We consider online optimization over Riemannian manifolds, where a learner attempts to minimize a sequence of time-varying loss functions defined on Riemannian manifolds. Though many Euclidean online convex optimizati...
ISBN:
(纸本)9781713845393
We consider online optimization over Riemannian manifolds, where a learner attempts to minimize a sequence of time-varying loss functions defined on Riemannian manifolds. Though many Euclidean online convex optimization algorithms have been proven useful in a wide range of areas, less attention has been paid to their Riemannian counterparts. In this paper, we study Riemannian online gradient descent (R-OGD) on Hadamard manifolds for both geodesically convex and strongly geodesically convex loss functions, and Riemannian bandit algorithm (R-BAN) on Hadamard homogeneous manifolds for geodesically convex functions. We establish upper bounds on the regrets of the problem with respect to time horizon, manifold curvature, and manifold dimension. We also find a universal lower bound for the achievable regret by constructing an online convex optimization problem on Hadamard manifolds. All the obtained regret bounds match the corresponding results are provided in Euclidean spaces. Finally, some numerical experiments validate our theoretical results.
A wildland fire is an unrestrained fire that happens mostly in forest regions, though it can additionally occupy agricultural or urban regions. Some of the foremost reasons of wildfires: human elements, both premedita...
详细信息
Manual Security is being replaced by video surveillance systems by the advent of multimedia forensics. Face detection is an important technique in multimedia forensics. Many proposed methods identify and localize the ...
详细信息
ISBN:
(纸本)9781728108995
Manual Security is being replaced by video surveillance systems by the advent of multimedia forensics. Face detection is an important technique in multimedia forensics. Many proposed methods identify and localize the faces in an image or in an image sequence. To build fully automated systems that analyze the information contained in face images, robust and efficient face detection algorithms are required. Since, innumerable video data that is collected from video surveillance are to be automatically processed and get valuable information out of it, we need to scale the processing framework accordingly. In this paper, we propose face recognition system and minimize the overall processing time of large data set using parallel processing method. Given a video from a video surveillance, we need to convert it to frames, detect the human faces in these frames and recognize the face by comparing with a given face or comparing against database entries where criminal data is present. We use cascade classifier that takes a vector of features (decision variables) and results the probability that the vector belongs to the class. Using cascade classifier, we identify the faces from a given image and finally compare the faces with database entries.
In this paper, the comparison between deep learning methods and feature extraction algorithms is presented. The principle of Grey-Level Co-occurrence Matrix (GLCM) and its modifications are used for our research. The ...
详细信息
ISBN:
(数字)9781728175393
ISBN:
(纸本)9781728175409
In this paper, the comparison between deep learning methods and feature extraction algorithms is presented. The principle of Grey-Level Co-occurrence Matrix (GLCM) and its modifications are used for our research. The main idea was to design a method for the description of combined features and textures. The texture classification process is carried out with the robust support vector machine classifier (SVM). We compare these feature extraction methods with proposed Convolutional Neural Networks (CNN). This proposed network contains 25 layers. Finally, the all evaluation and comparison of color texture retrieval results for all used methods are presented. The all feature extraction algorithms and proposed CNN have been tested on two different color texture datasets (Outex and Vistex datasets).
As a promising topic of biometrics, palmprint recognition helps to effectively verify a person's identity, which is suitable for building a security system. Recent progress has achieved high recognition accuracy i...
详细信息
ISBN:
(纸本)9781538662496
As a promising topic of biometrics, palmprint recognition helps to effectively verify a person's identity, which is suitable for building a security system. Recent progress has achieved high recognition accuracy in different benchmark datasets due to deep learning. However, these applications are almost implemented in one dataset with iterative training epochs to help neural network generalize. When applied practically where many new users' palmprints registered in sequence, deep learning-based recognition systems cannot avoid the problem of catastrophic forgetting. In this paper, we propose a continual learning framework based on reinforcement learning to dynamically expand the neural network when facing newly registered palmprints without costly retraining or fine-tuning. Experiments on different datasets demonstrate the high adaptability of our model that is promising for solving the forgetting attack of every biometric system.
In this study, an image enhancement model based on an inverse diffusion equation with a Riesz fractional derivative is developed. The optimal orders of fractional derivatives for the images are obtained through experi...
详细信息
ISBN:
(数字)9781728168968
ISBN:
(纸本)9781728168975
In this study, an image enhancement model based on an inverse diffusion equation with a Riesz fractional derivative is developed. The optimal orders of fractional derivatives for the images are obtained through experiments, and six quantities associated with the brightness and texture of each haze image-mean, variance, skewness, kurtosis, two-norm, and contrast-are calculated. By regression analysis, the linear relationship between the optimal order of the fractional derivative and these statistical quantities is acquired. Finally, the empirical formula for the order of the fractional derivative for the differential equation model is obtained. Experimental results show that the adaptive order of the fractional differential obtained using our approach is close to the optimal order obtained using artificial experiments and that the enhancement effect is optimal. Compared with other image enhancement algorithms, our algorithm can better improve the brightness and contrast of images and provide a better visual effect while defogging. Two objective evaluation indexes- information entropy and average gradient-also indicate the effectiveness of our method.
An end-to-end blurred image restoration algorithm based on CycleGAN is proposed to solve the complicated problems of obtaining real paired data sets of moving blurred images and simulating real blurred images with man...
详细信息
As the need to discover abnormal temperature rise and overheating breakdown of power equipment in substations is urgent, infrared inspection is important for its quick and accurate characteristics. To improve the accu...
详细信息
ISBN:
(数字)9781728165219
ISBN:
(纸本)9781728165226
As the need to discover abnormal temperature rise and overheating breakdown of power equipment in substations is urgent, infrared inspection is important for its quick and accurate characteristics. To improve the accuracy of infrared inspection diagnosis, this paper proposes an operational diagnosis system based on comprehensive analysis of infrared images of power equipment. Firstly, the image is preprocessed by histogram equalization, Sobel operator, Canny operator, median filtering, etc. Then, the feature points of the infrared image are extracted by SIFT algorithm, and the extracted feature points are K-means clustered. Find the type of feature points that belong to the capacitive device after clustering, and then perform SIFT feature extraction on the processed image, and eliminate the feature points that are not electrical devices according to the found feature points, thereby completing the target -- Identification of the electrical device. Finally, the target recognition results of the 3 pretreatment methods and the original without pretreatment are compared to find the best effect, that is, the pre-processing algorithm with the highest recognition accuracy.
The image preprocessing algorithm can effectively improve performance of the advanced visual algorithms under complex conditions. But the evaluation of the image preprocessing algorithm usually uses the traditional PS...
详细信息
ISBN:
(数字)9780738124223
ISBN:
(纸本)9781665419536
The image preprocessing algorithm can effectively improve performance of the advanced visual algorithms under complex conditions. But the evaluation of the image preprocessing algorithm usually uses the traditional PSNR/SSIM indicators, there is a big gap between the evaluation result and the performance of the algorithm in actual vision tasks. This article uses the UE4 virtual engine and referring to the atmospheric scattering model to construct a haze vehicle small object dataset (VSOD). Based on virtual data, a vision task-driven image preprocessing algorithm evaluation strategy is proposed. We take dehazing algorithms and object detection tasks as examples to verify the task-driven evaluation strategy. By analyzing the evaluation results of task-driven evaluation strategy and traditional PSNR/SSIM, we proved that the task-driven evaluation strategy can more accurately evaluate the performance of image preprocessingalgorithms in actual vision tasks.
Biometric features such as fingerprint images can be authenticated by not only computer algorithms but also optical systems. In previous works, double random phase encoding (DRPE) optical lens system is employed for f...
详细信息
暂无评论