This document provides an overview of pattern recognition and supervised learning for machine vision. It discusses what pattern recognition is, examples of pattern recognition applications, the basic steps in a pattern recognition system including data acquisition, preprocessing, feature extraction, supervised/unsupervised learning, and post-processing. For supervised learning, it describes the process of inferring functions from labeled training data. It also provides an example of using multiple features and decision boundaries for texture classification of images.
Review of Image Segmentation Techniques based on Region Merging ApproachEditor IJMTER
Image segmentation is an important task in computer vision and object recognition. Since
fully automatic image segmentation is usually very hard for natural images, interactive schemes with a
few simple user inputs are good solutions. In image segmentation the image is dividing into various
segments for processing images. The complexity of image content is a bigger challenge for carrying out
automatic image segmentation. On regions based scheme, the images are merged based on the similarity
criteria depending upon comparing the mean values of both the regions to be merged. So, the similar
regions are then merged and the dissimilar regions are merged together.
A comparison of image segmentation techniques, otsu and watershed for x ray i...eSAT Journals
Abstract The most dangerous and rapidly spreading disease in the world is Tuberculosis. In the investigating for suspected tuberculosis (TB), chest radiography is the only key techniques of diagnosis based on the medical imaging So, Computer aided diagnosis (CAD) has been popular and many researchers are interested in this research areas and different approaches have been proposed for the TB detection. Image segmentation plays a great importance in most medical imaging, by extracting the anatomical structures from images. There exist many image segmentation techniques in the literature, each of them having their own advantages and disadvantages. The aim of X-ray segmentation is to subdivide the image in different portions, so that it can help during the study the structure of the bone, for the detection of disorder. The goal of this paper is to review the most important image segmentation methods starting from a data base composed by real X-ray images. Keywords— chest radiography, computer aided diagnosis, image segmentation, anatomical structures, real X-rays.
Review of Image Segmentation Techniques based on Region Merging ApproachEditor IJMTER
Image segmentation is an important task in computer vision and object recognition. Since
fully automatic image segmentation is usually very hard for natural images, interactive schemes with a
few simple user inputs are good solutions. In image segmentation the image is dividing into various
segments for processing images. The complexity of image content is a bigger challenge for carrying out
automatic image segmentation. On regions based scheme, the images are merged based on the similarity
criteria depending upon comparing the mean values of both the regions to be merged. So, the similar
regions are then merged and the dissimilar regions are merged together.
A comparison of image segmentation techniques, otsu and watershed for x ray i...eSAT Journals
Abstract The most dangerous and rapidly spreading disease in the world is Tuberculosis. In the investigating for suspected tuberculosis (TB), chest radiography is the only key techniques of diagnosis based on the medical imaging So, Computer aided diagnosis (CAD) has been popular and many researchers are interested in this research areas and different approaches have been proposed for the TB detection. Image segmentation plays a great importance in most medical imaging, by extracting the anatomical structures from images. There exist many image segmentation techniques in the literature, each of them having their own advantages and disadvantages. The aim of X-ray segmentation is to subdivide the image in different portions, so that it can help during the study the structure of the bone, for the detection of disorder. The goal of this paper is to review the most important image segmentation methods starting from a data base composed by real X-ray images. Keywords— chest radiography, computer aided diagnosis, image segmentation, anatomical structures, real X-rays.
This is about Image segmenting.We will be using fuzzy logic & wavelet transformation for segmenting it.Fuzzy logic shall be used because of the inconsistencies that may occur during segementing or
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHJournal For Research
Image segmentation is often used to distinguish the foreground from the background. Image segmentation is one of the difficult research problems in the machine vision industry and pattern recognition. Thresholding is a simple but effective method to separate objects from the background. A commonly used method, the Otsu method, improves the image segmentation effect obviously. It can be implemented by two different approaches: Iteration approach and Custom approach. In this paper both approaches has been implemented on MATLAB and give the comparison of them and show that both has given almost the same threshold value for segmenting image but the custom approach requires less computations. So if this method will be implemented on hardware in an optimized way then custom approach is the best option.
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGEScseij
Image binarization is the process of separation of pixel values into two groups, black as background and
white as foreground. Thresholding can be categorized into global thresholding and local thresholding. This
paper describes a locally adaptive thresholding technique that removes background by using local mean
and standard deviation. Most common and simplest approach to segment an image is using thresholding.
In this work we present an efficient implementation for threshoding and give a detailed comparison of
Niblack and sauvola local thresholding algorithm. Niblack and sauvola thresholding algorithm is
implemented on medical images. The quality of segmented image is measured by statistical parameters:
Jaccard Similarity Coefficient, Peak Signal to Noise Ratio (PSNR).
Presentation on deformable model for medical image segmentationSubhash Basistha
Introduction to Image Processing
Steps of Image Processing
Types of Image Processing
Introduction to Image Segmentation
Introduction to Medical Image Segmentation
Application of Image Segmentation
Example of Image Segmentation
Need for Deformable Model
What is Deformable Model??
Types of Deformable Model
Improvement oh the recognition rate by random forestYoussef Rachidi
In this paper; we introduce a system of automatic recognition of characters based on the Random Forest Method in non-constrictive pictures that are stemmed from the terminals Mobile phone. After doing some pretreatments on the picture, the text is segmented into lines and then into characters. In the stage of characteristics extraction, we are representing the input data into the vector of primitives of the zoning types, of diagonal, horizontal and of the Zernike moment. These characteristics are linked to pixels’ densities and they are extracted on binary pictures. In the classification stage, we examine four classification methods with two different classifiers types namely the multi-layer perceptron (MLP) and the Random Forest method. After some checking tests, the system of learning and recognition which is based on the Random Forest has shown a good performance on a basis of 100 models of pictures.
Improvement of the Recognition Rate by Random ForestIJERA Editor
In this paper; we introduce a system of automatic recognition of characters based on the Random Forest Method in non-constrictive pictures that are stemmed from the terminals Mobile phone. After doing some pretreatments on the picture, the text is segmented into lines and then into characters. In the stage of characteristics extraction, we are representing the input data into the vector of primitives of the zoning types, of diagonal, horizontal and of the Zernike moment. These characteristics are linked to pixels’ densities and they are extracted on binary pictures. In the classification stage, we examine four classification methods with two different classifiers types namely the multi-layer perceptron (MLP) and the Random Forest method. After some checking tests, the system of learning and recognition which is based on the Random Forest has shown a good performance on a basis of 100 models of pictures
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Pinaki Ranjan Sarkar
Recent advancement in sensor technology allows very high spatial resolution along with multiple spectral bands. There are many studies, which highlight that Object Based Image Analysis(OBIA) is more accurate than pixel-based classification for high resolution(< 2m) imagery. Image segmentation is a crucial step for OBIA and it is a very formidable task to estimate optimal parameters for segmentation as it does not have any unique solution. In this paper, we have studied different segmentation algorithms (both mono-scale and multi-scale) for different terrain categories and showed how the segmented output depends on upon various parameters. Later, we have introduced a novel method to estimate optimal segmentation parameters. The main objectives of this study are to highlight the effectiveness of presently available segmentation techniques on very high-resolution satellite data and to automate segmentation process. Pre-estimation of segmentation parameter is more practical and efficient in OBIA. Assessment of segmentation algorithms and estimation of segmentation parameters are examined based on the very high-resolution multi-spectral WorldView-3(0.3m, PAN sharpened) data.
Machine learning lets you make better business decisions by uncovering patterns in your consumer behavior data that is hard for the human eye to spot. You can also use it to automate routine, expensive human tasks that were previously not doable by computers. In the business to business space (B2B), if your competitors can make wiser business decisions based on data and automate more business operations but you still base your decisions on guesswork and lack automation, you will lose out on business productivity. In this introduction to machine learning tech talk, you will learn how to use machine learning even if you do not have deep technical expertise on this technology.
Topics covered:
1.What is machine learning
2.What is a typical ML application architecture
3.How to start ML development with free resource links
4.Key decision factors in ML technology selection depending on use case scenarios
This is about Image segmenting.We will be using fuzzy logic & wavelet transformation for segmenting it.Fuzzy logic shall be used because of the inconsistencies that may occur during segementing or
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHJournal For Research
Image segmentation is often used to distinguish the foreground from the background. Image segmentation is one of the difficult research problems in the machine vision industry and pattern recognition. Thresholding is a simple but effective method to separate objects from the background. A commonly used method, the Otsu method, improves the image segmentation effect obviously. It can be implemented by two different approaches: Iteration approach and Custom approach. In this paper both approaches has been implemented on MATLAB and give the comparison of them and show that both has given almost the same threshold value for segmenting image but the custom approach requires less computations. So if this method will be implemented on hardware in an optimized way then custom approach is the best option.
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGEScseij
Image binarization is the process of separation of pixel values into two groups, black as background and
white as foreground. Thresholding can be categorized into global thresholding and local thresholding. This
paper describes a locally adaptive thresholding technique that removes background by using local mean
and standard deviation. Most common and simplest approach to segment an image is using thresholding.
In this work we present an efficient implementation for threshoding and give a detailed comparison of
Niblack and sauvola local thresholding algorithm. Niblack and sauvola thresholding algorithm is
implemented on medical images. The quality of segmented image is measured by statistical parameters:
Jaccard Similarity Coefficient, Peak Signal to Noise Ratio (PSNR).
Presentation on deformable model for medical image segmentationSubhash Basistha
Introduction to Image Processing
Steps of Image Processing
Types of Image Processing
Introduction to Image Segmentation
Introduction to Medical Image Segmentation
Application of Image Segmentation
Example of Image Segmentation
Need for Deformable Model
What is Deformable Model??
Types of Deformable Model
Improvement oh the recognition rate by random forestYoussef Rachidi
In this paper; we introduce a system of automatic recognition of characters based on the Random Forest Method in non-constrictive pictures that are stemmed from the terminals Mobile phone. After doing some pretreatments on the picture, the text is segmented into lines and then into characters. In the stage of characteristics extraction, we are representing the input data into the vector of primitives of the zoning types, of diagonal, horizontal and of the Zernike moment. These characteristics are linked to pixels’ densities and they are extracted on binary pictures. In the classification stage, we examine four classification methods with two different classifiers types namely the multi-layer perceptron (MLP) and the Random Forest method. After some checking tests, the system of learning and recognition which is based on the Random Forest has shown a good performance on a basis of 100 models of pictures.
Improvement of the Recognition Rate by Random ForestIJERA Editor
In this paper; we introduce a system of automatic recognition of characters based on the Random Forest Method in non-constrictive pictures that are stemmed from the terminals Mobile phone. After doing some pretreatments on the picture, the text is segmented into lines and then into characters. In the stage of characteristics extraction, we are representing the input data into the vector of primitives of the zoning types, of diagonal, horizontal and of the Zernike moment. These characteristics are linked to pixels’ densities and they are extracted on binary pictures. In the classification stage, we examine four classification methods with two different classifiers types namely the multi-layer perceptron (MLP) and the Random Forest method. After some checking tests, the system of learning and recognition which is based on the Random Forest has shown a good performance on a basis of 100 models of pictures
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Pinaki Ranjan Sarkar
Recent advancement in sensor technology allows very high spatial resolution along with multiple spectral bands. There are many studies, which highlight that Object Based Image Analysis(OBIA) is more accurate than pixel-based classification for high resolution(< 2m) imagery. Image segmentation is a crucial step for OBIA and it is a very formidable task to estimate optimal parameters for segmentation as it does not have any unique solution. In this paper, we have studied different segmentation algorithms (both mono-scale and multi-scale) for different terrain categories and showed how the segmented output depends on upon various parameters. Later, we have introduced a novel method to estimate optimal segmentation parameters. The main objectives of this study are to highlight the effectiveness of presently available segmentation techniques on very high-resolution satellite data and to automate segmentation process. Pre-estimation of segmentation parameter is more practical and efficient in OBIA. Assessment of segmentation algorithms and estimation of segmentation parameters are examined based on the very high-resolution multi-spectral WorldView-3(0.3m, PAN sharpened) data.
Machine learning lets you make better business decisions by uncovering patterns in your consumer behavior data that is hard for the human eye to spot. You can also use it to automate routine, expensive human tasks that were previously not doable by computers. In the business to business space (B2B), if your competitors can make wiser business decisions based on data and automate more business operations but you still base your decisions on guesswork and lack automation, you will lose out on business productivity. In this introduction to machine learning tech talk, you will learn how to use machine learning even if you do not have deep technical expertise on this technology.
Topics covered:
1.What is machine learning
2.What is a typical ML application architecture
3.How to start ML development with free resource links
4.Key decision factors in ML technology selection depending on use case scenarios
It is the study of how machines can
observe the environment
learn to distinguish patterns of interest from their background
make sound and reasonable decisions about the categories of the patterns.
Watanable [163] defines a pattern as
“ the opposite of a chaos; it is an entity, vaguely defined, that could be given a name”
This presentation is used in a refresher course at Nuzvid. This is one day session of the course. It introduces research avenues in Image Processing and allied areas to faculty participants..
Machine Learning 2 deep Learning: An IntroSi Krishan
Provides a brief introduction to machine learning, reasons for its popularity, a simple walk through example and then a need for deep learning and some of its characteristics. This is an updated version of an earlier presentation.
الموعد الإثنين 03 يناير 2022
143
مبادرة
#تواصل_تطوير
المحاضرة ال 143 من المبادرة
المهندس / محمد الرافعي طرباي
نقيب المبرمجين بالدقهلية
بعنوان
"IT INDUSTRY"
How To Getting Into IT With Zero Experience
وذلك يوم الإثنين 03 يناير2022
السابعة مساء توقيت القاهرة
الثامنة مساء توقيت مكة المكرمة
و الحضور من تطبيق زووم
https://us02web.zoom.us/meeting/register/tZUpf-GsrD4jH9N9AxO39J013c1D4bqJNTcu
علما ان هناك بث مباشر للمحاضرة على القنوات الخاصة بجمعية المهندسين المصريين
ونأمل أن نوفق في تقديم ما ينفع المهندس ومهمة الهندسة في عالمنا العربي
والله الموفق
للتواصل مع إدارة المبادرة عبر قناة التليجرام
https://t.me/EEAKSA
ومتابعة المبادرة والبث المباشر عبر نوافذنا المختلفة
رابط اللينكدان والمكتبة الالكترونية
https://www.linkedin.com/company/eeaksa-egyptian-engineers-association/
رابط قناة التويتر
https://twitter.com/eeaksa
رابط قناة الفيسبوك
https://www.facebook.com/EEAKSA
رابط قناة اليوتيوب
https://www.youtube.com/user/EEAchannal
رابط التسجيل العام للمحاضرات
https://forms.gle/vVmw7L187tiATRPw9
ملحوظة : توجد شهادات حضور مجانية لمن يسجل فى رابط التقيم اخر المحاضرة
An introduction to variable and feature selectionMarco Meoni
Presentation of a great paper from Isabelle Guyon (Clopinet) and André Elisseeff (Max Planck Institute) back in 2003, which outlines the main techniques for feature selection and model validation in machine learning systems
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
4. What is Pattern Recognition?
• A pattern is an entity, vaguely defined, that could be given a
name, e.g.,
– Fingerprint image,
– Handwritten word,
– Human face
– Etc.
• Pattern recognition is the study of how machines can
– Observe the environment,
– Learn to distinguish patterns of interest,
– Make sound and reasonable decisions about the categories of the
patterns.
5. Pattern Recognition Application
(example)
Problem Domain Application Input Pattern Pattern Classes
Document image analysis
Optical character
recognition
Document image Characters, words
Document classification Internet search Text document Semantic categories
Document classification Junk mail filtering Email Junk/non-junk
Multimedia database
retrieval
Internet search Video clip Video genres
Speech recognition
Telephone directory assis-
tance
Speech waveform Spoken words
Natural language
processing
Information extraction Sentences Parts of speech
Biometric recognition Personal identification Face, iris, fingerprint
Authorized users for access
control
Medical Computer aided diagnosis Microscopic image Cancerous/healthy cell
Military Automatic target recognition Optical or infrared image Target type
Industrial automation
Printed circuit board
inspection
Intensity or range image
Defective/non-defective
product
Industrial automation Fruit sorting
Images taken on a conveyor
belt
Grade of quality
Remote sensing Forecasting crop yield Multispectral image Land use categories
Bioinformatics Sequence analysis DNA sequence Known types of genes
Data mining
Searching for meaningful
patterns
Points in multidimensional
space
Compact and well-
separated clusters
6. Example
• Problem: Sorting incoming fish on a conveyor belt according
to species.
• Assume that we have only two kinds of fish:
– Sea bass
– Salmon
7. Decision Process
• What kind of information can distinguish one species from
the other?
– length, width, weight, number and shape of fins, tail shape, etc.
• What can cause problems during sensing?
– lighting conditions, position of fish on the conveyor belt, camera
noise, etc.
• What are the steps in the process?
– capture image → isolate fish → take measurements → make
decision
8. Selecting Features
• Assume a fisherman told us that a sea bass is generally longer than a
salmon.
• We can use length as a feature and decide between sea bass and
salmon according to a threshold on length.
• How can we choose this threshold?
9. Selecting Features
• How can we choose the
threshold l∗ to make a reliable
decision?
• Even though sea bass is longer
than salmon on the average,
there are many examples of
fish where this observation
does not hold.
10. Selecting Features
• Try another feature: average
lightness of the fish scales.
• It looks easier to choose the
threshold x∗ but we still
cannot make a perfect
decision
11. Cost of Error
• We should also consider costs of different errors we make in
our decisions.
• For example, if the fish packing company knows that:
– Customers who buy salmon will object vigorously if they see sea
bass in their cans.
– Customers who buy sea bass will not be unhappy if they
occasionally see some expensive salmon in their cans.
• How does this knowledge affect our decision?
12. Multiple Features
• Assume we also observed that sea bass are typically wider
than salmon.
• We can use two features in our decision:
– lightness: x1
– width: x2
• Each fish image is now represented as a point (feature
vector ) in a two-dimensional feature space.
X =
x1
x2
æ
è
ç
ç
ö
ø
÷
÷
13. Multiple Features
• We can draw a decision
boundary to divide the
feature space into two
regions. Does it look better
than using only lightness
• Does adding more features
always improve the results?
– Avoid unreliable features.
– Be careful about correlations
with existing features.
– Be careful about measurement
costs
– Be careful about noise in the
measurements
• Is there some curse for working
in very high dimensions?
14. Decision Boundaries
• Can we do better with
another decision rule?
• More complex models result
in more complex boundaries
• We may distinguish training
samples perfectly but how
can we predict how well we
can generalize to unknown
samples?
15. Decision Boundaries
• How can we manage the
tradeoff between complexity
of decision rules and their
performance to unknown
samples?
• Different criteria lead to
different decision boundaries
18. Supervised Learning
• Supervised learning is the machine learning task of inferring a
function from labeled training data. The training data consist of a set
of training examples.
• In supervised learning, each example is a pair consisting of an input
object (typically a vector) and a desired output value (also called the
supervisory signal)
• A supervised learning algorithm analyzes the training data and
produces an inferred function, which can be used for mapping new
examples
• An optimal scenario will allow for the algorithm to correctly
determine the class labels for unseen instances.
• This requires the learning algorithm to generalize from the training
data to unseen situations in a "reasonable" way
19. Supervised Learning Steps
• Data acquisition and sensing:
– Measurements of physical variables.
– Important issues: bandwidth, resolution, sensitivity, distortion,
SNR, latency, etc.
• Pre-processing:
– Removal of noise in data.
– Isolation of patterns of interest from the background.
– Color to grayscale conversion
• Feature extraction:
– Finding a new representation in terms of features
20. Supervised Learning Steps
• Model learning and estimation:
– Learning a mapping between features and pattern groups and
categories
• Classification:
– Using features and learned models to assign a pattern to a
category.
• Post-processing:
– Evaluation of confidence in decisions.
– Exploitation of context to improve performance.
– Combination of experts.
22. Classification Problem
• Apply a prediction function to a feature representation of the image
to get the desired output:
f( ) = “Brick”
f( ) = “Fabric”
f( ) = “Grass”
23. Testing stage Training stage
Classification Steps
Real world
Features
Decision
Model
Features
Training Data
Data
acquisition/training
Pre-processing
Feature extraction
Classification
Post-processing
Model
learning/estimation
Feature
extraction/selection
Pre-processing
24. Texture Classification (example)
• We are going to classify texture image
• Image source: 40 texture images from MIT VisTex database
– Number of classes: 5 (brick, fabric, grass, sand, stone)
– Train set: 30 images (6 images from each class)
– Test set: 10 images (2 images from each class)
• Features:
– Gray-level co-occurrence matrix (GLCM)
– Fourier power spectrum (#ring: 4, #sector:8)
• Classification method:
– K-nearest neighbor
– Naïve-bayes
• Evaluation: classification accuracy
25. Design Cycle
Data collection:
• Collecting training and testing data.
• How can we know when we have adequately large and representative
set of samples?
Collect
data
Select
features
Select
Model
Train
Classifier
Evaluate
classifier
27. Design Cycle
Feature selection:
• Domain dependence and prior information.
• Computational cost and feasibility.
• Discriminative features:
– Similar values for similar patterns.
– Different values for different patterns.
• Invariant features with respect to translation, rotation and scale.
• Robust features with respect to occlusion, distortion, deformation, and
variations in environment.
Collect
data
Select
features
Select
Model
Train
Classifier
Evaluate
classifier
28. Feature Selection
Gray-level co-occurrence matrix
(GLCM)
Fourier power spectrum
Features Formula
Energy
Inertia
Inverse diff
moment
Entropy
Pij
2
å
Pij
å *(i- j)2
Pij
å / 1+(i- j)2
{ }
Pij
2
*(-lnPij )
å
#ring = 4
#sector = 8
29. Design Cycle
Model selection:
• Domain dependence and prior information.
• Definition of design criteria.
• Parametric vs. non-parametric models.
• Handling of missing features.
• Computational complexity.
• Types of models: templates, decision-theoretic or statistical, syntactic or
structural, neural, and hybrid.
• How can we know how close we are to the true model underlying the
patterns?
Collect
data
Select
features
Select
Model
Train
Classifier
Evaluate
classifier
30. Model Selection
k-Nearest neighbor
• Assign label of nearest training data
point to each test data point
Naïve bayes (algorithm)
• For each value yk
– Estimate P(Y = yk) from the data.
– For each value xij of each attribute
Xi
• Estimate P(Xi=xij | Y = yk)
• Classify a new point via:
• In practice, the independence
assumption doesn’t often hold true,
but Naïve Bayes performs very well
despite it.
x x
x
x
x
x
x
x
o
o
o
o
o
o
o
x2
x1
+
+
1-Nearest neighbor
3-Nearest neighbor
i
k
i
k
y
new y
Y
X
P
y
Y
P
Y
k
)
|
(
)
(
max
arg
31. Design Cycle
Training:
• How can we learn the rule from data?
• Supervised learning: a teacher provides a category label or cost for each
pattern in the training set.
• Unsupervised learning: the system forms clusters or natural groupings of
the input patterns.
• Reinforcement learning: no desired category is given but the teacher
provides feedback to the system such as the decision is right or wrong.
Collect
data
Select
features
Select
Model
Train
Classifier
Evaluate
classifier
32. Design Cycle
Evaluation:
• How can we estimate the performance with training samples?
• How can we predict the performance with future data?
• Problems of over-fitting and generalization.
Collect
data
Select
features
Select
Model
Train
Classifier
Evaluate
classifier
34. Acknowledgment
Some of slides in this PowerPoint presentation are adaptation from
various slides, many thanks to:
1. Selim Aksoy, Department of Computer Engineering, Bilkent
University (http://www.cs.bilkent.edu.tr/~saksoy/)
2. James Hays, Computer Science Department, Brown University,
(http://cs.brown.edu/~hays/)