SlideShare a Scribd company logo
Comparison of Semantic Similarity Measures for
                                    NDVC Detection Using Semantic Features
                                 Hyun-seok Min, Jae Young Choi, Wesley De Neve, and Yong Man Ro
                                                                   Image and Video Systems Lab
                                                      Korea Advanced Institute of Science and Technology (KAIST)
                                                                        Daejeon, South Korea
                              e-mail: ymro@ee.kaist.ac.kr                                                                   website: http://ivylab.kaist.ac.kr

I. INTRODUCTION                                                                                   1.3. Jiang–Conrath : based on the conditional probability of encountering
- Observations                                                                                    an instance of a child concept in a certain corpus
   - an increasing number of near-duplicate video clips (NDVCs) can be
     found on websites for video sharing
                                                                                                                                                  1
                                                                                                      simJC (ti , t j ) =                                                       .
   - content transformations tend to preserve semantic information                                                        log( p(ti )) + log( p(t j )) - log(p(lso(ti , t j )))
- Novel idea
   - NDVC detection by means of semantic features and adaptive                                    1.4. Lin : follows from his theory of similarity between arbitrary objects
     semantic distance measurement
- Objective                                                                                                                  2 × log p(lso(ti , t j ))
   - to answer the question: ‘which semantic similarity measure is most                               simL (ti , t j ) =                                        .
     effective in the context of NDVC detection using semantic features?’                                                   log p(ti ) + log p(t j )
II. SEMANTIC NDVC DETECTION                                                                       2. Similarity measurement using Flickr tag occurrence and co-occurrence
                      Input: query video clip                                                     statistics


                 Video shot segmentation
                                                                   Image folksonomy
                                                                                                                          I ti ∩ j        I ti ∩ j : the set of images annotated with both
                                                                                                                                                t
                                                                                                                                t                   ti and tj
                                                                                                  simTC (ti , t j ) =                 ,
                        ...                ...
                                                                                                                            I ti            I ti   : the set of images annotated with tag ti
                                                                   Tag relevance learning
        Shot 1          ...   Shot i       ...       Shot N        using neighbor voting
                                                                                                  IV. EXPERIMENTS
                Semantic concept detection
                                                                                                  1. Experimental setup
                   ...              ...
                                                                                                   - Use of TRECVID 2009 for creating NDVCs and reference video clips
        Creation of a semantic video signature                                                     - Use of MIRFLICKR-25000 as a source of collective knowledge
                                                                                                   - Use of Toolbox and the Natural Language Toolkit (NLTK) for WordNet-
        Matching of semantic video signatures                                                        based semantic similarity measurement
                                                                     Reference video              2. Experimental results
                Output: NDVC identification                             database                   - Semantic NDVC detection is, in general, most effective when similarity
                                                                                                     measurement makes use of tag statistics derived from Flickr
            Fig. 1. NDVC detection by means of semantic video signatures.
                                                                                                      - similarity measurement using Flickr-based tag statistics is able to

                                            
                                                                                                        exploit an unrestricted concept vocabulary, whereas the WordNet-
 Ai  ti , j , wi , j , j  1,..., Ai , wi , j is a weight value for tag ti,j                           based similarity measures are only able to make use of semantic
                                                                                                        concepts that are part of the English-language version of WordNet
                                                                                                          0.8
            q     r                    q         r             q      r         q       r T                                                            Tag statistics            Leacock–Chodorow
Dshot (S , S ) = SQFD( A , A ) =                              w | -w G w | -w                 ,           0.7                                          Jiang–Conrath             Lin
                                                                                                          0.6                                          Resnik
         SQFD: Signature Quadratic Form Distance                                                          0.5
                                                                                                   NDCR




         W: vector of weight values for the tags t under consideration                                    0.4
         G: matrix of ground distances (computed using tag statistics)                                    0.3

 III. SEMANTIC SIMILARITY MEASURES                                                                        0.2
                                                                                                          0.1
 1. Similarity measurement using the WordNet knowledge base                                                0
                                                                                                                 blur     crop        pattern change in mirroring       resize     shift   average
 1.1. Leacock–Chodorow : relies on the length of the shortest path                                                                   insertion brightness
 between two concepts                                                                                                                             Transformations
                            len(ti , t j )
    simLC (ti , t j ) = log                ,                       Fig. 2. Influence of semantic similarity measurement on the effectiveness of semantic
                                                 2E                                                         NDVC detection. The lower the NDCR, the more effective NDVC detection.
   len(ti , t j )     : the shortest path between two concepts (ti, tj)
                                                                                                  V. CONCLUSIONS
         E            : the overall depth of the taxonomy used
                                                                                                  - We presented a novel technique for NDVC detection
 1.2. Resnik : measures the information content of the most specific                                 - takes advantage of the collective knowledge in an image folksonomy,
 common ancestor of two concepts                                                                       thus allowing for the use of an unrestricted concept vocabulary
                                                                                                  - We quantified the influence of several semantic similarity measures on
    simR (ti , t j ) = log p(lso(ti , t j )),                                                       the effectiveness of NDVC detection using semantic features
                                                                                                     - semantic NDVC detection is most effective when semantic similarity
    lso(ti , t j )    : the lowest super-ordinate of ti and tj                                         measurement takes advantage of tag occurrence and co-occurrence
                                                                                                       statistics derived from Flickr (an unstructured source of knowledge),
    p(t )             : the probability of encountering an instance of a concept t                     outperforming semantic similarity measurement that takes advantage
                        in a certain corpus
                                                                                                       of WordNet (a knowledge base with a hierarchical structure)

            The International Conference on Multimedia Information Technology and Applications (MITA), July 2012, Beijing (China)

More Related Content

What's hot

Shogun 2.0 @ PyData NYC 2012
Shogun 2.0 @ PyData NYC 2012Shogun 2.0 @ PyData NYC 2012
Shogun 2.0 @ PyData NYC 2012
Christian Widmer
 
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...Albert Orriols-Puig
 
CCIA'2008: On the dimensions of data complexity through synthetic data sets
CCIA'2008: On the dimensions of data complexity through synthetic data setsCCIA'2008: On the dimensions of data complexity through synthetic data sets
CCIA'2008: On the dimensions of data complexity through synthetic data setsAlbert Orriols-Puig
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learningbutest
 
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCSHIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCSAlbert Orriols-Puig
 
2 tri partite model algebra
2 tri partite model algebra2 tri partite model algebra
2 tri partite model algebraAle Cignetti
 
SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOINN Inc.
 

What's hot (10)

Shogun 2.0 @ PyData NYC 2012
Shogun 2.0 @ PyData NYC 2012Shogun 2.0 @ PyData NYC 2012
Shogun 2.0 @ PyData NYC 2012
 
Lecture8 - From CBR to IBk
Lecture8 - From CBR to IBkLecture8 - From CBR to IBk
Lecture8 - From CBR to IBk
 
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...
IWLCS'2008: First Approach toward Online Evolution of Association Rules wit...
 
CCIA'2008: On the dimensions of data complexity through synthetic data sets
CCIA'2008: On the dimensions of data complexity through synthetic data setsCCIA'2008: On the dimensions of data complexity through synthetic data sets
CCIA'2008: On the dimensions of data complexity through synthetic data sets
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCSHIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
 
Lecture4 - Machine Learning
Lecture4 - Machine LearningLecture4 - Machine Learning
Lecture4 - Machine Learning
 
2 tri partite model algebra
2 tri partite model algebra2 tri partite model algebra
2 tri partite model algebra
 
SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOIAM (SOINN-AM)
SOIAM (SOINN-AM)
 
Lecture18
Lecture18Lecture18
Lecture18
 

Viewers also liked

An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
idescitation
 
Leveraging an image folksonomy and the signature quadratic form distance for ...
Leveraging an image folksonomy and the signature quadratic form distance for ...Leveraging an image folksonomy and the signature quadratic form distance for ...
Leveraging an image folksonomy and the signature quadratic form distance for ...
Wesley De Neve
 
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-WordsVideo Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Wesley De Neve
 
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
Wesley De Neve
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Wesley De Neve
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
Wesley De Neve
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Wesley De Neve
 

Viewers also liked (7)

An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
 
Leveraging an image folksonomy and the signature quadratic form distance for ...
Leveraging an image folksonomy and the signature quadratic form distance for ...Leveraging an image folksonomy and the signature quadratic form distance for ...
Leveraging an image folksonomy and the signature quadratic form distance for ...
 
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-WordsVideo Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words
 
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
Opsporen van videokopieën met behulp van visuele vingerafdrukken en schuivend...
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
 

Similar to Comparison of Semantic Similarity Measures for NDVC Detection Using Semantic Features

論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
Toru Tamaki
 
Video + Language
Video + LanguageVideo + Language
Video+Language: From Classification to Description
Video+Language: From Classification to DescriptionVideo+Language: From Classification to Description
Video+Language: From Classification to Description
Goergen Institute for Data Science
 
Neural Architectures for Video Encoding
Neural Architectures for Video EncodingNeural Architectures for Video Encoding
Neural Architectures for Video Encoding
Universitat Politècnica de Catalunya
 
Im2013vit
Im2013vitIm2013vit
Lecture11
Lecture11Lecture11
Lecture11Bo Li
 
Transformer 動向調査 in 画像認識
Transformer 動向調査 in 画像認識Transformer 動向調査 in 画像認識
Transformer 動向調査 in 画像認識
Kazuki Maeno
 
Computational Semantics
Computational SemanticsComputational Semantics
Computational Semantics
Rossi Setchi
 
Deep Learning for Video: Action Recognition (UPC 2018)
Deep Learning for Video: Action Recognition (UPC 2018)Deep Learning for Video: Action Recognition (UPC 2018)
Deep Learning for Video: Action Recognition (UPC 2018)
Universitat Politècnica de Catalunya
 
A Multimodal Approach for Video Geocoding
A Multimodal Approach for   Video Geocoding A Multimodal Approach for   Video Geocoding
A Multimodal Approach for Video Geocoding MediaEval2012
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
IRJET Journal
 
Essen bioscience neuromics 9_17_12
Essen bioscience neuromics 9_17_12Essen bioscience neuromics 9_17_12
Essen bioscience neuromics 9_17_12
Pete Shuster
 
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
Piyush Yadav
 

Similar to Comparison of Semantic Similarity Measures for NDVC Detection Using Semantic Features (15)

論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
論文紹介:Temporal Sentence Grounding in Videos: A Survey and Future Directions
 
Video + Language 2019
Video + Language 2019Video + Language 2019
Video + Language 2019
 
Video + Language
Video + LanguageVideo + Language
Video + Language
 
Video+Language: From Classification to Description
Video+Language: From Classification to DescriptionVideo+Language: From Classification to Description
Video+Language: From Classification to Description
 
Neural Architectures for Video Encoding
Neural Architectures for Video EncodingNeural Architectures for Video Encoding
Neural Architectures for Video Encoding
 
Im2013vit
Im2013vitIm2013vit
Im2013vit
 
Lecture11
Lecture11Lecture11
Lecture11
 
Transformer 動向調査 in 画像認識
Transformer 動向調査 in 画像認識Transformer 動向調査 in 画像認識
Transformer 動向調査 in 画像認識
 
Computational Semantics
Computational SemanticsComputational Semantics
Computational Semantics
 
Deep Learning for Video: Action Recognition (UPC 2018)
Deep Learning for Video: Action Recognition (UPC 2018)Deep Learning for Video: Action Recognition (UPC 2018)
Deep Learning for Video: Action Recognition (UPC 2018)
 
A Multimodal Approach for Video Geocoding
A Multimodal Approach for   Video Geocoding A Multimodal Approach for   Video Geocoding
A Multimodal Approach for Video Geocoding
 
Real-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big DataReal-Time Video Copy Detection in Big Data
Real-Time Video Copy Detection in Big Data
 
Essen bioscience neuromics 9_17_12
Essen bioscience neuromics 9_17_12Essen bioscience neuromics 9_17_12
Essen bioscience neuromics 9_17_12
 
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
VEKG: Video Event Knowledge Graph to Represent Video Streams for Complex Even...
 
gist.doc
gist.docgist.doc
gist.doc
 

More from Wesley De Neve

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Wesley De Neve
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
Wesley De Neve
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...
Wesley De Neve
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Wesley De Neve
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
Wesley De Neve
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
Wesley De Neve
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
Wesley De Neve
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
Wesley De Neve
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Wesley De Neve
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Wesley De Neve
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Wesley De Neve
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Wesley De Neve
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
Wesley De Neve
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Wesley De Neve
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...
Wesley De Neve
 
Orientation day at the Ghent University Global Campus in Korea: Introduction
Orientation day at the Ghent University Global Campus in Korea: IntroductionOrientation day at the Ghent University Global Campus in Korea: Introduction
Orientation day at the Ghent University Global Campus in Korea: Introduction
Wesley De Neve
 
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLab
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLabBackground Information & Suggestions for Joint Research Topics IVY Lab & MMLab
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLab
Wesley De Neve
 

More from Wesley De Neve (20)

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...
 
Orientation day at the Ghent University Global Campus in Korea: Introduction
Orientation day at the Ghent University Global Campus in Korea: IntroductionOrientation day at the Ghent University Global Campus in Korea: Introduction
Orientation day at the Ghent University Global Campus in Korea: Introduction
 
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLab
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLabBackground Information & Suggestions for Joint Research Topics IVY Lab & MMLab
Background Information & Suggestions for Joint Research Topics IVY Lab & MMLab
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Comparison of Semantic Similarity Measures for NDVC Detection Using Semantic Features

  • 1. Comparison of Semantic Similarity Measures for NDVC Detection Using Semantic Features Hyun-seok Min, Jae Young Choi, Wesley De Neve, and Yong Man Ro Image and Video Systems Lab Korea Advanced Institute of Science and Technology (KAIST) Daejeon, South Korea e-mail: ymro@ee.kaist.ac.kr website: http://ivylab.kaist.ac.kr I. INTRODUCTION 1.3. Jiang–Conrath : based on the conditional probability of encountering - Observations an instance of a child concept in a certain corpus - an increasing number of near-duplicate video clips (NDVCs) can be found on websites for video sharing 1 simJC (ti , t j ) = . - content transformations tend to preserve semantic information log( p(ti )) + log( p(t j )) - log(p(lso(ti , t j ))) - Novel idea - NDVC detection by means of semantic features and adaptive 1.4. Lin : follows from his theory of similarity between arbitrary objects semantic distance measurement - Objective 2 × log p(lso(ti , t j )) - to answer the question: ‘which semantic similarity measure is most simL (ti , t j ) = . effective in the context of NDVC detection using semantic features?’ log p(ti ) + log p(t j ) II. SEMANTIC NDVC DETECTION 2. Similarity measurement using Flickr tag occurrence and co-occurrence Input: query video clip statistics Video shot segmentation Image folksonomy I ti ∩ j I ti ∩ j : the set of images annotated with both t t ti and tj simTC (ti , t j ) = , ... ... I ti I ti : the set of images annotated with tag ti Tag relevance learning Shot 1 ... Shot i ... Shot N using neighbor voting IV. EXPERIMENTS Semantic concept detection 1. Experimental setup ... ... - Use of TRECVID 2009 for creating NDVCs and reference video clips Creation of a semantic video signature - Use of MIRFLICKR-25000 as a source of collective knowledge - Use of Toolbox and the Natural Language Toolkit (NLTK) for WordNet- Matching of semantic video signatures based semantic similarity measurement Reference video 2. Experimental results Output: NDVC identification database - Semantic NDVC detection is, in general, most effective when similarity measurement makes use of tag statistics derived from Flickr Fig. 1. NDVC detection by means of semantic video signatures. - similarity measurement using Flickr-based tag statistics is able to   exploit an unrestricted concept vocabulary, whereas the WordNet- Ai  ti , j , wi , j , j  1,..., Ai , wi , j is a weight value for tag ti,j based similarity measures are only able to make use of semantic concepts that are part of the English-language version of WordNet 0.8 q r q r q r q r T Tag statistics Leacock–Chodorow Dshot (S , S ) = SQFD( A , A ) = w | -w G w | -w , 0.7 Jiang–Conrath Lin 0.6 Resnik SQFD: Signature Quadratic Form Distance 0.5 NDCR W: vector of weight values for the tags t under consideration 0.4 G: matrix of ground distances (computed using tag statistics) 0.3 III. SEMANTIC SIMILARITY MEASURES 0.2 0.1 1. Similarity measurement using the WordNet knowledge base 0 blur crop pattern change in mirroring resize shift average 1.1. Leacock–Chodorow : relies on the length of the shortest path insertion brightness between two concepts Transformations len(ti , t j ) simLC (ti , t j ) = log , Fig. 2. Influence of semantic similarity measurement on the effectiveness of semantic 2E NDVC detection. The lower the NDCR, the more effective NDVC detection. len(ti , t j ) : the shortest path between two concepts (ti, tj) V. CONCLUSIONS E : the overall depth of the taxonomy used - We presented a novel technique for NDVC detection 1.2. Resnik : measures the information content of the most specific - takes advantage of the collective knowledge in an image folksonomy, common ancestor of two concepts thus allowing for the use of an unrestricted concept vocabulary - We quantified the influence of several semantic similarity measures on simR (ti , t j ) = log p(lso(ti , t j )), the effectiveness of NDVC detection using semantic features - semantic NDVC detection is most effective when semantic similarity lso(ti , t j ) : the lowest super-ordinate of ti and tj measurement takes advantage of tag occurrence and co-occurrence statistics derived from Flickr (an unstructured source of knowledge), p(t ) : the probability of encountering an instance of a concept t outperforming semantic similarity measurement that takes advantage in a certain corpus of WordNet (a knowledge base with a hierarchical structure) The International Conference on Multimedia Information Technology and Applications (MITA), July 2012, Beijing (China)