SlideShare a Scribd company logo
1 of 22
Download to read offline
Action Recognition using 
Graph-Cut (I) 
J.Iveel 
2014-9-23
Intro 
• Proposed to recognize human action from video 
using Graph-Cut approach. 
• Algorithmic stages can be defined as follows: 
– Pre-GraphCut: Input video segment S should be 
converted into graphical representation Gs(V,E) 
– Pro-GraphCut: Given Gs(V,E) and optimum action-category- 
labels Lv for its node V, which is the output 
from Graph-Cut, select a set of sub-graph where 
action(s) of interest might happened.
Some Notation 
• “Video segment”, S, refers to a set of local feature point 
extracted at X location, described by descriptor D: 
• “Confidence score” refers to a likelihood of class label l 
given observation o :
Pre-GraphCut 
• Converting video segment into graphical representation 
requires: 
(1)Breaking down whole video segment S into spatio-temporal 
grids. Each grid volume is node Vi connected 
to its neibhourhood by edge Ei in graph Gs. 
(2)Assigning confidence-score for node Vi
Node Confidence-Score 
• The most challenging problem is (2): assigning 
confidence score for each node: 
– Node is, simply, a set of feature points within 
grid volume: 
– Therefore, node confidence can be defined by 
an unknown function, g, over these feature 
points inside.
Node Confidence-Score 
• The naïve approach is to find confidence-score for 
each feature point inside node and accumulate 
these scores to get node-score: 
Then, let us find feature confidence-score, i.e, 
likelihood of class l given local feature fj.
Feature Confidence-Score (1) 
• Target is to measure:
Feature Confidence-Score (2) 
• Constructed BOV histogram for each test video 
segment, with centroids C: 
• Trained binary linear SVM, to produce a support 
vector for class label l:
Feature Confidence-Score (3) 
• Given a feature point from test segment, then its 
confidence score: 
(1) Hard Assignment: 
(2) N-Soft Assignment:
Experiment: Feature Confidence (1) 
• Hard-Assignment case:
Experiment: Feature Confidence (2) 
• N-Soft Assignment case:
Node Cost-Value (1) 
• Graph-Cut framework, it minimizes the total penalty/cost 
value of single nodes and neighborhood nodes given node 
label configuration L: 
• Node cost score is inversely proportional to the likelihood 
or confidence score:
Node Cost-Score (2) 
• Assuming node confidence score is a sum of feature point 
scores (using hard assignment): 
• Considered following inverse relationship to derive node 
cost score: 
(1) Nlog ( Negative Log-likelihood) 
(2) Norm ( Negative Normalized Confidence Score) 
(3) Naive ( Negative Raw Confidence Score)
Method 1: NLog 
• Probabilistic interpretation: According Platt[1], he showed 
interpreting SVM confidence score in a probabilistic manner using 
a parametric form of a sigmoid to : 
• Negative Log Likelihood: In MRF (Graph-Cut), the cost values 
often associated with neg-log of the measurement of noise. Similar, 
once confidence values are translated into probability, operation is 
applied to derive cost score: 
• 
•
Method 2: Norm 
• The confidence score is scaled between 0 and 1. Then cost 
value is associated with the negative of these values:
Method 3: Naive 
• The cost value is directly associated with the negative of 
the raw confidence score:
Method 3: Naive 
• The cost value is directly associated with the negative of 
the raw confidence score:
Experiment: Node Cost Score (1) 
• With default parameters, Naive approach, surprisingly, outperforming other two methods. The 
worst performance is observed with the Norm method 
• The NLog approach performed lesser than my personal expectation. The reason, maybe, 
associated with the tuning parameters, A and B, of the sigmoid equation: 
• In particular, the parameter A is in control of slope. Let's inspect this parameter's effect on the 
performance
Experiment: Node Cost Score (2) 
• NLog approach: Sigmoid parameter A's effect on the performance
Experiment: Node Cost Score (3) 
Num Method Avg. Recognition 
1 Nlog ( optimized parameter) 96.8 % 
2 Norm 95.8 % 
3 Naive 93.5 %
Conclusion 
• In this slides, the two main questions being explored, which 
all related to construction of video graph G and proposed a 
few methods and did an experiment on the KTH dataset. 
– (i) Assign confidence score at feature-level 
● Soft-assignment 
● Hard-assignment 
– (ii) Assigning confidence score at node-level 
● Nlog ( Negative likelihood ) 
● Norm 
● Naive
Future Works 
• Future work will explore: 
– Alternative construction of video graph: 
● Instead of defined grid, use super-voxel for 
choosing node region. 
– Single feature confidence score: 
● Instead of BOF, using VLAD descriptor for 
obtaining more discriminative representation of 
feature.

More Related Content

What's hot

Mining at scale with latent factor models for matrix completion
Mining at scale with latent factor models for matrix completionMining at scale with latent factor models for matrix completion
Mining at scale with latent factor models for matrix completion
Fabio Petroni, PhD
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
Yaxin Liu
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with Hypergraphs
MLAI2
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
Ashish Kumar
 

What's hot (20)

Mining at scale with latent factor models for matrix completion
Mining at scale with latent factor models for matrix completionMining at scale with latent factor models for matrix completion
Mining at scale with latent factor models for matrix completion
 
Moving vehicle detection from Videos
Moving vehicle detection from VideosMoving vehicle detection from Videos
Moving vehicle detection from Videos
 
HDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law GraphsHDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law Graphs
 
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
GASGD: Stochastic Gradient Descent for Distributed Asynchronous Matrix Comple...
 
Chap003
Chap003Chap003
Chap003
 
Divide&Conquer & Dynamic Programming
Divide&Conquer & Dynamic ProgrammingDivide&Conquer & Dynamic Programming
Divide&Conquer & Dynamic Programming
 
Shai Avidan's Support vector tracking and ensemble tracking
Shai Avidan's Support vector tracking and ensemble trackingShai Avidan's Support vector tracking and ensemble tracking
Shai Avidan's Support vector tracking and ensemble tracking
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
 
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
 
Image enhancement techniques
Image enhancement techniques Image enhancement techniques
Image enhancement techniques
 
(CVPR2021 Oral) RobustNet: Improving Domain Generalization in Urban-Scene Seg...
(CVPR2021 Oral) RobustNet: Improving Domain Generalization in Urban-Scene Seg...(CVPR2021 Oral) RobustNet: Improving Domain Generalization in Urban-Scene Seg...
(CVPR2021 Oral) RobustNet: Improving Domain Generalization in Urban-Scene Seg...
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with Hypergraphs
 
object detection paper review
object detection paper reviewobject detection paper review
object detection paper review
 
Dynamic programming in Algorithm Analysis
Dynamic programming in Algorithm AnalysisDynamic programming in Algorithm Analysis
Dynamic programming in Algorithm Analysis
 
Dynamic pgmming
Dynamic pgmmingDynamic pgmming
Dynamic pgmming
 
image_enhancement_spatial
 image_enhancement_spatial image_enhancement_spatial
image_enhancement_spatial
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Parn pyramidal+affine+regression+networks+for+dense+semantic+correspondence
Parn pyramidal+affine+regression+networks+for+dense+semantic+correspondenceParn pyramidal+affine+regression+networks+for+dense+semantic+correspondence
Parn pyramidal+affine+regression+networks+for+dense+semantic+correspondence
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit Notes
 

Viewers also liked

Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectors
zukun
 

Viewers also liked (11)

Feature Matching using SIFT algorithm
Feature Matching using SIFT algorithmFeature Matching using SIFT algorithm
Feature Matching using SIFT algorithm
 
Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectors
 
3D Face Structure Estimation using Evolutionary Algorithms
3D Face Structure Estimation using Evolutionary Algorithms3D Face Structure Estimation using Evolutionary Algorithms
3D Face Structure Estimation using Evolutionary Algorithms
 
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image DescriptorsPCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
 
Scale Invariant Feature Transform
Scale Invariant Feature TransformScale Invariant Feature Transform
Scale Invariant Feature Transform
 
Scale Invariant feature transform
Scale Invariant feature transformScale Invariant feature transform
Scale Invariant feature transform
 
SIFT Algorithm Introduction
SIFT Algorithm IntroductionSIFT Algorithm Introduction
SIFT Algorithm Introduction
 
Scale invariant feature transform
Scale invariant feature transformScale invariant feature transform
Scale invariant feature transform
 
SIFT
SIFTSIFT
SIFT
 
IEEE ICARCV 2009
IEEE ICARCV 2009IEEE ICARCV 2009
IEEE ICARCV 2009
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 

Similar to Action Recognition based Graph Cut

Leveraging high level and low-level features for multimedia event detection.2...
Leveraging high level and low-level features for multimedia event detection.2...Leveraging high level and low-level features for multimedia event detection.2...
Leveraging high level and low-level features for multimedia event detection.2...
Lu Jiang
 
project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminar
MUKUL BICHKAR
 
nilesh-Mtech-presentation
nilesh-Mtech-presentationnilesh-Mtech-presentation
nilesh-Mtech-presentation
Nilesh Heda
 

Similar to Action Recognition based Graph Cut (20)

Video Annotation for Visual Tracking via Selection and Refinement_tran.pptx
Video Annotation for Visual Tracking via Selection and Refinement_tran.pptxVideo Annotation for Visual Tracking via Selection and Refinement_tran.pptx
Video Annotation for Visual Tracking via Selection and Refinement_tran.pptx
 
NMSL_2017summer
NMSL_2017summerNMSL_2017summer
NMSL_2017summer
 
Leveraging high level and low-level features for multimedia event detection.2...
Leveraging high level and low-level features for multimedia event detection.2...Leveraging high level and low-level features for multimedia event detection.2...
Leveraging high level and low-level features for multimedia event detection.2...
 
project_final_seminar
project_final_seminarproject_final_seminar
project_final_seminar
 
Build Your Own 3D Scanner: 3D Scanning with Swept-Planes
Build Your Own 3D Scanner: 3D Scanning with Swept-PlanesBuild Your Own 3D Scanner: 3D Scanning with Swept-Planes
Build Your Own 3D Scanner: 3D Scanning with Swept-Planes
 
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODECEFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 
Explaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersExplaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiers
 
20100309 02 - Software testing (McCabe)
20100309 02 - Software testing (McCabe)20100309 02 - Software testing (McCabe)
20100309 02 - Software testing (McCabe)
 
Action_recognition-topic.pptx
Action_recognition-topic.pptxAction_recognition-topic.pptx
Action_recognition-topic.pptx
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
20130523 05 - Cyclomatic complexity
20130523 05 - Cyclomatic complexity20130523 05 - Cyclomatic complexity
20130523 05 - Cyclomatic complexity
 
JPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluationsJPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluations
 
Comparitive Analysis for Pre-Processing of Images and Videos using Histogram ...
Comparitive Analysis for Pre-Processing of Images and Videos using Histogram ...Comparitive Analysis for Pre-Processing of Images and Videos using Histogram ...
Comparitive Analysis for Pre-Processing of Images and Videos using Histogram ...
 
Fidelity criteria in image compression
Fidelity criteria in image compressionFidelity criteria in image compression
Fidelity criteria in image compression
 
Detection focal loss 딥러닝 논문읽기 모임 발표자료
Detection focal loss 딥러닝 논문읽기 모임 발표자료Detection focal loss 딥러닝 논문읽기 모임 발표자료
Detection focal loss 딥러닝 논문읽기 모임 발표자료
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth Estimation
 
Icacci 2014 image security_presentation final
Icacci 2014 image security_presentation finalIcacci 2014 image security_presentation final
Icacci 2014 image security_presentation final
 
TAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AITAAI 2016 Keynote Talk: It is all about AI
TAAI 2016 Keynote Talk: It is all about AI
 
nilesh-Mtech-presentation
nilesh-Mtech-presentationnilesh-Mtech-presentation
nilesh-Mtech-presentation
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Action Recognition based Graph Cut

  • 1. Action Recognition using Graph-Cut (I) J.Iveel 2014-9-23
  • 2. Intro • Proposed to recognize human action from video using Graph-Cut approach. • Algorithmic stages can be defined as follows: – Pre-GraphCut: Input video segment S should be converted into graphical representation Gs(V,E) – Pro-GraphCut: Given Gs(V,E) and optimum action-category- labels Lv for its node V, which is the output from Graph-Cut, select a set of sub-graph where action(s) of interest might happened.
  • 3. Some Notation • “Video segment”, S, refers to a set of local feature point extracted at X location, described by descriptor D: • “Confidence score” refers to a likelihood of class label l given observation o :
  • 4. Pre-GraphCut • Converting video segment into graphical representation requires: (1)Breaking down whole video segment S into spatio-temporal grids. Each grid volume is node Vi connected to its neibhourhood by edge Ei in graph Gs. (2)Assigning confidence-score for node Vi
  • 5. Node Confidence-Score • The most challenging problem is (2): assigning confidence score for each node: – Node is, simply, a set of feature points within grid volume: – Therefore, node confidence can be defined by an unknown function, g, over these feature points inside.
  • 6. Node Confidence-Score • The naïve approach is to find confidence-score for each feature point inside node and accumulate these scores to get node-score: Then, let us find feature confidence-score, i.e, likelihood of class l given local feature fj.
  • 7. Feature Confidence-Score (1) • Target is to measure:
  • 8. Feature Confidence-Score (2) • Constructed BOV histogram for each test video segment, with centroids C: • Trained binary linear SVM, to produce a support vector for class label l:
  • 9. Feature Confidence-Score (3) • Given a feature point from test segment, then its confidence score: (1) Hard Assignment: (2) N-Soft Assignment:
  • 10. Experiment: Feature Confidence (1) • Hard-Assignment case:
  • 11. Experiment: Feature Confidence (2) • N-Soft Assignment case:
  • 12. Node Cost-Value (1) • Graph-Cut framework, it minimizes the total penalty/cost value of single nodes and neighborhood nodes given node label configuration L: • Node cost score is inversely proportional to the likelihood or confidence score:
  • 13. Node Cost-Score (2) • Assuming node confidence score is a sum of feature point scores (using hard assignment): • Considered following inverse relationship to derive node cost score: (1) Nlog ( Negative Log-likelihood) (2) Norm ( Negative Normalized Confidence Score) (3) Naive ( Negative Raw Confidence Score)
  • 14. Method 1: NLog • Probabilistic interpretation: According Platt[1], he showed interpreting SVM confidence score in a probabilistic manner using a parametric form of a sigmoid to : • Negative Log Likelihood: In MRF (Graph-Cut), the cost values often associated with neg-log of the measurement of noise. Similar, once confidence values are translated into probability, operation is applied to derive cost score: • •
  • 15. Method 2: Norm • The confidence score is scaled between 0 and 1. Then cost value is associated with the negative of these values:
  • 16. Method 3: Naive • The cost value is directly associated with the negative of the raw confidence score:
  • 17. Method 3: Naive • The cost value is directly associated with the negative of the raw confidence score:
  • 18. Experiment: Node Cost Score (1) • With default parameters, Naive approach, surprisingly, outperforming other two methods. The worst performance is observed with the Norm method • The NLog approach performed lesser than my personal expectation. The reason, maybe, associated with the tuning parameters, A and B, of the sigmoid equation: • In particular, the parameter A is in control of slope. Let's inspect this parameter's effect on the performance
  • 19. Experiment: Node Cost Score (2) • NLog approach: Sigmoid parameter A's effect on the performance
  • 20. Experiment: Node Cost Score (3) Num Method Avg. Recognition 1 Nlog ( optimized parameter) 96.8 % 2 Norm 95.8 % 3 Naive 93.5 %
  • 21. Conclusion • In this slides, the two main questions being explored, which all related to construction of video graph G and proposed a few methods and did an experiment on the KTH dataset. – (i) Assign confidence score at feature-level ● Soft-assignment ● Hard-assignment – (ii) Assigning confidence score at node-level ● Nlog ( Negative likelihood ) ● Norm ● Naive
  • 22. Future Works • Future work will explore: – Alternative construction of video graph: ● Instead of defined grid, use super-voxel for choosing node region. – Single feature confidence score: ● Instead of BOF, using VLAD descriptor for obtaining more discriminative representation of feature.