Pulse characterization with Wavelet transforms combined with classification using binary arrays
|
|
- Everett Craig
- 5 years ago
- Views:
Transcription
1 Pulse characterization with Wavelet transforms combined with classification using binary arrays
2 Overview Wavelet Transformation Creating binary arrays out of and how to deal with them An estimator for adequate events "Hamming distance" Correlation of adequate events How to handle multiple hits
3 Concept overview wavelet transformation, "binarization" binary data selected class agents selected representation selection of class estimation of adequate events out of selected classes correlation between adequate events and classifier agent binary representation from selected classes from s data pool of known position + binary representation one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
4 What is wavelet transformation and how can we use it? The wavelet transformation is a relatively new concept (about 10 years old) It provides a time-frequency representation: Ψ = 1 τ s s x ( t) = ψ ( x) = x( t) ψ ( t ) dt Haar wavelet Wavelet transformation wavelet transformation is basely a convolution ψ ( dataset t τ s t 1 0 ) Wavelet Function t ψ ( ) t ψ ( 1 ) 1 2 t 0 t 1 ψ ( ) ψ ( )
5 how does the transformation look like? signal Haar wavelet folded HP = high pass LP = low pass
6 For better accuracy a wavelet of higher order is used: "Daubechies" Wavelet" order 1 order 2 order 3 order 4
7 Daubechies wavelet transformation Daubechies Wavelet order 5 signal folded
8 Transformation of wavelet coefficient to binary array wavelet coefficient := a i threshold := µ Binary representation := pos i Binary representation := neg i Example: µ => If µ > a i >= 0 => pos i = 0 If -µ < a i <= 0 => neg i = 0 If µ < a i => pos i = 1 If µ > a i => neg i = 1 a i => pos i =1 ; neg i = 0 a i => pos i =neg i = 0 0 -µ a i => pos i =0 ; neg i = 1 µ:= 2.5 a union of binary arrays posi negi B = pos neg
9 Concept overview wavelet transformation, "binarization" binary data "B" selected class agents selected representation selection of class estimation of adequate events out of selected classes correlation between adequate events and classifier agent binary representation from selected classes from s data pool of known position + binary representation one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
10 Classification of binary arrays to position depending classes and creating agents to represent the position depending classes 2 D representation of detector shape with area definition agent to represent area definition
11 Concept overview wavelet transformation, "binarization" binary data "B" selected classes selected representation selection of class estimation of adequate events out of selected classes correlation between adequate events and classifier agent binary representation from selected classes from s data pool of known position + binary representation one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
12 How to find the right class agent? transformed binary pulse transformed binary pulse B B & agent 1 agent = & = agent 1 equal solution => significant agent 2 not equal solution => insignificant position of interaction agent 1 agent 2
13 Concept overview wavelet transformation, "binarization" binary data "B" selected class agents selected representation selection of class estimation of adequate events out of selected classes correlation between adequate events and classifier agent binary representation from selected classes from s data pool of known position + binary representation one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
14 selected class Hamming Distance to estimate adequate binary arrays from a selected class The Hamming distances of the selected class have to be calculated The Hamming distance is used to count the number of flipped bits in a fixed-length binary word B & The Hamming distance 3 => the smaller the similar
15 Test of Hamming distance length of Hamming array : 400 bit upper limit of Hamming distance: 60 bit pulse to find Pulses selected out of a data pool with about 3500 events, 18 have been found.
16 Test of Hamming distance length of Hamming array : 400 bit upper limit of Hamming distance: 150 bit pulse to find Pulses selected out of a data pool with about 3500 events, 280 have been found.
17 Concept overview wavelet transformation, "binarization" binary data "B" selected class agents selected representation selection of class estimation of adequate events out of selected classes correlation between adequate events and classifier agent binary representation from selected classes from s data pool of known position + binary representation one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
18 Correlations between selected events and s Events with a Hamming distance lower than a fixed limit are taken The correlation will be calculated from these events The event with the best correlation will be selected
19 Multiple hits and how to handle them "transitive of wavelets" As the wavelet transformation is a transitive operation it is allowable to swap them! * := transformation operator ( ) wavelet pulse a + pulse b = * wavelet * pulse a + wavelet * pulse b that means it is possible to subtract from each other to get a new pulse
20 Multiple hits and how to handle them "transitive of wavelets" the wavelet by a wavelet will subtracted from the found wavelet and fed back in to the algorithm selected classes selection of class selected representation estimation of adequate events out of selected classes correlation between adequate events and one wavelet describes new and binary representation subtraction of the found wavelet coefficients from pulse
21 Status and further development Scanned data to be transformed in to the wavelet coefficient to create a database with wavelets and their binary representation Analysis of s in combination with in order to find best position range for the classes and their agents to build the database Analysis of the different correlation ideas and selection of the most suitable one Selection of the thresholds: Hamming distance stopping of the algorithm
Doing Right By Massive Data: How To Bring Probability Modeling To The Analysis Of Huge Datasets Without Taking Over The Datacenter
Doing Right By Massive Data: How To Bring Probability Modeling To The Analysis Of Huge Datasets Without Taking Over The Datacenter Alexander W Blocker Pavlos Protopapas Xiao-Li Meng 9 February, 2010 Outline
More informationEE123 Digital Signal Processing
EE123 Digital Signal Processing Lecture 12 Introduction to Wavelets Last Time Started with STFT Heisenberg Boxes Continue and move to wavelets Ham exam -- see Piazza post Please register at www.eastbayarc.org/form605.htm
More informationBoosting: Algorithms and Applications
Boosting: Algorithms and Applications Lecture 11, ENGN 4522/6520, Statistical Pattern Recognition and Its Applications in Computer Vision ANU 2 nd Semester, 2008 Chunhua Shen, NICTA/RSISE Boosting Definition
More informationIntroduction to Deep Learning CMPT 733. Steven Bergner
Introduction to Deep Learning CMPT 733 Steven Bergner Overview Renaissance of artificial neural networks Representation learning vs feature engineering Background Linear Algebra, Optimization Regularization
More informationEfficient discovery of the top-k optimal dependency rules with Fisher s exact test of significance
Efficient discovery of the top-k optimal dependency rules with Fisher s exact test of significance Wilhelmiina Hämäläinen epartment of omputer Science University of Helsinki Finland whamalai@cs.helsinki.fi
More informationLearning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 7.2, Page 1
Learning Objectives At the end of the class you should be able to: identify a supervised learning problem characterize how the prediction is a function of the error measure avoid mixing the training and
More informationLearning Theory. Machine Learning CSE546 Carlos Guestrin University of Washington. November 25, Carlos Guestrin
Learning Theory Machine Learning CSE546 Carlos Guestrin University of Washington November 25, 2013 Carlos Guestrin 2005-2013 1 What now n We have explored many ways of learning from data n But How good
More informationRoger L. Tokheim. Chapter 8 Counters Glencoe/McGraw-Hill
Digital Electronics Principles & Applications Sixth Edition Roger L. Tokheim Chapter 8 Counters 2003 Glencoe/McGraw-Hill INTRODUCTION Overview of Counters Characteristics of Counters Ripple Up Counter
More informationData Mining. CS57300 Purdue University. Bruno Ribeiro. February 8, 2018
Data Mining CS57300 Purdue University Bruno Ribeiro February 8, 2018 Decision trees Why Trees? interpretable/intuitive, popular in medical applications because they mimic the way a doctor thinks model
More informationReview of Lecture 1. Across records. Within records. Classification, Clustering, Outlier detection. Associations
Review of Lecture 1 This course is about finding novel actionable patterns in data. We can divide data mining algorithms (and the patterns they find) into five groups Across records Classification, Clustering,
More informationModule 7:Data Representation Lecture 35: Wavelets. The Lecture Contains: Wavelets. Discrete Wavelet Transform (DWT) Haar wavelets: Example
The Lecture Contains: Wavelets Discrete Wavelet Transform (DWT) Haar wavelets: Example Haar wavelets: Theory Matrix form Haar wavelet matrices Dimensionality reduction using Haar wavelets file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture35/35_1.htm[6/14/2012
More information- An Image Coding Algorithm
- An Image Coding Algorithm Shufang Wu http://www.sfu.ca/~vswu vswu@cs.sfu.ca Friday, June 14, 2002 22-1 Agenda Overview Discrete Wavelet Transform Zerotree Coding of Wavelet Coefficients Successive-Approximation
More informationWavelet Scattering Transforms
Wavelet Scattering Transforms Haixia Liu Department of Mathematics The Hong Kong University of Science and Technology February 6, 2018 Outline 1 Problem Dataset Problem two subproblems outline of image
More informationESPRIT Feature. Innovation with Integrity. Particle detection and chemical classification EDS
ESPRIT Feature Particle detection and chemical classification Innovation with Integrity EDS Fast and Comprehensive Feature Analysis Based on the speed and accuracy of the QUANTAX EDS system with its powerful
More informationDecision Trees. CS57300 Data Mining Fall Instructor: Bruno Ribeiro
Decision Trees CS57300 Data Mining Fall 2016 Instructor: Bruno Ribeiro Goal } Classification without Models Well, partially without a model } Today: Decision Trees 2015 Bruno Ribeiro 2 3 Why Trees? } interpretable/intuitive,
More informationDesign at the Register Transfer Level
Week-7 Design at the Register Transfer Level Algorithmic State Machines Algorithmic State Machine (ASM) q Our design methodologies do not scale well to real-world problems. q 232 - Logic Design / Algorithmic
More informationThe Advanced Gamma Tracking Array detector characterisation
The Advanced Gamma Tracking Array detector characterisation http://www.gsi.de/agata/ Andy Boston ajboston@liv.ac.uk Ingredients of γ-tracking Ulaanbaatar Conference on Nuclear Physics and Applications
More informationOutline Challenges of Massive Data Combining approaches Application: Event Detection for Astronomical Data Conclusion. Abstract
Abstract The analysis of extremely large, complex datasets is becoming an increasingly important task in the analysis of scientific data. This trend is especially prevalent in astronomy, as large-scale
More informationEmbedded Zerotree Wavelet (EZW)
Embedded Zerotree Wavelet (EZW) These Notes are Based on (or use material from): 1. J. M. Shapiro, Embedded Image Coding Using Zerotrees of Wavelet Coefficients, IEEE Trans. on Signal Processing, Vol.
More informationTwo Channel Subband Coding
Two Channel Subband Coding H1 H1 H0 H0 Figure 1: Two channel subband coding. In two channel subband coding A signal is convolved with a highpass filter h 1 and a lowpass filter h 0. The two halfband signals
More information+ (50% contribution by each member)
Image Coding using EZW and QM coder ECE 533 Project Report Ahuja, Alok + Singh, Aarti + + (50% contribution by each member) Abstract This project involves Matlab implementation of the Embedded Zerotree
More information1 Handling of Continuous Attributes in C4.5. Algorithm
.. Spring 2009 CSC 466: Knowledge Discovery from Data Alexander Dekhtyar.. Data Mining: Classification/Supervised Learning Potpourri Contents 1. C4.5. and continuous attributes: incorporating continuous
More informationFlip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance. Presenter: Brian Wongchaowart March 17, 2010
Flip-N-Write: A Simple Deterministic Technique to Improve PRAM Write Performance, Energy and Endurance Sangyeun Cho Hyunjin Lee Presenter: Brian Wongchaowart March 17, 2010 Motivation Suppose that you
More informationDigital Image Processing Lectures 15 & 16
Lectures 15 & 16, Professor Department of Electrical and Computer Engineering Colorado State University CWT and Multi-Resolution Signal Analysis Wavelet transform offers multi-resolution by allowing for
More informationChannel Coding and Interleaving
Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Lesson 13 Zerotree Approach. Instructional Objectives At the end of this lesson, the students should be able to: 1. Explain the principle of embedded coding. 2. Show the
More informationIBM quantum experience: Experimental implementations, scope, and limitations
IBM quantum experience: Experimental implementations, scope, and limitations Plan of the talk IBM Quantum Experience Introduction IBM GUI Building blocks for IBM quantum computing Implementations of various
More informationLogic Design II (17.342) Spring Lecture Outline
Logic Design II (17.342) Spring 2012 Lecture Outline Class # 10 April 12, 2012 Dohn Bowden 1 Today s Lecture First half of the class Circuits for Arithmetic Operations Chapter 18 Should finish at least
More informationThe Detection Techniques for Several Different Types of Fiducial Markers
Vol. 1, No. 2, pp. 86-93(2013) The Detection Techniques for Several Different Types of Fiducial Markers Chuen-Horng Lin 1,*,Yu-Ching Lin 1,and Hau-Wei Lee 2 1 Department of Computer Science and Information
More informationModule 4 MULTI- RESOLUTION ANALYSIS. Version 2 ECE IIT, Kharagpur
Module 4 MULTI- RESOLUTION ANALYSIS Lesson Theory of Wavelets Instructional Objectives At the end of this lesson, the students should be able to:. Explain the space-frequency localization problem in sinusoidal
More informationClassification of Hand-Written Digits Using Scattering Convolutional Network
Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview
More informationPhoton Detection. Array of Photon Detectors. Response Function. Photon Detection. The goal is a simple model for photon detection.
Photon Detection The goal is a simple model for photon detection. The detector model will have an onset threshold and a saturation level. Photon Detection The photon stream will be treated as a Poisson
More informationECE 661: Homework 10 Fall 2014
ECE 661: Homework 10 Fall 2014 This homework consists of the following two parts: (1) Face recognition with PCA and LDA for dimensionality reduction and the nearest-neighborhood rule for classification;
More informationWavelets and Image Compression. Bradley J. Lucier
Wavelets and Image Compression Bradley J. Lucier Abstract. In this paper we present certain results about the compression of images using wavelets. We concentrate on the simplest case of the Haar decomposition
More information1 Handling of Continuous Attributes in C4.5. Algorithm
.. Spring 2009 CSC 466: Knowledge Discovery from Data Alexander Dekhtyar.. Data Mining: Classification/Supervised Learning Potpourri Contents 1. C4.5. and continuous attributes: incorporating continuous
More informationIntroduction to Computer Vision. 2D Linear Systems
Introduction to Computer Vision D Linear Systems Review: Linear Systems We define a system as a unit that converts an input function into an output function Independent variable System operator or Transfer
More informationECE 901 Lecture 16: Wavelet Approximation Theory
ECE 91 Lecture 16: Wavelet Approximation Theory R. Nowak 5/17/29 1 Introduction In Lecture 4 and 15, we investigated the problem of denoising a smooth signal in additive white noise. In Lecture 4, we considered
More informationINTRODUCTION TO. Adapted from CS474/674 Prof. George Bebis Department of Computer Science & Engineering University of Nevada (UNR)
INTRODUCTION TO WAVELETS Adapted from CS474/674 Prof. George Bebis Department of Computer Science & Engineering University of Nevada (UNR) CRITICISM OF FOURIER SPECTRUM It gives us the spectrum of the
More information1 What a Neural Network Computes
Neural Networks 1 What a Neural Network Computes To begin with, we will discuss fully connected feed-forward neural networks, also known as multilayer perceptrons. A feedforward neural network consists
More informationUniversität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Decision Trees. Tobias Scheffer
Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Decision Trees Tobias Scheffer Decision Trees One of many applications: credit risk Employed longer than 3 months Positive credit
More informationALU (3) - Division Algorithms
HUMBOLDT-UNIVERSITÄT ZU BERLIN INSTITUT FÜR INFORMATIK Lecture 12 ALU (3) - Division Algorithms Sommersemester 2002 Leitung: Prof. Dr. Miroslaw Malek www.informatik.hu-berlin.de/rok/ca CA - XII - ALU(3)
More informationContents Lecture 4. Lecture 4 Linear Discriminant Analysis. Summary of Lecture 3 (II/II) Summary of Lecture 3 (I/II)
Contents Lecture Lecture Linear Discriminant Analysis Fredrik Lindsten Division of Systems and Control Department of Information Technology Uppsala University Email: fredriklindsten@ituuse Summary of lecture
More informationWavelets Marialuce Graziadei
Wavelets Marialuce Graziadei 1. A brief summary 2. Vanishing moments 3. 2D-wavelets 4. Compression 5. De-noising 1 1. A brief summary φ(t): scaling function. For φ the 2-scale relation hold φ(t) = p k
More information1. SINGULARITY FUNCTIONS
1. SINGULARITY FUNCTIONS 1.0 INTRODUCTION Singularity functions are discontinuous functions or their derivatives are discontinuous. A singularity is a point at which a function does not possess a derivative.
More informationReal Time Face Detection and Recognition using Haar - Based Cascade Classifier and Principal Component Analysis
Real Time Face Detection and Recognition using Haar - Based Cascade Classifier and Principal Component Analysis Sarala A. Dabhade PG student M. Tech (Computer Egg) BVDU s COE Pune Prof. Mrunal S. Bewoor
More informationWhat is a quantum computer? Quantum Architecture. Quantum Mechanics. Quantum Superposition. Quantum Entanglement. What is a Quantum Computer (contd.
What is a quantum computer? Quantum Architecture by Murat Birben A quantum computer is a device designed to take advantage of distincly quantum phenomena in carrying out a computational task. A quantum
More informationAdvanced Image Cleaning
Introduction Algorithms Experiments Results Conclusion References CTA Consortium Meeting Jérémie DECOCK October 25, 216 Introduction Algorithms Experiments Results Conclusion References Introduction 2
More informationFinal Examination CS540-2: Introduction to Artificial Intelligence
Final Examination CS540-2: Introduction to Artificial Intelligence May 9, 2018 LAST NAME: SOLUTIONS FIRST NAME: Directions 1. This exam contains 33 questions worth a total of 100 points 2. Fill in your
More informationDigital Circuits and Systems
EE201: Digital Circuits and Systems 4 Sequential Circuits page 1 of 11 EE201: Digital Circuits and Systems Section 4 Sequential Circuits 4.1 Overview of Sequential Circuits: Definition The circuit whose
More informationL. Yaroslavsky. Fundamentals of Digital Image Processing. Course
L. Yaroslavsky. Fundamentals of Digital Image Processing. Course 0555.330 Lec. 6. Principles of image coding The term image coding or image compression refers to processing image digital data aimed at
More informationChapter 7 Wavelets and Multiresolution Processing
Chapter 7 Wavelets and Multiresolution Processing Background Multiresolution Expansions Wavelet Transforms in One Dimension Wavelet Transforms in Two Dimensions Image Pyramids Subband Coding The Haar
More informationSF2930 Regression Analysis
SF2930 Regression Analysis Alexandre Chotard Tree-based regression and classication 20 February 2017 1 / 30 Idag Overview Regression trees Pruning Bagging, random forests 2 / 30 Today Overview Regression
More informationHarmonic Analysis and Geometries of Digital Data Bases
Harmonic Analysis and Geometries of Digital Data Bases AMS Session Special Sesson on the Mathematics of Information and Knowledge, Ronald Coifman (Yale) and Matan Gavish (Stanford, Yale) January 14, 2010
More informationModeling radon daughter deposition rates for low background detectors
Modeling radon daughter deposition rates for low background detectors Shawn Westerdale LANL, MIT Student Symposium 2009 0 LA-UR : 09-04881 Shawn Westerdale (LANL, MIT) P-23 Weak Interactions Team Student
More information( nonlinear constraints)
Wavelet Design & Applications Basic requirements: Admissibility (single constraint) Orthogonality ( nonlinear constraints) Sparse Representation Smooth functions well approx. by Fourier High-frequency
More informationPhys 243 Lab 7: Radioactive Half-life
Phys 243 Lab 7: Radioactive Half-life Dr. Robert MacDonald The King s University College Winter 2013 Abstract In today s lab you ll be measuring the half-life of barium-137, a radioactive isotope of barium.
More informationStephen Scott.
1 / 35 (Adapted from Ethem Alpaydin and Tom Mitchell) sscott@cse.unl.edu In Homework 1, you are (supposedly) 1 Choosing a data set 2 Extracting a test set of size > 30 3 Building a tree on the training
More informationInvariant Scattering Convolution Networks
Invariant Scattering Convolution Networks Joan Bruna and Stephane Mallat Submitted to PAMI, Feb. 2012 Presented by Bo Chen Other important related papers: [1] S. Mallat, A Theory for Multiresolution Signal
More informationKing Fahd University of Petroleum and Minerals College of Computer Science and Engineering Computer Engineering Department
King Fahd University of Petroleum and Minerals College of Computer Science and Engineering Computer Engineering Department Page 1 of 13 COE 202: Digital Logic Design (3-0-3) Term 112 (Spring 2012) Final
More informationACM 126a Solutions for Homework Set 4
ACM 26a Solutions for Homewor Set 4 Laurent Demanet March 2, 25 Problem. Problem 7.7 page 36 We need to recall a few standard facts about Fourier series. Convolution: Subsampling (see p. 26): Zero insertion
More informationOn the Use of Hot-Film Sensors in the Investigation of Fluid Dynamic Phenomena in the Near-Wall Region
UNIVERSITY of LIMERICK OLLSCOIL LUIMNIGH On the Use of Hot-Film Sensors in the Investigation of Fluid Dynamic Phenomena in the Near-Wall Region Philip C. Griffin & Mark R.D. Davies Stokes Research Institute
More informationBinary Convolutional Codes
Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An
More informationECS 332: Principles of Communications 2012/1. HW 4 Due: Sep 7
ECS 332: Principles of Communications 2012/1 HW 4 Due: Sep 7 Lecturer: Prapun Suksompong, Ph.D. Instructions (a) ONE part of a question will be graded (5 pt). Of course, you do not know which part will
More informationLower and Upper Bound Theory
Lower and Upper Bound Theory Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY 1 Lower and Upper Bound Theory How fast can we sort? Most of the sorting algorithms are
More informationAssignment #09 - Solution Manual
Assignment #09 - Solution Manual 1. Choose the correct statements about representation of a continuous signal using Haar wavelets. 1.5 points The signal is approximated using sin and cos functions. The
More informationShift Register Counters
Shift Register Counters Shift register counter: a shift register with the serial output connected back to the serial input. They are classified as counters because they give a specified sequence of states.
More informationCS 188: Artificial Intelligence. Outline
CS 188: Artificial Intelligence Lecture 21: Perceptrons Pieter Abbeel UC Berkeley Many slides adapted from Dan Klein. Outline Generative vs. Discriminative Binary Linear Classifiers Perceptron Multi-class
More informationLecture 2: Haar Multiresolution analysis
WAVELES AND MULIRAE DIGIAL SIGNAL PROCESSING Lecture 2: Haar Multiresolution analysis Prof.V. M. Gadre, EE, II Bombay 1 Introduction HAAR was a mathematician, who has given an idea that any continuous
More informationLearning and Memory in Neural Networks
Learning and Memory in Neural Networks Guy Billings, Neuroinformatics Doctoral Training Centre, The School of Informatics, The University of Edinburgh, UK. Neural networks consist of computational units
More informationUsing a Hopfield Network: A Nuts and Bolts Approach
Using a Hopfield Network: A Nuts and Bolts Approach November 4, 2013 Gershon Wolfe, Ph.D. Hopfield Model as Applied to Classification Hopfield network Training the network Updating nodes Sequencing of
More informationDeep Learning: Approximation of Functions by Composition
Deep Learning: Approximation of Functions by Composition Zuowei Shen Department of Mathematics National University of Singapore Outline 1 A brief introduction of approximation theory 2 Deep learning: approximation
More informationData Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.5. Spring 2010 Instructor: Dr. Masoud Yaghini Outline How the Brain Works Artificial Neural Networks Simple Computing Elements Feed-Forward Networks Perceptrons (Single-layer,
More informationWavelets and Multiresolution Processing
Wavelets and Multiresolution Processing Wavelets Fourier transform has it basis functions in sinusoids Wavelets based on small waves of varying frequency and limited duration In addition to frequency,
More informationLecture 4 Discriminant Analysis, k-nearest Neighbors
Lecture 4 Discriminant Analysis, k-nearest Neighbors Fredrik Lindsten Division of Systems and Control Department of Information Technology Uppsala University. Email: fredrik.lindsten@it.uu.se fredrik.lindsten@it.uu.se
More informationFully Bayesian Analysis of Low-Count Astronomical Images
Fully Bayesian Analysis of Low-Count Astronomical Images 1 Alanna Connors 2 1 Department of Statistics University of California, Irvine 2 Eurika Scientific Thanks to James Chiang, Adam Roy, and The California
More informationIntroduction to Low-Density Parity Check Codes. Brian Kurkoski
Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code
More informationCS5112: Algorithms and Data Structures for Applications
CS5112: Algorithms and Data Structures for Applications Lecture 14: Exponential decay; convolution Ramin Zabih Some content from: Piotr Indyk; Wikipedia/Google image search; J. Leskovec, A. Rajaraman,
More informationSparse linear models
Sparse linear models Optimization-Based Data Analysis http://www.cims.nyu.edu/~cfgranda/pages/obda_spring16 Carlos Fernandez-Granda 2/22/2016 Introduction Linear transforms Frequency representation Short-time
More informationVisual Object Detection
Visual Object Detection Ying Wu Electrical Engineering and Computer Science Northwestern University, Evanston, IL 60208 yingwu@northwestern.edu http://www.eecs.northwestern.edu/~yingwu 1 / 47 Visual Object
More informationDetection of Artificial Satellites in Images Acquired in Track Rate Mode.
Detection of Artificial Satellites in Images Acquired in Track Rate Mode. Martin P. Lévesque Defence R&D Canada- Valcartier, 2459 Boul. Pie-XI North, Québec, QC, G3J 1X5 Canada, martin.levesque@drdc-rddc.gc.ca
More informationMulti-Layer Boosting for Pattern Recognition
Multi-Layer Boosting for Pattern Recognition François Fleuret IDIAP Research Institute, Centre du Parc, P.O. Box 592 1920 Martigny, Switzerland fleuret@idiap.ch Abstract We extend the standard boosting
More informationHarmonic Analysis of Deep Convolutional Neural Networks
Harmonic Analysis of Deep Convolutional Neural Networks Helmut Bőlcskei Department of Information Technology and Electrical Engineering October 2017 joint work with Thomas Wiatowski and Philipp Grohs ImageNet
More informationPart 1: Digital Logic and Gates. Analog vs. Digital waveforms. The digital advantage. In real life...
Part 1: Digital Logic and Gates Analog vs Digital waveforms An analog signal assumes a continuous range of values: v(t) ANALOG A digital signal assumes discrete (isolated, separate) values Usually there
More informationMetric Embedding of Task-Specific Similarity. joint work with Trevor Darrell (MIT)
Metric Embedding of Task-Specific Similarity Greg Shakhnarovich Brown University joint work with Trevor Darrell (MIT) August 9, 2006 Task-specific similarity A toy example: Task-specific similarity A toy
More informationImage retrieval, vector quantization and nearest neighbor search
Image retrieval, vector quantization and nearest neighbor search Yannis Avrithis National Technical University of Athens Rennes, October 2014 Part I: Image retrieval Particular object retrieval Match images
More informationUNSIGNED BINARY NUMBERS DIGITAL ELECTRONICS SYSTEM DESIGN WHAT ABOUT NEGATIVE NUMBERS? BINARY ADDITION 11/9/2018
DIGITAL ELECTRONICS SYSTEM DESIGN LL 2018 PROFS. IRIS BAHAR & ROD BERESFORD NOVEMBER 9, 2018 LECTURE 19: BINARY ADDITION, UNSIGNED BINARY NUMBERS For the binary number b n-1 b n-2 b 1 b 0. b -1 b -2 b
More informationS.Y. Diploma : Sem. III [CO/CM/IF/CD/CW] Digital Techniques
S.Y. Diploma : Sem. III [CO/CM/IF/CD/CW] Digital Techniques Time: 3 Hrs.] Prelim Question Paper Solution [Marks : 100 Q.1(a) Attempt any SIX of the following : [12] Q.1(a) (i) Derive AND gate and OR gate
More informationIntroduction to Signal Processing
to Signal Processing Davide Bacciu Dipartimento di Informatica Università di Pisa bacciu@di.unipi.it Intelligent Systems for Pattern Recognition Signals = Time series Definitions Motivations A sequence
More informationSparse Approximation and Variable Selection
Sparse Approximation and Variable Selection Lorenzo Rosasco 9.520 Class 07 February 26, 2007 About this class Goal To introduce the problem of variable selection, discuss its connection to sparse approximation
More informationInvestigating the Existence of Barker Codes
20th June 2008 R. Altalli, L. Cao, F. Chen, E. Cumberbatch, L. Cummings, R. Ferguson, J. Miller, S. Li, H. Liang, Y. Liu, I. Mercer, C. Please, M. Salem, B. Tilley, J. Watt, Y. Yang Greg Coxson, TSC and
More informationLecture 9 Evolutionary Computation: Genetic algorithms
Lecture 9 Evolutionary Computation: Genetic algorithms Introduction, or can evolution be intelligent? Simulation of natural evolution Genetic algorithms Case study: maintenance scheduling with genetic
More informationGenerative Models for Classification
Generative Models for Classification CS4780/5780 Machine Learning Fall 2014 Thorsten Joachims Cornell University Reading: Mitchell, Chapter 6.9-6.10 Duda, Hart & Stork, Pages 20-39 Generative vs. Discriminative
More informationCPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication
CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication March, 2006 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform
More informationIntroduction to Wavelet. Based on A. Mukherjee s lecture notes
Introduction to Wavelet Based on A. Mukherjee s lecture notes Contents History of Wavelet Problems of Fourier Transform Uncertainty Principle The Short-time Fourier Transform Continuous Wavelet Transform
More informationStatistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 2: Introduction to statistical learning theory. 1 / 22 Goals of statistical learning theory SLT aims at studying the performance of
More informationA First Course in Wavelets with Fourier Analysis
* A First Course in Wavelets with Fourier Analysis Albert Boggess Francis J. Narcowich Texas A& M University, Texas PRENTICE HALL, Upper Saddle River, NJ 07458 Contents Preface Acknowledgments xi xix 0
More informationLecture 7. Union bound for reducing M-ary to binary hypothesis testing
Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing
More informationFinal Examination CS 540-2: Introduction to Artificial Intelligence
Final Examination CS 540-2: Introduction to Artificial Intelligence May 7, 2017 LAST NAME: SOLUTIONS FIRST NAME: Problem Score Max Score 1 14 2 10 3 6 4 10 5 11 6 9 7 8 9 10 8 12 12 8 Total 100 1 of 11
More informationAMORTIZED ANALYSIS. binary counter multipop stack dynamic table. Lecture slides by Kevin Wayne. Last updated on 1/24/17 11:31 AM
AMORTIZED ANALYSIS binary counter multipop stack dynamic table Lecture slides by Kevin Wayne http://www.cs.princeton.edu/~wayne/kleinberg-tardos Last updated on 1/24/17 11:31 AM Amortized analysis Worst-case
More informationCounting Photons to Calibrate a Photometer for Stellar Intensity Interferometry
Counting Photons to Calibrate a Photometer for Stellar Intensity Interferometry A Senior Project Presented to the Department of Physics California Polytechnic State University, San Luis Obispo In Partial
More information