SlideShare a Scribd company logo
A Person Cross Domain Re
identification Based Ad RSVMs
ABSTRACT
• This project addresses a new person re identification
problem without label information of persons under non
overlapping target cameras.
• In this propose an adaptive ranking support vector
machines (AdaRSVMs) method for re identification
under target domain cameras without person labels.
• To overcome the problems introduced due to the absence
of matched (positive) image pairs in the target domain,
we relax the discriminative constraint to a necessary
condition only relying on the positive mean in the target
domain.
INTRODUCTION
• In Recent years, person re-identification across
a camera network comprising multiple cameras
with non-overlapping views has become an
active research topic due to its importance in
many camera-network-based computer vision
applications.
Person Re-identification
• Person re identification is a feature
representation of the person image is less
sensitive to large inter-camera variations,
many re-identification methods focus on
extracting robust features.
Support Vector Machine(SVM)
• Classification of images can also be performed
using SVMs.
• Experimental results show that SVMs achieve
significantly higher search accuracy than
traditional query refinement schemes after just
three to four rounds of relevance feedback.
• This is also true of image segmentation
systems, including those using a modified
version SVM.
Existing system
• Existing schemes mainly focus On developing
either robust feature representations or
discriminative earning models.
• For the discriminative Learning methods, it is
generally assumed that the Label information of
persons is available for training.
• With the Person labels, matched (positive) and
unmatched (negative) Image pairs are generated
to train the is criminative distance model.
Disadvantages
• Existing system used in only small scale
networks
• This renders existing approaches inapplicable,
since the person labels are not available.
Proposed system
• In this paper, we propose a novel Adaptive
Ranking Support Vector Machines
(AdaRSVM) method to deal with the problem
that label information of persons is not
available under target cameras.
BLOCK DAIGRAM
Domain Adaptation
• The main objective of domain adaptation
approach is to adapt the classification model
learnt from the source domain to target domain
without serious deterioration of recognition
performance.
Advantages
• Our method achieves better re identification
performance than existing domain adaptation
methods derived under equal conditional
probability assumption.
• It is used in large scale camera Networks
Applications
• To estimate target position of object.
• Crowded areas
• Investigations
• Marketing research
• Tourists flow estimation
• Traffic management
Software Requirements
• Operating system : Windows XP/7.
• Coding Language : MATLAB
• Tool : MATLABR 2013a

More Related Content

Viewers also liked

Coaching ontologico PIADE
Coaching ontologico PIADECoaching ontologico PIADE
Coaching ontologico PIADE
Dr.Jose A Santos. +4500 contactos
 
Introduccion a Triz.
Introduccion a Triz.Introduccion a Triz.
Introduccion a Triz.
Dr.Jose A Santos. +4500 contactos
 
The Effects of Domestic Violence on Chilren
The Effects of Domestic Violence on ChilrenThe Effects of Domestic Violence on Chilren
The Effects of Domestic Violence on Chilren
Vonthisha Wiley
 
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروعPm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
khalid Dahleez
 
Tsunami Warning System
Tsunami Warning SystemTsunami Warning System
Tsunami Warning System
Girish1020
 
Onsite Journal
Onsite JournalOnsite Journal
Onsite Journal
yincytwincy
 
Gestión humana
Gestión humanaGestión humana
Perico trepa por chile
Perico trepa por chilePerico trepa por chile
Perico trepa por chile
Martina Javiera Rojas Muñoz
 
WordCamp Auckland 2017 summary
WordCamp Auckland 2017 summaryWordCamp Auckland 2017 summary
WordCamp Auckland 2017 summary
Ralf Klis
 
Arte islam
Arte islamArte islam
Arte islam
deltha12
 
Five essentials of EB-5
Five essentials of EB-5Five essentials of EB-5
Five essentials of EB-5
Zac Gawn
 
Nicastro
NicastroNicastro
Nicastro
vivianace
 
Elementos de maquinas
Elementos de maquinasElementos de maquinas
Elementos de maquinas
Edison Marrufo
 
Z11460000120164014 session 13 final presentation
Z11460000120164014 session 13 final presentation Z11460000120164014 session 13 final presentation
Z11460000120164014 session 13 final presentation
Novraldy Lihawa
 

Viewers also liked (14)

Coaching ontologico PIADE
Coaching ontologico PIADECoaching ontologico PIADE
Coaching ontologico PIADE
 
Introduccion a Triz.
Introduccion a Triz.Introduccion a Triz.
Introduccion a Triz.
 
The Effects of Domestic Violence on Chilren
The Effects of Domestic Violence on ChilrenThe Effects of Domestic Violence on Chilren
The Effects of Domestic Violence on Chilren
 
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروعPm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
Pm arabic ch6 إدارة التكلفة وإعداد موازنة المشروع
 
Tsunami Warning System
Tsunami Warning SystemTsunami Warning System
Tsunami Warning System
 
Onsite Journal
Onsite JournalOnsite Journal
Onsite Journal
 
Gestión humana
Gestión humanaGestión humana
Gestión humana
 
Perico trepa por chile
Perico trepa por chilePerico trepa por chile
Perico trepa por chile
 
WordCamp Auckland 2017 summary
WordCamp Auckland 2017 summaryWordCamp Auckland 2017 summary
WordCamp Auckland 2017 summary
 
Arte islam
Arte islamArte islam
Arte islam
 
Five essentials of EB-5
Five essentials of EB-5Five essentials of EB-5
Five essentials of EB-5
 
Nicastro
NicastroNicastro
Nicastro
 
Elementos de maquinas
Elementos de maquinasElementos de maquinas
Elementos de maquinas
 
Z11460000120164014 session 13 final presentation
Z11460000120164014 session 13 final presentation Z11460000120164014 session 13 final presentation
Z11460000120164014 session 13 final presentation
 

Similar to Cross domain

A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
PNandaSai
 
Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...
R M Shahidul Islam Shahed
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
jagan477830
 
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
IRJET Journal
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
Daksh Verma
 
High quality single shot capture of facial geometry
High quality single shot capture of facial geometryHigh quality single shot capture of facial geometry
High quality single shot capture of facial geometry
Brohi Aijaz Ali
 
Model autonomous car
Model autonomous carModel autonomous car
Model autonomous car
GowthamSureshKumar1
 
Ijetr042148
Ijetr042148Ijetr042148
Automated_attendance_system_project.pptx
Automated_attendance_system_project.pptxAutomated_attendance_system_project.pptx
Automated_attendance_system_project.pptx
Naveensai51
 
IRIS Recognition Projects Research Topics
IRIS Recognition Projects Research TopicsIRIS Recognition Projects Research Topics
IRIS Recognition Projects Research Topics
Matlab Simulation
 
Machine learning and Autonomous System
Machine learning and Autonomous SystemMachine learning and Autonomous System
Machine learning and Autonomous System
Anshul Saxena
 
Blind Source Camera Identification
Blind Source Camera Identification Blind Source Camera Identification
Blind Source Camera Identification
Sudhanshu Patel
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
sadique_ghitm
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Ali Alkan
 
SVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR ImageSVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR Image
IRJET Journal
 
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
Agile Testing Alliance
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
Igslabs Malleswaram
 
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
Edge AI and Vision Alliance
 
1376842384 16369008
1376842384  163690081376842384  16369008
1376842384 16369008
Editor Jacotech
 

Similar to Cross domain (20)

A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
 
Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
 
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
A Survey on Different Relevance Feedback Techniques in Content Based Image Re...
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
High quality single shot capture of facial geometry
High quality single shot capture of facial geometryHigh quality single shot capture of facial geometry
High quality single shot capture of facial geometry
 
Model autonomous car
Model autonomous carModel autonomous car
Model autonomous car
 
Ijetr042148
Ijetr042148Ijetr042148
Ijetr042148
 
Automated_attendance_system_project.pptx
Automated_attendance_system_project.pptxAutomated_attendance_system_project.pptx
Automated_attendance_system_project.pptx
 
IRIS Recognition Projects Research Topics
IRIS Recognition Projects Research TopicsIRIS Recognition Projects Research Topics
IRIS Recognition Projects Research Topics
 
Machine learning and Autonomous System
Machine learning and Autonomous SystemMachine learning and Autonomous System
Machine learning and Autonomous System
 
Blind Source Camera Identification
Blind Source Camera Identification Blind Source Camera Identification
Blind Source Camera Identification
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
 
SVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR ImageSVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR Image
 
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
 
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
 
1376842384 16369008
1376842384  163690081376842384  16369008
1376842384 16369008
 

Recently uploaded

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 

Recently uploaded (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 

Cross domain

  • 1. A Person Cross Domain Re identification Based Ad RSVMs
  • 2. ABSTRACT • This project addresses a new person re identification problem without label information of persons under non overlapping target cameras. • In this propose an adaptive ranking support vector machines (AdaRSVMs) method for re identification under target domain cameras without person labels. • To overcome the problems introduced due to the absence of matched (positive) image pairs in the target domain, we relax the discriminative constraint to a necessary condition only relying on the positive mean in the target domain.
  • 3. INTRODUCTION • In Recent years, person re-identification across a camera network comprising multiple cameras with non-overlapping views has become an active research topic due to its importance in many camera-network-based computer vision applications.
  • 4. Person Re-identification • Person re identification is a feature representation of the person image is less sensitive to large inter-camera variations, many re-identification methods focus on extracting robust features.
  • 5. Support Vector Machine(SVM) • Classification of images can also be performed using SVMs. • Experimental results show that SVMs achieve significantly higher search accuracy than traditional query refinement schemes after just three to four rounds of relevance feedback. • This is also true of image segmentation systems, including those using a modified version SVM.
  • 6. Existing system • Existing schemes mainly focus On developing either robust feature representations or discriminative earning models. • For the discriminative Learning methods, it is generally assumed that the Label information of persons is available for training. • With the Person labels, matched (positive) and unmatched (negative) Image pairs are generated to train the is criminative distance model.
  • 7. Disadvantages • Existing system used in only small scale networks • This renders existing approaches inapplicable, since the person labels are not available.
  • 8. Proposed system • In this paper, we propose a novel Adaptive Ranking Support Vector Machines (AdaRSVM) method to deal with the problem that label information of persons is not available under target cameras.
  • 10. Domain Adaptation • The main objective of domain adaptation approach is to adapt the classification model learnt from the source domain to target domain without serious deterioration of recognition performance.
  • 11. Advantages • Our method achieves better re identification performance than existing domain adaptation methods derived under equal conditional probability assumption. • It is used in large scale camera Networks
  • 12. Applications • To estimate target position of object. • Crowded areas • Investigations • Marketing research • Tourists flow estimation • Traffic management
  • 13. Software Requirements • Operating system : Windows XP/7. • Coding Language : MATLAB • Tool : MATLABR 2013a