My presentation for Kharkiv AI club about capsule networks. Introduction to capsule networks theory, basics. Links, references, explanations of capsules and routing
Image compression: Techniques and ApplicationNidhi Baranwal
This presentation involves a mathematical view of image compression having a brief introduction of its theory,major techniques along with their algorithm and examples.
Radial basis function network ppt bySheetal,Samreen and Dhanashrisheetal katkar
Radial Basis Functions are nonlinear activation functions used by artificial neural networks.Explained commonly used RBFs ,cover's theorem,interpolation problem and learning strategies.
COM2304: Intensity Transformation and Spatial Filtering – III Spatial Filters...Hemantha Kulathilake
At the end of this lecture, you should be able to;
describe sharpening through spatial filters.
Identify usage of derivatives in Image Processing.
discuss edge detection techniques.
compare 1st & 2nd order derivatives used for sharpening.
Apply sharpening techniques for problem solving.
Image Segmentation: Approaches and ChallengesApache MXNet
This slides go over the problem of deep semantic segmentation. It covers the different approaches taken, from hourglass autoencoder to pyramid networks.
Slides by Thomas Delteil
Slides from the UPC reading group on computer vision about the following paper:
Redmon, Joseph, Santosh Divvala, Ross Girshick, and Ali Farhadi. "You only look once: Unified, real-time object detection." arXiv preprint arXiv:1506.02640 (2015).
Image compression: Techniques and ApplicationNidhi Baranwal
This presentation involves a mathematical view of image compression having a brief introduction of its theory,major techniques along with their algorithm and examples.
Radial basis function network ppt bySheetal,Samreen and Dhanashrisheetal katkar
Radial Basis Functions are nonlinear activation functions used by artificial neural networks.Explained commonly used RBFs ,cover's theorem,interpolation problem and learning strategies.
COM2304: Intensity Transformation and Spatial Filtering – III Spatial Filters...Hemantha Kulathilake
At the end of this lecture, you should be able to;
describe sharpening through spatial filters.
Identify usage of derivatives in Image Processing.
discuss edge detection techniques.
compare 1st & 2nd order derivatives used for sharpening.
Apply sharpening techniques for problem solving.
Image Segmentation: Approaches and ChallengesApache MXNet
This slides go over the problem of deep semantic segmentation. It covers the different approaches taken, from hourglass autoencoder to pyramid networks.
Slides by Thomas Delteil
Slides from the UPC reading group on computer vision about the following paper:
Redmon, Joseph, Santosh Divvala, Ross Girshick, and Ali Farhadi. "You only look once: Unified, real-time object detection." arXiv preprint arXiv:1506.02640 (2015).
Modeling perceptual similarity and shift invariance in deep networksNAVER Engineering
Abstract: While it is nearly effortless for humans to quickly assess the perceptual similarity between two images, the underlying processes are thought to be quite complex. Despite this, the most widely used perceptual metrics today, such as PSNR and SSIM, are simple, shallow functions, and fail to account for many nuances of human perception. Recently, the deep learning community has found that features of the VGG network trained on ImageNet classification have been remarkably useful as a training loss for image synthesis. But how perceptual are these so-called "perceptual losses"? What elements are critical for their success? To answer these questions, we introduce a new dataset of human perceptual similarity judgments. We systematically evaluate deep features across different architectures and tasks and compare them with classic metrics. We find that deep features outperform all previous metrics by large margins on our dataset. More surprisingly, this result is not restricted to ImageNet-trained VGG features, but holds across different deep architectures and levels of supervision (supervised, self-supervised, or even unsupervised). Our results suggest that perceptual similarity is an emergent property shared across deep visual representations.
Despite their strong transfer performance, deep convolutional representations surprisingly lack a basic low-level property -- shift-invariance, as small input shifts or translations can cause drastic changes in the output. Commonly used downsampling methods, such as max-pooling, strided-convolution, and average-pooling, ignore the sampling theorem. The well-known signal processing fix is anti-aliasing by low-pass filtering before downsampling. However, simply inserting this module into deep networks degrades performance; as a result, it is seldomly used today. We show that when integrated correctly, it is compatible with existing architectural components, such as max-pooling and strided-convolution. We observe increased accuracy in ImageNet classification, across several commonly-used architectures, such as ResNet, DenseNet, and MobileNet, indicating effective regularization. Furthermore, we observe better generalization, in terms of stability and robustness to input corruptions. Our results demonstrate that this classical signal processing technique has been undeservingly overlooked in modern deep networks.
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach IJECEIAES
Defining the correct number of clusters is one of the most fundamental tasks in graph clustering. When it comes to large graphs, this task becomes more challenging because of the lack of prior information. This paper presents an approach to solve this problem based on the Bat Algorithm, one of the most promising swarm intelligence based algorithms. We chose to call our solution, “Bat-Cluster (BC).” This approach allows an automation of graph clustering based on a balance between global and local search processes. The simulation of four benchmark graphs of different sizes shows that our proposed algorithm is efficient and can provide higher precision and exceed some best-known values.
Network Biology: A paradigm for modeling biological complex systemsGanesh Bagler
These slides are part of the two lectures delivered at the as part of the 'National Workshop on Network Modelling and Graph Theory' (Dec 14-16, 2017) at Department of Mathematics, Dibrugarh University, Assam, India.
(1) Network Biology: A paradigm for integrative modeling of biological complex systems -- 14 Dec 2017, 3:30pm
(2) Applications of network modeling in biomedicine -- 15 Dec 2017, 9:00pm
Sponsored by UGC under SAP DRS (II)
(1) Workshop link: https://www.dibru.ac.in/upcoming-events/2981-national-workshop-on-network-modelling-and-graph-theory
(2) The Workshop Flyer: https://www.dibru.ac.in/images/uploaded_files/2017/Nov/National_Workshop_on_Network_Modelling_and_Graph_Theory.pdf
The project aims at development of efficient segmentation method for the CBIR system. Mean-shift segmentation generates a list of potential objects which are meaningful and then these objects are clustered according to a predefined similarity measure. The method was tested on benchmark data and F-Score of .30 was achieved.
PowerPoint slides from a 2015 Guest Lecture in PSYCH-268A: Computational Neuroscience, Prof. Jeff Krichmar, University of California, Irvine (UCI).
Corresponding publication:
Beyeler*, M., Carlson*, K. D. , Chou*, T-S., Dutt, N., Krichmar, J. L. (2015). CARLsim 3: A user-friendly and highly optimized library for the creation of neurobiologically detailed spiking neural networks. Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland. (*equal contribution)
Why Neurons have thousands of synapses? A model of sequence memory in the brainNumenta
Presentation given by Yuwei Cui, Numenta Research Engineer at Beijing Normal University. December 2015.
Collaborators: Jeff Hawkins, Subutai Ahmad, Chetan Surpur
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Introduction to capsule networks
1. KHARKIV AI CLUB
Andrii Babii, Ph.D. - Kharkiv National University of Radio Electronics
apratster@gmail.com
Introduction to capsule networks
2. 2
Before we start
Hinton’s articles:
•Dynamic Routing Between Capsules - Sabour, S., Frosst, N. and Hinton, G.E. (2017)
•Matrix capsules with EM routing - Hinton, G. E., Sabour, S. and Frosst, N. (2018)
•Optimizing Neural Networks that Generate Images - Tijmen Tieleman's disseration
•Transforming Auto-encoders - Hinton, G. E., Krizhevsky, A. and Wang, S. D. (2011)
•A parallel computation that assigns canonical object-based frames of reference. -
Hinton, G.E. (1981)
•Shape representation in parallel systems - Hinton, G.E. (1981)
Glossary (by Sebastian Kwiatkowski)
http://www.aisummary.com/blog/capsule-networks-glossary/
Implementation
https://github.com/Sarasra/models/tree/master/research/capsules
For article “Dynamic Routing Between Capsules”
and more implementations links and info:
https://github.com/sekwiatkowski/awesome-capsule-networks
3. 3
Equivariance and invariance
Maximum value m
Rotate !
Maximum value m will be invariant to rotation, it is same.
Coordinates of the point with maximum value m, will vary "equally" with the distortion.
Coordinates of maximum will be equivariant
7. 7
What wrong with convolutional networks?
Geoffrey Hinton talk "What is wrong with
convolutional neural nets ?"
https://www.youtube.com/watch?v=rTawFwUvnLE
“Feature extraction levels are interleaved with subsampling layers that pool the
outputs of nearby feature detectors of the same type”
Slide:
-It is a bad fit to the psychology of shape perception: It does not explain why we
assign intrinsic coordinate frames to objects and why they have such huge effects
- It solves the wrong problem: We want equivariance, not invariance. Disentangling
rather than discarding.
- It fails to use the underlying linear structure: It does not make use of the natural
linear manifold that perfectly handles the largest source of variance in images
-Pooling is a poor way to do dynamic routing: We need to route each part of the
input to the neurons that know how to deal with it. Finding the best routing is
equivalent to parsing the image
8. 8
How it can be improved ?
Capsules + Dynamic Routing
What we want to store:
Is this feature detected? (Probability)
Attributes of feature: pose (position, size, orientation), deformation, velocity, albedo,
hue, texture, etc.
From scalar values to vectors!
15. 15
How it can be solved ?
Architecture of simple Capsule Net for MNIST:
Dynamic Routing Between Capsules - Sabour, S., Frosst, N. and Hinton, G.E. (2017)
16. 16
Examples
Dynamic Routing Between Capsules - Sabour, S., Frosst, N. and Hinton, G.E. (2017)
(MNIST)
Fashion MNIST
https://github.com/XifengGuo/CapsNet-Fashion-MNIST
Capsule Deep Neural Network for Recognition of Historical Graffiti Handwriting
N Gordienko, Y Kochura, V Taran, G Peng
Food detection, face detection and lot more:
17. + Good preliminary results (MNIST).
+ Requires less training data.
+ Works good with overlapping objects.
+ Can detect partially visible objects.
+ Results are interpretable, components hierarchy can be mapped.
+ Equivariance
- No known yet accuracy on large data sources CIFAR10? Accuracy seems low.
- Really slow training time (so far).
- Non linear squashing reflect the probability nature not so good as we want.
- Cosine of an angle for measuring the agreement?
Advantages and disadvantages