Loading...
Search for: subspaces
0.007 seconds
Total 44 records

    Sequential subspace finding: A new algorithm for learning low-dimensional linear subspaces

    , Article European Signal Processing Conference ; September , 2013 , Page(s): 1 - 5 ; 22195491 (ISSN) ; 9780992862602 (ISBN) Sadeghi, M ; Joneidi, M ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    European Signal Processing Conference, EUSIPCO  2013
    Abstract
    In this paper we propose a new algorithm for learning low-dimensional linear subspaces. Our proposed algorithm performs by sequentially finding some low-dimensional subspaces on which a set of training data lies. Each subspace is found in such a way that the number of signals lying on (or near to) it is maximized. Once we found a subset of the training data that is sufficiently close to a subspace, then we omit these signals from the set of training signals and repeat the procedure for the remaining signals until all training signals are assigned to a subspace. This data reduction procedure results in a significant improvement to the runtime of our algorithm. We then propose a robust version... 

    Decoding the long term memory using weighted thresholding union subspaces based classification on magnetoencephalogram

    , Article Communications in Computer and Information Science ; Vol. 427, issue , 2014 , p. 164-171 ; ISSN: 18650929 ; ISBN: 9783319108483 Tavakoli, S ; Fatemizadeh, E ; Sharif University of Technology
    Abstract
    In this paper Long Term Memory (LTM) process during leftward and rightward orientation recalling have been analyzed using Magnetoencephalogram (MEG) signals. This paper presents a novel criterion for decision making using union subspace based classifier. The proposed method involves the Eigenvalues from Singular Value Decomposition (SVD) of each subspace not only to select basis for each subspace but also to weight the decision making criterion to discriminate two classes. The proposed method has provided orientation detection from recalling signal with 6.75 percent increase in classification accuracy compared to better results on this data  

    Some results on the intersection graph of ideals of matrix algebras

    , Article Linear and Multilinear Algebra ; Volume 62, Issue 2 , February , 2014 , Pages 195-206 ; ISSN: 03081087 Akbari, S ; Nikandish, R ; Sharif University of Technology
    Abstract
    Let be a ring and be the set of all non-trivial left ideals of. The intersection graph of ideals of, denoted by, is a graph with the vertex set and two distinct vertices and are adjacent if and only if. In this paper, we classify all rings (not necessarily commutative) whose domination number of the intersection graph of ideals is at least 2. Moreover, some results on the intersection graphs of ideals of matrix algebras over a finite field are given. For instance, we determine the domination number, the clique number and the independence number of. We prove that if is a positive integer and, then the domination number of is. Among other results, we show that if, where is a positive integer... 

    Learning low-dimensional subspaces via sequential subspace fitting

    , Article 2013 21st Iranian Conference on Electrical Engineering, ICEE 2013 ; 2013 , 14 May-16 May 2 ; 9781467356343 (ISBN) Sadeghi, M ; Joneidi, M ; Golestani, H. B ; Sharif University of Technology
    2013
    Abstract
    In this paper we address the problem of learning low-dimensional subspaces using a given set of training data. To this aim, we propose an algorithm that performs by sequentially fitting a number of low-dimensional subspaces to the training data. Once we found a subset of the training data that is sufficiently near a fitted subspace, we omit these signals from the set of training signals and repeat the same procedure for the remaining signals until all training signals are assigned to a subspace. We then propose a robust version of the algorithm to address the situation in which the training signals are contaminated by additive white Gaussian noise (AWGN). Experimental results on both... 

    Two-dimensional heteroscedastic feature extraction technique for face recognition

    , Article Computing and Informatics ; Volume 30, Issue 5 , 2011 , Pages 965-986 ; 13359150 (ISSN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2011
    Abstract
    One limitation of vector-based LDA and its matrix-based extension is that they cannot deal with heteroscedastic data. In this paper, we present a novel two-dimensional feature extraction technique for face recognition which is capable of handling the heteroscedastic data in the dataset. The technique is a general form of two-dimensional linear discriminant analysis. It generalizes the interclass scatter matrix of two-dimensional LDA by applying the Chernoff distance as a measure of separation of every pair of clusters with the same index in different classes. By employing the new distance, our method can capture the discriminatory information presented in the difference of covariance... 

    Joint predictive model and representation learning for visual domain adaptation

    , Article Engineering Applications of Artificial Intelligence ; Volume 58 , 2017 , Pages 157-170 ; 09521976 (ISSN) Gheisari, M ; Soleymani Baghshah, M ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    Traditional learning algorithms cannot perform well in scenarios where training data (source domain data) that are used to learn the model have a different distribution with test data (target domain data). The domain adaptation that intends to compensate this problem is an important capability for an intelligent agent. This paper presents a domain adaptation method which learns to adapt the data distribution of the source domain to that of the target domain where no labeled data of the target domain is available (and just unlabeled data are available for the target domain). Our method jointly learns a low dimensional representation space and an adaptive classifier. In fact, we try to find a... 

    Heteroscedastic multilinear discriminant analysis for face recognition

    , Article Proceedings - International Conference on Pattern Recognition, 23 August 2010 through 26 August 2010, Istanbul ; 2010 , Pages 4287-4290 ; 10514651 (ISSN) ; 9780769541099 (ISBN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2010
    Abstract
    There is a growing attention in subspace learning using tensor-based approaches in high dimensional spaces. In this paper we first indicate that these methods suffer from the Heteroscedastic problem and then propose a new approach called Heteroscedastic Multilinear Discriminant Analysis (HMDA). Our method can solve this problem by utilizing the pairwise chernoff distance between every pair of clusters with the same index in different classes. We also show that our method is a general form of Multilinear Discriminant Analysis (MDA) approach. Experimental results on CMU-PIE, AR and AT&T face databases demonstrate that the proposed method always perform better than MDA in term of classification... 

    Preventing the transmission of harmful cognitive radio users in the presence of primary users

    , Article Proceedings - 2009 1st UK-India International Workshop on Cognitive Wireless Systems, UKIWCWS 2009, 11 December 2009 through 12 December 2009, New Delhi ; 2009 ; 9781457701832 (ISBN) Fathollahi, M ; Soleimanipour, M ; Sharif University of Technology
    Abstract
    A cognitive radio provides access to a licensed spectrum for unlicensed users opportunistically provided that they are not harmful for licensed users (primary users). We call a cognitive radio user (CR user) harmful, when it generates interference for primary users (PU) or occupies spectrum holes excessively. This paper discusses the spectrum management policy against harmful CR users. For this, we design a jammer signal which ruins transmission of harmful CR users and forces them to leave the spectrum without damaging the communication of PUs. This signal is designed using group subspace technique for both synchronous and asynchronous channels. Our simulation results show that the designed... 

    Tensor-based face representation and recognition using multi-linear subspace analysis

    , Article 2009 14th International CSI Computer Conference, CSICC 2009, 20 October 2009 through 21 October 2009, Tehran ; 2009 , Pages 658-663 ; 9781424442621 (ISBN) Mohseni, H ; Kasaei, S ; Sharif University of Technology
    Abstract
    Discriminative subspace analysis is a popular approach for a variety of applications. There is a growing interest in subspace learning techniques for face recognition. Principal component analysis (PCA) and eigenfaces are two important subspace analysis methods have been widely applied in a variety of areas. However, the excessive dimension of data space often causes the curse of dimensionality dilemma, expensive computational cost, and sometimes the singularity problem. In this paper, a new supervised discriminative subspace analysis is presented by encoding face image as a high order general tensor. As face space can be considered as a nonlinear submanifold embedded in the tensor space, a... 

    Simultaneousely Triangularization of Families of Compact Operators on the Banach Spaces

    , M.Sc. Thesis Sharif University of Technology Behmani, Reza (Author) ; Fanai, Hamid Reza (Supervisor)
    Abstract
    Simultaneous triangulation of matrices is a subject with a rich literature. There are many well known theorems available, such as McCoy theorem or Burnsides. In the nite dimensional case since the all the topologies on vector spaces are the same, there is a little bit diculty and most of the arguments are from linear algebra. In this thesis we study the simultaneous triangulation of sub algebras of K(X),with X a innite dimensional Banach space. We will give a denition of simultaneous triangulation which is independent of the notion of Basis and totally relies on Invariant subspaces. This denition coincides with the denition of simultaneous triangulation in nite dimensional case. Then we will... 

    Feature Extraction in Subspace Domain for Face Recognition

    , Ph.D. Dissertation Sharif University of Technology Safayani, Mehran (Author) ; Manzuri Shalmani, Mohammad Taghi (Supervisor)
    Abstract
    Feature extraction in subspace domain for face recognition has attracted growing attention in recent years. Face image shown by a long vector usually belongs to a manifold of intrinsically low dimension. Researchers in face recognition field try to extract these manifolds using algebraic and statistical tools. Recently, the use of multilinear algebra and multidimensional data in various stages of feature extraction and recognition is considered. This approach reduces small sample size problem and computational cost by considering the spatial information in the image. Although these successes, the performance of the methods based of this idea in term of recognition rate in the applications... 

    Decoding the Long Term Memory using Magnetoencephalogram

    , M.Sc. Thesis Sharif University of Technology Tavakoli, Sahar (Author) ; Fatemizadeh, Emad (Supervisor)
    Abstract
    Memory and recalling process has always been a basic question. Decoding the Long-Term_Memory is one of the first steps in answering this question. Since various experiments in the field of human long-term memory, was conducted. This research is motivated by a trial that in which, the Mgntvansfalvgram (MEG) has been recorded while recalling the color and orientation of a grading which is associated with an object, after the object has been shown. High accuracy in Decoding the mentioned color and direction, will be decoding the long-term memory. In order to enhance memory decoding, the research studies different classifiers such as sparse based classifiers and other popular one. It has also... 

    Text Independent Speaker Verification Based on Phonetic Evolution

    , M.Sc. Thesis Sharif University of Technology Izadi, Mohammad Rasool (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Marvasti, Farrokh (Co-Advisor)
    Abstract
    In this thesis, by taking into account the phonetic information contained in the signal spectrum we have been looking for, compact Parameterization and less redundancy, in feature extraction phase. In order to access the consecutive dependency nformation contained in the frame, we’ve put on the agenda, using a linear regression model based on the phonetic structure and developments. Then, to describe the phonetic symbols, it has been considered to the tone modeling and ways of expression and modeling of speaker and background. In fact, we have expressed the speaker and the background as dependent functions to speech phonetics classes. According to phonetic subspaces and time
    speech... 

    Face Recognition in Subspace Domain Based on Kernel Methods

    , M.Sc. Thesis Sharif University of Technology Taghizadeh, Elham (Author) ; Manzuri Shalmani, Mohammad Taghi (Supervisor)
    Abstract
    Linear dimension reduction is one of the common methods in face recognition. But this method is not efficient in cases which borders of different classes are nonlinear. In these cases dimension reduction increases the error of recognition significantly. In the problem of face recognition, there are several factors which make the borders of classes nonlinear including variation in illumination, position and expression of the face. So nonlinear methods has been proposed for face recognition in the presence of nonlinear factors. One of theses nonlinear methods is "Kernel" trick. In the Kernel method data is transferred to the new space with a nonlinear mapping. This mapping should be chosen... 

    Secret Sharing Schemes for General Access Structures

    , M.Sc. Thesis Sharif University of Technology Sefidgaran, Milad (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Secret sharing scheme is a method for distributing the secret (secret information) among a set of participants in such a way that only the authorized sets can recover the secret and the unauthorized sets could not. In a perfect secret sharing scheme, unauthorized sets cannot get any additional (i.e. a posteriori) information about the possible value of the secret. In these schemes, to prevent information leakage and increase communication efficiency, the size of the share should be as close to the secret size as possible. In other words, finding the shares with reasonable size which results in an optimal information rate for a given access structure, improves the efficiency of the scheme.... 

    Limiting spectral distribution of the sample covariance matrix of the windowed array data

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2013, Issue 1 , 2013 ; 16876172 (ISSN) Yazdian, E ; Gazor, S ; Bastani, M. H ; Sharif University of Technology
    2013
    Abstract
    In this article, we investigate the limiting spectral distribution of the sample covariance matrix (SCM) of weighted/windowed complex data. We use recent advances in random matrix theory and describe the distribution of eigenvalues of the doubly correlated Wishart matrices. We obtain an approximation for the spectral distribution of the SCM obtained from windowed data. We also determine a condition on the coefficients of the window, under which the fragmentation of the support of noise eigenvalues can be avoided, in the noise-only data case. For the commonly used exponential window, we derive an explicit expression for the l.s.d of the noise-only data. In addition, we present a method to... 

    Entanglement dynamics for qubits dissipating into a common environment

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 87, Issue 3 , 2013 ; 10502947 (ISSN) Memarzadeh, L ; Mancini, S ; Sharif University of Technology
    2013
    Abstract
    We provide an analytical investigation of the entanglement dynamics for a system composed of an arbitrary number of qubits dissipating into a common environment. Specifically, we consider product initial states with a given number of excitations whose evolution remains confined on low-dimensional subspaces of the operators space. We then find for which pairs of qubits entanglement can be generated and can persist at a steady state. Finally, we determine the stationary distribution of entanglement as well as its scaling versus the total number of qubits in the system  

    An L1 criterion for dictionary learning by subspace identification

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 14 March 2010 through 19 March 2010 ; March , 2010 , Pages 5482-5485 ; 15206149 (ISSN) ; 9781424442966 (ISBN) Jaillet, F ; Gribonval, R ; Plumbley, M.D ; Zayyani, H ; Sharif University of Technology
    2010
    Abstract
    We propose an ℓ1 criterion for dictionary learning for sparse signal representation. Instead of directly searching for the dictionary vectors, our dictionary learning approach identifies vectors that are orthogonal to the subspaces in which the training data concentrate. We study conditions on the coefficients of training data that guarantee that ideal normal vectors deduced from the dictionary are local optima of the criterion. We illustrate the behavior of the criterion on a 2D example, showing that the local minima correspond to ideal normal vectors when the number of training data is sufficient. We conclude by describing an algorithm that can be used to optimize the criterion in higher... 

    Union of low-rank subspaces detector

    , Article IET Signal Processing ; Volume 10, Issue 1 , 2016 , Pages 55-62 ; 17519675 (ISSN) Joneidi, M ; Ahmadi, P ; Sadeghi, M ; Rahnavard, N ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The problem of signal detection using a flexible and general model is considered. Owing to applicability and flexibility of sparse signal representation and approximation, it has attracted a lot of attention in many signal processing areas. In this study, the authors propose a new detection method based on sparse decomposition in a union of subspaces model. Their proposed detector uses a dictionary that can be interpreted as a bank of matched subspaces. This improves the performance of signal detection, as it is a generalisation for detectors. Low-rank assumption for the desired signals implies that the representations of these signals in terms of some proper bases would be sparse. Their... 

    Recommendations on enhancing the efficiency of algebraic multigrid preconditioned GMRES in solving coupled fluid flow equations

    , Article Numerical Heat Transfer, Part B: Fundamentals ; Volume 55, Issue 3 , 2009 , Pages 232-256 ; 10407790 (ISSN) Vakili, S ; Darbandi, M ; Sharif University of Technology
    2009
    Abstract
    The algebraic multigrid (AMG) algorithm as a preconditioner to the Krylov subspace methods has drawn the attention of many researchers in solving fluid flow and heat transfer problems. However, the efficient employment of this solver needs experience, because users have to quantify several important parameters. In this work, we choose a hybrid finite-volume element method and quantify the optimum magnitudes for those parameters. To generalize our results, two sets of fluid flow governing equations, the thermobuoyant flow and confined diffusion flame, are studied and the optimum values are determined. The results indicate that the AMG can be very effective if a proper storage method is chosen...