International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced Morphological Contour Representation and Reconstruction using Line S...CSCJournals
The paper proposes an enhanced morphological contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Domain tying across virtual interfaces: coupling X-FEM with the Mortar methodBasavaRaju Akula
In this paper we propose a unified framework of the mortar domain decomposition method and extended finite element method (X-FEM). This framework allows to deal in an efficient manner with two cumbersome aspects of the finite element methods, namely incompatible interface discretizations and internal discontinuities. Features of mortar methods in the context of mesh tying, and of X-FEM in the context of void/inclusion treatment are exploited to formulate the weak coupling along an inclusion’s surface and the virtual surface of the host mesh. It has a potential to address a multitude of problems
from accurate substructuring to efficient wear simulation in contact problems.
Study on Reconstruction Accuracy using shapiness index of morphological trans...ijcseit
Basin, lakes, and pore-grain space are important geophysical shapes, which can fit with the several
classical and fractal binary shapes, are processed by employing morphological transformations, and
methods. The decomposition of skeleton network (minimum morphological information) using various
classical structures like square, octagon and rhombus. Then derive the dilated subsets respective degree by
the structures for reconstruct the original image. Through shapiness index of pattern spectrum procedure,
we try test the reconstruction accuracy in a quantitative manner. It gives some general procedure to
characterise the shape-size complexity of surface water body. The reconstruction accuracy is against the
size of water bodies with which we produce the some example of different shapiness index for different
structuring element of shapes. In which quantitative manner approach yields better reconstruction level.
The complexity of water bodies are compared with the surfaces.
Enhanced Morphological Contour Representation and Reconstruction using Line S...CSCJournals
The paper proposes an enhanced morphological contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Domain tying across virtual interfaces: coupling X-FEM with the Mortar methodBasavaRaju Akula
In this paper we propose a unified framework of the mortar domain decomposition method and extended finite element method (X-FEM). This framework allows to deal in an efficient manner with two cumbersome aspects of the finite element methods, namely incompatible interface discretizations and internal discontinuities. Features of mortar methods in the context of mesh tying, and of X-FEM in the context of void/inclusion treatment are exploited to formulate the weak coupling along an inclusion’s surface and the virtual surface of the host mesh. It has a potential to address a multitude of problems
from accurate substructuring to efficient wear simulation in contact problems.
Study on Reconstruction Accuracy using shapiness index of morphological trans...ijcseit
Basin, lakes, and pore-grain space are important geophysical shapes, which can fit with the several
classical and fractal binary shapes, are processed by employing morphological transformations, and
methods. The decomposition of skeleton network (minimum morphological information) using various
classical structures like square, octagon and rhombus. Then derive the dilated subsets respective degree by
the structures for reconstruct the original image. Through shapiness index of pattern spectrum procedure,
we try test the reconstruction accuracy in a quantitative manner. It gives some general procedure to
characterise the shape-size complexity of surface water body. The reconstruction accuracy is against the
size of water bodies with which we produce the some example of different shapiness index for different
structuring element of shapes. In which quantitative manner approach yields better reconstruction level.
The complexity of water bodies are compared with the surfaces.
The main goal of cluster analysis is to classify elements into groupsbased on their similarity. Clustering has many applications such as astronomy, bioinformatics, bibliography, and pattern recognition. In this paper, a survey of clustering methods and techniques and identification of advantages and disadvantages of these methods are presented to give a solid background to choose the best method to extract strong association rules.
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...IJMER
A true understanding of their structural behaviour is required, such as the deflections, buckling loads
and modal characteristics, the through thickness distributions of stresses and strains, the large deflection
behaviour and, of extreme importance for obtaining strong, reliable multi-layered structures, the failure
characteristics. In the past, the structural behaviour of plates and shells using the finite element method has been
studied by a variety of approaches. Choudhary and Tungikaranalyzed the geometrically nonlinear behavior of
laminated composite plates using the finite element analysis.
Unimodal Multi-Feature Fusion and one-dimensional Hidden Markov Models for Lo...IJECEIAES
The objective of low-resolution face recognition is to identify faces from small size or poor quality images with varying pose, illumination, expression, etc. In this work, we propose a robust low face recognition technique based on one-dimensional Hidden Markov Models. Features of each facial image are extracted using three steps: firstly, both Gabor filters and Histogram of Oriented Gradients (HOG) descriptor are calculated. Secondly, the size of these features is reduced using the Linear Discriminant Analysis (LDA) method in order to remove redundant information. Finally, the reduced features are combined using Canonical Correlation Analysis (CCA) method. Unlike existing techniques using HMMs, in which authors consider each state to represent one facial region (eyes, nose, mouth, etc), the proposed system employs 1D-HMMs without any prior knowledge about the localization of interest regions in the facial image. Performance of the proposed method will be measured using the AR database.
Graph fusion of finger multimodal biometricsAnu Antony
Graph fusion technique i.e., weighted graph structure model to characterize the finger biometrics, and present the fusion frameworks for the trimodal images of a finger.
Improvement of the Shell Element Implemented in FEASTSMTiosrjce
The paper deals with shear locking problem in shell element. Shear locking does not mean complete
rigidity, it refers to unwanted high-stiffness behavior that influences the solution but does not over whelm it, so
that convergence with mesh refinement is slowed but not prevented. In the present study the Bilinear
Degenerated Shell (BDS) element model is improved based on the bubble function for membrane strain energy
and selective integration for the shear energy. After formulation of the shell element, implementation is carried
out in FEASTSMT (FINITE ELEMENT ANALYSIS OF STRUCTURES). Result of the shell element without any
bubble function terms showed sensitivity to shear locking problem. Use of bubble functions and selective
integration greatly improves the element performance. The results were compared with those available in
literatures.
Face Alignment Using Active Shape Model And Support Vector MachineCSCJournals
The Active Shape Model (ASM) is one of the most popular local texture models for face alignment. It applies in many fields such as locating facial features in the image, face synthesis, etc. However, the experimental results show that the accuracy of the classical ASM for some applications is not high. This paper suggests some improvements on the classical ASM to increase the performance of the model in the application: face alignment. Four of our major improvements include: i) building a model combining Sobel filter and the 2-D profile in searching face in image; ii) applying Canny algorithm for the enhancement edge on image; iii) Support Vector Machine (SVM) is used to classify landmarks on face, in order to determine exactly location of these landmarks support for ASM; iv) automatically adjust 2-D profile in the multi-level model based on the size of the input image. The experimental results on CalTech face database and Technical University of Denmark database (imm_face) show that our proposed improvement leads to far better performance.
Hex-Cell is an interconnection network that has attractive features like the embedding capability of topological structures; such as; bus, ring, tree and mesh topologies. In this paper, we present two algorithms for embedding bus and ring topologies onto Hex-Cell interconnection network. We use three metrics to evaluate our proposed algorithms: dilation, congestion, and expansion. Our evaluation results
show that the congestion of our two proposed algorithms is equal to one; and the dilation is equal to 2d-1 for the first algorithm and 1 for the second.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
HANDWRITTEN CHARACTER RECOGNITION USING STRUCTURAL SHAPE DECOMPOSITIONcsandit
This paper presents a statistical framework for recognising 2D shapes which are represented as
an arrangement of curves or strokes. The approach is a hierarchical one which mixes geometric
and symbolic information in a three-layer architecture. Each curve primitive is represented
using a point-distribution model which describes how its shape varies over a set of training
data. We assign stroke labels to the primitives and these indicate to which class they belong.
Shapes are decomposed into an arrangement of primitives and the global shape representation
has two components. The first of these is a second point distribution model that is used to
represent the geometric arrangement of the curve centre-points. The second component is a
string of stroke labels that represents the symbolic arrangement of strokes. Hence each shape
can be represented by a set of centre-point deformation parameters and a dictionary of
permissible stroke label configurations. The hierarchy is a two-level architecture in which the
curve models reside at the nonterminal lower level of the tree. The top level represents the curve
arrangements allowed by the dictionary of permissible stroke combinations. The aim in
recognition is to minimise the cross entropy between the probability distributions for geometric
alignment errors and curve label errors. We show how the stroke parameters, shape-alignment
parameters and stroke labels may be recovered by applying the expectation maximization EM
algorithm to the utility measure. We apply the resulting shape-recognition method to Arabic
character recognition.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Image restoration based on morphological operationsijcseit
Image processing including noise suppression, feature extraction, edge detection, image segmentation,
shape recognition, texture analysis, image restoration and reconstruction, image compression etc uses
mathematical morphology which is a method of nonlinear filters.
It is modulated from traditional morphology to order morphology, soft mathematical morphology and fuzzy
soft mathematical morphology. This paper is covers 6 morphological operations which are implemented in
the matlab program, including erosion, dilation, opening, closing, boundary extraction and region filling.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The main goal of cluster analysis is to classify elements into groupsbased on their similarity. Clustering has many applications such as astronomy, bioinformatics, bibliography, and pattern recognition. In this paper, a survey of clustering methods and techniques and identification of advantages and disadvantages of these methods are presented to give a solid background to choose the best method to extract strong association rules.
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...IJMER
A true understanding of their structural behaviour is required, such as the deflections, buckling loads
and modal characteristics, the through thickness distributions of stresses and strains, the large deflection
behaviour and, of extreme importance for obtaining strong, reliable multi-layered structures, the failure
characteristics. In the past, the structural behaviour of plates and shells using the finite element method has been
studied by a variety of approaches. Choudhary and Tungikaranalyzed the geometrically nonlinear behavior of
laminated composite plates using the finite element analysis.
Unimodal Multi-Feature Fusion and one-dimensional Hidden Markov Models for Lo...IJECEIAES
The objective of low-resolution face recognition is to identify faces from small size or poor quality images with varying pose, illumination, expression, etc. In this work, we propose a robust low face recognition technique based on one-dimensional Hidden Markov Models. Features of each facial image are extracted using three steps: firstly, both Gabor filters and Histogram of Oriented Gradients (HOG) descriptor are calculated. Secondly, the size of these features is reduced using the Linear Discriminant Analysis (LDA) method in order to remove redundant information. Finally, the reduced features are combined using Canonical Correlation Analysis (CCA) method. Unlike existing techniques using HMMs, in which authors consider each state to represent one facial region (eyes, nose, mouth, etc), the proposed system employs 1D-HMMs without any prior knowledge about the localization of interest regions in the facial image. Performance of the proposed method will be measured using the AR database.
Graph fusion of finger multimodal biometricsAnu Antony
Graph fusion technique i.e., weighted graph structure model to characterize the finger biometrics, and present the fusion frameworks for the trimodal images of a finger.
Improvement of the Shell Element Implemented in FEASTSMTiosrjce
The paper deals with shear locking problem in shell element. Shear locking does not mean complete
rigidity, it refers to unwanted high-stiffness behavior that influences the solution but does not over whelm it, so
that convergence with mesh refinement is slowed but not prevented. In the present study the Bilinear
Degenerated Shell (BDS) element model is improved based on the bubble function for membrane strain energy
and selective integration for the shear energy. After formulation of the shell element, implementation is carried
out in FEASTSMT (FINITE ELEMENT ANALYSIS OF STRUCTURES). Result of the shell element without any
bubble function terms showed sensitivity to shear locking problem. Use of bubble functions and selective
integration greatly improves the element performance. The results were compared with those available in
literatures.
Face Alignment Using Active Shape Model And Support Vector MachineCSCJournals
The Active Shape Model (ASM) is one of the most popular local texture models for face alignment. It applies in many fields such as locating facial features in the image, face synthesis, etc. However, the experimental results show that the accuracy of the classical ASM for some applications is not high. This paper suggests some improvements on the classical ASM to increase the performance of the model in the application: face alignment. Four of our major improvements include: i) building a model combining Sobel filter and the 2-D profile in searching face in image; ii) applying Canny algorithm for the enhancement edge on image; iii) Support Vector Machine (SVM) is used to classify landmarks on face, in order to determine exactly location of these landmarks support for ASM; iv) automatically adjust 2-D profile in the multi-level model based on the size of the input image. The experimental results on CalTech face database and Technical University of Denmark database (imm_face) show that our proposed improvement leads to far better performance.
Hex-Cell is an interconnection network that has attractive features like the embedding capability of topological structures; such as; bus, ring, tree and mesh topologies. In this paper, we present two algorithms for embedding bus and ring topologies onto Hex-Cell interconnection network. We use three metrics to evaluate our proposed algorithms: dilation, congestion, and expansion. Our evaluation results
show that the congestion of our two proposed algorithms is equal to one; and the dilation is equal to 2d-1 for the first algorithm and 1 for the second.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
HANDWRITTEN CHARACTER RECOGNITION USING STRUCTURAL SHAPE DECOMPOSITIONcsandit
This paper presents a statistical framework for recognising 2D shapes which are represented as
an arrangement of curves or strokes. The approach is a hierarchical one which mixes geometric
and symbolic information in a three-layer architecture. Each curve primitive is represented
using a point-distribution model which describes how its shape varies over a set of training
data. We assign stroke labels to the primitives and these indicate to which class they belong.
Shapes are decomposed into an arrangement of primitives and the global shape representation
has two components. The first of these is a second point distribution model that is used to
represent the geometric arrangement of the curve centre-points. The second component is a
string of stroke labels that represents the symbolic arrangement of strokes. Hence each shape
can be represented by a set of centre-point deformation parameters and a dictionary of
permissible stroke label configurations. The hierarchy is a two-level architecture in which the
curve models reside at the nonterminal lower level of the tree. The top level represents the curve
arrangements allowed by the dictionary of permissible stroke combinations. The aim in
recognition is to minimise the cross entropy between the probability distributions for geometric
alignment errors and curve label errors. We show how the stroke parameters, shape-alignment
parameters and stroke labels may be recovered by applying the expectation maximization EM
algorithm to the utility measure. We apply the resulting shape-recognition method to Arabic
character recognition.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Image restoration based on morphological operationsijcseit
Image processing including noise suppression, feature extraction, edge detection, image segmentation,
shape recognition, texture analysis, image restoration and reconstruction, image compression etc uses
mathematical morphology which is a method of nonlinear filters.
It is modulated from traditional morphology to order morphology, soft mathematical morphology and fuzzy
soft mathematical morphology. This paper is covers 6 morphological operations which are implemented in
the matlab program, including erosion, dilation, opening, closing, boundary extraction and region filling.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DOMAIN ENGINEERING FOR APPLIED MONOCULAR RECONSTRUCTION OF PARAMETRIC FACESsipij
Many modern online 3D applications and videogames rely on parametric models of human faces for
creating believable avatars. However, manually reproducing someone's facial likeness with a parametric
model is difficult and time-consuming. Machine Learning solution for that task is highly desirable but is
also challenging. The paper proposes a novel approach to the so-called Face-to-Parameters problem (F2P
for short), aiming to reconstruct a parametric face from a single image. The proposed method utilizes
synthetic data, domain decomposition, and domain adaptation for addressing multifaceted challenges in
solving the F2P. The open-sourced codebase illustrates our key observations and provides means for
quantitative evaluation. The presented approach proves practical in an industrial application; it improves
accuracy and allows for more efficient models training. The techniques have the potential to extend to
other types of parametric models.
Domain Engineering for Applied Monocular Reconstruction of Parametric Facessipij
Many modern online 3D applications and videogames rely on parametric models of human faces for
creating believable avatars. However, manually reproducing someone's facial likeness with a parametric
model is difficult and time-consuming. Machine Learning solution for that task is highly desirable but is
also challenging. The paper proposes a novel approach to the so-called Face-to-Parameters problem (F2P
for short), aiming to reconstruct a parametric face from a single image. The proposed method utilizes
synthetic data, domain decomposition, and domain adaptation for addressing multifaceted challenges in
solving the F2P. The open-sourced codebase illustrates our key observations and provides means for
quantitative evaluation. The presented approach proves practical in an industrial application; it improves
accuracy and allows for more efficient models training. The techniques have the potential to extend to
other types of parametric models.
There exists a plethora of algorithms to perform image segmentation and there are several issues related to
execution time of these algorithms. Image Segmentation is nothing but label relabeling problem under
probability framework. To estimate the label configuration, an iterative optimization scheme is
implemented to alternately carry out the maximum a posteriori (MAP) estimation and the maximum
likelihood (ML) estimations. In this paper this technique is modified in such a way so that it performs
segmentation within stipulated time period. The extensive experiments shows that the results obtained are
comparable with existing algorithms. This algorithm performs faster execution than the existing algorithm
to give automatic segmentation without any human intervention. Its result match image edges very closer to
human perception.
A HYBRID MORPHOLOGICAL ACTIVE CONTOUR FOR NATURAL IMAGESIJCSEA Journal
Morphological active contours for image segmentation have become popular due to their low
computational complexity coupled with their accurate approximation of the partial differential equations
involved in the energy minimization of the segmentation process. In this paper, a morphological active
contour which mimics the energy minimization of the popular Chan-Vese Active Contour without Edges is
coupled with a morphological edge-driven segmentation term to accurately segment natural images. By
using morphological approximations of the energy minimization steps, the algorithm has a low
computational complexity. Additionally, the coupling of the edge-based and region-based segmentation
techniques allows the proposed method to be robust and accurate. We will demonstrate the accuracy and
robustness of the algorithm using images from the Weizmann Segmentation Evaluation Database and
report on the segmentation results using the Sorensen-Dice similarity coefficient
A HYBRID MORPHOLOGICAL ACTIVE CONTOUR FOR NATURAL IMAGESIJCSEA Journal
Morphological active contours for image segmentation have become popular due to their low computational complexity coupled with their accurate approximation of the partial differential equations involved in the energy minimization of the segmentation process. In this paper, a morphological active contour which mimics the energy minimization of the popular Chan-Vese Active Contour without Edges is coupled with a morphological edge-driven segmentation term to accurately segment natural images. By using morphological approximations of the energy minimization steps, the algorithm has a low computational complexity. Additionally, the coupling of the edge-based and region-based segmentation techniques allows the proposed method to be robust and accurate. We will demonstrate the accuracy and robustness of the algorithm using images from the Weizmann Segmentation Evaluation Database and report on the segmentation results using the Sorensen-Dice similarity coefficient.
A HYBRID MORPHOLOGICAL ACTIVE CONTOUR FOR NATURAL IMAGESIJCSEA Journal
Morphological active contours for image segmentation have become popular due to their low computational complexity coupled with their accurate approximation of the partial differential equations
involved in the energy minimization of the segmentation process. In this paper, a morphological active contour which mimics the energy minimization of the popular Chan-Vese Active Contour without Edges is coupled with a morphological edge-driven segmentation term to accurately segment natural images. By using morphological approximations of the energy minimization steps, the algorithm has a low computational complexity. Additionally, the coupling of the edge-based and region-based segmentation techniques allows the proposed method to be robust and accurate. We will demonstrate the accuracy and robustness of the algorithm using images from the Weizmann Segmentation Evaluation Database and report on the segmentation results using the Sorensen-Dice similarity coefficient.
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hier...Mad Scientists
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hierarchical Representations, Honglak Lee(ICML 2009)
석사과정 세미나 발표를 위해 논문을 읽고 분석한 내용입니다. CDBN은 CNN와 DBN의 장점을 결합하여 translation invariance와 computational competence를 확보하였고, probabilistic max-pooling을 통해 image restoration을 할 수 있는 undirected DBM을 구성할 수 있게 합니다.
Partitioning intensity inhomogeneity colour images via Saliency- based active...IJECEIAES
Partitioning or segmenting intensity inhomogeneity colour images is a challenging problem in computer vision and image shape analysis. Given an input image, the active contour model (ACM) which is formulated in variational framework is regularly used to partition objects in the image. A selective type of variational ACM approach is better than a global approach for segmenting specific target objects, which is useful for applications such as tumor segmentation or tissue classification in medical imaging. However, the existing selective ACMs yield unsatisfactory outcomes when performing the segmentation for colour (vector-valued) with intensity variations. Therefore, our new approach incorporates both local image fitting and saliency maps into a new variational selective ACM to tackle the problem. The euler-lagrange (EL) equations were presented to solve the proposed model. Thirty combinations of synthetic and medical images were tested. The visual observation and quantitative results show that the proposed model outshines the other existing models by average, with the accuracy of 2.23% more than the compared model and the Dice and Jaccard coefficients which were around 12.78% and 19.53% higher, respectively, than the compared model.
M ESH S IMPLIFICATION V IA A V OLUME C OST M EASUREijcga
We develop a polygonal mesh simplification algorithm based on a novel analysis of the mesh
geometry.
Particularly, we propose first a characterization of vertices as hyperbolic or non
-
hyperbolic depend
-
ing
upon their discrete local geometry. Subsequently, the simplification process computes a volume cost for
each non
-
hyperbolic vertex, in anal
-
ogy with spherical volume, to capture the loss of fidelity if that vertex
is decimated. Vertices of least volume cost are then successively deleted and the resulting holes re
-
triangulated using a method based on a novel heuristic. Preliminary experiments i
ndicate a performance
comparable to that of the best known mesh simplification algorithms
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMAGE SEGMENTATION BY MODIFIED MAP-ML ESTIMATIONScscpconf
Though numerous algorithms exist to perform image segmentation there are several issues
related to execution time of these algorithm. Image Segmentation is nothing but label relabeling
problem under probability framework. To estimate the label configuration, an iterative
optimization scheme is implemented to alternately carry out the maximum a posteriori (MAP)
estimation and the maximum likelihood (ML) estimations. In this paper this technique is
modified in such a way so that it performs segmentation within stipulated time period. The
extensive experiments shows that the results obtained are comparable with existing algorithms.
This algorithm performs faster execution than the existing algorithm to give automatic
segmentation without any human intervention. Its result match image edges very closer to
human perception.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
Ok3425102516
1. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2510 | P a g e
An Object Shape Completion Using the Shape Boltzmann
Machine
Mr. B. Srinidhi*and Mr. E. Suneel**
* M.Tech Student ** Associate Professor, Department of ECE
DVR & Dr HS MIC college of Technology, Kanchikacherla, Andhra Pradesh-521180, India
ABSTRACT
An object shape plays a crucial role in
many computer vision applications such as
segmentation, object detection, inpainting and
graphics. An object shape mainly depends upon
local and global variables. Local variables on the
shape such as smoothness and continuity can help
provide correct segmentations where the object
boundary is noisy, unclear or lost in shadow.
Global variables on the shape such as ensuring the
correct number of parts (legs, wheels, wings etc)
can resolve ambiguities where background clutter
looks similar to part of the object. In this paper,
we present a new learning algorithm for
Boltzmann machines that contain two layers of
hidden units that we call a Shape Boltzmann
Machine (ShapeBM) for the task of modeling
foreground/background (binary) and parts-based
(categorical) shape images. We show that the
ShapeBM can generate more realistic and
generalized samples and ability to do shape
completion suggests applications in a computer
graphic setting.
Keywords – Boltzmann Machine, Generalized,
Generative, Realistic, Sampling.
I. INTRODUCTION
Foreground/background classification of
pixels is a crucial preprocessing step in many
computer vision applications, such as those for object
detection and segmentation, inpainting and graphics.
The original learning algorithm for Boltzmann
machines required randomly initialized Markov
chains to approach their equilibrium distributions in
order to estimate the data-dependent, data-
independent expectations that a connected pair of
binary variables would both be on. The difference of
these two expectations is the gradient required for
maximum likelihood learning. Even with the help of
simulated annealing, this learning procedure was too
slow to be practical.
There have been a wide variety of
approaches to modeling 2D shape. The most
commonly used models are grid-structured Markov
Random Fields (MRFs) or Conditional Random
Fields[8]. In such models, the pairwise potentials
connecting neighboring pixels impose very local
constraints like smoothness but are unable to capture
more complex properties such as convexity or
curvature, nor can they account for longer-range
properties. Carefully designed high-order potentials
[5] allow particular local or longer-range shape
properties to be modeled within an MRF, but these
potentials fall short of capturing all such properties so
as to make realistic-looking samples. For example, a
strong shape model of horses would know that horses
have legs, heads and tails, that these parts appear in
certain positions consistent with a global pose, that
there are never more than four legs visible in any
given image, that the legs have to support the horse's
body, along with many more properties that are
difficult to express in words but necessary to make
the shape look plausible. A common approach when
using a contour (or an image) is to use a mean shape
in combination with some principal directions of
variation, as captured by a Principal Components
Analysis[9] or Factor Analysis[2]. Such models
capture the typical global shape of an object and
global variations on it (such as changes in the aspect
ratio of a face). Non-parametric approaches employ
what is effectively a large database of template
shapes[6] or shape fragments[3]. In the former case,
because no attempt is made to understand the
composition of the shape, it is impossible to
generalize to novel shapes not present in the
database.
In this paper shows how a strong model of
binary shape can be constructed using a form of
DBM[10] with a set of carefully chosen capacity
variables, which we call the Shape Boltzmann
Machine (SBM). The model is a generative model of
object shape and can be learned directly from training
data. Due to its generative formulation the SBM can
be used very flexibly, not just as a shape prior in
segmentation tasks but also, for instance, to
synthesize novel shapes in graphics applications, or
to complete partially occluded shapes. We learn SBM
models from several challenging shape datasets and
evaluate them on a range of shape synthesis and
completion tasks. We demonstrate that, despite the
relatively small sizes of the training datasets, the
learned models are both able to generate realistic
samples and to generalize to generate samples that
differ from images in the training dataset. We finally
present an extension of the SBM that also allows it to
simultaneously model the shape of multiple
dependent regions such as the parts of an object,
2. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2511 | P a g e
which can in turn be used, for instance, as a prior in
parts-based segmentation tasks.
Table 1 : Comparison of a number of different
shape models
Shape Models Realism Gene
raliza
tion
Glob
ally
Loc
ally
Mean [1] √ - -
Factor Analysis[2] √ - √
Fragments[3] - √ √
Grid MRFs/CRFs[4] - √ √
High-order potentials[5] Limited √ √
Database [6] √ √ -
ShapeBM [7] √ √ √
We show that the SBM characterizes a
strong model of shape[7], in that samples from the
model look realistic and it can generalize to generate
samples that differ from training examples. The
Realism ensures that the model captures shape
characteristics at all spatial scales well enough to
place probability mass only on images that belong to
the ―true‖ shape distribution. The Generalization
ensures that there are no gaps in the learned
distribution, i.e. that it also covers novel unseen but
valid shapes.
II. BOLTZMANN MACHINES
A Boltzmann machine is a network of
symmetrically coupled stochastic binary units. It
contains a set of visible units 𝑣 ∈ {0,1} 𝐷
, and a set of
hidden units h∈ {0,1} 𝑝
. The energy of the state {v,h}
is defined as
𝐸 𝑣, ℎ; 𝜃 = −
1
2
𝑣 𝑇
𝐿𝑣 −
1
2
ℎ 𝑇
𝐽ℎ − 𝑣 𝑇
𝑊ℎ (1)
Where 𝜃 = {𝑊, 𝐿, 𝐽}are the model
parameters: W, L, J represent visible-to-hidden,
visible-to-visible and hidden- to-hidden symmetric
interaction terms.
Fig. 1: General Boltzmann machine.
In Fig 1 the top layer represents a vector of
stochastic binary ―hidden‖ features and the bottom
layer represents a vector of stochastic binary
―visible‖ variables. The diagonal elements of L and J
are set to 0. The probability that the model assigns to
a visible vector v is
𝑝 𝑣; 𝜃 =
𝑝∗(𝑣;𝜃)
𝑍(𝜃)
=
1
𝑍(𝜃)
𝑒−𝐸(𝑣,ℎ;𝜃)
ℎ (2)
𝑍 𝜃 = 𝑒−𝐸(𝑣,ℎ;𝜃)
ℎ𝑣 (3)
Where p* denotes unnormalized probability
and Z(θ) is the partition function. The conditional
distributions over hidden and visible units are given
by
𝑝 ℎ𝑗 = 1/𝑣, ℎ−𝑗 = 𝜎 ( 𝑊𝑖𝑗 𝑣𝑖
𝐷
𝑖=1 + 𝐽𝑖𝑚 ℎ𝑗
𝑃
𝑚=1𝑗 ) (4)
𝑝 𝑣𝑗 = 1/ℎ, 𝑣−𝑖 = 𝜎 ( 𝑊𝑖𝑗 ℎ𝑗
𝑃
𝑗=1 + 𝐿𝑖𝑘 𝑣𝑗
𝐷
𝑘=1𝑖 ) (5)
where 𝜎 𝑥 = 1/(1 + 𝑒−𝑥 ) is the logistic
function.
III. PROPOSED MODEL
RBMs and DBMs are powerful generative
models, but also have many parameters. Since they
are typically trained on large amounts of unlabeled
data (thousands or tens of thousands of examples),
this is usually less of a problem than in supervised
settings. Segmented images, however, are expensive
to obtain and datasets are typically small (hundreds
of examples). In such a regime, RBMs and DBMs
can be prone to over fitting.
In this section we will describe how we can
impose a set of carefully chosen connectivity and
capacity constraints on a DBM to overcome this
problem: the resulting SBM formulation not only
learns a model that accurately captures the properties
of binary shapes, but that also generalizes well, even
when trained on small datasets.
III. I. SHAPE BOLTZMANN MACHINE
The SBM used below has two layers of
latent variables: h1
and h2
. The visible units v are the
pixels of a binary image of size N X M. In the first
layer we enforce local receptive fields by connecting
each hidden unit in h1
only to a subset of the visible
units, corresponding to one of four rectangular
patches, as shown in Fig. 2.
Fig. 2: The Shape Boltzmann Machine.
(a) 1D slice of a Shape Boltzmann Machine.
(b) The Shape Boltzmann Machine in 2D.
(a)
(b)
3. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2512 | P a g e
(6)
(7)
(8)
In order to encourage boundary consistency
each patch overlaps its neighbor by b pixels and so
has side lengths of N/2 + b/2 and M/2 + b/2. We
furthermore share weights between the four sets of
hidden units and patches. In the SBM the receptive
field overlap of adjacent groups of hidden units is
particularly small compared to their sizes.
Overall, these modifications reduce the
number of first layer parameters by a factor of about
16 which reduces the amount of data needed for
training by a similar factor. At the same time these
modifications take into account two important
properties of shapes: first, the restricted receptive
field size reflects the fact that the strongest
dependencies between pixels are typically local,
while distant parts of an object often vary more
independently (the small overlap allows boundary
continuity to be learned primarily at the lowest
layer); second, weight sharing takes account of the
fact that many generic properties of shapes (e.g.
smoothness) are independent of the image position.
For the second layer we choose full connectivity
between h1
and h2
, but restrict the relative capacity of
h2
: we use around 4 X 500 hidden units for h1
vs.
around 50 for h2
in our single class experiments.
While the first layer is primarily concerned with
generic, local properties, the role of the second layer
is to impose global variables, e.g. with respect to the
class of an object shape or its overall pose. The
second layer mediates dependencies between pixels
that are far apart (not in the same local receptive
field), but these dependencies will be weaker than
between nearby pixels that share first level hidden
units. Limiting the capacity of the second layer
encourages this separation of concerns and helps to
prevent the model from over fitting to small training
sets. Note that this is in contrast to who use a top-
most layer that is at least as large as all of the
preceding layers.
Fig.3: Flow Chart for the Shape Boltzmann Machine
Our MATLAB implementation completed
training around 4 hours, running on a dual–core
3GHz PC with 4GB memory. We use advanced
versions of MATLAB 2009b. In the below flow chart
training samples collected after processing the
learning procedure. SBM parameters are discussed in
section III.II. Graphical user interface(GUI) is the
one of the major tool in the MATLAB platform.
Based on SBM parameters more realistic and
generalized samples generated through the GUI form
trained binary samples.
1) Realism - samples from the model look
realistic;
2) Generalization - the model can generate
samples that differ from training examples.
III. II. A MULTI REGION SBM
The SBM model described in the previous
section represents Shapes as binary images and can
be used, for example, as a prior when segmenting a
foreground object from its background. While it is
often sufficient to consider the foreground object as a
single region without internal structure, there are
situations where it is desirable to explicitly model
multiple, dependent regions, e.g. in order to
decompose the foreground object into parts. In the
SBM this can be achieved by using categorical
visible units instead of binary ones: Visible units with
L + 1 different states (i.e. 𝑣𝑖 𝜖{0, … . 𝐿}) allow the
modeling of shapes with L parts. The visible unit
representing the ith
pixel then indicates which of the L
parts or the background the pixel belongs to (here we
treat the background as part 0).
We use a ―one-of-L + 1‖ encoding for vi ,
i.e. we choose vi to be L + 1 dimensional binary
vectors, for 𝑣𝑖 = 𝑙 we set 𝑣𝑖𝑙 = 1, 𝑣𝑖𝑙′ = 0, ∀𝑙′
≠ 𝑙.
The energy function of this model given by
𝐸 𝑣, ℎ1
,
ℎ2
𝜃 𝑠
= 𝑏𝑙𝑖
𝑖,𝑙
𝑣𝑙𝑖 + 𝑤𝑙𝑖𝑗
1
𝑣𝑙𝑖 ℎ𝑗
1
𝑖,𝑗,𝑙
+ 𝑐𝑗
1
ℎ𝑗
1
𝑗
+ 𝑤𝑗𝑘
2
ℎ𝑗
1
ℎ 𝑘
2
𝑗 ,𝑘
+ 𝑐 𝑘
2
ℎ 𝑘
2
𝑘
Where we use V to denote the the matrix
with the L+1 dimensional vectors vi in its rows.
This change in the nature of the visible units
preserves all of the appealing properties of the SBM.
In particular the conditional distributions over the
three sets of variables V, h1, and h2 remain factorial.
The only change is in the specific forms of the two
conditional distributions p(v/h1
) and p(h1
/v; h2
) :
𝑝 𝑣𝑖 = 𝑙 ℎ1
=
𝑒𝑥𝑝 𝑤 𝑙𝑖𝑗
1
ℎ 𝑗
1
+𝑏 𝑙𝑖𝑗
exp ( 𝑤
𝑙′ 𝑖𝑗
1 ℎ 𝑗
1+𝑏 𝑙′ 𝑖𝑗 )𝐿
𝑙′=0
𝑝 ℎ𝑗
1
= 1/𝑉, ℎ2 = 𝜎( 𝑤𝑙𝑖𝑗
1
𝑣𝑙𝑖 + 𝑤𝑗𝑘
2
ℎ 𝑘
2
+ 𝑐𝑗
1
𝑘𝑖,𝑙 )
4. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2513 | P a g e
(9)
where in the left-hand-side of eq. (7) we use
𝑣𝑖 = 𝑙 to denote the fact that 𝑣𝑖𝑙 = 1, 𝑣𝑖𝑙′ = 0, ∀𝑙′
≠ 𝑙
as explained above.
The conditional distribution given in eq. (7)
implements the constraint that for each pixel only one
of these L + 1 binary units can be active, i.e. only one
of the parts can be present. Due to the particular form
of the conditional distribution (7) categorical visible
units are often referred to as ―softmax‖ units. It
should be noted that the above formulation of the
multi-part SBM is especially suited to model the
shapes of several dependent regions such as non-
occluding (or lightly occluding) object parts. For
modeling the shapes of multiple independent regions,
as arise in the case of multiple occluding objects, it
might be more suitable to model occlusion explicitly.
IV. LEARNING
Learning of the model involves maximizing
log p(v;Θ) of the observed data v with respect to its
parameters Θ = {b;W1
;W2
; c1
; c2
}. The gradient of
the log-likelihood of a single training image with
respect to the parameters is given by
∇Θ log p v;Θ = ∇ΘE v, h1
, h2
; Θ pΘ(h1,h2/v)
− ∇ΘE v′, h1, h2; Θ pΘ(v′,h1,h2)
and the total gradient is obtained by summing the
gradients of the individual training images.
The first term on the right hand side is the
expectation of the gradient of the energy where the
expectation is taken with respect to the posterior
distribution over h1
, h2
given the observed image v.
The second term is also an expectation of the gradient
of the energy, but this time taken with respect to the
joint distribution over v, h1
, h2
defined by the model.
Although the gradient is readily written out,
maximization of the log-likelihood is difficult in
practice. Firstly, except for very simple cases it is
intractable to compute as both expectations involve a
sum over a number of terms that is exponential in the
number of variables (visible and hidden units).
Secondly, gradient ascent in the likelihood is prone to
getting stuck in local optima. In this work we
minimizes these difficulties in three ways: (a) it
approximates the first expectation in eq. (9) using a
mean-field approximation to the posterior; (b) it
approximates the second expectation with samples
drawn from the model distribution via MCMC; and
(c) it employs a pre-training strategy that provides a
good initialization to the weights W1
, W2
before
attempting learning in the full model. Learning
proceeds in two phases. In the pre-traning phase we
greedily train the model bottom-up, one layer at a
time. The purpose of this phase is to find good initial
values for all parameters of the model. In the second
phase we then perform approximate stochastic
gradient ascent in the likelihood of the full model to
fine-tune the parameters in an expectation-
maximization-like scheme. This involves the same
sample-based approximation to the gradient of the
normalization constant.
Fig.4: Block-Gibbs MCMC sampling Scheme
In Fig. 9 which v, h1
and h2
variables are
sampled in turn. Note that each sample of h1
is
obtained conditioned on the current state of v and h2
.
For sufficiently large values of n, sample n will be
uncorrelated with the original image.
V. RESULTS
In this section we demonstrate that the SBM
can be trained to be a strong model of object shape.
For this purpose we consider a challenging dataset:
Weizmann horses. Weizmann horse dataset The
Weizmann horse dataset contains 327 images, all of
horses facing to the left, but in a variety of poses. The
dataset is challenging because in addition to their
overall pose variation, the positions of the horses'
heads, tails and legs change considerably from image
to image.
V. I. REALISM
The realism ensures that the model captures shape
characteristics at all spatial scales well enough to
place probability mass only on images that belong to
the ―true‖ shape distribution. The SBM aims to
overcome these problems through a combination of
connectivity constraints, weight sharing and model
hierarchy. The combination of these ingredients is
necessary to obtain a strong model of shape. Samples
from the SBM for horses and motorbikes are shown
in Fig. 5.
Fig. 5 Realism Criterion
First, we note that the model generates
natural shapes from a variety of poses. Second, we
observe that details such as legs (in the case of
horses) or handle bars, side mirrors, and forks (in the
5. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2514 | P a g e
case of motorbikes) are preserved and remain sharply
defined in the samples. Third, we note that the horses
have the correct number of legs while motorbikes
have, for instance, the correct number of handle bars
and wheels. Finally, we note that the patch overlap
ensures seamless connections between the four
quadrants of the image. Indeed, horse and motorbike
samples generated by the model look suficiently
realistic that we consider the model to have fulfilled
the Realism requirement.
V. II. GENERALIZATION
The generalization ensures that there are no
gaps in the learned distribution, i.e. that it also covers
novel unseen but valid shapes. We next investigated
to what extent the SBM meets the Generalization
requirement, to ensure that the model has not simply
memorized the training data. In Fig. 6 we show for
horses the difference between the sampled shapes
from Fig. 5 and their closest images in the training
set. We use the Hamming distance between training
images and a thresholded version of the conditional
probability (> 0.3), as the similarity measure. This
measure was found to retrieve the visually most
similar images. Red indicates pixels that are in the
sample but not in the closest training image, and
yellow indicates pixels in the training image but not
in the sample. Both models generalize from the
training data-points in non-trivial ways whilst
maintaining validity of the overall object shape.
These results suggest that the SBM generalizes to
realistic shapes that it has not encountered in the
training set.
Fig. 6 Generalization Criterion
V. III. MULTIPLE OBJECT CATEGORIES
Class-specific shape models are appropriate
if the class is known, but for segmentation / detection
applications this may not be the case. A similar
situation arises if the view point is not fixed (e.g.
objects can appear right or left facing). In both cases
there is large overall variability in the data but the
data also form relatively distinct clusters of similar
shapes (e.g. all objects from a particular category, or
all right-facing objects).
To investigate whether the SBM is able to
successfully deal with such additional variability and
structure in the data we applied it to a dataset
consisting of shapes from multiple object classes and
tested whether it would be able to learn a strong
model of the shapes of all classes simultaneously.We
trained an SBM on a combination of the Weizmann
data and 3 other animal categories from Caltech-101.
In addition to 327 horse images, the dataset contains
images of 798 motorbikes, 68 dragonflies, 78 llamas
and 59 rhinos (for a total of 1329 images).
Fig. 7 Multiple objects
VI. SHAPE COMPLETION
We further assessed both the realism and
generalization capabilities of the SBM by using it to
perform shape completion, where the goal is to
generate likely configurations of pixels for a missing
region of the shape, given the rest of the shape. To
perform completion we obtain samples of the missing
- or unobserved – pixels vU conditioned on the
remaining (observed) pixels vO (U and O denote the
set indices of unobserved and observed pixels
respectively). This is achieved using a Gibbs
sampling procedure that samples from the conditional
distribution.
Fig. 8 Shape completion variability
In this procedure, samples are obtained by
running a Markov chain as before, sampling v, h1
,
and h2
from their respective conditional distributions,
but every time v is sampled we ―clamp‖ the observed
pixels vO of the image to their given values, updating
only the state of the unobserved pixels vU. Since the
6. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2515 | P a g e
model specifies a distribution over the missing region
p(vU/vO), multiple such samples capture the
variability of possible solutions that exist for any
given completion task. In Fig. 8 we show how the
samples become more constrained as the missing
region shrinks. Blue in the first column indicates the
missing regions. The samples highlight the variability
in possible completions captured by the model. As
the missing region shrinks, the samples become more
constrained.
Fig. 9: Sampled image completion.
Fig. 9 shows sampled completions of
regions of horse, motorbike, llama, dragonfly and
rhino images that the model had not seen during
training. Despite the large sizes of the missing
portions, and the varying poses of the horses,
motorbikes, llamas, dragonflies and rhinos
completions look realistic. The SBM's ability to do
shape completion suggests applications in a computer
graphics setting. Sampled completions can be
constrained in real-time by simply clamping certain
pixels of the image.
(a) (b)
Fig. 11: Constrained shape completion.
In Fig. 11a we show snapshots of a
graphical user interface in which the user modifies a
horse silhouette with a digital brush. The model's
ability to generalize enables it to generate samples
that satisfy the user's constraints. The model's
accurate knowledge about horse shapes ensures that
the samples remain realistic. As a direct comparison
we also consider a simple data-base driven (―non-
parametric‖) approach where we try to find suitable
completions via a nearest-neighbor search in our
database of training shapes. Missing regions (blue
pixels, top row) are completed using the SBM and by
finding the closest match (middle row) to the
prescribed pixels in the training data. Fig. 11a The
horse's back is pulled up by the SBM (bottom row)
using an appropriate on" brush. Notice how the
stomach moves up and the head angle changes to
maintain a valid shape. The horse's back is then
pushed down with an ―on‖ brush. Fig. 11b given only
minimal user input, the model completes the images
to generate realistic horse shapes. As shown in Fig.
11 such a database-driven approach can fail to find
shapes that match the constraints.
A natural way to directly evaluate a generative model
quantitatively is by computing the likelihood of some
held-out data under the model. As an alternative we
therefore introduce what we will refer to as an
―imputation score" for the shape completion task as a
measure of the strength of a model. We collect
additional horse and motorbike silhouettes from the
web (25 horses and 25 motorbikes), and divide each
into 9 segments. We then perform multiple
imputation tests for each image. In each test, we
remove one of the segments and estimate the
conditional probability of that segment under the
model, given the remaining 8 segments. The log
probabilities are then averaged across the different
segments and images to give the score. Except for the
mean model (where they are trivial) the conditional
distributions over the subsets of unobserved pixels
given the rest of the image are infeasible to compute
in practice due to the dependencies introduced by the
latent variables. We therefore approximate the
required conditional log-probabilities via MCMC: for
a particular image and segment we draw
configurations of the latent variables from the
posterior given the observed part of the image and
then evaluate the conditional probability of the true
configuration of the unobserved segment given the
latent variables, i.e. we compute
𝑝 𝑉𝑈 𝑉𝑂 ≈
1
𝑆
𝑝 𝑉𝑈 ℎ 𝑠
𝑠 (10)
Provided that our MCMC scheme allows us
to sample from the true posterior the right hand side
of eq. 10 provides us with an unbiased estimate of
p(vU|vO).A high score in this test indicates both the
realism of samples and the generalization capability
of a model, since models that do not allocate
probability mass on good shapes (from the ―true"
generating distribution of horses) and models that
waste probability mass on bad shapes are both
penalized. The ShapeBM significantly outperforms
our baseline models at this task.
7. Mr. B. Srinidhi, Mr. E. Suneel / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2510-2516
2516 | P a g e
VII. CONCLUSION
In this paper we have presented the Shape
Boltzmann Machine, a strong generative model of
object shape. The SBM is based on the general DBM
architecture, a form of undirected graphical model
that makes heavy use of latent variables to model
high-order dependencies between the observed
variables. We believe that the combination of (a)
carefully chosen connectivity and capacity
constraints, along with (b) a hierarchical architecture,
and (c) a training procedure that allows for the joint
optimization of the full model, is key to the success
of the SBM.
These ingredients allow the SBM to learn
high quality probability distributions over object
shapes from small datasets, consisting of just a few
hundred training images. The learned models are
convincing in terms of both realism of samples from
the distribution and generalization to new examples
of the same shape class. Without making use of
specialist knowledge about the particular shapes the
model develops a natural representation with some
separation of concerns across layers.
REFERENCES
[1] N. Jojic and Y. Caspi, Capturing Image
Structure with Probabilistc Index Maps, In
CVPR, 2004, 212-219.
[2] T. Cemgil, W. Zajdel and B. Krose, A
Hybrid Graphical Model for Robust Feature
Extraction from video, In CVPR, 2005,
1158-1165.
[3] E. Borenstein, E. Sharon, and S. Ullman.
Combining Top-Down and Bottom-Up
Segmentation. In CVPR Workshop on
Perceptual Organization in Computer
Vision, 2004.
[4] C. Rother, V. Kolmogorov, and A. Blake.
―GrabCut‖: interactive foreground
extraction using iterated graph cuts.
SIGGRAPH, 2004, 309–314.
[5] S. Nowozin and C. Lampert. Global
connectivity potentials for random field
models. In CVPR, 2009, 818–825.
[6] D. Gavrila. An Exemplar-Based Approach
to Hierarchical Shape Matching. PAMI,
2007, 1408–1421.
[7] S. M. Ali Eslami, Nicolas Heess, and John
Winn. The Shape Boltzmann Machine: a
Strong Model of Object Shape. In IEEE
CVPR, 2012, 406-413.
[8] Y. Boykov and M.P. Jolly. Interactive Graph
Cuts for Optimal Boundary & Region
Segmentation of Objects in N-D images. In
ICCV, 2001, 105–112.
[9] T. Cootes, C. Taylor, D. H. Cooper, and J.
Graham. Active shape models—their
training and application, Computer Vision
and Image Understanding, 1995, 61:38–59.
[10] R. Salakhutdinov and G. Hinton. Deep
Boltzmann Machines, In AISTATS, 2009,
vol. 5, 448–455.
[11] T. Tieleman. Training restricted Boltzmann
machines using approximations to the
likelihood gradient. In ICML, 2008, 1064-
1071.