Towards Real Time Pattern Detection
|
|
- George Stewart
- 5 years ago
- Views:
Transcription
1 Towards Real Time attern Detection Yacov Hel-Or The Interdisciplinary Center attern Detection A given pattern is sought in an image/video. The pattern may appear at any location in the image. The pattern may be subject to any transformation (within a given transformation group). joint work with Hagit Hel-Or Haifa University 1 Example in 2D Face detection in images Example in 3D Action detection in video streams 1
2 Why is this a hard problem? The search in Spatial Domain Two types of search: 1. Search in the Spatial Domain. 2. Search in the Transformation Domain. Searching for faces in a 1000x1000 image, is applied 1e6 times, for each pixel location. A very expensive search problem The Search in Transformation Domain rotation of 2D signal projected into its 3 highest eigen-vectors A pattern under transformations draws a manifold in pattern space : R kxk Q T(α) A rotation manifold of a pattern drawn in pattern-space The manifold was projected into its three most significant components. 2
3 The transformation manifold in the pattern space is highly complex: In a very high dimensional space. Non convex. Non regular (two similarly perceived patterns may be distant in pattern space). Efficient Search in the Transformation Domain (In ICI, Barcelona Sept. 2003) A complex search problem Transformation Manifold A pattern can be represented as a point in R kxk T(α) is a transformation T(α) applied to pattern. T(α) for all α forms an orbit in R kxk Fast Search in attern Orbit Assume d(q,) is a distance metric. We would like to find (Q,)=min α d(q, T(α)) T(α 0 ) T(α 1 ) Q (Q,) T(α) T(α 2 ) 3
4 Fast Search in attern Orbit (Cont.) Fast Search in attern Orbit (Cont.) In the general case (Q,) is not a metric. Q Observation: if d(q,)= d(t(α)q, T(α)) R The metric property of (Q,) implies triangular inequality on the distances. Q S (Q,)- (,S) (Q,S) (Q,) is a metric oint-to-orbit dist. = Orbit-to-Orbit dist. Orbit Decomposition In practice T(α) is sampled into T ε (i) = T (εi), i=1,2, We can divide T ε (i) into two sub-orbits: T 2ε (i) and T 2ε (i) where = T ε (1) Orbit Decomposition (Cont.) Q 2ε (,Q) ε (,Q) 2ε (,Q) 2ε (, ) T 2ε (i) 2ε T ε (i) ε T 2ε (i) 2ε T 2ε (i) T ε (i) T 2ε (i) ε (,Q) = Min k { { 2ε d(q,t (,Q) ε (k)), 2ε (,Q) } Since 2ε is a metric and 2ε (, ) can be calculated in advance we may save calculations using the triangle inequality constraint. 4
5 The Orbit Tree The sub-group subdivision can be applied recursively. Threshold = 100 Orbit Tree 5
6 6
7 % Image ixels Remaining Rejection Rate # Distance Calculations Average number of distance computations per pixel is Fast Search in Group Orbit: Summary Observation 1: Orbit distance is a metric when the point distance is transformation invariant. Observation 2: Fast search in orbit distance space can be applied using the triangular inequality. Distant patterns are rejected fast. Important: Can be applied to metric spaces (Non Euclidean). Manifold simplification can be achieved using metric spaces that are NOT Euclidean. Fast search methods in metric spaces are required. 7
8 Efficient Search in the Spatial Domain (In ICCV, France, Oct. 2003) The Euclidean Distance d E ( u, v) = [ I( x u, y v) ( x, y) ] x, y N 2 d E ( u, v, t) = [ I( x u, y v, t w) ( x, y, t) ] x, y, t N 2 The Euclidean Distance Euclidean Distance (Cont.) W de (,W) d E (, W ) = W = ( W ) i T + W W 2 T i i i T Wi i T ( W) = T is constant. W T W can be calculated using a convolution of a window of ones with the squared image. T W can be calculated using a convolution of with the image. i 8
9 The Fourier Transform The Convolution Theorem W i Jean Baptiste Joseph Fourier R(i)= T W i projection of onto W i R = I= FFT { FFT{ I} FFT{ } Complexity (2D case) Norm Distance in Sub-space Representing an image window and the pattern as vectors in R kxk : Naive Fourier Average # Operations per ixel +: 2k 2 *: k 2 +: 36 log n *: 24 log n Space n 2 n 2 Integer Arithm. Yes No Run Time for 1Kx1K Image 32x32 pattern III, 1.8 Ghz 5.14 seconds 4.3 seconds d E (p,q)= w-p 2 = - 2 If p and w were projected onto a unit kernel u it follows from the Cauchy-Schwarz Inequality: d E (p,w) b where b=u T p-u T w w u b p 9
10 Distance Measure in Sub-space (Cont.) If w and p were projected onto a set of kernels: U T (p-w)=b w How can we Expedite the Distance Calculations? Two necessary requirements: 1. Choose projecting kernels [U] having high probability to be parallel to the vector p-w. 2. Choose projecting kernels that are fast to apply. p u 2 Natural Images It can be shown that: u 1 d E T T 1 ( p, w ) b ( U U ) b u 1 V u=-2, v=2 u=-1, v=2 u=0, v=2 u=1, v=2 u=2, v=2 u=-2, v=1 u=-1, v=1 u=0, v=1 u=1, v=1 u=2, v=1 U u=-2, v=0 u=-1, v=0 u=0, v=0 u=1, v=0 u=2, v=0 u=-2, v=-1 u=-1, v=-1 u=0, v=-1 u=1, v=-1 u=2, v=-1 u=-2, v=-2 u=-1, v=-2 u=0, v=-2 u=1, v=-2 u=2, v=-2 10
11 rojecting Kernels: Walsh-Hadamard The Walsh-Hadamard Kernels: Following the above requirement we use the kxk Walsh-Hadamard kernels Each window in a natural image is closely spanned by the first few kernel vectors. Can be applied very fast in a recursive manner. Walsh-Hadamard v.s. Standard Basis: The Walsh-Hadamard Tree (1D case) The lower bound for distance value in % v.s. number of Walsh-Hadamard projections, averaged over 100 patternimage pairs of size 256x256. The lower bound for distance value in % v.s. number of standard basis projections, Averaged over 100 pattern-image pairs of size 256x
12 The Walsh-Hadamard Tree - Example roperties: Descending from a node to its child requires one addition operation per pixel. A projection of the entire image onto one kernel is performed in a top-down traversal. A projection of a particular window in the image onto one kernel is performed in a bottom-up traversal. All operations are performed in integers Complexity (1D): rojecting all windows in the image onto a single kernel requires log k additions per pixel. rojecting all windows in the image onto l<k kernels requires m additions per pixel, where m is the number of nodes preceding the l leaf. rojecting all windows in the image onto k kernels requires 2k additions per pixel. + rojecting a single window onto a single - + kernel requires k-1 additions Walsh-Hadamard Tree (2D): For the 2D case, the projection is performed in a similar manner where the tree depth is 2log k The complexity is calculated accordingly Construction tree for 2x2 basis 12
13 attern Matching algorithm Iteratively apply Walsh-Hadamard kernels to each window w i in the image. At each iteration and for each w i calculate a lowerbound Lb i for p-w i 2. If the lower-bound Lb i is greater than a pre-defined threshold, reject the window w i and ignore it in further projections. attern Matching algorithm - Complexity All windows are projected onto the first kernel : 2logk ops/pixel Only a few windows are further projected using ~2k operations per active window : ε ops/pixel Total : 2logk + ε ops/pixel Example: Sought attern Initial Image: candidates After the 1 st st projection: 563 candidates 13
14 After the 2 nd projection: 16 candidates After the 3 rd projection: 1 candidate ercentage of windows remaining following each projection, averaged over 100 pattern-image pairs. Image size = 256x256, pattern size = 16x16. Accumulated number of additions after each projection averaged over 100 pattern-image pairs. Image size = 256x256, pattern size = 16x16. Average Number of operations per pixel:
15 Example with Noise Original Noise Level = 40 Detected patterns % Windows Remaining rojection # Number of projections required to find all patterns, as a function of noise level. (Threshold is set to minimum). ercentage of windows remaining following each projection, at various noise levels. Image size = 256x256, pattern size = 16x16. DC-invariant attern Matching Complexity (2D case) Original Illumination gradient added Detected patterns. Average # Operations per ixel Space Integer Arithm. Run Time for 1Kx1K Image 32x32 pattern III, 1.8 Ghz Naive +: 2k 2 *: k 2 n 2 Yes 4.86 seconds Fourier +: 36 log n *: 24 log n n 2 No 3.5 seconds New +: 2 log k + ε n 2 log k Yes 78 msec Five projections are required to find all 10 patterns (Threshold is set to minimum). 15
16 Fast Search in Spatial Domain - Summary: Very fast application of projection kernels. rojections are performed with additions/subtractions only (no multiplications). Integer operations (3 times faster for additions). Fast rejection of windows. ossible to perform pattern matching at video rate. Can implement a normalized correlation as well. A C++ implementation is available on the web. Conclusion attern Detection using 2 complementary processes: 1. Reduce search in Transformation Domain. 2. Reduce search in Spatial Domain. rocesses are based on rejection schemes, and are restricted to a specific domain. The two processes can be combined into a single, highly efficient, search process. --- END The size of WH projection kernels are 2 K x2 k. Show how is it possible to apply the fast pattern matching (using Eulcidean distance) for patterns of size different than 2 K x2 k. rove : if d(q,)= d(t(α)q, T(α)), (Q,)=min α,β d(t(β)q, T(α)) is a metric (Hint: since T(α) is a group, for any α there exists a α such that T(α ) T(α) =I ) 16
Real Time Pattern Detection
Real Time Pattern Detection Yacov Hel-Or The Interdisciplinary Center joint work with Hagit Hel-Or Haifa University 1 Pattern Detection A given pattern is sought in an image. The pattern may appear at
More informationAlgorithms for Picture Analysis. Lecture 07: Metrics. Axioms of a Metric
Axioms of a Metric Picture analysis always assumes that pictures are defined in coordinates, and we apply the Euclidean metric as the golden standard for distance (or derived, such as area) measurements.
More informationFinal Exam, Machine Learning, Spring 2009
Name: Andrew ID: Final Exam, 10701 Machine Learning, Spring 2009 - The exam is open-book, open-notes, no electronics other than calculators. - The maximum possible score on this exam is 100. You have 3
More informationTailored Bregman Ball Trees for Effective Nearest Neighbors
Tailored Bregman Ball Trees for Effective Nearest Neighbors Frank Nielsen 1 Paolo Piro 2 Michel Barlaud 2 1 Ecole Polytechnique, LIX, Palaiseau, France 2 CNRS / University of Nice-Sophia Antipolis, Sophia
More informationFiltering and Edge Detection
Filtering and Edge Detection Local Neighborhoods Hard to tell anything from a single pixel Example: you see a reddish pixel. Is this the object s color? Illumination? Noise? The next step in order of complexity
More informationThe Generalized Laplacian Distance and its Applications for Visual Matching
013 IEEE Conference on Computer Vision and Pattern Recognition The Generalized Laplacian Distance and its Applications for Visual Matching Elhanan Elboher 1 Michael Werman 1 Yacov Hel-Or 1 School of Computer
More informationRandomized Algorithms
Randomized Algorithms Saniv Kumar, Google Research, NY EECS-6898, Columbia University - Fall, 010 Saniv Kumar 9/13/010 EECS6898 Large Scale Machine Learning 1 Curse of Dimensionality Gaussian Mixture Models
More informationSome Useful Background for Talk on the Fast Johnson-Lindenstrauss Transform
Some Useful Background for Talk on the Fast Johnson-Lindenstrauss Transform Nir Ailon May 22, 2007 This writeup includes very basic background material for the talk on the Fast Johnson Lindenstrauss Transform
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationOn the interior of the simplex, we have the Hessian of d(x), Hd(x) is diagonal with ith. µd(w) + w T c. minimize. subject to w T 1 = 1,
Math 30 Winter 05 Solution to Homework 3. Recognizing the convexity of g(x) := x log x, from Jensen s inequality we get d(x) n x + + x n n log x + + x n n where the equality is attained only at x = (/n,...,
More informationWolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13 Indexes for Multimedia Data 13 Indexes for Multimedia
More informationHilbert Spaces. Hilbert space is a vector space with some extra structure. We start with formal (axiomatic) definition of a vector space.
Hilbert Spaces Hilbert space is a vector space with some extra structure. We start with formal (axiomatic) definition of a vector space. Vector Space. Vector space, ν, over the field of complex numbers,
More informationActive Testing! Liu Yang! Joint work with Nina Balcan,! Eric Blais and Avrim Blum! Liu Yang 2011
! Active Testing! Liu Yang! Joint work with Nina Balcan,! Eric Blais and Avrim Blum! 1 Property Testing Instance space X = R n (Distri D over X)! Tested function f : X->{0,1}! A property P of Boolean fn
More informationCHAPTER VIII HILBERT SPACES
CHAPTER VIII HILBERT SPACES DEFINITION Let X and Y be two complex vector spaces. A map T : X Y is called a conjugate-linear transformation if it is a reallinear transformation from X into Y, and if T (λx)
More informationRiemannian Metric Learning for Symmetric Positive Definite Matrices
CMSC 88J: Linear Subspaces and Manifolds for Computer Vision and Machine Learning Riemannian Metric Learning for Symmetric Positive Definite Matrices Raviteja Vemulapalli Guide: Professor David W. Jacobs
More informationProf. M. Saha Professor of Mathematics The University of Burdwan West Bengal, India
CHAPTER 9 BY Prof. M. Saha Professor of Mathematics The University of Burdwan West Bengal, India E-mail : mantusaha.bu@gmail.com Introduction and Objectives In the preceding chapters, we discussed normed
More informationMath 307 Learning Goals. March 23, 2010
Math 307 Learning Goals March 23, 2010 Course Description The course presents core concepts of linear algebra by focusing on applications in Science and Engineering. Examples of applications from recent
More informationLinear Regression. Aarti Singh. Machine Learning / Sept 27, 2010
Linear Regression Aarti Singh Machine Learning 10-701/15-781 Sept 27, 2010 Discrete to Continuous Labels Classification Sports Science News Anemic cell Healthy cell Regression X = Document Y = Topic X
More informationMultimedia Databases 1/29/ Indexes for Multimedia Data Indexes for Multimedia Data Indexes for Multimedia Data
1/29/2010 13 Indexes for Multimedia Data 13 Indexes for Multimedia Data 13.1 R-Trees Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
More informationTransforming Hierarchical Trees on Metric Spaces
CCCG 016, Vancouver, British Columbia, August 3 5, 016 Transforming Hierarchical Trees on Metric Spaces Mahmoodreza Jahanseir Donald R. Sheehy Abstract We show how a simple hierarchical tree called a cover
More informationImage Filtering. Slides, adapted from. Steve Seitz and Rick Szeliski, U.Washington
Image Filtering Slides, adapted from Steve Seitz and Rick Szeliski, U.Washington The power of blur All is Vanity by Charles Allen Gillbert (1873-1929) Harmon LD & JuleszB (1973) The recognition of faces.
More informationMethods for sparse analysis of high-dimensional data, II
Methods for sparse analysis of high-dimensional data, II Rachel Ward May 26, 2011 High dimensional data with low-dimensional structure 300 by 300 pixel images = 90, 000 dimensions 2 / 55 High dimensional
More informationVlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems
1 Vlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems V. Estivill-Castro 2 Perception Concepts Vision Chapter 4 (textbook) Sections 4.3 to 4.5 What is the course
More informationProblem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26
Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing
More information1 Machine Learning Concepts (16 points)
CSCI 567 Fall 2018 Midterm Exam DO NOT OPEN EXAM UNTIL INSTRUCTED TO DO SO PLEASE TURN OFF ALL CELL PHONES Problem 1 2 3 4 5 6 Total Max 16 10 16 42 24 12 120 Points Please read the following instructions
More informationMath 4441 Aug 21, Differential Geometry Fall 2007, Georgia Tech
Math 4441 Aug 21, 2007 1 Differential Geometry Fall 2007, Georgia Tech Lecture Notes 0 Basics of Euclidean Geometry By R we shall always mean the set of real numbers. The set of all n-tuples of real numbers
More informationLinear Algebra Review
January 29, 2013 Table of contents Metrics Metric Given a space X, then d : X X R + 0 and z in X if: d(x, y) = 0 is equivalent to x = y d(x, y) = d(y, x) d(x, y) d(x, z) + d(z, y) is a metric is for all
More informationRandomized Selection on the GPU. Laura Monroe, Joanne Wendelberger, Sarah Michalak Los Alamos National Laboratory
Randomized Selection on the GPU Laura Monroe, Joanne Wendelberger, Sarah Michalak Los Alamos National Laboratory High Performance Graphics 2011 August 6, 2011 Top k Selection on GPU Output the top k keys
More informationAlexander Ostrowski
Ostrowski p. 1/3 Alexander Ostrowski 1893 1986 Walter Gautschi wxg@cs.purdue.edu Purdue University Ostrowski p. 2/3 Collected Mathematical Papers Volume 1 Determinants Linear Algebra Algebraic Equations
More informationMAT 771 FUNCTIONAL ANALYSIS HOMEWORK 3. (1) Let V be the vector space of all bounded or unbounded sequences of complex numbers.
MAT 771 FUNCTIONAL ANALYSIS HOMEWORK 3 (1) Let V be the vector space of all bounded or unbounded sequences of complex numbers. (a) Define d : V V + {0} by d(x, y) = 1 ξ j η j 2 j 1 + ξ j η j. Show that
More informationElements of Convex Optimization Theory
Elements of Convex Optimization Theory Costis Skiadas August 2015 This is a revised and extended version of Appendix A of Skiadas (2009), providing a self-contained overview of elements of convex optimization
More informationA fast randomized algorithm for the approximation of matrices preliminary report
DRAFT A fast randomized algorithm for the approximation of matrices preliminary report Yale Department of Computer Science Technical Report #1380 Franco Woolfe, Edo Liberty, Vladimir Rokhlin, and Mark
More informationMid Term-1 : Practice problems
Mid Term-1 : Practice problems These problems are meant only to provide practice; they do not necessarily reflect the difficulty level of the problems in the exam. The actual exam problems are likely to
More informationOutline. Linear Algebra for Computer Vision
Outline Linear Algebra for Computer Vision Introduction CMSC 88 D Notation and Basics Motivation Linear systems of equations Gauss Elimination, LU decomposition Linear Spaces and Operators Addition, scalar
More informationThese slides follow closely the (English) course textbook Pattern Recognition and Machine Learning by Christopher Bishop
Music and Machine Learning (IFT68 Winter 8) Prof. Douglas Eck, Université de Montréal These slides follow closely the (English) course textbook Pattern Recognition and Machine Learning by Christopher Bishop
More informationFourier transforms and convolution
Fourier transforms and convolution (without the agonizing pain) CS/CME/BioE/Biophys/BMI 279 Oct. 26, 2017 Ron Dror 1 Outline Why do we care? Fourier transforms Writing functions as sums of sinusoids The
More informationConvergence of a Generalized Midpoint Iteration
J. Able, D. Bradley, A.S. Moon under the supervision of Dr. Xingping Sun REU Final Presentation July 31st, 2014 Preliminary Words O Rourke s conjecture We begin with a motivating question concerning the
More information5. Subgradient method
L. Vandenberghe EE236C (Spring 2016) 5. Subgradient method subgradient method convergence analysis optimal step size when f is known alternating projections optimality 5-1 Subgradient method to minimize
More informationDigital Image Processing
Digital Image Processing, 2nd ed. Digital Image Processing Chapter 7 Wavelets and Multiresolution Processing Dr. Kai Shuang Department of Electronic Engineering China University of Petroleum shuangkai@cup.edu.cn
More informationRelative Irradiance. Wavelength (nm)
Characterization of Scanner Sensitivity Gaurav Sharma H. J. Trussell Electrical & Computer Engineering Dept. North Carolina State University, Raleigh, NC 7695-79 Abstract Color scanners are becoming quite
More informationA SYNOPSIS OF HILBERT SPACE THEORY
A SYNOPSIS OF HILBERT SPACE THEORY Below is a summary of Hilbert space theory that you find in more detail in any book on functional analysis, like the one Akhiezer and Glazman, the one by Kreiszig or
More informationRank reduction of parameterized time-dependent PDEs
Rank reduction of parameterized time-dependent PDEs A. Spantini 1, L. Mathelin 2, Y. Marzouk 1 1 AeroAstro Dpt., MIT, USA 2 LIMSI-CNRS, France UNCECOMP 2015 (MIT & LIMSI-CNRS) Rank reduction of parameterized
More informationMinmax Tree Cover in the Euclidean Space
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department
More informationA Faber-Krahn type inequality for regular trees
A Faber-Krahn type inequality for regular trees Josef Leydold leydold@statistikwu-wienacat Institut für Statistik, WU Wien Leydold 2003/02/13 A Faber-Krahn type inequality for regular trees p0/36 The Faber-Krahn
More informationImage Processing 1 (IP1) Bildverarbeitung 1
MIN-Fakultät Fachbereich Informatik Arbeitsbereich SAV/BV (KOGS) Image Processing 1 (IP1) Bildverarbeitung 1 Lecture 14 Skeletonization and Matching Winter Semester 2015/16 Slides: Prof. Bernd Neumann
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More informationSTA141C: Big Data & High Performance Statistical Computing
STA141C: Big Data & High Performance Statistical Computing Lecture 5: Numerical Linear Algebra Cho-Jui Hsieh UC Davis April 20, 2017 Linear Algebra Background Vectors A vector has a direction and a magnitude
More informationImage Filtering, Edges and Image Representation
Image Filtering, Edges and Image Representation Capturing what s important Req reading: Chapter 7, 9 F&P Adelson, Simoncelli and Freeman (handout online) Opt reading: Horn 7 & 8 FP 8 February 19, 8 A nice
More informationAccelerated Dense Random Projections
1 Advisor: Steven Zucker 1 Yale University, Department of Computer Science. Dimensionality reduction (1 ε) xi x j 2 Ψ(xi ) Ψ(x j ) 2 (1 + ε) xi x j 2 ( n 2) distances are ε preserved Target dimension k
More informationComputer Intensive Methods in Mathematical Statistics
Computer Intensive Methods in Mathematical Statistics Department of mathematics johawes@kth.se Lecture 16 Advanced topics in computational statistics 18 May 2017 Computer Intensive Methods (1) Plan of
More informationData preprocessing. DataBase and Data Mining Group 1. Data set types. Tabular Data. Document Data. Transaction Data. Ordered Data
Elena Baralis and Tania Cerquitelli Politecnico di Torino Data set types Record Tables Document Data Transaction Data Graph World Wide Web Molecular Structures Ordered Spatial Data Temporal Data Sequential
More informationIowa State University. Instructor: Alex Roitershtein Summer Exam #1. Solutions. x u = 2 x v
Math 501 Iowa State University Introduction to Real Analysis Department of Mathematics Instructor: Alex Roitershtein Summer 015 Exam #1 Solutions This is a take-home examination. The exam includes 8 questions.
More informationTheory and Applications of Simulated Annealing for Nonlinear Constrained Optimization 1
Theory and Applications of Simulated Annealing for Nonlinear Constrained Optimization 1 Benjamin W. Wah 1, Yixin Chen 2 and Tao Wang 3 1 Department of Electrical and Computer Engineering and the Coordinated
More informationIntroduction to Proofs
Real Analysis Preview May 2014 Properties of R n Recall Oftentimes in multivariable calculus, we looked at properties of vectors in R n. If we were given vectors x =< x 1, x 2,, x n > and y =< y1, y 2,,
More informationDesigning Information Devices and Systems I Spring 2018 Homework 11
EECS 6A Designing Information Devices and Systems I Spring 28 Homework This homework is due April 8, 28, at 23:59. Self-grades are due April 2, 28, at 23:59. Submission Format Your homework submission
More informationa. Define a function called an inner product on pairs of points x = (x 1, x 2,..., x n ) and y = (y 1, y 2,..., y n ) in R n by
Real Analysis Homework 1 Solutions 1. Show that R n with the usual euclidean distance is a metric space. Items a-c will guide you through the proof. a. Define a function called an inner product on pairs
More informationIntroduction to Computer Vision
Introduction to Computer Vision Michael J. Black Oct. 2009 Lecture 10: Images as vectors. Appearance-based models. News Assignment 1 parts 3&4 extension. Due tomorrow, Tuesday, 10/6 at 11am. Goals Images
More informationFinite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product
Chapter 4 Hilbert Spaces 4.1 Inner Product Spaces Inner Product Space. A complex vector space E is called an inner product space (or a pre-hilbert space, or a unitary space) if there is a mapping (, )
More informationMIDTERM SOLUTIONS: FALL 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE
MIDTERM SOLUTIONS: FALL 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE March 28, 2012 The exam is closed book. You are allowed a double sided one page cheat sheet. Answer the questions in the spaces provided on
More informationLecture Notes 1: Vector spaces
Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector
More informationA fast randomized algorithm for approximating an SVD of a matrix
A fast randomized algorithm for approximating an SVD of a matrix Joint work with Franco Woolfe, Edo Liberty, and Vladimir Rokhlin Mark Tygert Program in Applied Mathematics Yale University Place July 17,
More informationOver-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki
Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom Alireza Avanaki ABSTRACT A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement
More informationShape of Gaussians as Feature Descriptors
Shape of Gaussians as Feature Descriptors Liyu Gong, Tianjiang Wang and Fang Liu Intelligent and Distributed Computing Lab, School of Computer Science and Technology Huazhong University of Science and
More informationReducing The Computational Cost of Bayesian Indoor Positioning Systems
Reducing The Computational Cost of Bayesian Indoor Positioning Systems Konstantinos Kleisouris, Richard P. Martin Computer Science Department Rutgers University WINLAB Research Review May 15 th, 2006 Motivation
More informationSpectral Geometry of Riemann Surfaces
Spectral Geometry of Riemann Surfaces These are rough notes on Spectral Geometry and their application to hyperbolic riemann surfaces. They are based on Buser s text Geometry and Spectra of Compact Riemann
More informationSTA141C: Big Data & High Performance Statistical Computing
STA141C: Big Data & High Performance Statistical Computing Numerical Linear Algebra Background Cho-Jui Hsieh UC Davis May 15, 2018 Linear Algebra Background Vectors A vector has a direction and a magnitude
More informationData Mining: Data. Lecture Notes for Chapter 2. Introduction to Data Mining
Data Mining: Data Lecture Notes for Chapter 2 Introduction to Data Mining by Tan, Steinbach, Kumar 1 Types of data sets Record Tables Document Data Transaction Data Graph World Wide Web Molecular Structures
More informationMidterm, Fall 2003
5-78 Midterm, Fall 2003 YOUR ANDREW USERID IN CAPITAL LETTERS: YOUR NAME: There are 9 questions. The ninth may be more time-consuming and is worth only three points, so do not attempt 9 unless you are
More information2, find c in terms of k. x
1. (a) Work out (i) 8 0.. (ii) 5 2 1 (iii) 27 3. 1 (iv) 252.. (4) (b) Given that x = 2 k and 4 c 2, find c in terms of k. x c =. (1) (Total 5 marks) 2. Solve the equation 7 1 4 x 2 x 1 (Total 7 marks)
More informationCambridge University Press The Mathematics of Signal Processing Steven B. Damelin and Willard Miller Excerpt More information
Introduction Consider a linear system y = Φx where Φ can be taken as an m n matrix acting on Euclidean space or more generally, a linear operator on a Hilbert space. We call the vector x a signal or input,
More informationInformation Projection Algorithms and Belief Propagation
χ 1 π(χ 1 ) Information Projection Algorithms and Belief Propagation Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 with J. M.
More informationLecture 20: Discrete Fourier Transform and FFT
EE518 Digital Signal Processing University of Washington Autumn 2001 Dept of Electrical Engineering Lecture 20: Discrete Fourier Transform and FFT Dec 10, 2001 Prof: J Bilmes TA:
More informationLinear Analysis Lecture 5
Linear Analysis Lecture 5 Inner Products and V Let dim V < with inner product,. Choose a basis B and let v, w V have coordinates in F n given by x 1. x n and y 1. y n, respectively. Let A F n n be the
More informationLecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?
KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of
More informationMath 307 Learning Goals
Math 307 Learning Goals May 14, 2018 Chapter 1 Linear Equations 1.1 Solving Linear Equations Write a system of linear equations using matrix notation. Use Gaussian elimination to bring a system of linear
More informationAruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Robust Face Recognition System using Non Additive
More informationLecture 6 January 21, 2016
MATH 6/CME 37: Applied Fourier Analysis and Winter 06 Elements of Modern Signal Processing Lecture 6 January, 06 Prof. Emmanuel Candes Scribe: Carlos A. Sing-Long, Edited by E. Bates Outline Agenda: Fourier
More informationApplied Linear Algebra
Applied Linear Algebra Peter J. Olver School of Mathematics University of Minnesota Minneapolis, MN 55455 olver@math.umn.edu http://www.math.umn.edu/ olver Chehrzad Shakiban Department of Mathematics University
More informationRapid Design of Subcritical Airfoils. Prabir Daripa Department of Mathematics Texas A&M University
Rapid Design of Subcritical Airfoils Prabir Daripa Department of Mathematics Texas A&M University email: daripa@math.tamu.edu In this paper, we present a fast, efficient and accurate algorithm for rapid
More informationRandomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th
CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,
More informationVector Derivatives and the Gradient
ECE 275AB Lecture 10 Fall 2008 V1.1 c K. Kreutz-Delgado, UC San Diego p. 1/1 Lecture 10 ECE 275A Vector Derivatives and the Gradient ECE 275AB Lecture 10 Fall 2008 V1.1 c K. Kreutz-Delgado, UC San Diego
More informationConvex Optimization on Large-Scale Domains Given by Linear Minimization Oracles
Convex Optimization on Large-Scale Domains Given by Linear Minimization Oracles Arkadi Nemirovski H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology Joint research
More informationOutline. Computer Science 331. Cost of Binary Search Tree Operations. Bounds on Height: Worst- and Average-Case
Outline Computer Science Average Case Analysis: Binary Search Trees Mike Jacobson Department of Computer Science University of Calgary Lecture #7 Motivation and Objective Definition 4 Mike Jacobson (University
More informationSparse Approximation of Signals with Highly Coherent Dictionaries
Sparse Approximation of Signals with Highly Coherent Dictionaries Bishnu P. Lamichhane and Laura Rebollo-Neira b.p.lamichhane@aston.ac.uk, rebollol@aston.ac.uk Support from EPSRC (EP/D062632/1) is acknowledged
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationMinmax Tree Cover in the Euclidean Space
Minmax Tree Cover in the Euclidean Space Seigo Karakawa, Ehab Morsy, Hiroshi Nagamochi Department of Applied Mathematics and Physics Graduate School of Informatics Kyoto University Yoshida Honmachi, Sakyo,
More informationData Mining Techniques
Data Mining Techniques CS 6220 - Section 3 - Fall 2016 Lecture 12 Jan-Willem van de Meent (credit: Yijun Zhao, Percy Liang) DIMENSIONALITY REDUCTION Borrowing from: Percy Liang (Stanford) Linear Dimensionality
More informationLinear Algebra. Paul Yiu. Department of Mathematics Florida Atlantic University. Fall A: Inner products
Linear Algebra Paul Yiu Department of Mathematics Florida Atlantic University Fall 2011 6A: Inner products In this chapter, the field F = R or C. We regard F equipped with a conjugation χ : F F. If F =
More informationarxiv:cs/ v1 [cs.cg] 7 Feb 2006
Approximate Weighted Farthest Neighbors and Minimum Dilation Stars John Augustine, David Eppstein, and Kevin A. Wortman Computer Science Department University of California, Irvine Irvine, CA 92697, USA
More informationA projection algorithm for strictly monotone linear complementarity problems.
A projection algorithm for strictly monotone linear complementarity problems. Erik Zawadzki Department of Computer Science epz@cs.cmu.edu Geoffrey J. Gordon Machine Learning Department ggordon@cs.cmu.edu
More informationFunctional Analysis MATH and MATH M6202
Functional Analysis MATH 36202 and MATH M6202 1 Inner Product Spaces and Normed Spaces Inner Product Spaces Functional analysis involves studying vector spaces where we additionally have the notion of
More informationProbability and Statistics for Final Year Engineering Students
Probability and Statistics for Final Year Engineering Students By Yoni Nazarathy, Last Updated: May 24, 2011. Lecture 6p: Spectral Density, Passing Random Processes through LTI Systems, Filtering Terms
More informationLine Search Methods for Unconstrained Optimisation
Line Search Methods for Unconstrained Optimisation Lecture 8, Numerical Linear Algebra and Optimisation Oxford University Computing Laboratory, MT 2007 Dr Raphael Hauser (hauser@comlab.ox.ac.uk) The Generic
More informationInner products. Theorem (basic properties): Given vectors u, v, w in an inner product space V, and a scalar k, the following properties hold:
Inner products Definition: An inner product on a real vector space V is an operation (function) that assigns to each pair of vectors ( u, v) in V a scalar u, v satisfying the following axioms: 1. u, v
More informationMATH 6210: SOLUTIONS TO PROBLEM SET #3
MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form
More informationNumerical Sequences and Series
Numerical Sequences and Series Written by Men-Gen Tsai email: b89902089@ntu.edu.tw. Prove that the convergence of {s n } implies convergence of { s n }. Is the converse true? Solution: Since {s n } is
More informationReview: Learning Bimodal Structures in Audio-Visual Data
Review: Learning Bimodal Structures in Audio-Visual Data CSE 704 : Readings in Joint Visual, Lingual and Physical Models and Inference Algorithms Suren Kumar Vision and Perceptual Machines Lab 106 Davis
More informationTools from Lebesgue integration
Tools from Lebesgue integration E.P. van den Ban Fall 2005 Introduction In these notes we describe some of the basic tools from the theory of Lebesgue integration. Definitions and results will be given
More informationSupplementary Notes on Linear Algebra
Supplementary Notes on Linear Algebra Mariusz Wodzicki May 3, 2015 1 Vector spaces 1.1 Coordinatization of a vector space 1.1.1 Given a basis B = {b 1,..., b n } in a vector space V, any vector v V can
More informationRegularization methods for large-scale, ill-posed, linear, discrete, inverse problems
Regularization methods for large-scale, ill-posed, linear, discrete, inverse problems Silvia Gazzola Dipartimento di Matematica - Università di Padova January 10, 2012 Seminario ex-studenti 2 Silvia Gazzola
More information