This document provides an overview of compressive sensing and discusses several key aspects:
- Compressive sensing acquisition uses fewer measurements than traditional sampling to reconstruct sparse signals.
- Theoretical guarantees like the restricted isometry property ensure accurate reconstruction is possible from few random measurements.
- Fourier domain measurements and structured sensing matrices like partial Fourier matrices can enable fast acquisition.
- Parameters like the regularization parameter λ in reconstruction algorithms must be selected appropriately, such as through risk minimization and prediction risk estimation techniques.
Slides of the lectures given at the summer school "Biomedical Image Analysis Summer School : Modalities, Methodologies & Clinical Research", Centrale Paris, Paris, July 9-13, 2012
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
This paper presents a novel technique for
designing an Infinite Impulse Response (IIR) Filter with
Linear Phase Response. The design of IIR filter is always a
challenging task due to the reason that a Linear Phase
Response is not realizable in this kind. The conventional
techniques involve large number of samples and higher
order filter for better approximation resulting in complex
hardware for implementing the same. In addition, an
extensive computational resource for obtaining the inverse
of huge matrices is required. However, we propose a
technique, which uses the frequency domain sampling along
with the linear programming concept to achieve a filter
design, which gives a best approximation for the linear
phase response. The proposed method can give the closest
response with less number of samples (only 10) and is
computationally simple. We have presented the filter design
along with its formulation and solving methodology.
Numerical results are used to substantiate the efficiency of
the proposed method.
Slides of the lectures given at the summer school "Biomedical Image Analysis Summer School : Modalities, Methodologies & Clinical Research", Centrale Paris, Paris, July 9-13, 2012
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
This paper presents a novel technique for
designing an Infinite Impulse Response (IIR) Filter with
Linear Phase Response. The design of IIR filter is always a
challenging task due to the reason that a Linear Phase
Response is not realizable in this kind. The conventional
techniques involve large number of samples and higher
order filter for better approximation resulting in complex
hardware for implementing the same. In addition, an
extensive computational resource for obtaining the inverse
of huge matrices is required. However, we propose a
technique, which uses the frequency domain sampling along
with the linear programming concept to achieve a filter
design, which gives a best approximation for the linear
phase response. The proposed method can give the closest
response with less number of samples (only 10) and is
computationally simple. We have presented the filter design
along with its formulation and solving methodology.
Numerical results are used to substantiate the efficiency of
the proposed method.
Estimating Human Pose from Occluded Images (ACCV 2009)Jia-Bin Huang
We address the problem of recovering 3D human pose from single 2D images, in which the pose estimation problem is formulated as a direct nonlinear regression from image observation to 3D joint positions. One key issue that has not been addressed in the literature is how to estimate 3D pose when humans in the scenes are partially or heavily occluded. When occlusions occur, features extracted from image observations (e.g., silhouettes-based shape features, histogram of oriented gradient, etc.) are seriously corrupted, and consequently the regressor (trained on un-occluded images) is unable to estimate pose states correctly. In this paper, we present a method that is capable of handling occlusions using sparse signal representations, in which each test sample is represented as a compact linear combination of training samples. The sparsest solution can then be efficiently obtained by solving a convex optimization problem with certain norms (such as l1-norm). The corrupted test image can be recovered with a sparse linear combination of un-occluded training images which can then be used for estimating human pose correctly (as if no occlusions exist). We also show that the proposed approach implicitly performs relevant feature selection with un-occluded test images. Experimental results on synthetic and real data sets bear out our theory that with sparse representation 3D human pose can be robustly estimated when humans are partially or heavily occluded in the scenes.
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsNITHIN KALLE PALLY
walsh transform-1D Walsh Transform kernel is given by:
n - 1
g(x, u) = (1/N) ∏ (-1) bi(x) bn-1-i(u)
i = 0
where, N – no. of samples
n – no. of bits needed to represent x as well as u
bk(z) – kth bits in binary representation of z.
Thus, Forward Discrete Walsh Transformation is
N - 1 n - 1
W(u) = (1/N) Σ f(x) ∏ (-1) bi(x) b(u) x = 0 i = 0
Note on Coupled Line Cameras for Rectangle Reconstruction (ACDDE 2012)Joo-Haeng Lee
The presentation file for the talk in ACDDE 2012.
http://www.acdde2012.org/
It deals with the research result published in ICPR 2012 with the title as "Camera Calibration from a Single Image based on Coupled Line Cameras and Rectangle Constraint"
https://iapr.papercept.net/conferences/scripts/abstract.pl?ConfID=7&Number=70
Quantum Probabilities and Quantum-inspired Information RetrievalIngo Frommholz
The tutorial about quantum probabilities and quantum-inspired information retrieval I held in October 2012 at the IR Autumn School of the German Information Retrieval Specialist Group at Schloss Dagstuhl, Germany.
Detection Tracking and Recognition of Human Poses for a Real Time Spatial GameWolfgang Hürst
CASA workshop 3AMIGAS (supported by FOCUS K3D and GATE)
Technical program presentation no. 5:
presenter Feifei Huo, TU Delft
http://www.cs.uu.nl/events/3amigas/
http://www.focusk3d.eu/
http://gate.gameresearch.nl
Estimating Human Pose from Occluded Images (ACCV 2009)Jia-Bin Huang
We address the problem of recovering 3D human pose from single 2D images, in which the pose estimation problem is formulated as a direct nonlinear regression from image observation to 3D joint positions. One key issue that has not been addressed in the literature is how to estimate 3D pose when humans in the scenes are partially or heavily occluded. When occlusions occur, features extracted from image observations (e.g., silhouettes-based shape features, histogram of oriented gradient, etc.) are seriously corrupted, and consequently the regressor (trained on un-occluded images) is unable to estimate pose states correctly. In this paper, we present a method that is capable of handling occlusions using sparse signal representations, in which each test sample is represented as a compact linear combination of training samples. The sparsest solution can then be efficiently obtained by solving a convex optimization problem with certain norms (such as l1-norm). The corrupted test image can be recovered with a sparse linear combination of un-occluded training images which can then be used for estimating human pose correctly (as if no occlusions exist). We also show that the proposed approach implicitly performs relevant feature selection with un-occluded test images. Experimental results on synthetic and real data sets bear out our theory that with sparse representation 3D human pose can be robustly estimated when humans are partially or heavily occluded in the scenes.
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsNITHIN KALLE PALLY
walsh transform-1D Walsh Transform kernel is given by:
n - 1
g(x, u) = (1/N) ∏ (-1) bi(x) bn-1-i(u)
i = 0
where, N – no. of samples
n – no. of bits needed to represent x as well as u
bk(z) – kth bits in binary representation of z.
Thus, Forward Discrete Walsh Transformation is
N - 1 n - 1
W(u) = (1/N) Σ f(x) ∏ (-1) bi(x) b(u) x = 0 i = 0
Note on Coupled Line Cameras for Rectangle Reconstruction (ACDDE 2012)Joo-Haeng Lee
The presentation file for the talk in ACDDE 2012.
http://www.acdde2012.org/
It deals with the research result published in ICPR 2012 with the title as "Camera Calibration from a Single Image based on Coupled Line Cameras and Rectangle Constraint"
https://iapr.papercept.net/conferences/scripts/abstract.pl?ConfID=7&Number=70
Quantum Probabilities and Quantum-inspired Information RetrievalIngo Frommholz
The tutorial about quantum probabilities and quantum-inspired information retrieval I held in October 2012 at the IR Autumn School of the German Information Retrieval Specialist Group at Schloss Dagstuhl, Germany.
Detection Tracking and Recognition of Human Poses for a Real Time Spatial GameWolfgang Hürst
CASA workshop 3AMIGAS (supported by FOCUS K3D and GATE)
Technical program presentation no. 5:
presenter Feifei Huo, TU Delft
http://www.cs.uu.nl/events/3amigas/
http://www.focusk3d.eu/
http://gate.gameresearch.nl
Cosmological Perturbations and Numerical SimulationsIan Huston
Talk given at Queen Mary, University of London in March 2010.
Cosmological perturbation theory is well established as a tool for
probing the inhomogeneities of the early universe.
In this talk I will motivate the use of perturbation theory and
outline the mathematical formalism. Perturbations beyond linear order
are especially interesting as non-Gaussian effects can be used to
constrain inflationary models.
I will show how the Klein-Gordon equation at second order, written in
terms of scalar field variations only, can be numerically solved.
The slow roll version of the second order source term is used and the
method is shown to be extendable to the full equation. This procedure
allows the evolution of second order perturbations in general and the
calculation of the non-Gaussianity parameter in cases where there is
no analytical solution available.
This week, Luke Pearson (Polychain Capital) and Joshua Fitzgerald (Anoma) present their work on Plonkup, a protocol that combines Plookup and PLONK into a single, efficient protocol. The protocol relies on a new hash function, called Reinforced Concrete, written by Dmitry Khovratovich. The three of them will present their work together at this week's edition of zkStudyClub!
Slides:
---
To Follow the Zero Knowledge Podcast us at https://www.zeroknowledge.fm
To the listeners of Zero Knowledge Podcast, if you like what we do:
- Follow us on Twitter - @zeroknowledgefm
- Join us on Telegram - https://t.me/joinchat/TORo7aknkYNLHmCM
- Support our Gitcoin Grant - https://gitcoin.co/grants/329/zero-knowledge-podcast-2
- Support us on Patreon - https://www.patreon.com/zeroknowledge
An automated and user-friendly optical tweezers for biomolecular investigat...Dr. Pranav Rathi
An automated and user-friendly optical tweezers for biomolecular investigations; a versatile, automated, fast, precise and user friendly optical tweezers capable of doing verity of biomolecular experiments.
We study communication cost of computing functions when inputs are distributed among k processors, each of which is located at one vertex of a network/graph called a terminal. Every other node of the network also has a processor, with no input. The communication is point-to-point and the cost is the total number of bits exchanged by the protocol, in the worst case, on all edges. Our results show the effect of topology of the network on the total communication cost. We prove tight bounds for simple functions like Element-Distinctness (ED), which depend on the 1-median of the graph. On the other hand, we show that for a large class of natural functions like Set-Disjointness the communication cost is essentially n times the cost of the optimal Steiner tree connecting the terminals. Further, we show for natural composed functions like ED∘XOR and XOR∘ED, the naive protocols suggested by their definition is optimal for general networks. Interestingly, the bounds for these functions depend on more involved topological parameters that are a combination of Steiner tree and 1-median costs. To obtain our results, we use some tools like metric embeddings and linear programming whose use in the context of communication complexity is novel as far as we know. (Based on joint works with Jaikumar Radhakrishnan and Atri Rudra)
Model Selection with Piecewise Regular GaugesGabriel Peyré
Talk given at Sampta 2013.
The corresponding paper is :
Model Selection with Piecewise Regular Gauges (S. Vaiter, M. Golbabaee, J. Fadili, G. Peyré), Technical report, Preprint hal-00842603, 2013.
http://hal.archives-ouvertes.fr/hal-00842603/
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
5. Single Pixel Camera (Rice)
˜
f
y[i] = f, i
P measures N micro-mirrors
P/N = 1 P/N = 0.16 P/N = 0.02
6. CS Hardware Model
˜
CS is about designing hardware: input signals f L2 (R2 ).
Physical hardware resolution limit: target resolution f RN .
array micro
˜
f L2 f RN mirrors y RP
resolution
K
CS hardware
7. CS Hardware Model
˜
CS is about designing hardware: input signals f L2 (R2 ).
Physical hardware resolution limit: target resolution f RN .
array micro
˜
f L2 f RN mirrors y RP
resolution
K
CS hardware
,
,
...
,
8. CS Hardware Model
˜
CS is about designing hardware: input signals f L2 (R2 ).
Physical hardware resolution limit: target resolution f RN .
array micro
˜
f L2 f RN mirrors y RP
resolution
K
CS hardware
,
Operator K
, f
...
,
10. Sparse CS Recovery
f0 RN
f0 RN sparse in ortho-basis
(Discretized) sampling acquisition:
y = Kf0 + w = K (x0 ) + w
=
N
x0 R
11. Sparse CS Recovery
f0 RN
f0 RN sparse in ortho-basis
(Discretized) sampling acquisition:
y = Kf0 + w = K (x0 ) + w
=
K drawn from the Gaussian matrix ensemble
Ki,j N (0, P 1/2
) i.i.d.
drawn from the Gaussian matrix ensemble
N
x0 R
12. Sparse CS Recovery
f0 RN
f0 RN sparse in ortho-basis
(Discretized) sampling acquisition:
y = Kf0 + w = K (x0 ) + w
=
K drawn from the Gaussian matrix ensemble
Ki,j N (0, P 1/2
) i.i.d.
drawn from the Gaussian matrix ensemble
N
x0 R
Sparse recovery: min ||x||1
|| x y|| ||w||
15. CS with RIP
1
recovery:
y= x0 + w
x⇥
argmin ||x||1 where
|| x y|| ||w||
Restricted Isometry Constants:
⇥ ||x||0 k, (1 k )||x||2 || x||2 (1 + k )||x||2
16. CS with RIP
1
recovery:
y= x0 + w
x⇥
argmin ||x||1 where
|| x y|| ||w||
Restricted Isometry Constants:
⇥ ||x||0 k, (1 k )||x||2 || x||2 (1 + k )||x||2
Theorem: If 2k2 1, then [Candes 2009]
C0
||x0 x || ⇥ ||x0 xk ||1 + C1
k
where xk is the best k-term approximation of x0 .
17. Singular Values Distributions
Eigenvalues of I I with |I| = k are essentially in [a, b]
a = (1 ) 2
and b = (1 )2
P=200, k=10
where = k/P
1.5
When k = P
1
+ , the eigenvalue distribution tends to
0.5
1
0
f (⇥) = (⇥ b)+ (a ⇥)+ [Marcenko-Pastur]
2⇤ ⇥
0 0.5 1 1.5 2 2.5
P=200, k=30
f ( )
1
0.8
0.6
P = 200, k = 30
0.4
0.2
0
0 0.5 1 1.5 2 2.5
Large deviation inequality [Ledoux]
P=200, k=50
0.8
0.6
0.4
0.2
0
0 0.5 1 1.5 2 2.5
18. Singular Values Distributions
Eigenvalues of I with |I| = k are essentially in [a, b]
I
a = (1 ) 2
and b = (1 )2
P=200, k=10
where = k/P
1.5
When k = P
1
+ , the eigenvalue distribution tends to
0.5
1
0
f (⇥) = (⇥ b)+ (a ⇥)+ [Marcenko-Pastur]
2⇤ ⇥
0 0.5 1 1.5 2 2.5
P=200, k=30
f ( )
1
0.8
0.6
P = 200, k = 30
0.4
0.2
0
0 0.5 1 1.5 2 2.5
Large deviation inequality [Ledoux]
P=200, k=50
0.8
0.6
0.4
C
Theorem:
0.2
If k P
0
0 0.5
log(N/P )
1 1.5 2 2.5
then 2k 2 1 with high probability.
19. Numerics with RIP
Stability constant of A:
(1 ⇥1 (A))|| ||2 ||A ||2 (1 + ⇥2 (A))|| ||2
smallest / largest eigenvalues of A A
20. Numerics with RIP
Stability constant of A:
(1 ⇥1 (A))|| ||2 ||A ||2 (1 + ⇥2 (A))|| ||2
smallest / largest eigenvalues of A A
Upper/lower RIC:
ˆ2
k
i
k = max i( I)
|I|=k
2 1 ˆ2
k
k = min( k, k)
1 2
Monte-Carlo estimation:
ˆk k k
N = 4000, P = 1000
21. Polytope Noiseless Recovery
Counting faces of random polytopes: [Donoho]
All x0 such that ||x0 ||0 Call (P/N )P are identifiable.
Most x0 such that ||x0 ||0 Cmost (P/N )P are identifiable.
Call (1/4) 0.065
1
0.9
Cmost (1/4) 0.25 0.8
0.7
0.6
Sharp constants. 0.5
0.4
No noise robustness. 0.3
0.2
0.1
0
50 100 150 200 250 300 350 400
RIP
All Most
22. Polytope Noiseless Recovery
Counting faces of random polytopes: [Donoho]
All x0 such that ||x0 ||0 Call (P/N )P are identifiable.
Most x0 such that ||x0 ||0 Cmost (P/N )P are identifiable.
Call (1/4) 0.065
1
0.9
Cmost (1/4) 0.25 0.8
0.7
0.6
Sharp constants. 0.5
0.4
No noise robustness. 0.3
0.2
Computation of 0.1
“pathological” signals 0
50 100 150 200 250 300 350 400
[Dossal, P, Fadili, 2010]
RIP
All Most
25. Tomography and Fourier Measures
ˆ
f = FFT2(f )
k
Fourier slice theorem: ˆ ˆ
p (⇥) = f (⇥ cos( ), ⇥ sin( ))
1D 2D Fourier
t R
Partial Fourier measurements: {p k
(t)}0 k<K
Equivalent to: ˆ
Kf = (f [!])!2⌦
26. Regularized Inversion
Noisy measurements: ⇥ ˆ
, y[ ] = f0 [ ] + w[ ].
Noise: w[⇥] N (0, ), white noise.
1
regularization:
1 ˆ[⇤]|2 +
f = argmin
⇥
|y[⇤] f |⇥f, ⇥m ⇤|.
f 2 m
28. MRI Reconstruction
From [Lutsig et al.]
randomization
Fourier sub-sampling pattern:
High resolution Low resolution Linear Sparsity
29. Structured Measurements
Gaussian matrices: intractable for large N .
Random partial orthogonal matrix: { } orthogonal basis.
Kf = (h'! , f i)!2⌦ where |⌦| = P uniformly random.
Fast measurements: (e.g. Fourier basis)
30. Structured Measurements
Gaussian matrices: intractable for large N .
Random partial orthogonal matrix: { } orthogonal basis.
Kf = (h'! , f i)!2⌦ where |⌦| = P uniformly random.
Fast measurements: (e.g. Fourier basis)
⌅ ⌅
Mutual incoherence: µ= N max |⇥⇥ , m ⇤| [1, N]
,m
31. Structured Measurements
Gaussian matrices: intractable for large N .
Random partial orthogonal matrix: { } orthogonal basis.
Kf = (h'! , f i)!2⌦ where |⌦| = P uniformly random.
Fast measurements: (e.g. Fourier basis)
⌅ ⌅
Mutual incoherence: µ= N max |⇥⇥ , m ⇤| [1, N]
,m
Theorem: with high probability on , =K
CP p
If k 6 2 , then 2k 6 2 1
µ log(N )4 [Rudelson, Vershynin, 2006]
not universal: requires incoherence.
33. Risk Minimization
1 2
Estimator: e.g. x (y) 2 argmin ||y x|| + ||x||1
x 2
34. I >0 a regularization parameter.
Risk Minimization
How to choose the value of the parameter ?
1 2
Estimator: e.g. x (y) 2 argmin ||y
Risk-based selection of
x|| + ||x||1
x 2
?(y, ) ||2 )x ,
Risk associated risk: R(of ) = Ew (||x (y)x x0 wrt 0
I Average to : measure the expected quality of
? R( ) = Ew ||x?(y, ) x0||2 .
(y) = argmin R( ) Plugin-estimator: x ? (y) (y)
I The optimal (theoretical) minimizes the risk.
The risk is unknown since it depends on x0.
Can we estimate the risk solely from x?(y, )?
35. I >0 a regularization parameter.
Risk Minimization
How to choose the value of the parameter ?
1 2
Estimator: e.g. x (y) 2 argmin ||y
Risk-based selection of
x|| + ||x||1
x 2
?(y, ) ||2 )x ,
Risk associated risk: R(of ) = Ew (||x (y)x x0 wrt 0
I Average to : measure the expected quality of
? R( ) = Ew ||x?(y, ) x0||2 .
(y) = argmin R( ) Plugin-estimator: x ? (y) (y)
I The optimal (theoretical) minimizes the risk.
Ew is not accessible ! use one observation.
But: The risk is unknown since it depends on x0.
Can we estimate the risk solely from x?(y, )?
36. I >0 a regularization parameter.
Risk Minimization
How to choose the value of the parameter ?
1 2
Estimator: e.g. x (y) 2 argmin ||y
Risk-based selection of
x|| + ||x||1
x 2
?(y, ) ||2 )x ,
Risk associated risk: R(of ) = Ew (||x (y)x x0 wrt 0
I Average to : measure the expected quality of
? R( ) = Ew ||x?(y, ) x0||2 .
(y) = argmin R( ) Plugin-estimator: x ? (y) (y)
I The optimal (theoretical) minimizes the risk.
Ew is not accessible ! use one observation.
But: The risk is unknown since it depends on x0.
x0 is not accessible ! needs risk estimators.
?
Can we estimate the risk solely from x (y, )?
41. Prediction Risk Estimation
Prediction: µ (y) = x (y)
Sensitivity analysis: if µ is weakly di↵erentiable
2
µ (y + ) = µ (y) + @µ (y) · + O(|| || )
Stein Unbiased Risk Estimator:
2 2 2
SURE (y) = ||y µ (y)|| P +2 df (y)
df (y) = tr(@µ (y)) = div(µ )(y)
2
Theorem: [Stein, 1981] Ew (SURE (y)) = Ew (|| x0 µ (y)|| )
Other estimators: GCV, BIC, AIC, . . .
Generalized SURE: estimate Ew (||Pker( )? (x0 x (y))||2 )
42. Computation for L1 Regularization
1 2
Sparse estimator: x (y) 2 argmin ||y x|| + ||x||1
x 2
43. Computation for L1 Regularization
1 2
Sparse estimator: x (y) 2 argmin ||y x|| + ||x||1
x 2
Theorem: for all y, there exists x? s.t. I injective.
df (y) = div ( x ) (y) = ||x? ||0 [Dossal et al. 2011]
44. (a) y
Computation for L1 Regularization Regulariz
6
Quadratic lo
? x 10
(b) x (y, ) at the optimal
2 4 6 2.5
Projection Risk
GSURE
1 True Risk
Sparse estimator: x (y) 21.5 using multi-scale 2 + ||x||thresholding
argmin 2||y
Compressed-sensing x|| wavelet 1
(a) y
2
Quadratic loss
x
)
6
1.5 x 10
)
⌘
?
Theorem: for all y, there exists x? s.t. I injective.
2.5
df (y) = div ( x ) (y)1 = ||x? ||01 [Dossal et al. 2011]
(b) x?(y, ) at the optimal 2 4 66
(b) x?(y, ) at the optimal 2 4 8 8 10 10
12
Regularization parameter λ
Regularization parameter λ
2R P ⇥N Compressed-sensing using multi-scale wavelet thresholding
realization of a random vector. P = N/4 2
Quadratic loss
pressed-sensing using multi-scale wavelet thresholding
are indexed by I, 6
x 10
: TI wavelets. (c) xM L
2.5
Projection Risk
on GJ : 6 GSURE
x 10 True Risk
Quadratic loss
2.5
2
1.5 Projecti
Quadratic loss
(c) xM L
GSURE
True Ri
1.5
A[J]DI sI .
2
atic loss
)? 1
+ xat ? (y) 2 4 6
y
(c) xM L (d) x?(y,
(d) x?(y,
) the optimal
) at the optimal
1
2 4 ? 6 8
Regularization parameter λ
10 12
Regulariz
45. where, for any z 2 RP , ⌫ = ⌫(z) solves the following linear system
Anisotropic Total-Variation
✓ ⇤
DJ
◆✓ ◆ ✓ ⇤ ◆ 6
⌫ z 10 6
x 10
DJ⇤ 0 ⌫
˜
= x .
0 1
2.5
2.5
Extension to ` analysis, TV.
I In practice, with law of large number, the empirical mean is replaced for the expectation.
I The computation of ⌫(z) is achieved by solving the [Vaiter et al. conjugate gradient solver
linear system with a 2012]
: vertical sub-sampling.
Numerical example
Finite di↵erences gradient:
Super-resolution using (anisotropic) Total-Variation
Observations y 2
2
D = [@1 , @2 ]
(a) y
Quadratic loss
(a) y
Quadratic loss
6
x 10
2.5
Projection Risk
GSURE
True Risk
Quadratic loss
2
(a) y
Quadratic loss
1.5
1.5
1.5
1 1
1
?
?
x (y)
(b) x?(y, ? at the optimal
) 2 4 ?6 8 10 12
47. Conclusion
Sparsity: approximate signals with few atoms.
dictionary
Compressed sensing ideas:
Randomized sensors + sparse recovery.
Number of measurements signal complexity.
CS is about designing new hardware.
48. Conclusion
Sparsity: approximate signals with few atoms.
dictionary
Compressed sensing ideas:
Randomized sensors + sparse recovery.
Number of measurements signal complexity.
CS is about designing new hardware.
The devil is in the constants:
Worse case analysis is problematic.
Designing good signal models.