IPSJ SIG Technical Report Vol.2013-CG-153 No.19 Vol.2013-CVIM-189 No /11/29 1,a) 0 1 SIFT SURF 1. Scale-Invariant Feature Transform (SIFT)[16]

Size: px
Start display at page:

Download "IPSJ SIG Technical Report Vol.2013-CG-153 No.19 Vol.2013-CVIM-189 No /11/29 1,a) 0 1 SIFT SURF 1. Scale-Invariant Feature Transform (SIFT)[16]"

Transcription

1 1,a) 0 1 SIFT SURF 1. Scale-Invariant Feature Transform (SIFT)[16] [14], [17] [6] 1 *1 SIFT 1 Shibuya CROSS TOWER 28th Floor Shibuya Shibuya-ku Tokyo, Japan a) manbai@d-itlab.co.jp *1 Binary Features, Binary Descriptors, Binary Codes 1.1 SIFT[16] SURF[6] ( 1 ) SIFT 128 unsigned char 1 128byte 1,000 1, byte 125Kbyte ( 2 ) 2 x 1, x 2 R D (1)(2) d E d θ d E (x 1, x 2 ) = (x 1 x 2 ) (x 1 x 2 ) (1) ( ) x d θ (x 1, x 2 ) = arccos 1 x 2 (2) x 1 x 2 D D D 1 1 SIFT D 1

2 B y y { 1, +1} B (3) y {0, +1} B (4) y (3) (4) Binary Hashing (3) (3)(4) y B 0 1 *2 2 XOR 1 1 CPU 1.3 *2 (3) ( 1 ) ( 2 ) 64bits SIFT [25] BRIEF[9] BRISK[15] ORB[20] ORB OpenCV Willow Garage OpenCV ORB FREAK[3] D-BRIEF[26] BinBoost[25] positive 2

3 2 3 BRIEF negative positive negative 2.1 BRIEF: Binary Robust Independent Elementary Features Calonder [9] BRIEF 2 2 u i, v i R 2 B i = 1,, B I(u i ), I(v i ) I(u i ) I(v i ) 1, 0 B bits u i, v i 3 2 BRIEF SIFT SURF 2 BRISK ORB 2.2 BRISK: Binary Robust Invariant Scalable Keypoints Leutenegger [15] BRISK 2 BRIEF FAST[19] 3 BRISK (a) BRIEF 2 BRISK 60 3

4 (a) (b) L (c) S 4 BRISK 4(a) 60 u i R 2 (i = 1,, 60) BRISK δ min L δ max S 4(b)(c) L, S L S L (u i, u j ) L (5) g(u i, u j ) = (u j u i ) I(u j, σ j ) I(u i, σ i ) u j u i 2 (5) I(u i, σ i ), I(u j, σ j ) σ i, σ j g(u i, u j ) u j, u i 4(b) α L g g = (g x, g y ) = 1 L (u i,u j) L g(u i, u j ) (6) α = atan2(g y, g x ) (7) α u i, u j u α i, uα j (8) 1 I(u α j y ij =, σ j) > I(u α i, σ i), (u i, u j ) S (8) 0 (otherwise) S S 512 δ max ORB: Oriented FAST and Rotated BRIEF BRISK ORB BRIEF 2 FAST BRISK 2 ORB α 0,1 (intensity centroid, C) O C α O m pq C m pq = x,y C = x p y q I(x, y) (9) ( m10, m ) 01 m 00 m 00 α (10) θ = atan2(m 01, m 10 ) (11) 2 α ORB y i % y i, y j 4

5 5 ORB 6 FREAK ORB [27], [29] y i, y j y i y i 100% 0 y i y i 0 1 y i ORB 205,590 Greedy 256 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ORB FREAK: Fast Retina Keypoint Alahi [3] FREAK ORB BRISK FREAK 6 FREAK Alahi FREAK ORB BRISK 43 ORB Greedy 512 Alahi 512 FREAK 512 Greedy coarse-to-fine FREAK % 128 FREAK 5

6 BRISK 2.5 D-BRIEF: Discriminative BRIEF BRIEF, BRISK, ORB, FREAK 2 x *3 x i y i (12) *4 y i = sgn(w i x + τ i ) (12) τ i = 0 w i BRIEF, BRISK, ORB, FREAK w i τ i Trzcinski [26] D-BRIEF w i τ i w i w i x D-BRIEF w i w i x w i = Ds i (13) D s i s i w i D-BRIEF (14) *3 N N x N 2 *4 3 Binary Hashing min (s i,τ i) i 1,,B sgn((ds i ) x + τ i )sgn((ds i ) x + τ i ) (x,x ) N sgn((ds i ) x + τ i )sgn((ds i ) x + τ i ) (x,x ) P + λ s i 1 subject to (Ds i ) (Ds j ) = δ ij (14) (x, x ) P (x, x ) N λ s i w i δ ij i = j 1 0 (Ds i ) (Ds j ) = δ ij ORB (14) x, x y, y (14) min y y y y + λ s i 1 (15) (s i,τ i) (x,x ) N (x,x ) P N P s i, τ i D-BRIEF y, y { 1, +1} B d H (y, y ) y y (16) y y = B 2d H (y, y ) (16) y, y y y (14) P N w i, τ i D-BRIEF (14) (14) s i, τ i sgn L1 s i w i (17) (x,x {w 0 i } = arg min ) P (w i (x x )) 2 {w i} (x,x ) N (w i (x x )) 2 i (17) w i Linear Discriminant 6

7 Embedding (LDE)[8] sgn τ i LDE w i τ i (14) τ i *5 w 0 i w0 i Ds i s i w i s i {s 0 i } = arg mins i w 0 i Ds i λ s i 1 (18) 2.6 BinBoost Trzcinski [25] BinBoost K 1 x y i y i (x) = sgn(w i h i (x)) (19) { 1, +1} i h i R K K w i R K h i x D-BRIEF BinBoost AdaBoost N {(x n, x n, l n )} N n=1 x n x n l n = +1, l n = 1 (20) w i h i N L = min {w i,h i} B i=1 exp( γl n n=1 B i=1 c i (x n, x n; w i, h i )) (20) γ c i c i (x n, x n; w i, h i ) = y i (x)y i (x ) (21) = sgn(w i h i (x))sgn(w i h i (x )) l n = +1 l n = 1 (16) *5 τ i LDAHash[24] AdaBoost i = 1 h i w i (20) (22) N max l n W i (n)c i (x n, x n; w i, h i ) (22) w i,h i n=1 W i (n) i 1 W i (n) = exp( γl n c i (x n, x n; w i, h i )) (23) i =1 1,, i 1 AdaBoost c i sgn (22) sgn (24) max w i ( w i,h i N l n W i (n)h i (x)h i (x ) )w i (24) n=1 h i W i (n) BinBoost [23] K K B K B b i (24) h i (24) M = max w i w i Mw i (25) N l n W i (n)h i (x)h i (x ) (26) n=1 (19) w i w i 2 = 1 (25) M 7

8 7 sgn(p i x 1) sgn(p i x 2) sgn(p i x 1) = sgn(p i x 2) Random projections 3. Binary Hashing web (27) y = sgn(px + t) (27) x D y B t P B D P t Random projections[5], [10] (CARD[4], LDAHash[24]) CARD LDAHash 3.1 Random Projections Random projections [5], [10] Binary Hashing P x D B 2 (D = 2) x 1, x 2 θ (27) t = 0 P 2 Random projections P 2 θ x 1 x 2 θ x 1 x 2 x 1 x 2 θ (28) Pr[sgn(p i x 1 ) sgn(p i x 2 )] = θ π (28) (28) p i x 1 x 2 B B Random projections SIFT SURF (mean centering) Random projections Random projections Random Projections 3.2 CARD: Compact And Real-time Descriptors Ambai[4] CARD SIFT 2 (1) (2)Binary Hashing P CARD BRISK ORB Binary Hashing SIFT CARD K L CARD 4 4 8

9 8 CARD L M θ(x, y) M L M L θ(x, y) (29) l = Q L (Q 1 M (θ(x, y) α)) (29) (a) α = 0 (b) α = 3 9 l l = 0,, L 1 Q N ( ) 0 N 1 Q 1 N ( ) θ(x, y) α Q L (Q 1 M ( )) (29) θ(x, y) α M 10 M M (30) Binary Hashing y = sgn(px) (30) 10 8 K = 17, L = SIFT α SIFT 2 CARD α = 0, 1,, M 1 CARD α M M 9 M = 40 α = 0, 3 (x, y) x t Binary Hashing P B D (30) B D B (D 1) 2 P ( 1 ) ( ) P ( 2 ) P S 1, 0, 1 W (1) (2) (30) S P P 90% 9

10 128bit 3.3 LDAHash Strecha [24] LDAHash 2 (x, x ) P 2 (x, x ) N P N P t LDAHash (31) L = αe{d H (y, y ) P} E{d H (y, y ) N } (31) d H y y E{ P}, E{ N } P, N P, N (31) (31) (32)(33) L = E{y y N } αe{y y P} (32) L = αe{ y y 2 P} E{ y y 2 N } (33) y { 1, +1} B (31) (32) d H y y (16) (31) (33) y y 2 = y 2 2y y + y 2 (34) (16) (34) (35) y y 2 = 4d H (y, y ) 2B + y 2 + y 2 (35) y { 1, +1} B y 2 = y 2 = B (31) (33) P, t (33) y, y sgn (33) sgn L = αe{ Px Px 2 P} E{ Px Px 2 N } (36) (36) t (33) (36) P P (32) t P Strecha (36) Linear Discriminant Analysis (LDA) Difference of Covariances (DIF) P, N Σ P, Σ N Σ P = E{(x x )(x x ) P} (37) Σ N = E{(x x )(x x ) N } (38) LDA Σ R = Σ P Σ 1 N DIF Σ D = ασ P Σ N Linear Discriminant Analysis (LDA) Σ P, Σ N (36) L = αtr(pσ P P ) tr(pσ N P ) (39) x Σ 1/2 N (39) (39) L tr(pσ 1/2 N Σ PΣ /2 N P ) (40) = tr(pσ P Σ 1 N P ) = tr(pσ R P ) (41) Σ R = Σ P Σ 1 N Σ P Σ N tr(pσ R P ) Σ R B S 1/2 R Ũ RΣ 1/2 N (42) S R B B B ŨR D B Difference of Covariances (DIF) (39) Σ D = ασ P Σ N L = tr(pσ D P ) (43) 10

11 LDA P Σ D B B B S D D B ŨD P (44) P = 1/2 S D Ũ D (44) LDA DIF P N α α Σ N Σ N = I t P (32) t t t i t i p i min t i E {sgn((p i x + t i ) (p i x + t i )) N } αe{sgn((p i x + t i ) (p i x + t i )) P} (45) P i 1 t i 4. 2, 3 1 LDAHash, D-BRIEF, Bin- Boost LDAHash Binary Hashing D-BRIEF BinBoost 1 1 msec #include "intrin.h" int _mm_popcnt_u32 ( unsigned int a); int _mm_popcnt_u64 ( unsigned int64 a); 11 SSE4.2 (46) y = sgn(pf(x) + t) (46) x R N 2 N N P R B D t R B f( ) x f : R N 2 R D (47) P, t, f( ) 2 BRIEF, BRISK, ORB, FREAK, D-BRIEF x Binary Hashing f(x) = x BinBoost f(x) D P Random projections, CARD, LDAHash f(x) SIFT SURF Binary Hashing f(x) BinBoost f(x) P Boosting XOR Intel Core i7 SSE4.2 C/C++ intrin.h include 32/64 ( 11) *6 64 mm popcnt u64() 64 *6 GCC (-msse4.2) 11

12 1 BRIEF (ECCV 2010) BRISK (ICCV 2011) ORB (ICCV 2011) FREAK (CVPR 2012) D-BRIEF (ECCV 2012) BinBoost (CVPR 2013) Random projections CARD (ICCV 2011) LDAHash (PAMI 2012) 2 P t f(x) BRIEF (ECCV2010) t = 0 f(x) = x BRISK (ICCV2011) t = 0 f(x) = x ORB (ICCV2011) t = 0 f(x) = x FREAK (CVPR2012) t = 0 f(x) = x D-BRIEF (ECCV2012) f(x) = x BinBoost (CVPR2013) t = 0 Random projections t = 0 (SIFT, SURF ) CARD (ICCV2011) { 1, 0, +1} t = 0 mean centering LUT mean centering LDAHash (PAMI2012) LDA DIF (SIFT, SURF ) inline unsigned int popcnt32(unsigned int x) { x = (x & 0x ) + ((x >> 1) & 0x ); x = (x & 0x ) + ((x >> 2) & 0x ); x = (x & 0x0f0f0f0f) + ((x >> 4) & 0x0f0f0f0f); x = (x & 0x00ff00ff) + ((x >> 8) & 0x00ff00ff); x = (x & 0x0000ffff) + ((x >> 16) & 0x0000ffff); return x; } #define CSA(h,l,a,b,c) \ {unsigned u = a ^ b; unsigned v = c; \ h = (a & b) (u & v); l = u ^ v;} 13 (carry-save adder, CSA) 12 [18], [28] (a) 3 (b) 7 14 (carry-save adder, CSA) [18] 3 a, b, c 2 h, l C/C++ 13 a, b, c 12

13 3 CSA 1 CSA 2 pop(a) + pop(b) + pop(c) = 2 pop(h) + pop(l) (48) pop( ) a, b, c 3 a, b, c CSA 1 h, l l h 2 CSA a, b, c CSA 3 14(a) CSA CSA CSA 14(b) 7 4 CSA 3 CSA CSA [18] CPU CPU CSA 6. Binary Hashing 2007 SIGIR Workshop Hinton RBM Semantic Hashing[21] Weiss 2008 NIPS Spectral Hashing[29] Binary Hashing 2011 CVPR Iterative Quantization[12] Binary Hashing [13] VLAD Fisher Vector [11] [22] Binary Hashing Mikolajczyk [17] Affine Covariant Regions Datasets[1] Homography Brown [7] Multi-view Stereo Correspondence Dataset[2] Difference of Gaussian (DOG) Harris [1] : Affine Covariant Regions Datasets, (online), available from vgg/data/dataaff.html (accessed ). [2] : Multi-view Stereo Correspondence Dataset, (online), available from mbrown/ patchdata/patchdata.html (accessed ). [3] Alahi, A., Ortiz, R. and Vandergheynst, P.: FREAK: Fast Retina Keypoint, CVPR, pp (2012). [4] Ambai, M. and Yoshida, Y.: CARD: Compact And Realtime Descriptors, ICCV, pp (2011). [5] Andoni, A. and Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM (2008). [6] Bay, H., Ess, A., Tuytelaars, T. and Van Gool, L.: Speeded-Up Robust Features (SURF), Computer Vision and Image Understanding, Vol. 110, pp (2008). [7] Brown, M., Hua, G. and Winder, S.: Discriminant Learning of Local Image Descriptors, PAMI, Vol. 33, pp (2011). [8] Brown, M., Hua, G. and Winder, S.: Discriminative 13

14 3 BRIEF (ECCV2010) C++(OpenCV2.0 ) BRISK (ICCV2011) C++(OpenCV2.2 ), MATLAB OpenCV ORB (ICCV2011) OpenCV FREAK (CVPR2012) C++(OpenCV ) OpenCV MATLAB MATLAB R2013a Computer Vision System Toolbox 5.2 D-BRIEF (ECCV2012) C++(OpenCV2.0 ), MATLAB BinBoost (CVPR2013) C++ CARD (ICCV2011) MATLAB (Denso IT Laboratory, Inc.) ios : CARDesc, AppStore (Apple Inc.) LDAHash (PAMI2012) C++(OpenCV ) Learning of Local Image Descriptors, PAMI, Vol. 33, No. 1, pp (2011). [9] Calonder, M., Lepetit, V., Strecha, C. and Fua, P.: BRIEF: Binary Robust Independent Elementary Features, ECCV, pp (2010). [10] Goemans, M. X. and Williamson, D. P.: Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming, Journal of the ACM, Vol. 42, pp (1995). [11] Gong, Y., Kumar, S., Rowley, H. A. and Lazebnik, S.: Learning Binary Codes for High-Dimensional Data Using Bilinear Projections, CVPR, pp (2013). [12] Gong, Y. and Lazebnik, S.: Iterative quantization: A procrustean approach to learning binary codes, CVPR, pp (2011). [13] Heo, J.-P., Lee, Y., He, J., Chang, S.-F. and Yoon, S.-E.: Spherical hashing, CVPR, pp (2012). [14] Ke, Y. and Sukthankar, R.: PCA-SIFT: A More Distinctive Representation for Local Image Descriptors, CVPR, pp (2004). [15] Leutenegger, S., Chli, M. and Siegwart, R.: BRISK: Binary Robust invariant scalable keypoints, ICCV, pp (2011). [16] Lowe, D. G.: Distinctive Image Features from Scale- Invariant Keypoints, IJCV, Vol. 60, pp (2004). [17] Mikolajczyk, K. and Schmid, C.: A Performance Evaluation of Local Descriptors, PAMI, Vol. 27, pp (2005). [18] Oram, A. and Wilson, G.: Beautiful Code: Leading Programmers Explain How They Think, Oreilly & Associates Inc (2007). [19] Rosten, E. and Drummond, T.: Machine learning for high-speed corner detection, ECCV, pp (2006). [20] Rublee, E., Rabaud, V., Konolige, K. and Bradski, G.: ORB: An efficient alternative to SIFT or SURF, ICCV, pp (2011). [21] Salakhutdinov, R. R. and Hinton, G. E.: Semantic hashing, SIGIR workshop on Information Retrieval and applications of Graphical Models (2007). [22] Sato, I., Ambai, M. and Suzuki, K.: Sparse Isotropic Hashing, IPSJ Transactions on Computer Vision and Applications, Vol. 5, No. 0, pp (2013). [23] Shakhnarovich, G.: Learning Task-Specific Similarity, Ph.D thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science (2006). [24] Strecha, C., Bronstein, A., Bronstein, M. and Fua, P.: LDAHash: Improved Matching with Smaller Descriptors, PAMI, Vol. 34, No. 1, pp (2012). [25] Trzcinski, T., Christoudias, M., Lepetit, V. and Fua, P.: Boosting Binary Keypoint Descriptors, CVPR, pp (2013). [26] Trzcinski, T. and Lepetit, V.: Efficient Discriminative Projections for Compact Binary Descriptors, ECCV, pp (2012). [27] Wang, J., Kumar, S. and Chang, S.-F.: Sequential Projection Learning for Hashing with Compact Codes, ICML (2010). [28] Warren, H. S.: Hacker s Delight (2nd Edition), Addison-Wesley Professional (2012). [29] Weiss, Y., Torralba, A. and Fergus, R.: Spectral Hashing, NIPS, pp (2008). 14

Duplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF

Duplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF Partial Copy Detection of Line Drawings from a Large-Scale Database Weihan Sun, Koichi Kise Graduate School of Engineering, Osaka Prefecture University E-mail: sunweihan@m.cs.osakafu-u.ac.jp, kise@cs.osakafu-u.ac.jp

More information

Google Goggles [1] Google Goggles Android iphone web Google Goggles Lee [2] Lee iphone () [3] [4] [5] [6] [7] [8] [9] [10] :

Google Goggles [1] Google Goggles Android iphone web Google Goggles Lee [2] Lee iphone () [3] [4] [5] [6] [7] [8] [9] [10] : THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 182-8585 1-5-1 E-mail: {maruya-t,akiyama-m}@mm.inf.uec.ac.jp, yanai@cs.uec.ac.jp SURF Bag-of-Features

More information

Microsoft PowerPoint - SSII_harada pptx

Microsoft PowerPoint - SSII_harada pptx The state of the world The gathered data The processed data w d r I( W; D) I( W; R) The data processing theorem states that data processing can only destroy information. David J.C. MacKay. Information

More information

(MIRU2010) Geometric Context Randomized Trees Geometric Context Rand

(MIRU2010) Geometric Context Randomized Trees Geometric Context Rand (MIRU2010) 2010 7 Geometric Context Randomized Trees 487-8501 1200 E-mail: {fukuta,ky}@vision.cs.chubu.ac.jp, hf@cs.chubu.ac.jp Geometric Context Randomized Trees 10 3, Geometric Context, Abstract Image

More information

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta 1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

yoo_graduation_thesis.dvi

yoo_graduation_thesis.dvi 200 3 A Graduation Thesis of College of Engineering, Chubu University Keypoint Matching of Range Data from Features of Shape and Appearance Yohsuke Murai 1 1 2 2.5D 3 2.1 : : : : : : : : : : : : : : :

More information

2.2 6).,.,.,. Yang, 7).,,.,,. 2.3 SIFT SIFT (Scale-Invariant Feature Transform) 8).,. SIFT,,. SIFT, Mean-Shift 9)., SIFT,., SIFT,. 3.,.,,,,,.,,,., 1,

2.2 6).,.,.,. Yang, 7).,,.,,. 2.3 SIFT SIFT (Scale-Invariant Feature Transform) 8).,. SIFT,,. SIFT, Mean-Shift 9)., SIFT,., SIFT,. 3.,.,,,,,.,,,., 1, 1 1 2,,.,.,,, SIFT.,,. Pitching Motion Analysis Using Image Processing Shinya Kasahara, 1 Issei Fujishiro 1 and Yoshio Ohno 2 At present, analysis of pitching motion from baseball videos is timeconsuming

More information

IPSJ SIG Technical Report Vol.2012-CG-149 No.13 Vol.2012-CVIM-184 No /12/4 3 1,a) ( ) DB 3D DB 2D,,,, PnP(Perspective n-point), Ransa

IPSJ SIG Technical Report Vol.2012-CG-149 No.13 Vol.2012-CVIM-184 No /12/4 3 1,a) ( ) DB 3D DB 2D,,,, PnP(Perspective n-point), Ransa 3,a) 3 3 ( ) DB 3D DB 2D,,,, PnP(Perspective n-point), Ransac. DB [] [2] 3 DB Web Web DB Web NTT NTT Media Intelligence Laboratories, - Hikarinooka Yokosuka-Shi, Kanagawa 239-0847 Japan a) yabushita.hiroko@lab.ntt.co.jp

More information

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2 IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 MI-Hough Forest () E-mail: ym@vision.cs.chubu.ac.jphf@cs.chubu.ac.jp Abstract Hough Forest Random Forest MI-Hough Forest Multiple Instance Learning Bag Hough Forest

More information

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

(MIRU2008) HOG Histograms of Oriented Gradients (HOG) (MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. TRECVID2012 Instance Search {sak

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. TRECVID2012 Instance Search {sak THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. TRECVID2012 Instance Search 599 8531 1 1 E-mail: {sakata,matozaki}@m.cs.osakafu-u.ac.jp, {kise,masa}@cs.osakafu-u.ac.jp

More information

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field

More information

Real AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics

More information

SICE東北支部研究集会資料(2013年)

SICE東北支部研究集会資料(2013年) 280 (2013.5.29) 280-4 SURF A Study of SURF Algorithm using Edge Image and Color Information Yoshihiro Sasaki, Syunichi Konno, Yoshitaka Tsunekawa * *Iwate University : SURF (Speeded Up Robust Features)

More information

スライド 1

スライド 1 Randomized Trees CV 1: [Lepetit et al., 2006] CV 2: [Shotton et al., 2008] CV 3: [Amit & Geman, 1997] [Moosmann et al., 2006] [ et al., 2010] CVへの応用例4: TomokazuMitsui パーツベースの人検出 [三井 et al., 2011] 人の領域をパーツに分割し

More information

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution Convolutional Neural Network 2014 3 A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolutional Neural Network Fukui Hiroshi 1940 1980 [1] 90 3

More information

LBP 2 LBP 2. 2 Local Binary Pattern Local Binary pattern(lbp) [6] R

LBP 2 LBP 2. 2 Local Binary Pattern Local Binary pattern(lbp) [6] R DEIM Forum 24 F5-4 Local Binary Pattern 6 84 E-mail: {tera,kida}@ist.hokudai.ac.jp Local Binary Pattern (LBP) LBP 3 3 LBP 5 5 5 LBP improved LBP uniform LBP.. Local Binary Pattern, Gradient Local Auto-Correlations,,,,

More information

2. 30 Visual Words TF-IDF Lowe [4] Scale-Invarient Feature Transform (SIFT) Bay [1] Speeded Up Robust Features (SURF) SIFT 128 SURF 64 Visual Words Ni

2. 30 Visual Words TF-IDF Lowe [4] Scale-Invarient Feature Transform (SIFT) Bay [1] Speeded Up Robust Features (SURF) SIFT 128 SURF 64 Visual Words Ni DEIM Forum 2012 B5-3 606 8510 E-mail: {zhao,ohshima,tanaka}@dl.kuis.kyoto-u.ac.jp Web, 1. Web Web TinEye 1 Google 1 http://www.tineye.com/ 1 2. 3. 4. 5. 6. 2. 30 Visual Words TF-IDF Lowe [4] Scale-Invarient

More information

[1] SBS [2] SBS Random Forests[3] Random Forests ii

[1] SBS [2] SBS Random Forests[3] Random Forests ii Random Forests 2013 3 A Graduation Thesis of College of Engineering, Chubu University Proposal of an efficient feature selection using the contribution rate of Random Forests Katsuya Shimazaki [1] SBS

More information

論文07_安倍

論文07_安倍 特集 * 高速かつメモリ消費量の少ない局所特徴量 CARD: Compact And Real-time Descriptors 安倍 満 Mitsuru AMBAI 吉田悠一 Yuichi YOSHIDA This paper proposes a new algorithm, Compact And Real-time Descriptors (CARD), for an object recognition

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and

More information

3: 2: 2. 2 Semi-supervised learning Semi-supervised learning [5,6] Semi-supervised learning Self-training [13] [14] Self-training Self-training Semi-s

3: 2: 2. 2 Semi-supervised learning Semi-supervised learning [5,6] Semi-supervised learning Self-training [13] [14] Self-training Self-training Semi-s THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 599-8531 1-1 E-mail: tsukada@m.cs.osakafu-u.ac.jp, {masa,kise}@cs.osakafu-u.ac.jp Semi-supervised learning

More information

IPSJ SIG Technical Report Vol.2011-CVIM-177 No /5/ TRECVID2010 SURF Bag-of-Features 1 TRECVID SVM 700% MKL-SVM 883% TRECVID2010 MKL-SVM A

IPSJ SIG Technical Report Vol.2011-CVIM-177 No /5/ TRECVID2010 SURF Bag-of-Features 1 TRECVID SVM 700% MKL-SVM 883% TRECVID2010 MKL-SVM A 1 1 TRECVID2010 SURF Bag-of-Features 1 TRECVID SVM 700% MKL-SVM 883% TRECVID2010 MKL-SVM Analysis of video data recognition using multi-frame Kazuya Hidume 1 and Keiji Yanai 1 In this study, we aim to

More information

bag-of-words bag-of-keypoints Web bagof-keypoints Nearest Neighbor SVM Nearest Neighbor SIFT Nearest Neighbor bag-of-keypoints Nearest Neighbor SVM 84

bag-of-words bag-of-keypoints Web bagof-keypoints Nearest Neighbor SVM Nearest Neighbor SIFT Nearest Neighbor bag-of-keypoints Nearest Neighbor SVM 84 Bag-of-Keypoints Web G.Csurka bag-of-keypoints Web Bag-of-keypoints SVM 5.% Web Image Classification with Bag-of-Keypoints Taichi joutou and Keiji yanai Recently, need for generic image recognition is

More information

(MIRU2009) cuboid cuboid SURF 6 85% Web. Web Abstract Extracting Spatio-te

(MIRU2009) cuboid cuboid SURF 6 85% Web. Web Abstract Extracting Spatio-te (MIRU2009) 2009 7 182 8585 1 5 1 E-mail: noguchi-a@mm.cs.uec.ac.jp, yanai@cs.uec.ac.jp cuboid cuboid SURF 6 85% Web. Web Abstract Extracting Spatio-temporal Local Features Considering Consecutiveness of

More information

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] 1 599 8531 1 1 Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, Osaka 599 8531, Japan 2 565 0871 Osaka University 1 1, Yamadaoka, Suita, Osaka

More information

IPSJ SIG Technical Report Vol.2013-CVIM-187 No /5/30 1,a) 1,b), 1,,,,,,, (DNN),,,, 2 (CNN),, 1.,,,,,,,,,,,,,,,,,, [1], [6], [7], [12], [13]., [

IPSJ SIG Technical Report Vol.2013-CVIM-187 No /5/30 1,a) 1,b), 1,,,,,,, (DNN),,,, 2 (CNN),, 1.,,,,,,,,,,,,,,,,,, [1], [6], [7], [12], [13]., [ ,a),b),,,,,,,, (DNN),,,, (CNN),,.,,,,,,,,,,,,,,,,,, [], [6], [7], [], [3]., [8], [0], [7],,,, Tohoku University a) omokawa@vision.is.tohoku.ac.jp b) okatani@vision.is.tohoku.ac.jp, [3],, (DNN), DNN, [3],

More information

Microsoft PowerPoint - cvim_harada pptx

Microsoft PowerPoint - cvim_harada pptx 1 2 Flickr reaches 6 billion photos on 1 Aug, 2011. http://www.flickr.com/photos/eon60/6000000000/ 3 4 http://www.dpchallenge.com/image.php?image_id=997702 5 6 http://www.image-net.org/challenges/lsvrc/2011/pascal_ilsvrc_2011.pptx

More information

光学

光学 Fundamentals of Projector-Camera Systems and Their Calibration Methods Takayuki OKATANI To make the images projected by projector s appear as desired, it is e ective and sometimes an only choice to capture

More information

画像認識性能を改善する高精度な特徴量抽出手法の検討 A Study on Feature-Extraction Methods for Improvement of Image-Recognition Performance 井上俊明 Toshiaki Inoue 要旨 各種のカメラ搭載機器の急速な

画像認識性能を改善する高精度な特徴量抽出手法の検討 A Study on Feature-Extraction Methods for Improvement of Image-Recognition Performance 井上俊明 Toshiaki Inoue 要旨 各種のカメラ搭載機器の急速な 画像認識性能を改善する高精度な特徴量抽出手法の検討 A Study on Feature-Extraction Methods for Improvement of Image-Recognition Performance 井上俊明 Toshiaki Inoue 要旨 各種のカメラ搭載機器の急速な普及に伴い, 撮影 蓄積された画像を有効に活用する 画像認識技術への期待が高まっている 特に近年, 画像中のさまざまな物体を認識する,

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

*2.5mm ”ŒŠá‡ÆfiÁ™¥‡Ì…Z†[…t…X…N…−†[…j…fi…O

*2.5mm ”ŒŠá‡ÆfiÁ™¥‡Ì…Z†[…t…X…N…−†[…j…fi…O I. Takeuchi, Nagoya Institute of Technology 1/38 f(x) = w 1 x 1 + w 2 x 2 +... + w d x d f(x) = α 1 K(x, x 1 ) + α 2 K(x, x 2 ) +... + α n K(x, x n ) {wj } d j=1 f {αi } n i=1 f I. Takeuchi, Nagoya Institute

More information

Microsoft PowerPoint - descriptor.ppt [互換モード]

Microsoft PowerPoint - descriptor.ppt [互換モード] 1 局所特徴記述子を用いたバイオメトリクス認証の検討 A Study on Biometric Authentication Using Local Feature Descriptor 伊藤康一, 青山章一郎, 青木孝文 Koichi Ito, Shoichiro Aoyama and Takafumi Aoki 東北大学大学院情報科学研究科 Graduate School of Information

More information

IPSJ SIG Technical Report Vol.2010-MPS-77 No /3/5 VR SIFT Virtual View Generation in Hallway of Cybercity Buildings from Video Sequen

IPSJ SIG Technical Report Vol.2010-MPS-77 No /3/5 VR SIFT Virtual View Generation in Hallway of Cybercity Buildings from Video Sequen VR 1 1 1 1 1 SIFT Virtual View Generation in Hallway of Cybercity Buildings from Video Sequences Sachiyo Yoshida, 1 Masami Takata 1 and Joe Kaduki 1 Appearance of Three-dimensional (3D) building model

More information

main.dvi

main.dvi PC 1 1 [1][2] [3][4] ( ) GPU(Graphics Processing Unit) GPU PC GPU PC ( 2 GPU ) GPU Harris Corner Detector[5] CPU ( ) ( ) CPU GPU 2 3 GPU 4 5 6 7 1 toyohiro@isc.kyutech.ac.jp 45 2 ( ) CPU ( ) ( ) () 2.1

More information

一般社団法人電子情報通信学会 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGIN

一般社団法人電子情報通信学会 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGIN 一般社団法人電子情報通信学会 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS 信学技報 IEICE Technical Report PRMU2017-36,SP2017-12(2017-06)

More information

untitled

untitled IS2-26 第 19 回 画 像 センシングシンポジウム, 横 浜,2013 年 6 月 SVM E-mail: yuhi@vision.cs.chubu.ac.jp Abstract SVM SVM SVM SVM HOG B-HOG HOG SVM 6.1% 17 1 Intelligent Transport System(ITS: ) 2005 Dalal HOG SVM[1] [2] HOG

More information

CVaR

CVaR CVaR 20 4 24 3 24 1 31 ,.,.,. Markowitz,., (Value-at-Risk, VaR) (Conditional Value-at-Risk, CVaR). VaR, CVaR VaR. CVaR, CVaR. CVaR,,.,.,,,.,,. 1 5 2 VaR CVaR 6 2.1................................................

More information

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance EMD 1,a) 1 1 1 SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance (EMD), Bag-of-keypoints,. Bag-of-keypoints, SIFT, EMD, A method of similar image retrieval system using EMD and SIFT Hoshiga

More information

WISS Woodman Labs GoPro 1 [5, 3, 2] Copyright is held by the author(s). 1 GoPro GoPro 2 6 GoPro RICOH THETA 3 Kodak P

WISS Woodman Labs GoPro 1 [5, 3, 2] Copyright is held by the author(s). 1 GoPro GoPro 2 6 GoPro RICOH THETA 3 Kodak P WISS 2016. 8 1 Woodman Labs GoPro 1 [5, 3, 2] Copyright is held by the author(s). 1 GoPro https://gopro.com/ 360 GoPro 2 6 GoPro RICOH THETA 3 Kodak PIXPRO SP360 4 Samsung Gear 360 5 1 RICOH THETA S Brazucam

More information

? (EM),, EM? (, 2004/ 2002) von Mises-Fisher ( 2004) HMM (MacKay 1997) LDA (Blei et al. 2001) PCFG ( 2004)... Variational Bayesian methods for Natural

? (EM),, EM? (, 2004/ 2002) von Mises-Fisher ( 2004) HMM (MacKay 1997) LDA (Blei et al. 2001) PCFG ( 2004)... Variational Bayesian methods for Natural SLC Internal tutorial Daichi Mochihashi daichi.mochihashi@atr.jp ATR SLC 2005.6.21 (Tue) 13:15 15:00@Meeting Room 1 Variational Bayesian methods for Natural Language Processing p.1/30 ? (EM),, EM? (, 2004/

More information

BDH Cao BDH BDH Cao Cao Cao BDH ()*$ +,-+.)*$!%&'$!"#$ 2. 1 Weng [4] Metric Learning Weng DB DB Yang [5] John [6] Sparse Coding sparse coding DB [7] K

BDH Cao BDH BDH Cao Cao Cao BDH ()*$ +,-+.)*$!%&'$!#$ 2. 1 Weng [4] Metric Learning Weng DB DB Yang [5] John [6] Sparse Coding sparse coding DB [7] K Bucket Distance Hashing Metric Learning 1,a) 1,b) 1,c) 1,d) (DB) [1] DB Cao [2] Cao Metric Learning Cao Cao Cao Cao Cao 100 DB 10% 1. m DB DB DB 1 599 8531 1 1 Graduate School of Engineering, Osaka Prefecture

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

paper.dvi

paper.dvi 23 Study on character extraction from a picture using a gradient-based feature 1120227 2012 3 1 Google Street View Google Street View SIFT 3 SIFT 3 y -80 80-50 30 SIFT i Abstract Study on character extraction

More information

[6] DoN DoN DDoN(Donuts DoN) DoN 4(2) DoN DDoN 3.2 RDoN(Ring DoN) 4(1) DoN 4(3) DoN RDoN 2 DoN 2.2 DoN PCA DoN DoN 2 DoN PCA 0 DoN 3. DoN

[6] DoN DoN DDoN(Donuts DoN) DoN 4(2) DoN DDoN 3.2 RDoN(Ring DoN) 4(1) DoN 4(3) DoN RDoN 2 DoN 2.2 DoN PCA DoN DoN 2 DoN PCA 0 DoN 3. DoN 3 1,a) 1,b) 3D 3 3 Difference of Normals (DoN)[1] DoN, 1. 2010 Kinect[2] 3D 3 [3] 3 [4] 3 [5] 3 [6] [7] [1] [8] [9] [10] Difference of Normals (DoN) 48 8 [1] [6] DoN DoN 1 National Defense Academy a) em53035@nda.ac.jp

More information

20 9 19 1 3 11 1 3 111 3 112 1 4 12 6 121 6 122 7 13 7 131 8 132 10 133 10 134 12 14 13 141 13 142 13 143 15 144 16 145 17 15 19 151 1 19 152 20 2 21 21 21 211 21 212 1 23 213 1 23 214 25 215 31 22 33

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

1 4 1 ( ) ( ) ( ) ( ) () 1 4 2

1 4 1 ( ) ( ) ( ) ( ) () 1 4 2 7 1995, 2017 7 21 1 2 2 3 3 4 4 6 (1).................................... 6 (2)..................................... 6 (3) t................. 9 5 11 (1)......................................... 11 (2)

More information

DEIM Forum 2019 A7-1 Flexible Distance-based Hashing mori

DEIM Forum 2019 A7-1 Flexible Distance-based Hashing mori DEIM Forum 2019 A7-1 Flexible Distance-based Hashing 731 3194 E-mail: mc66023@e.hiroshima-cu.ac.jp,{wakaba,s naga,inagi,yoko}@hiroshima-cu.ac.jp, morikei18@gmail.com Flexible Distance-based Hashing(FDH)

More information

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 1 1 1 GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Self-location is very informative for wearable systems.

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

thesis.dvi

thesis.dvi 2007 Graph Cuts Graph Cuts Graph Cuts Graph Cuts t-link Interactive Graph Cuts 4.7% Mean Shift Segmentation 1 1 2 3 2.1.................... 3 2.1.1............................. 3 2.2...........................

More information

通信容量制約を考慮したフィードバック制御 - 電子情報通信学会 情報理論研究会(IT) 若手研究者のための講演会

通信容量制約を考慮したフィードバック制御 -  電子情報通信学会 情報理論研究会(IT)  若手研究者のための講演会 IT 1 2 1 2 27 11 24 15:20 16:05 ( ) 27 11 24 1 / 49 1 1940 Witsenhausen 2 3 ( ) 27 11 24 2 / 49 1940 2 gun director Warren Weaver, NDRC (National Defence Research Committee) Final report D-2 project #2,

More information

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw ,.,. NP,.,. 1 1.1.,.,,.,.,,,. 2. 1.1.1 (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., 152-8552 2-12-1, tatsukawa.m.aa@m.titech.ac.jp, 190-8562 10-3, mirai@ism.ac.jp

More information

& 3 3 ' ' (., (Pixel), (Light Intensity) (Random Variable). (Joint Probability). V., V = {,,, V }. i x i x = (x, x,, x V ) T. x i i (State Variable),

& 3 3 ' ' (., (Pixel), (Light Intensity) (Random Variable). (Joint Probability). V., V = {,,, V }. i x i x = (x, x,, x V ) T. x i i (State Variable), .... Deeping and Expansion of Large-Scale Random Fields and Probabilistic Image Processing Kazuyuki Tanaka The mathematical frameworks of probabilistic image processing are formulated by means of Markov

More information

スライド 1

スライド 1 swk(at)ic.is.tohoku.ac.jp 2 Outline 3 ? 4 S/N CCD 5 Q Q V 6 CMOS 1 7 1 2 N 1 2 N 8 CCD: CMOS: 9 : / 10 A-D A D C A D C A D C A D C A D C A D C ADC 11 A-D ADC ADC ADC ADC ADC ADC ADC ADC ADC A-D 12 ADC

More information

ばらつき抑制のための確率最適制御

ばらつき抑制のための確率最適制御 ( ) http://wwwhayanuemnagoya-uacjp/ fujimoto/ 2011 3 9 11 ( ) 2011/03/09-11 1 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 2 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 3 / 46 (1/2) r + Controller - u Plant y

More information

Sobel Canny i

Sobel Canny i 21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan MachineDancing: 1,a) 1,b) 3 MachineDancing 2 1. 3 MachineDancing MachineDancing 1 MachineDancing MachineDancing [1] 1 305 0058 1-1-1 a) s.fukayama@aist.go.jp b) m.goto@aist.go.jp 1 MachineDancing 3 CG

More information

医系の統計入門第 2 版 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. このサンプルページの内容は, 第 2 版 1 刷発行時のものです.

医系の統計入門第 2 版 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます.   このサンプルページの内容は, 第 2 版 1 刷発行時のものです. 医系の統計入門第 2 版 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/009192 このサンプルページの内容は, 第 2 版 1 刷発行時のものです. i 2 t 1. 2. 3 2 3. 6 4. 7 5. n 2 ν 6. 2 7. 2003 ii 2 2013 10 iii 1987

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

_314I01BM浅谷2.indd

_314I01BM浅谷2.indd 587 ネットワークの表現学習 1 1 1 1 Deep Learning [1] Google [2] Deep Learning [3] [4] 2014 Deepwalk [5] 1 2 [6] [7] [8] 1 2 1 word2vec[9] word2vec 1 http://www.ai-gakkai.or.jp/my-bookmark_vol31-no4 588 31 4 2016

More information

2008 : 80725872 1 2 2 3 2.1.......................................... 3 2.2....................................... 3 2.3......................................... 4 2.4 ()..................................

More information

鉄鋼協会プレゼン

鉄鋼協会プレゼン NN :~:, 8 Nov., Adaptive H Control for Linear Slider with Friction Compensation positioning mechanism moving table stand manipulator Point to Point Control [G] Continuous Path Control ground Fig. Positoining

More information

main.dvi

main.dvi CDMA 1 CDMA ( ) CDMA CDMA CDMA 1 ( ) Hopfield [1] Hopfield 1 E-mail: okada@brain.riken.go.jp 1 1: 1 [] Hopfield Sourlas Hopfield [3] Sourlas 1? CDMA.1 DS/BPSK CDMA (Direct Sequence; DS) (Binary Phase-Shift-Keying;

More information

JFE.dvi

JFE.dvi ,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho

More information

変 位 変位とは 物体中のある点が変形後に 別の点に異動したときの位置の変化で あり ベクトル量である 変位には 物体の変形の他に剛体運動 剛体変位 が含まれている 剛体変位 P(x, y, z) 平行移動と回転 P! (x + u, y + v, z + w) Q(x + d x, y + dy,

変 位 変位とは 物体中のある点が変形後に 別の点に異動したときの位置の変化で あり ベクトル量である 変位には 物体の変形の他に剛体運動 剛体変位 が含まれている 剛体変位 P(x, y, z) 平行移動と回転 P! (x + u, y + v, z + w) Q(x + d x, y + dy, 変 位 変位とは 物体中のある点が変形後に 別の点に異動したときの位置の変化で あり ベクトル量である 変位には 物体の変形の他に剛体運動 剛体変位 が含まれている 剛体変位 P(x, y, z) 平行移動と回転 P! (x + u, y + v, z + w) Q(x + d x, y + dy, z + dz) Q! (x + d x + u + du, y + dy + v + dv, z +

More information

(b) BoF codeword codeword BoF (c) BoF Fergus Weber [11] Weber [12] Weber Fergus BoF (b) Fergus [13] Fergus 2. Fergus 2. 1 Fergus [3]

(b) BoF codeword codeword BoF (c) BoF Fergus Weber [11] Weber [12] Weber Fergus BoF (b) Fergus [13] Fergus 2. Fergus 2. 1 Fergus [3] * A Multimodal Constellation Model for Generic Object Recognition Yasunori KAMIYA, Tomokazu TAKAHASHI,IchiroIDE, and Hiroshi MURASE Bag of Features (BoF) BoF EM 1. [1] Part-based Graduate School of Information

More information

On the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA

On the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA Journal Article / 学術雑誌論文 ベイズアプローチによる最適識別系の有限 標本効果に関する考察 : 学習標本の大きさ がクラス間で異なる場合 (< 論文小特集 > パ ターン認識のための学習 : 基礎と応用 On the limited sample effect of bayesian approach : the case of each class 韓, 雪仙 ; 若林, 哲史

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

本文6(599) (Page 601)

本文6(599) (Page 601) (MIRU2008) 2008 7 525 8577 1 1 1 E-mail: matsuzaki@i.ci.ritsumei.ac.jp, shimada@ci.ritsumei.ac.jp Object Recognition by Observing Grasping Scene from Image Sequence Hironori KASAHARA, Jun MATSUZAKI, Nobutaka

More information

IPSJ SIG Technical Report Vol.2013-CVIM-188 No /9/2 1,a) D. Marr D. Marr 1. (feature-based) (area-based) (Dense Stereo Vision) van der Ma

IPSJ SIG Technical Report Vol.2013-CVIM-188 No /9/2 1,a) D. Marr D. Marr 1. (feature-based) (area-based) (Dense Stereo Vision) van der Ma ,a) D. Marr D. Marr. (feature-based) (area-based) (Dense Stereo Vision) van der Mark [] (Intelligent Vehicle: IV) SAD(Sum of Absolute Difference) Intel x86 CPU SSE2(Streaming SIMD Extensions 2) CPU IV

More information

Trial for Value Quantification from Exceptional Utterances 37-066593 1 5 1.1.................................. 5 1.2................................ 8 2 9 2.1.............................. 9 2.1.1.........................

More information

ohpmain.dvi

ohpmain.dvi fujisawa@ism.ac.jp 1 Contents 1. 2. 3. 4. γ- 2 1. 3 10 5.6, 5.7, 5.4, 5.5, 5.8, 5.5, 5.3, 5.6, 5.4, 5.2. 5.5 5.6 +5.7 +5.4 +5.5 +5.8 +5.5 +5.3 +5.6 +5.4 +5.2 =5.5. 10 outlier 5 5.6, 5.7, 5.4, 5.5, 5.8,

More information

WISS 2018 [2 4] [5,6] Query-by-Dancing Query-by- Dancing Cao [1] OpenPose 2 Ghias [7] Query by humming Chen [8] Query by rhythm Jang [9] Query-by-tapp

WISS 2018 [2 4] [5,6] Query-by-Dancing Query-by- Dancing Cao [1] OpenPose 2 Ghias [7] Query by humming Chen [8] Query by rhythm Jang [9] Query-by-tapp Query-by-Dancing: WISS 2018. Query-by-Dancing Query-by-Dancing 1 OpenPose [1] Copyright is held by the author(s). DJ DJ DJ WISS 2018 [2 4] [5,6] Query-by-Dancing Query-by- Dancing Cao [1] OpenPose 2 Ghias

More information

IPSJ SIG Technical Report Vol.2010-CVIM-171 No /3/19 1. Web 1 1 Web Web Web Multiple Kernel Learning(MKL) Web ( ) % MKL 68.8% Extractin

IPSJ SIG Technical Report Vol.2010-CVIM-171 No /3/19 1. Web 1 1 Web Web Web Multiple Kernel Learning(MKL) Web ( ) % MKL 68.8% Extractin 1. Web 1 1 Web Web Web Multiple Kernel Learning(MKL) Web ( ) 200 57.2% MKL 68.8% Extracting Spatio-Temporal Local Features for Classifying Web Video Shots Akitsugu Noguchi 1 and Keiji Yanai 1 Nowadays,

More information

11) 13) 11),12) 13) Y c Z c Image plane Y m iy O m Z m Marker coordinate system T, d X m f O c X c Camera coordinate system 1 Coordinates and problem

11) 13) 11),12) 13) Y c Z c Image plane Y m iy O m Z m Marker coordinate system T, d X m f O c X c Camera coordinate system 1 Coordinates and problem 1 1 1 Posture Esimation by Using 2-D Fourier Transform Yuya Ono, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Recently, research fields of augmented reality and robot navigation are actively investigated. Estimating

More information

July 28, H H 0 H int = H H 0 H int = H int (x)d 3 x Schrödinger Picture Ψ(t) S =e iht Ψ H O S Heisenberg Picture Ψ H O H (t) =e iht O S e i

July 28, H H 0 H int = H H 0 H int = H int (x)d 3 x Schrödinger Picture Ψ(t) S =e iht Ψ H O S Heisenberg Picture Ψ H O H (t) =e iht O S e i July 8, 4. H H H int H H H int H int (x)d 3 x Schrödinger Picture Ψ(t) S e iht Ψ H O S Heisenberg Picture Ψ H O H (t) e iht O S e iht Interaction Picture Ψ(t) D e iht Ψ(t) S O D (t) e iht O S e ih t (Dirac

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

Emacs ML let start ::= exp (1) exp ::= (2) fn id exp (3) ::= (4) (5) ::= id (6) const (7) (exp) (8) let val id = exp in

Emacs ML let start ::= exp (1) exp ::= (2) fn id exp (3) ::= (4) (5) ::= id (6) const (7) (exp) (8) let val id = exp in Emacs, {l06050,sasano}@sic.shibaura-it.ac.jp Eclipse Visual Studio Standard ML Haskell Emacs 1 Eclipse Visual Studio variable not found LR(1) let Emacs Emacs Emacs Java Emacs JDEE [3] JDEE Emacs Java 2

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

RaVioli SIMD

RaVioli SIMD RaVioli SIMD 17 17115074 i RaVioli SIMD PC PC PC PC CPU RaVioli RaVioli CPU RaVioli CPU SIMD RaVioli RaVioli SIMD RaVioli SIMD RaVioli SIMD 1 1 2 RaVioli 2 2.1 RaVioli.......................................

More information

IPSJ SIG Technical Report Vol.2017-CVIM-205 No /1/ Content-based Image Retrieval(CBIR) CBIR RANSAC (Local feature hashing) 1000 A geo

IPSJ SIG Technical Report Vol.2017-CVIM-205 No /1/ Content-based Image Retrieval(CBIR) CBIR RANSAC (Local feature hashing) 1000 A geo - - Content-based Image Retrieval(CBIR) CBIR RANSAC (Local feature hashing) A geometric consistency checking method for keypoint matching -Application to image retrieval- Okura Yuto Wada Toshikazu Abstract:

More information

A Graduation Thesis of College of Engineering, Chubu University Pose Estimation by Regression Analysis with Depth Information Yoshiki Agata

A Graduation Thesis of College of Engineering, Chubu University Pose Estimation by Regression Analysis with Depth Information Yoshiki Agata 2011 3 A Graduation Thesis of College of Engineering, Chubu University Pose Estimation by Regression Analysis with Depth Information Yoshiki Agata CG [2] [3][4] 3 3 [1] HOG HOG TOF(Time Of Flight) iii

More information

a) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a

a) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a a) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a), Tetsuo SAWARAGI, and Yukio HORIGUCHI 1. Johansson

More information

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx.

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx. 1, 2 1 m110057@shibaura-it.ac.jp 2 sasano@sic.shibaura-it.ac.jp Eclipse Visual Studio ML Standard ML Emacs 1 ( IDE ) IDE C C++ Java IDE IDE IDE IDE Eclipse Java IDE Java Standard ML 1 print (Int. 1 Int

More information

現実認識型情報端末uScopeの提案

現実認識型情報端末uScopeの提案 uscope YRP E-mail: tesshi@sakamura-lab.org AR(Augmented Reality:) uscope POI(Point Of Interest) 1. AR(Augmented Reality)/MR(Mixed Reality) [1] Layer [2] GPS POI Point Of Interest POI 2(a) POI POI POI 2(b)

More information

paper.dvi

paper.dvi SIFT 23 (410M5B1) SIFT(Scale Invariant Feature Transform) SIFT SIFT SIFT SIMD SIFT SIMD MIMD Gaussian SIMD Abstract Currently, with the development of image-recognition technique, to recognize a large

More information

18 2 20 W/C W/C W/C 4-4-1 0.05 1.0 1000 1. 1 1.1 1 1.2 3 2. 4 2.1 4 (1) 4 (2) 4 2.2 5 (1) 5 (2) 5 2.3 7 3. 8 3.1 8 3.2 ( ) 11 3.3 11 (1) 12 (2) 12 4. 14 4.1 14 4.2 14 (1) 15 (2) 16 (3) 17 4.3 17 5. 19

More information

2013 M

2013 M 2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................

More information

Part () () Γ Part ,

Part () () Γ Part , Contents a 6 6 6 6 6 6 6 7 7. 8.. 8.. 8.3. 8 Part. 9. 9.. 9.. 3. 3.. 3.. 3 4. 5 4.. 5 4.. 9 4.3. 3 Part. 6 5. () 6 5.. () 7 5.. 9 5.3. Γ 3 6. 3 6.. 3 6.. 3 6.3. 33 Part 3. 34 7. 34 7.. 34 7.. 34 8. 35

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc 1,a) 1,b) Obstacle Detection from Monocular On-Vehicle Camera in units of Delaunay Triangles Abstract: An algorithm to detect obstacles by using a monocular on-vehicle video camera is developed. Since

More information

³ÎΨÏÀ

³ÎΨÏÀ 2017 12 12 Makoto Nakashima 2017 12 12 1 / 22 2.1. C, D π- C, D. A 1, A 2 C A 1 A 2 C A 3, A 4 D A 1 A 2 D Makoto Nakashima 2017 12 12 2 / 22 . (,, L p - ). Makoto Nakashima 2017 12 12 3 / 22 . (,, L p

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information