This upload consists of Ph.D dissertation defense slides of the research topic "Efficient VLSI Architectures for Image Enhancement Techniques" of Visvesvaraya Technological University, Belgaum, Karnataka, India.
For suggestions & comments mail me at :
mchanumantharaju@gmail.com
hanu2005@yahoo.com
or contact me at : 9742290764
https://mcv-m6-video.github.io/deepvideo-2019/
This lecture provides an overview how the temporal information encoded in video sequences can be exploited to learn visual features from a self-supervised perspective. Self-supervised learning is a type of unsupervised learning in which data itself provides the necessary supervision to estimate the parameters of a machine learning algorithm.
Master in Computer Vision Barcelona 2019.
http://pagines.uab.cat/mcv/
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...Shahbaz Alam
Four widely used histogram equalization techniques for image enhancement namely GHE, BBHE, DSIHE, RMSHE are discussed. Some basic definitions and notations are also attached. All analysis are done by using MATLAB . Pictures are taken from the book "Digital Image Processing" by Rafael C. Gonzalez and Richard E. Woods. The presentation slide was made for my B.Sc project purpose.
Predictive uncertainty of deep models and its applicationsNAVER Engineering
발표자: 이기민(KAIST 박사과정)
발표일: 2018.4.
The predictive uncertainty (e.g., entropy of softmax distribution of a deep classifier) is indispensable as it is useful in many machine learning applications (e.g., active learning and ensemble learning) as well as when deploying the trained model in real-world systems. In order to improve the quality of the predictive uncertainty, we proposed a novel loss function for training deep models (ICLR 2018). We showed that confidence deep models trained by our method can be very useful in various machine learning applications such as novelty detection (CVPR 2018) and ensemble learning (ICML 2017).
This upload consists of Ph.D dissertation defense slides of the research topic "Efficient VLSI Architectures for Image Enhancement Techniques" of Visvesvaraya Technological University, Belgaum, Karnataka, India.
For suggestions & comments mail me at :
mchanumantharaju@gmail.com
hanu2005@yahoo.com
or contact me at : 9742290764
https://mcv-m6-video.github.io/deepvideo-2019/
This lecture provides an overview how the temporal information encoded in video sequences can be exploited to learn visual features from a self-supervised perspective. Self-supervised learning is a type of unsupervised learning in which data itself provides the necessary supervision to estimate the parameters of a machine learning algorithm.
Master in Computer Vision Barcelona 2019.
http://pagines.uab.cat/mcv/
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...Shahbaz Alam
Four widely used histogram equalization techniques for image enhancement namely GHE, BBHE, DSIHE, RMSHE are discussed. Some basic definitions and notations are also attached. All analysis are done by using MATLAB . Pictures are taken from the book "Digital Image Processing" by Rafael C. Gonzalez and Richard E. Woods. The presentation slide was made for my B.Sc project purpose.
Predictive uncertainty of deep models and its applicationsNAVER Engineering
발표자: 이기민(KAIST 박사과정)
발표일: 2018.4.
The predictive uncertainty (e.g., entropy of softmax distribution of a deep classifier) is indispensable as it is useful in many machine learning applications (e.g., active learning and ensemble learning) as well as when deploying the trained model in real-world systems. In order to improve the quality of the predictive uncertainty, we proposed a novel loss function for training deep models (ICLR 2018). We showed that confidence deep models trained by our method can be very useful in various machine learning applications such as novelty detection (CVPR 2018) and ensemble learning (ICML 2017).
ЗНБ СГУ представляет виртуальную выставку одной книги «ПУШКИН В РИСУНКАХ В. Е. МАКОВСКОГО». Выставка представляет страницы книги Пушкин в рисунках В. Е. Маковского. Ленинград ; Москва : Искусство, 1937. 109,[3]с. : рис.
«Живописец-реалист, мастер сатирического жанра, В. Е. Маковский (1846–1921) приобрёл широкую популярность, главным образом, изображением бытовых сцен из жизни мелкого чиновничества, купечества и мещанства. Но, наряду со станковой живописью, он занимался и графикой – офортным гравированием и книжной иллюстрацией. Особый интерес представляют для нас рисунки Маковского к произведениям Пушкина. Эта пушкинская сюита Маковского была исполнена в начале 1880-х годов. Как бы ни расценивать с формально-художественной стороны рисунки Маковского, они прежде всего содержательны в сюжетном отношении как прямые интерпретации пушкинского текста». (Из предисловия к изданию).
SGU NSL is a virtual exhibition of one of the book "Pushkin in the drawings of Vladimir Makovsky." The exhibition presents the pages of the book Pushkin figures Vladimir Makovsky. Leningrad; Moscow: Art, 1937. 109, [3] s. : Fig.
"Realist painter, a master of the satirical genre, V. E. Makovsky (1846-1921) gained wide popularity mainly depicting everyday scenes from the life of petty officials, merchants and petty bourgeoisie. But, along with the easel painting, he practiced and graphics - etching engraving and book illustration. Of particular interest to us Makovsky drawings to works of Pushkin. This Pushkin Suite Makovsky was performed in the early 1880s. Whatever regard to the formal side of art paintings Makovsky, they especially meaningful in the scene for both direct interpretation of Pushkin's text. " (From the preface to the publication).
Όλα για το παιδί….
Η αγορά βρεφικής/παιδικής διατροφής και φροντίδας αποτελεί μία πολύ σημαντική κατηγορία
για το χώρο του οργανωμένου λιανεμπορίου. Μπορεί να απευθύνεται σε μικρότερο καταναλω-
τικό κοινό από άλλες κατηγορίες και αυτό να την καθιστά σχετικά αργοκίνητη, εντούτοις απο-
τελεί κατηγορία προορισμό (destination) και κριτήριο για την επιλογή σουπερμάρκετ για τους
πελάτες. Με την έκδοση «παιδί» επιχειρούμε να προσεγγίσουμε την πολύ ιδιαίτερη και συνάμα
εξαιρετικά σημαντική αυτή αγορά σκιαγραφώντας την κατάσταση που παρατηρείται σήμερα
στα «baby/kid corners» του οργανωμένου λιανεμπορίου. Με την αρωγή των εταιρειών Nielsen
και SymponyIRI που μας προσέφεραν τα απαραίτητα ερευνητικά δεδομένα καταγράφουμε την
εικόνα σε επιλεγμένες κατηγορίες του χώρου αναδεικνύοντας αφενός τα οικονομικά μεγέθη
αφετέρου τις μάρκες και τις εταιρείες που πρωταγωνιστούν σε κάθε μία κατηγορία. Θα πρέπει
να αναφερθεί σαφώς πως τα στοιχεία δεν αντικατοπτρίζουν το 100% της αγοράς αλλά σίγου-
ρα αντικατοπτρίζουν απόλυτα τις τάσεις και τις μεταβολές της.
Παράλληλα για ακόμη μία φορά, πολύτιμο insight για τις καταναλωτικές συνήθειες και την
πορεία της αγοράς της βρεφικής/παιδικής διατροφής και φροντίδας, μας δίνουν στελέχη αλυ-
σίδων supermarket (buyers με εξειδίκευση στη συγκεκριμένη αγορά), οι οποίοι μέσα από τις
συνεντεύξεις τους μας παρουσιάζουν και την στρατηγική του κάθε Ομίλου όσον αφορά την
υπό εξέταση κατηγορία. Αν θέλαμε να καταλήξουμε σε ένα γενικό συμπέρασμα για την αγορά
που εξετάζουμε στην παρούσα έκδοση θα μπορούσαμε να πούμε πως οι δυσχερείς οικονομι-
κές συνθήκες που βιώνουμε στην χώρα μας την έχουν επηρεάσει, οδηγώντας την σε κατά πε-
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Beniamino Murgante
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov – National Centre for Geocomputation, National University of Ireland , Maynooth (Ireland)
Intelligent Analysis of Environmental Data (S4 ENVISA Workshop 2009)
Stochastic Approximation and Simulated AnnealingSSA KPI
AACIMP 2010 Summer School lecture by Leonidas Sakalauskas. "Applied Mathematics" stream. "Stochastic Programming and Applications" course. Part 8.
More info at http://summerschool.ssa.org.ua
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...Ceni Babaoglu, PhD
The seminar series will focus on the mathematical background needed for machine learning. The first set of the seminars will be on "Linear Algebra for Machine Learning". Here are the slides of the fourth part which is discussing eigenvalues, eigenvectors and diagonalization.
Here is the link of the first part which was discussing linear systems: https://www.slideshare.net/CeniBabaogluPhDinMat/linear-algebra-for-machine-learning-linear-systems/1
Here are the slides of the second part which was discussing basis and dimension:
https://www.slideshare.net/CeniBabaogluPhDinMat/2-linear-algebra-for-machine-learning-basis-and-dimension
Here are the slides of the third part which is discussing factorization and linear transformations.
https://www.slideshare.net/CeniBabaogluPhDinMat/3-linear-algebra-for-machine-learning-factorization-and-linear-transformations-130813437
Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...Yuji Oyamada
Paper info: https://www.jstage.jst.go.jp/article/pjsai/JSAI2019/0/JSAI2019_2C5E504/_article/-char/ja/
Paper (pdf): https://www.jstage.jst.go.jp/article/pjsai/JSAI2019/0/JSAI2019_2C5E504/_pdf/-char/ja
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...Yuji Oyamada
Our deep learning based 3d object classification work published at International Workshop on Frontiers of Computer Vision (IW-FCV), 2018.
For further detail, see the following page.
https://sites.google.com/view/dryujioyamada/research/objectclassification
Single Camera Calibration Using Partially Visible Calibration Objects Based o...Yuji Oyamada
Our work published at IEEE ISMAR 2012 Workshop on Tracking Methods and Applications (TMA).
https://sites.google.com/view/dryujioyamada/research/practicalcalibration
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
Bouguet's MatLab Camera Calibration Toolbox for Stereo Camera
1. Theory of Bouguet’s MatLab Camera Calibration
Toolbox: Stereo
Yuji Oyamada
1 HVRL, University
2 Chair for Computer Aided Medical Procedure (CAMP)
Technische Universit¨t M¨nchen
a u
June 5, 2012
2. Variables Optimization
Variables
Assumption:
• N cameras observing L key-points resulting M images for each
sequence.
• The cameras are fixed meaning relative positions among them
are same through the sequence.
Variables:
• aj : Intrinsic parameters of j-th camera.
• bij : Extrinsic parameters of i-th image of j-th camera.
• xijk : k-th key-point of i-th image of j-th camera.
where
• j = 1, . . . , N
• i = 1, . . . , M
• k = 1, . . . , Lij
3. Variables Optimization
Variables
The set of extrinsic parameters {bij } has redundancy because the
cameras are fixed.
Introduce another variable r:
• bi : Extrinsic parameters of i-th image of 1st camera.
• rj : Extrinsic parameters of j-th camera w.r.t. 1st camera.
Note that r1 is equivalent to identity matrix.
4. Variables Optimization
Variables
We have observation vector x and parameters vector p where
x = (x111 , . . . , x11L11 , x1N1 , . . . , x1NL1N , . . . , xMN1 , . . . , xMNLMN )
= (x11 , x1N , . . . , xMN , . . . , xMN )
p = (a1 , . . . , aN , r2 , . . . , rN , b1 , . . . , bM )
where xij = (xij1 , . . . , xijLij )
5. Variables Optimization
Non-linear optimization
Finds optimal parameters p as
M N Lij
a r ˆ
{{ˆj }{ˆj }{bi }} = arg min vijk dist(ˆijk , xijk )2
x
{aj }{rj }{bi }
i=1 j=1 k=1
where
• ˆijk = Q(aj , bi ) denotes a reprojected point of xijk with
x
parameters aj and bi ,
• a visibility term vijk = 1 iff k-th point is visible in i-th image
observed by j-th camera.
6. Variables Optimization
Normal equations
J Jδ = −J
where
∂ˆ
x ∂ˆ ∂ˆ ∂ˆ
x x x
J= = = [ARB]
∂p ∂a ∂r ∂b
∂ˆ
x ∂ˆ
x ∂ˆ
x
A= ,R = ,B =
∂a ∂r ∂b
∂ˆij
x ∂ˆij
x ∂ˆij
x
Aij = , Rij = , Bij =
∂aj ∂rj ∂bi
7. Variables Optimization
Structure of Jacobian matrix J
8. Variables Optimization
Sparse LM
• LM is suitable for minimization w.r.t. a small number of
parameters.
• The central step of LM, solving the normal equations,
• has complexity N 3 in the number of parameters and
• is repeated many times.
• The normal equation matrix has a certain sparse block
structure.
9. Variables Optimization
Sparse LM
• Let p ∈ RM be the parameter vector that is able to be
partitioned into parameter vectors as p = (a , b ) .
• Given a measurement vector x ∈ RN
• Let x be the covariance matrix for the measurement vector.
• A general function f : RM → RN takes p to the estimated
measurement vector ˆ = f (p).
x
• denotes the difference x − ˆ between the measured and the
x
estimated vectors.
10. Variables Optimization
Sparse LM
The set of equations Jδ = solved as the central step in the LM
has the form
δa
Jδ = [A|B] = .
δb
−1 −1
Then, the normal equations J x Jδ = J x to be solved
at each step of LM are of the form
−1 −1 −1
A x A A x B δa A x
−1 −1 = −1
B x A B x B
δb B x
11. Variables Optimization
Sparse LM
Let
−1
• U=A x A
−1
• W=A x B
−1
• V=B x B
and ·∗ denotes augmented matrix by λ.
The normal equations are rewritten as
U∗ W δa A
=
W V∗ δb B
∗ ∗−1
U − WV W 0 δa A − WV∗−1 B
→ =
W V∗ δb B
This results in the elimination of the top right hand block.
12. Variables Optimization
Sparse LM
The top half of this set of equations is
(U∗ − WV∗−1 W )δa = A − WV∗−1 B
Subsequently, the value of δa may be found by back-substitution,
giving
V ∗ δb = B − W δa
13. Variables Optimization
Sparse LM
p = (a , b ) , where a = (fc , cc , alpha c , kc ) and
b = ({omc i Tc i })
The Jacobian matrix is
∂ˆ
x ∂ˆ ∂ˆ
x x
J= = , = [A, B]
∂p ∂a ∂b
where
∂ˆ
x ∂ˆ ∂ˆ
x x ∂ˆ
x ∂ˆ
x
= , , ,
∂a ∂fc ∂cc ∂alpha c ∂kc
∂ˆ
x ∂ˆx ∂ˆ
x ∂ˆ
x ∂ˆ
x ∂ˆ
x ∂ˆ
x
= , ,··· , ··· ,
∂b ∂omc 1 ∂Tc 1 ∂omc i ∂Tc i ∂omc N ∂Tc N
14. Variables Optimization
Sparse LM
The normal equation is rewritten as
A A
A B + λI ∆p = − x
B B
N N
Ai Ai Ai Bi
+ λI ∆p = − A x
i=1
→ N i=1
N B x
Bi Ai Bi Bi
i=1 i=1
15. Variables Optimization
Sparse LM
N
A i Ai A1 B1 · · · Ai Bi ··· AN BN
i=1
B1 A1 B1 B1
J J=
.
. ..
. .
Bi Ai Bi Bi
.
. ..
. .
BN AN BN BN
16. Variables Optimization
Sparse LM
N
Ai x
i=1
B1 x
J =
.
.
x .
Bi x
.
.
.
BN x
17. Variables Optimization
Sparse LM
When each image has different number of corresponding points
(Mi = Mj , if i = j), each Ai and Bi have different size as
18. Variables Optimization
Sparse LM
However, the difference does not matter because
A A ∈ Rdint ×dint
A B ∈ Rdint ×dex
B A ∈ Rdex ×dint
B B ∈ Rdex ×dex
where dint denotes dimension of intrinsic params and dex denotes
dimension of extrinsic params.