Search results for "normal"

showing 10 items of 2571 documents

A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection

2019

Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingQuantization (signal processing)Data_MISCELLANEOUS020207 software engineeringWatermark02 engineering and technologyGraphics (cs.GR)Computer Science - Graphics[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingComputer engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshVertex normalQuantization (image processing)Digital watermarkingCryptography and Security (cs.CR)ComputingMilieux_MISCELLANEOUSSmoothing
researchProduct

Unsupervised Anomaly and Change Detection With Multivariate Gaussianization

2022

Anomaly detection (AD) is a field of intense research in remote sensing (RS) image processing. Identifying low probability events in RS images is a challenging problem given the high dimensionality of the data, especially when no (or little) information about the anomaly is available a priori. While a plenty of methods are available, the vast majority of them do not scale well to large datasets and require the choice of some (very often critical) hyperparameters. Therefore, unsupervised and computationally efficient detection methods become strictly necessary, especially now with the data deluge problem. In this article, we propose an unsupervised method for detecting anomalies and changes …

FOS: Computer and information sciencesComputer Science - Machine LearningMultivariate statisticsComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionFOS: Physical sciencesImage processingPattern recognitionMultivariate normal distributionComputational Physics (physics.comp-ph)Machine Learning (cs.LG)Methodology (stat.ME)Transformation (function)Robustness (computer science)General Earth and Planetary SciencesAnomaly detectionArtificial intelligenceElectrical and Electronic EngineeringbusinessPhysics - Computational PhysicsStatistics - MethodologyChange detectionCurse of dimensionalityIEEE Transactions on Geoscience and Remote Sensing
researchProduct

Kernel methods and their derivatives: Concept and perspectives for the earth system sciences.

2020

Kernel methods are powerful machine learning techniques which implement generic non-linear functions to solve complex tasks in a simple way. They Have a solid mathematical background and exhibit excellent performance in practice. However, kernel machines are still considered black-box models as the feature mapping is not directly accessible and difficult to interpret.The aim of this work is to show that it is indeed possible to interpret the functions learned by various kernel methods is intuitive despite their complexity. Specifically, we show that derivatives of these functions have a simple mathematical formulation, are easy to compute, and can be applied to many different problems. We n…

FOS: Computer and information sciencesComputer Science - Machine LearningSupport Vector MachineTheoretical computer scienceComputer scienceEntropyKernel FunctionsNormal Distribution0211 other engineering and technologies02 engineering and technologyMachine Learning (cs.LG)Machine LearningStatistics - Machine LearningSimple (abstract algebra)0202 electrical engineering electronic engineering information engineeringOperator TheoryData ManagementMultidisciplinaryGeographyApplied MathematicsSimulation and ModelingQRDensity estimationKernel methodKernel (statistics)Physical SciencessymbolsMedicine020201 artificial intelligence & image processingAlgorithmsResearch ArticleComputer and Information SciencesScienceMachine Learning (stat.ML)Research and Analysis MethodsKernel MethodsKernel (linear algebra)symbols.namesakeArtificial IntelligenceSupport Vector MachinesHumansEntropy (information theory)Computer SimulationGaussian process021101 geological & geomatics engineeringData VisualizationCorrectionRandom VariablesFunction (mathematics)Probability TheorySupport vector machineAlgebraPhysical GeographyLinear AlgebraEarth SciencesEigenvectorsRandom variableMathematicsEarth SystemsPLoS ONE
researchProduct

Generating a Gray code for prefix normal words in amortized polylogarithmic time per word

2020

A prefix normal word is a binary word with the property that no substring has more $1$s than the prefix of the same length. By proving that the set of prefix normal words is a bubble language, we can exhaustively list all prefix normal words of length $n$ as a combinatorial Gray code, where successive strings differ by at most two swaps or bit flips. This Gray code can be generated in $\Oh(\log^2 n)$ amortized time per word, while the best generation algorithm hitherto has $\Oh(n)$ running time per word. We also present a membership tester for prefix normal words, as well as a novel characterization of bubble languages.

FOS: Computer and information sciencesGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)Property (programming)combinatorial Gray codeComputer Science - Formal Languages and Automata TheoryData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyCharacterization (mathematics)01 natural sciencesTheoretical Computer ScienceCombinatoricsSet (abstract data type)Gray codeComputer Science - Data Structures and Algorithms0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)MathematicsAmortized analysisSettore INF/01 - Informaticaprefix normal wordsSubstringcombinatorial generationPrefixjumbled pattern matching010201 computation theory & mathematics020201 artificial intelligence & image processingbinary languagesprefix normal words binary languages combinatorial Gray code combinatorial generation jumbled pattern matchingWord (computer architecture)Theoretical Computer Science
researchProduct

Randomized Rx For Target Detection

2018

This work tackles the target detection problem through the well-known global RX method. The RX method models the clutter as a multivariate Gaussian distribution, and has been extended to nonlinear distributions using kernel methods. While the kernel RX can cope with complex clutters, it requires a considerable amount of computational resources as the number of clutter pixels gets larger. Here we propose random Fourier features to approximate the Gaussian kernel in kernel RX and consequently our development keep the accuracy of the nonlinearity while reducing the computational cost which is now controlled by an hyperparameter. Results over both synthetic and real-world image target detection…

FOS: Computer and information sciencesHyperparameter020301 aerospace & aeronauticsComputer Science - Machine LearningComputer scienceComputer Vision and Pattern Recognition (cs.CV)0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionMultivariate normal distribution02 engineering and technologyObject detectionMachine Learning (cs.LG)symbols.namesakeKernel (linear algebra)Kernel method0203 mechanical engineeringKernel (statistics)Gaussian functionsymbolsClutterAnomaly detectionAlgorithm021101 geological & geomatics engineering
researchProduct

On prefix normal words and prefix normal forms

2016

A $1$-prefix normal word is a binary word with the property that no factor has more $1$s than the prefix of the same length; a $0$-prefix normal word is defined analogously. These words arise in the context of indexed binary jumbled pattern matching, where the aim is to decide whether a word has a factor with a given number of $1$s and $0$s (a given Parikh vector). Each binary word has an associated set of Parikh vectors of the factors of the word. Using prefix normal words, we provide a characterization of the equivalence class of binary words having the same set of Parikh vectors of their factors. We prove that the language of prefix normal words is not context-free and is strictly contai…

FOS: Computer and information sciencesPrefix codePrefix normal wordPre-necklaceDiscrete Mathematics (cs.DM)General Computer ScienceFormal Languages and Automata Theory (cs.FL)Binary numberComputer Science - Formal Languages and Automata TheoryContext (language use)Binary languageLyndon words0102 computer and information sciences02 engineering and technologyPrefix grammarprefix normal formsKraft's inequalityCharacterization (mathematics)Lyndon word01 natural sciencesPrefix normal formenumerationTheoretical Computer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsMathematicsDiscrete mathematicsprefix normal words prefix normal forms binary languages binary jumbled pattern matching pre-necklaces Lyndon words enumerationbinary jumbled pattern matchingSettore INF/01 - InformaticaComputer Science (all)pre-necklacesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)prefix normal wordsPrefix010201 computation theory & mathematics020201 artificial intelligence & image processingCombinatorics (math.CO)binary languagesComputer Science::Formal Languages and Automata TheoryWord (group theory)Computer Science - Discrete MathematicsTheoretical Computer Science
researchProduct

A New Nonparametric Estimate of the Risk-Neutral Density with Applications to Variance Swaps

2021

We develop a new nonparametric approach for estimating the risk-neutral density of asset prices and reformulate its estimation into a double-constrained optimization problem. We evaluate our approach using the S\&P 500 market option prices from 1996 to 2015. A comprehensive cross-validation study shows that our approach outperforms the existing nonparametric quartic B-spline and cubic spline methods, as well as the parametric method based on the Normal Inverse Gaussian distribution. As an application, we use the proposed density estimator to price long-term variance swaps, and the model-implied prices match reasonably well with those of the variance future downloaded from the CBOE websi…

FOS: Computer and information sciencesStatistics and ProbabilityVariance swapOptimization problemvariance swapStatistics - ApplicationsFOS: Economics and businessNormal-inverse Gaussian distributiondouble-constrained optimizationpricingEconometricsApplications (stat.AP)Asset (economics)normal inverse Gaussian distributionMathematicsParametric statisticslcsh:T57-57.97Applied MathematicsNonparametric statisticsEstimatorVariance (accounting)lcsh:Applied mathematics. Quantitative methodsPricing of Securities (q-fin.PR)risk-neutral densitylcsh:Probabilities. Mathematical statisticslcsh:QA273-280Quantitative Finance - Pricing of Securities
researchProduct

Binary jumbled string matching for highly run-length compressible texts

2012

The Binary Jumbled String Matching problem is defined as: Given a string $s$ over $\{a,b\}$ of length $n$ and a query $(x,y)$, with $x,y$ non-negative integers, decide whether $s$ has a substring $t$ with exactly $x$ $a$'s and $y$ $b$'s. Previous solutions created an index of size O(n) in a pre-processing step, which was then used to answer queries in constant time. The fastest algorithms for construction of this index have running time $O(n^2/\log n)$ [Burcsi et al., FUN 2010; Moosa and Rahman, IPL 2010], or $O(n^2/\log^2 n)$ in the word-RAM model [Moosa and Rahman, JDA 2012]. We propose an index constructed directly from the run-length encoding of $s$. The construction time of our index i…

FOS: Computer and information sciencesString algorithmsStructure (category theory)Binary numberG.2.1Data_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyString searching algorithm01 natural sciencesComputer Science - Information RetrievalTheoretical Computer ScienceCombinatoricsdata structuresSimple (abstract algebra)Computer Science - Data Structures and AlgorithmsString algorithms; jumbled pattern matching; prefix normal form; data structures0202 electrical engineering electronic engineering information engineeringParikh vectorData Structures and Algorithms (cs.DS)Run-length encodingMathematics68W32 68P05 68P20String (computer science)prefix normal formSubstringComputer Science Applicationsjumbled pattern matching010201 computation theory & mathematicsData structureSignal ProcessingRun-length encoding020201 artificial intelligence & image processingConstant (mathematics)Information Retrieval (cs.IR)Information SystemsInformation Processing Letters
researchProduct

Depletion in Bose-Einstein condensates using quantum field theory in curved space

2007

5 pages.-- PACS nrs.: 03.75.Kk; 05.30.Jp; 04.62.+v; 04.70.Dy.-- ISI Article Identifier: 000246074600122.-- ArXiv pre-print available at: http://arxiv.org/abs/cond-mat/0610367

FOS: Physical sciencesGeneral Relativity and Quantum Cosmology (gr-qc)Condensed Matter - Soft Condensed MatterBose-Einstein condensationGeneral Relativity and Quantum Cosmologylaw.inventionRenormalizationBOSE EINSTEIN CONDENSATElawQuantum mechanicsAtomSpace-time configurationsQuantum field theoryCurved spacePhysicsCondensed Matter::Quantum GasesTemperaturesQuantum field theory in curved spacetimeCondensed Matter::OtherBlack holesQuantum gravityQUANTUM FIELD THEORY IN CURVED SPACEAtomic and Molecular Physics and OpticsCondensed Matter - Other Condensed MatterQuantum electrodynamicsQuantum gravitySoft Condensed Matter (cond-mat.soft)Bose–Einstein condensateHawking radiationOther Condensed Matter (cond-mat.other)
researchProduct

Unique continuation of the normal operator of the x-ray transform and applications in geophysics

2020

We show that the normal operator of the X-ray transform in $\mathbb{R}^d$, $d\geq 2$, has a unique continuation property in the class of compactly supported distributions. This immediately implies uniqueness for the X-ray tomography problem with partial data and generalizes some earlier results to higher dimensions. Our proof also gives a unique continuation property for certain Riesz potentials in the space of rapidly decreasing distributions. We present applications to local and global seismology. These include linearized travel time tomography with half-local data and global tomography based on shear wave splitting in a weakly anisotropic elastic medium.

FOS: Physical sciencesx-ray transformSpace (mathematics)01 natural sciencesTheoretical Computer SciencePhysics - GeophysicsContinuationtomografiaClassical Analysis and ODEs (math.CA)FOS: MathematicsNormal operatorUniqueness0101 mathematicsAnisotropyMathematical PhysicsMathematicsX-ray transformgeophysicsApplied Mathematics010102 general mathematicsMathematical analysisgeofysiikkaShear wave splittingInverse problemFunctional Analysis (math.FA)Geophysics (physics.geo-ph)Computer Science ApplicationsMathematics - Functional Analysis010101 applied mathematicsMathematics - Classical Analysis and ODEsSignal ProcessingInverse Problems
researchProduct