Diagram Recognition [Szummer et al ‘04]
71 nodes; 4.8 con.; 28% non-sub; 0.5 unary strength
• 2700 test cases: QPBO solved nearly all
(QPBOP solves all)
Ground truth QPBOP (0sec) - Global Min.
Sim. Ann. E=0 (0.28sec) QPBO: 56.3% unlabeled (0 sec)
BP E=25 (0 sec) GrapCut E= 119 (0 sec) ICM E=999 (0 sec)
12. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
Conclusion: low-connectivity tractable: QPBO(P)
• Multi-label, 4-connected MRFs *Szeliski et al ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
• Multi-label, highly-connected MRFs *Kolmogorov et al ‘06+
13. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
Conclusion: low-connectivity tractable: QPBO(P)
• Multi-label, 4-connected MRFs *Szeliski et al ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
• Multi-label, highly-connected MRFs *Kolmogorov et al ‘06+
14. Multiple labels – 4 connected
“Attractive Potentials”
stereo
Panoramic
stitching
Image
Segmentation;
de-noising;
in-painting
[Szelsiki et al ’06,08+
15. Stereo
image Ground TRW-S image Ground TRW-S
truth truth
Conclusions:
– Solved by alpha-exp. and TRW-S
(within 0.01%-0.9% of lower bound – true for all tests!)
– Expansion-move always better than swap-move
16. De-noising and in-painting
Ground truth Noisy input TRW-S Alpha-exp.
Conclusion:
– Alpha-expansion has problems with smooth areas
(potential solution: fusion-move *Lempitsky et al. ‘07+)
18. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
Conclusion: low-connectivity tractable (QPBO)
• Multi-label, 4-connected MRFs *Szeliski et al ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
Conclusion: solved by expansion-move; TRW-S
(within 0.01 - 0.9% of lower bound)
• Multi-label, highly-connected MRFs *Kolmogorov et al ‘06+
19. Comparison papers
• Binary, highly-connected MRFs *Rother et al. ‘07+
Conclusion: low-connectivity tractable (QPBO)
• Multi-label, 4-connected MRFs *Szeliski et al ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
Conclusion: solved by expansion-move; TRW-S
(within 0.01 - 0.9% of lower bound)
• Multi-label, highly-connected MRFs *Kolmogorov et al ‘06+
20. Multiple labels – highly connected
Stereo with occlusion:
E(d): {1,…,D}2n → R
Each pixel is connected to D pixels in the other image
*Kolmogorov et al. ‘06+
21. Multiple labels – highly connected
Tsukuba: 16 labels Cones: 56 labels
• Alpha-exp. considerably better than message passing
Potential reason: smaller connectivity in one expansion-move
22. Comparison: 4-con. versus highly con.
Tsukuba (E) Map (E) Venus (E)
highly-con. 103.09% 103.28% 102.26%
4-con. 100.004% 100.056% 100.014%
Lower-bound scaled to 100%
Conclusion:
• highly connected graphs are harder to optimize
23. Comparison papers
• binary, highly-connected MRFs *Rother et al. ‘07+
Conclusion: low-connectivity tractable (QPBO)
• Multi-label, 4-connected MRFs *Szeliski et al ‘06,‘08+
all online: http://vision.middlebury.edu/MRF/
Conclusion: solved by alpha-exp.; TRW
(within 0.9% to lower bound)
• Multi-label, highly-connected MRFs *Kolmogorov et al ‘06+
Conclusion: challenging optimization (alpha-exp. best)
How to efficiently optimize general highly-connected
(higher-order) MRFs is still an open question
24. Course Program
9.30-10.00 Introduction (Andrew Blake)
10.00-11.00 Discrete Models in Computer Vision (Carsten Rother)
15min Coffee break
11.15-12.30 Message Passing: DP, TRW, LP relaxation (Pawan Kumar)
12.30-13.00 Quadratic pseudo-boolean optimization (Pushmeet Kohli)
1 hour Lunch break
14:00-15.00 Transformation and move-making methods (Pushmeet Kohli)
15:00-15.30 Speed and Efficiency (Pushmeet Kohli)
15min Coffee break
15:45-16.15 Comparison of Methods (Carsten Rother)
16:15-17.30 Recent Advances: Dual-decomposition, higher-order, etc.
(Carsten Rother + Pawan Kumar)
All online material will be online (after conference):
http://research.microsoft.com/en-us/um/cambridge/projects/tutorial/
26. Challenging Optimization Problems
• How to solve higher-order MRFs:
• Possible Approaches:
- Convert to Pairwise MRF (Pushmeet has explained)
- Branch & MinCut (Pushmeet has explained)
- Add global constraint to LP relaxation
- Dual Decomposition
27. Add global constraints to LP
Basic idea:
T
∑ Xi ≥ 1
i Є T
References:
[K. Kolev et al. ECCV’ 08] silhouette constraint
[Nowizin et al. CVPR ‘09+ connectivity prior
[Lempitsky et al ICCV ‘09+ bounding box prior (see talk on Thursday)
See talk on Thursday:
[Lempitsky et al ICCV ‘09+ bounding box prior
28. Dual Decomposition
• Well known in optimization community [Bertsekas ’95, ‘99+
• Other names: “Master-Slave” [Komodiakis et al. ‘07, ’09+
• Examples of Dual-Decomposition approaches:
– Solve LP of TRW [Komodiakis et al. ICCV ‘07+
– Image segmentation with connectivity prior [Vicente et al CVPR ‘08+
– Feature Matching [Toressani et al ECCV ‘08+
– Optimizing Higher-Order Clique MRFs [Komodiakis et al CVPR ‘09+
– Marginal Probability Field *Woodford et al ICCV ‘09+
– Jointly optimizing appearance and Segmentation [Vicente et al ICCV 09]
29. Dual Decomposition
Hard to optimize Possible to optimize Possible to optimize
min E(x) = min [ E1(x) + θTx + E2(x) – θTx ]
x x
≥ min [E1(x1) + θTx1] + min [E2(x2) - θTx2] = L(θ)
x1 x2
“Lower bound”
• θ is called the dual vector (same size as x)
• Goal: max L(θ) ≤ min E(x)
θ x
• Properties:
• L(θ) is concave (optimal bound can be found)
• If x1=x2 then problem solved (not guaranteed)
30. Why is the lower bound a concave function?
L(θ) = min [E1(x1) + θTx1] + min [E2(x2) - θTx2] L(θ) : Rn -> R
x1 x2
L1(θ) L2(θ)
θTx’1
L1(θ)
θTx’’1
θTx’’’1
θ
L(θ) concave since a sum of concave functions
31. How to maximize the lower bound?
If L(θ) were to be differentiable use gradient ascent
L(θ) not diff. … so subgradient approach [Shor ‘85+
32. How to maximize the lower bound?
If L(θ) were to be differentiable use gradient ascent
L(θ) not diff. so subgradient approach [Shor ‘85+
L(θ) = min [E1(x1) + θTx1] + min [E2(x2) - θTx2] L(θ) : Rn -> R
x1 x2
L1(θ) L2(θ)
θTx’1
L1(θ)
θTx’’1
Subgradient g θTx’’’1
Θ’ Θ’’ Θ
Θ’’ = Θ’ + λ g = Θ’ + λ x’1 Θ’’ = Θ’ + λ (x1-x2)
33. Dual Decomposition
L(θ) = min [E1(x1) + θTx1] + min [E2(x2) - θTx2]
x1 x2
Subgradient Optimization:
“Master”
Θ = Θ + λ(x*-x2)
1
*
x1* x2
*
Θ Θ subgradient
Subproblem 1 Subproblem 2
x* = min [E1(x1) + θTx1]
1 x2 = min [E2(x2) + θTx2]
* “Slaves”
x1 x2
• Guaranteed to converge to optimal bound L(θ)
• Choose step-width λ correctly ([Bertsekas ’95])
• Pick solution x as the best of x1 or x2
• E and L can in- and decrease during optimization
• Each step: θ gets close to optimal θ* Example optimization
34. Why can the lower bound go down?
Lower envelop of planes in 3D:
L(θ)
L(θ’)
L(θ’) ≤ L(θ)
35. Analyse the model
push x1p towards 0
1 push x2p towards 1
0
L(θ) = min [E1(x1) + θTx1] + min [E2(x2) - θTx2]
Update step: Θ’’ = Θ’ + λ (x*-x*)
1 2
Look at pixel p:
Case1: x* = x2p
1p
* then Θ’’ = Θ’
Case2: x* = 1 x2p = 0
1p
* then Θ’’ = Θ’+ λ
Case3: x* = 0 x* = 1
1p 2p then Θ’’ = Θ’- λ
36. Example 1: Segmentation and Connectivity
Foreground object must be connected:
E(x) = ∑ θi (xi) + ∑ θij (xi,xj) + h(x)
h(x)= { ∞ if x not 4-connected
0 otherwise
Zoom in
User input Standard MRF Standard MRF
+h
*Vicente et al ’08+
37. Example 1: Segmentation and Connectivity
E1(x)
E(x) = ∑ θi (xi) + ∑ θij (xi,xj) + h(x)
h(x)= { ∞ if x not 4-connected
0 otherwise
Derive Lower bound:
min E(x) = min [ E1(x) + θTx + h(x) – θTx ]
x x
≥ min [E1(x1) + θTx1] + min [h(x2) + θTx2] = L(θ)
x1 x2
Subproblem 1: Subproblem 2:
Unary terms + Unary terms +
pairwise terms Connectivity constraint
Global minimum: Global minimum:
GraphCut Dijkstra
But: Lower bound was for no example tight.
38. Example 1: Segmentation and Connectivity
E1(x)
E(x) = ∑ θi (xi) + ∑ θij (xi,xj) + h(x)
h(x)= { ∞ if x not 4-connected
0 otherwise
Derive Lower bound: x’ indicator vector of all pairwise terms
min E(x) = min [ E1(x) + θTx + θ’Tx’ + h(x) – θTx + h(x) - θ’Tx’]
x,x’ x,x’
≥ min [E1(x1) + θTx1 + θ’Tx’1] + min [h(x2) + θTx2] +
x1,x’1 x2
min [h(x3) + θ’Tx’3] =L(θ)
x3,x’3
Subproblem 1: Subproblem 2: Subproblem 3:
Unary terms + Unary terms + Pairwise terms +
pairwise terms Connectivity constraint Connectivity constraint
Global minimum: Global minimum: Lower Bound: Based on
GraphCut Dijkstra minimal paths on a dual graph
39. Results: Segmentation and Connectivity
Global optimum 12 out of 40 cases.
Extra
Input GlobalMin
Image Input GraphCut
Heuristic method, DijkstraGC, which is faster and gives
empirically same or better results
*Vicente et al ’08+
40. Example2: Dual of the LP Relaxation
(from Pawan Kumar’s part)
q*( i) = min iTx
i
xi
Wainwright et al., 2001
1
q*( 1) Va Vb Vc
Va Vb Vc
2
q*( 2) Vd Ve Vf
Vd Ve Vf
3
q*( 3) V V g V h i
Vg Vh Vi
q*( 4) q*( 5) q*( 6)
=( a0, a1,…, ab00, ab01,…) Va Vb Vc
i≥ 0
x = (xa0, xa1,…,xab00,xab01,…) Vd Ve Vf
Dual of LP
Vg Vh Vi
max i q*( i) = L({ i})
{ i} i 4 5 6
i i =
i
41. Example2: Dual of the LP Relaxation
“Original “i different “Lower bound”
problem” trees”
min Tx = min iTx
x
∑ ≥ ∑ min
x
iTx
i = L({ i})
x i i i
q*( i)
Subject to i =
i
Use subgradient … why?
θTx’1
q*( i) concave wrt i ; q*( i) = min iTx
i
θTx’’1
xi
θTx’’’1
Projected subgradient method:
θ
Θi = [Θi + λx *]
i Ω
Ω= {Θi| ∑ Θi = Θ }
i
Guaranteed to get the optimal lower bound !
42. Example 2: optimize LP of TRW
TRW-S:
• Not guaranteed to get optimal bound (DD does)
• Lower bound goes always up (DD not).
• Needs min-marginals (DD not)
• DD paralizable (every tree in DD can be optimized separately)
[Komodiakis et al ’07+
43. Example 3:
A global perspective on low-level vision
Global unary, er. 12.8%
Cost f
0 n ∑xi
Not NP-hard i
Add global term which enforces
(Pushmeet
Kohli’s part) a match with the marginal statistic
Cost f E(x) = ∑ θi (xi) + ∑ θij (xi,xj) + f(∑xi) “Solve with dual-
i i,jЄN i decomposition”
E1 E2
0 n ∑xi
*Woodford et al. ICCV’09+
i (see poster on Friday)
44. Example 3:
A global perspective on low-level vision
Image de-noising
Ground truth Noisy input Pairwise-MRF Global gradient Gradient strength
prior
Image synthesis
input [Kwatra ’03+ global color
distribution prior
45. Example 4: Solve GrabCut globally optimal
w Color model
E(x, w) E’(x) = min E(x, w)
w
Highly connected MRF Higher-order MRF
E(x,w): {0,1}n x {GMMs}→ R
E(x,w) = ∑ θi (xi,w) + ∑ θij (xi,xj) *Vicente et al; ICCV ’09+
(see poster on Tuesday)
46. Example 4: Solve GrabCut globally optimal
E(x)= g(∑xi) + ∑ fb(∑xib) + ∑ θij (xi,xj) “Solve with dual-
i b i,jЄN decomposition”
E1 E2
g convex fb concave
0 n/2 n ∑xi 0 max ∑xib
Prefers “equal area” segmentation Each color either fore- or background
input
47. Example 3: Solve GrabCut globally optimal
Globally optimal in 60% of cases, such as…
*Vicente et al; ICCV ’09+
(see poster on Tuesday)
48. Summary
• Dual Decomposition is a powerful technique for
challenging MRFs
• Not guaranteed to give globally optimal energy
• … but for several vision problems we get tight
bounds