Automatic face naming by learning discriminative affinity matrices from weakl...Raja Ram
This paper proposes two new methods for automatic face naming using weakly labeled images. The first method, called regularized low-rank representation (rLRR), learns a discriminative affinity matrix by incorporating weak supervision into low-rank representation to penalize reconstruction coefficients between faces of different subjects. The second method, called ambiguously supervised structural metric learning (ASML), learns a discriminative distance metric and uses it to obtain an affinity matrix. The two affinity matrices are then combined and used in an iterative scheme to infer face names. Experiments on synthetic and real-world datasets demonstrate the effectiveness of the proposed approaches.
Integrating mobile access with university data processing in the cloudRaja Ram
This document summarizes a research paper that proposes integrating mobile access with university data processing in the cloud. It discusses using infrastructure as a service (IAAS) technology in a university to help students and teachers through new developments and advancements in education. The proposed architecture allows mobile hosts to securely access a network protected by a firewall from the public internet in the cloud. It presents a Nephele data processing method for cloud environments that follows a classic server-client pattern. The paper also describes a university data processing architecture that separates data for administrators, staff and students, and discusses implementing the system using ASP.Net and SQL Server.
A method for detecting abnormal program behavior on embedded devicesRaja Ram
The document presents a method for detecting abnormal program behavior on embedded devices using a self-organizing map (SOM) approach. It extracts features from the processor's program counter and cycles per instruction, and uses these features to train an unsupervised SOM to classify program behavior. Testing on an ARM Cortex-M3 processor showed the method can identify unknown program behaviors not in the training set with over 98.4% accuracy.
This document presents some commonly followed business processes across most organizations. The process designs have been created using IntelliPro BPMS.
How to build and automate your first process in IntelliPro BPMS?iLeap
This document explains how once can build and automate a business process using IntelliPro BPMS. It has step-by-step explanation and illustration of process automation.
Automatic face naming by learning discriminative affinity matrices from weakl...Raja Ram
This paper proposes two new methods for automatic face naming using weakly labeled images. The first method, called regularized low-rank representation (rLRR), learns a discriminative affinity matrix by incorporating weak supervision into low-rank representation to penalize reconstruction coefficients between faces of different subjects. The second method, called ambiguously supervised structural metric learning (ASML), learns a discriminative distance metric and uses it to obtain an affinity matrix. The two affinity matrices are then combined and used in an iterative scheme to infer face names. Experiments on synthetic and real-world datasets demonstrate the effectiveness of the proposed approaches.
Integrating mobile access with university data processing in the cloudRaja Ram
This document summarizes a research paper that proposes integrating mobile access with university data processing in the cloud. It discusses using infrastructure as a service (IAAS) technology in a university to help students and teachers through new developments and advancements in education. The proposed architecture allows mobile hosts to securely access a network protected by a firewall from the public internet in the cloud. It presents a Nephele data processing method for cloud environments that follows a classic server-client pattern. The paper also describes a university data processing architecture that separates data for administrators, staff and students, and discusses implementing the system using ASP.Net and SQL Server.
A method for detecting abnormal program behavior on embedded devicesRaja Ram
The document presents a method for detecting abnormal program behavior on embedded devices using a self-organizing map (SOM) approach. It extracts features from the processor's program counter and cycles per instruction, and uses these features to train an unsupervised SOM to classify program behavior. Testing on an ARM Cortex-M3 processor showed the method can identify unknown program behaviors not in the training set with over 98.4% accuracy.
This document presents some commonly followed business processes across most organizations. The process designs have been created using IntelliPro BPMS.
How to build and automate your first process in IntelliPro BPMS?iLeap
This document explains how once can build and automate a business process using IntelliPro BPMS. It has step-by-step explanation and illustration of process automation.
This document summarizes Gary Little's background and experience in marketing. It outlines his education at Fairfield University where he studied New Media and marketing. It then details his work experience managing marketing for sports and entertainment clients as well as a celebrity hairstylist brand. It provides examples of high-profile events he has planned and organized. Finally, it discusses his vision for the future of marketing and upcoming projects.
The document summarizes a research paper that proposes new memory-efficient architectures for realizing two-dimensional finite impulse response (FIR) filters. It analyzes the memory requirements of different configurations for non-separable 2D FIR filters and finds that a fully-direct structure has the lowest memory complexity. It then explores opportunities for memory reuse by parallelizing the computation of filter outputs. The proposed architectures aim to reduce memory footprint, enable memory reuse and sharing, and lower memory bandwidth requirements compared to existing designs. Evaluation shows the proposed architectures achieve significantly lower area-delay-product and energy consumption per output.
Multi transmit beam forming for fast cardiacRaja Ram
This document proposes using multiple line transmission (MLT) beamforming to increase frame rate in echocardiography without compromising spatial resolution or signal-to-noise ratio. MLT transmits multiple focused beams simultaneously using an apodization scheme and combining transmission patterns with proper delays and amplitudes. This allows increasing frame rate by lowering the number of transmit events per frame compared to traditional methods. The document tests MLT beamforming on phantoms and volunteers to evaluate image quality quantitatively and qualitatively compared to single line transmission beamforming.
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...Raja Ram
This document proposes a public auditing mechanism called Panda for ensuring integrity of shared data with efficient user revocation in the cloud. Existing public auditing mechanisms require re-signing of data blocks by existing users when a user is revoked, which is inefficient. Panda utilizes proxy re-signatures to allow the cloud to re-sign blocks on behalf of existing users during revocation, avoiding the need for existing users to download and re-sign blocks. A public verifier can still audit integrity of shared data without retrieving the entire data, even if parts have been re-signed by the cloud. Panda improves efficiency of user revocation and reduces computation/communication costs for existing users.
Nathan Jones' design portfolio includes summaries of three projects:
1. A test fixture for micro-scale measurements that uses a double-cantilever beam design and Hooke's law to determine how hard materials are being pushed.
2. A dry erase marker vending machine accessed with a Pitt ID that uses RFID, stepper motors, and an Arduino to select and dispense markers.
3. A video game called CaveTrekker that allows visually impaired users to play games using tactile and audio feedback without visuals by orienting the user and communicating messages through a control lever and sounds.
The document describes several case studies of companies that implemented IntelliPro BPMS to automate various business processes. Some key examples include automating machine assembly tracking to reduce cycle times, automating production processes to reduce rejections, automating purchase request approvals to reduce approval times, and automating sales order fulfillment to improve productivity and quality. IntelliPro BPMS is highlighted as providing a flexible platform to design, automate, monitor and optimize business processes through workflows, rules, tasks and integrations with other systems.
Heterogeneous heed protocol for wireless sensor networks springerRaja Ram
The document describes a study that extends the HEED (hybrid energy-efficient distributed) clustering protocol to work in heterogeneous wireless sensor networks. The study defines one-level, two-level, and three-level heterogeneity models and implements HEED for each, called hetHEED-1, hetHEED-2, and hetHEED-3. It also incorporates fuzzy logic to account for distance as an additional parameter for cluster head selection, calling these versions HEED-FL, hetHEED-FL-2, and hetHEED-FL-3. Simulation results show that increasing heterogeneity and using fuzzy logic can significantly increase network lifetime, energy efficiency, and packet delivery to the base station compared to the original HEED
Face recognition across non uniform motion blur, illumination, and poseRaja Ram
This document summarizes a research paper that proposes a new methodology for face recognition in the presence of non-uniform (space-varying) motion blur. The key points are:
1) Existing face recognition methods cannot handle non-uniform blur that occurs in real-world camera shake situations.
2) The paper models blurred faces as a weighted combination of geometrically transformed versions of the original sharp image, using a "transformation spread function" to model non-uniform blur.
3) Algorithms are proposed to recognize faces under non-uniform blur alone, and also under combinations of blur, illumination changes, and pose variations. This is achieved by alternately estimating camera motion and illumination parameters.
This document summarizes RFID tag anti-collision algorithms. It discusses that RFID systems use wireless communication between tags and readers, which can cause collisions when multiple tags respond simultaneously. It reviews existing ALOHA-based and tree-based anti-collision algorithms and presents a new trend that combines aspects of both approaches. The document then focuses on tree-ALOHA algorithms, describing the working process and presenting simulation results showing it can reduce overhead compared to other methods.
This document provides information on cerebrovascular accidents (strokes). It defines a stroke as occurring when blood supply to the brain is interrupted, usually due to a blood clot or burst blood vessel. Strokes can be ischemic, caused by a clot cutting off blood flow, or hemorrhagic, caused by a ruptured blood vessel. Warning signs include sudden weakness, numbness, trouble speaking, and loss of vision. Acting FAST (Facial drooping, Arm weakness, Speech difficulties, Time to call for help) can help identify a stroke and get immediate medical attention, as rapid treatment improves outcomes. Risk factors include age, race, family history, high blood pressure, diabetes, smoking and more.
This document summarizes Gary Little's background and experience in marketing. It outlines his education at Fairfield University where he studied New Media and marketing. It then details his work experience managing marketing for sports and entertainment clients as well as a celebrity hairstylist brand. It provides examples of high-profile events he has planned and organized. Finally, it discusses his vision for the future of marketing and upcoming projects.
The document summarizes a research paper that proposes new memory-efficient architectures for realizing two-dimensional finite impulse response (FIR) filters. It analyzes the memory requirements of different configurations for non-separable 2D FIR filters and finds that a fully-direct structure has the lowest memory complexity. It then explores opportunities for memory reuse by parallelizing the computation of filter outputs. The proposed architectures aim to reduce memory footprint, enable memory reuse and sharing, and lower memory bandwidth requirements compared to existing designs. Evaluation shows the proposed architectures achieve significantly lower area-delay-product and energy consumption per output.
Multi transmit beam forming for fast cardiacRaja Ram
This document proposes using multiple line transmission (MLT) beamforming to increase frame rate in echocardiography without compromising spatial resolution or signal-to-noise ratio. MLT transmits multiple focused beams simultaneously using an apodization scheme and combining transmission patterns with proper delays and amplitudes. This allows increasing frame rate by lowering the number of transmit events per frame compared to traditional methods. The document tests MLT beamforming on phantoms and volunteers to evaluate image quality quantitatively and qualitatively compared to single line transmission beamforming.
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...Raja Ram
This document proposes a public auditing mechanism called Panda for ensuring integrity of shared data with efficient user revocation in the cloud. Existing public auditing mechanisms require re-signing of data blocks by existing users when a user is revoked, which is inefficient. Panda utilizes proxy re-signatures to allow the cloud to re-sign blocks on behalf of existing users during revocation, avoiding the need for existing users to download and re-sign blocks. A public verifier can still audit integrity of shared data without retrieving the entire data, even if parts have been re-signed by the cloud. Panda improves efficiency of user revocation and reduces computation/communication costs for existing users.
Nathan Jones' design portfolio includes summaries of three projects:
1. A test fixture for micro-scale measurements that uses a double-cantilever beam design and Hooke's law to determine how hard materials are being pushed.
2. A dry erase marker vending machine accessed with a Pitt ID that uses RFID, stepper motors, and an Arduino to select and dispense markers.
3. A video game called CaveTrekker that allows visually impaired users to play games using tactile and audio feedback without visuals by orienting the user and communicating messages through a control lever and sounds.
The document describes several case studies of companies that implemented IntelliPro BPMS to automate various business processes. Some key examples include automating machine assembly tracking to reduce cycle times, automating production processes to reduce rejections, automating purchase request approvals to reduce approval times, and automating sales order fulfillment to improve productivity and quality. IntelliPro BPMS is highlighted as providing a flexible platform to design, automate, monitor and optimize business processes through workflows, rules, tasks and integrations with other systems.
Heterogeneous heed protocol for wireless sensor networks springerRaja Ram
The document describes a study that extends the HEED (hybrid energy-efficient distributed) clustering protocol to work in heterogeneous wireless sensor networks. The study defines one-level, two-level, and three-level heterogeneity models and implements HEED for each, called hetHEED-1, hetHEED-2, and hetHEED-3. It also incorporates fuzzy logic to account for distance as an additional parameter for cluster head selection, calling these versions HEED-FL, hetHEED-FL-2, and hetHEED-FL-3. Simulation results show that increasing heterogeneity and using fuzzy logic can significantly increase network lifetime, energy efficiency, and packet delivery to the base station compared to the original HEED
Face recognition across non uniform motion blur, illumination, and poseRaja Ram
This document summarizes a research paper that proposes a new methodology for face recognition in the presence of non-uniform (space-varying) motion blur. The key points are:
1) Existing face recognition methods cannot handle non-uniform blur that occurs in real-world camera shake situations.
2) The paper models blurred faces as a weighted combination of geometrically transformed versions of the original sharp image, using a "transformation spread function" to model non-uniform blur.
3) Algorithms are proposed to recognize faces under non-uniform blur alone, and also under combinations of blur, illumination changes, and pose variations. This is achieved by alternately estimating camera motion and illumination parameters.
This document summarizes RFID tag anti-collision algorithms. It discusses that RFID systems use wireless communication between tags and readers, which can cause collisions when multiple tags respond simultaneously. It reviews existing ALOHA-based and tree-based anti-collision algorithms and presents a new trend that combines aspects of both approaches. The document then focuses on tree-ALOHA algorithms, describing the working process and presenting simulation results showing it can reduce overhead compared to other methods.
This document provides information on cerebrovascular accidents (strokes). It defines a stroke as occurring when blood supply to the brain is interrupted, usually due to a blood clot or burst blood vessel. Strokes can be ischemic, caused by a clot cutting off blood flow, or hemorrhagic, caused by a ruptured blood vessel. Warning signs include sudden weakness, numbness, trouble speaking, and loss of vision. Acting FAST (Facial drooping, Arm weakness, Speech difficulties, Time to call for help) can help identify a stroke and get immediate medical attention, as rapid treatment improves outcomes. Risk factors include age, race, family history, high blood pressure, diabetes, smoking and more.
9. • 循环就是一个事件流,只不过里面
包含了一些条件判断
def fib(max):
a, b = 0, 1
while a < max:
yield a
a, b = b, a+b
等价于
def fib(max):
a, b = 0, 1
if a < max:
yield a
a, b = b, a+b
if a < max:
yield a
a, b = b, a+b
if a < max:
yield a
a, b = b, a+b
...