27 results on '"SALMAN, H."'
Search Results
2. Accuracy vs. Complexity: A Trade-off in Visual Question Answering Models
- Author
-
Farazi, Moshiur R., Khan, Salman H., and Barnes, Nick
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Computational Complexity - Abstract
Visual Question Answering (VQA) has emerged as a Visual Turing Test to validate the reasoning ability of AI agents. The pivot to existing VQA models is the joint embedding that is learned by combining the visual features from an image and the semantic features from a given question. Consequently, a large body of literature has focused on developing complex joint embedding strategies coupled with visual attention mechanisms to effectively capture the interplay between these two modalities. However, modelling the visual and semantic features in a high dimensional (joint embedding) space is computationally expensive, and more complex models often result in trivial improvements in the VQA accuracy. In this work, we systematically study the trade-off between the model complexity and the performance on the VQA task. VQA models have a diverse architecture comprising of pre-processing, feature extraction, multimodal fusion, attention and final classification stages. We specifically focus on the effect of "multi-modal fusion" in VQA models that is typically the most expensive step in a VQA pipeline. Our thorough experimental evaluation leads us to two proposals, one optimized for minimal complexity and the other one optimized for state-of-the-art VQA performance.
- Published
- 2020
3. Cascaded Structure Tensor Framework for Robust Identification of Heavily Occluded Baggage Items from Multi-Vendor X-ray Scans
- Author
-
Hassan, Taimur, Khan, Salman H., Akcay, Samet, Bennamoun, Mohammed, and Werghi, Naoufel
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
In the last two decades, luggage scanning has globally become one of the prime aviation security concerns. Manual screening of the baggage items is a cumbersome, subjective and inefficient process. Hence, many researchers have developed Xray imagery-based autonomous systems to address these shortcomings. However, to the best of our knowledge, there is no framework, up to now, that can recognize heavily occluded and cluttered baggage items from multi-vendor X-ray scans. This paper presents a cascaded structure tensor framework which can automatically extract and recognize suspicious items irrespective of their position and orientation in the multi-vendor X-ray scans. The proposed framework is unique, as it intelligently extracts each object by iteratively picking contour based transitional information from different orientations and uses only a single feedforward convolutional neural network for the recognition. The proposed framework has been rigorously tested on publicly available GDXray and SIXray datasets containing a total of 1,067,381 X-ray scans where it significantly outperformed the state-of-the-art solutions by achieving the mean average precision score of 0.9343 and 0.9595 for extracting and recognizing suspicious items from GDXray and SIXray scans, respectively. Furthermore, the proposed framework has achieved 15.78% better time
- Published
- 2019
4. Question-Agnostic Attention for Visual Question Answering
- Author
-
Farazi, Moshiur R, Khan, Salman H, and Barnes, Nick
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Visual Question Answering (VQA) models employ attention mechanisms to discover image locations that are most relevant for answering a specific question. For this purpose, several multimodal fusion strategies have been proposed, ranging from relatively simple operations (e.g., linear sum) to more complex ones (e.g., Block). The resulting multimodal representations define an intermediate feature space for capturing the interplay between visual and semantic features, that is helpful in selectively focusing on image content. In this paper, we propose a question-agnostic attention mechanism that is complementary to the existing question-dependent attention mechanisms. Our proposed model parses object instances to obtain an `object map' and applies this map on the visual features to generate Question-Agnostic Attention (QAA) features. In contrast to question-dependent attention approaches that are learned end-to-end, the proposed QAA does not involve question-specific training, and can be easily included in almost any existing VQA model as a generic light-weight pre-processing step, thereby adding minimal computation overhead for training. Further, when used in complement with the question-dependent attention, the QAA allows the model to focus on the regions containing objects that might have been overlooked by the learned attention representation. Through extensive evaluation on VQAv1, VQAv2 and TDIUC datasets, we show that incorporating complementary QAA allows state-of-the-art VQA models to perform better, and provides significant boost to simplistic VQA models, enabling them to performance on par with highly sophisticated fusion strategies., Comment: To appear in the proceedings of International Conference on Pattern Recognition (ICPR) 2020
- Published
- 2019
- Full Text
- View/download PDF
5. Energy Aware Wireless System based Software Defined Radio
- Author
-
Salman, H., Balatiah, R., Masri, A., and Dama, Y. A. S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Development of green telecommunication systems is already being considered highly attractive by standard bodies and recently is attracting research attention. While most of the research focuses on modeling and simulation, in this work we implement a lab setup to test an energy aware wireless system based on software defined radio and solar energy power system. In addition, we proposed an energy aware adaptive modulation algorithm that considers the state of charge of the solar energy batteries before setting up the modulation order. Moreover, the algorithm adapts to user preferences between the connectivity mode and the quality mode., Comment: 5 Pages, 6 Figures, 4 Tables, 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)
- Published
- 2019
- Full Text
- View/download PDF
6. Unsupervised Primitive Discovery for Improved 3D Generative Modeling
- Author
-
Khan, Salman H., Guo, Yulan, Hayat, Munawar, and Barnes, Nick
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
3D shape generation is a challenging problem due to the high-dimensional output space and complex part configurations of real-world objects. As a result, existing algorithms experience difficulties in accurate generative modeling of 3D shapes. Here, we propose a novel factorized generative model for 3D shape generation that sequentially transitions from coarse to fine scale shape generation. To this end, we introduce an unsupervised primitive discovery algorithm based on a higher-order conditional random field model. Using the primitive parts for shapes as attributes, a parameterized 3D representation is modeled in the first stage. This representation is further refined in the next stage by adding fine scale details to shape. Our results demonstrate improved representation ability of the generative model and better quality samples of newly generated 3D shapes. Further, our primitive generation approach can accurately parse common objects into a simplified representation., Comment: CVPR 2019
- Published
- 2019
7. Cross-Domain Transferability of Adversarial Perturbations
- Author
-
Naseer, Muzammal, Khan, Salman H., Khan, Harris, Khan, Fahad Shahbaz, and Porikli, Fatih
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Adversarial examples reveal the blind spots of deep neural networks (DNNs) and represent a major concern for security-critical applications. The transferability of adversarial examples makes real-world attacks possible in black-box settings, where the attacker is forbidden to access the internal parameters of the model. The underlying assumption in most adversary generation methods, whether learning an instance-specific or an instance-agnostic perturbation, is the direct or indirect reliance on the original domain-specific data distribution. In this work, for the first time, we demonstrate the existence of domain-invariant adversaries, thereby showing common adversarial space among different datasets and models. To this end, we propose a framework capable of launching highly transferable attacks that crafts adversarial patterns to mislead networks trained on wholly different domains. For instance, an adversarial function learned on Paintings, Cartoons or Medical images can successfully perturb ImageNet samples to fool the classifier, with success rates as high as $\sim$99\% ($\ell_{\infty} \le 10$). The core of our proposed adversarial function is a generative network that is trained using a relativistic supervisory signal that enables domain-invariant perturbations. Our approach sets the new state-of-the-art for fooling rates, both under the white-box and black-box scenarios. Furthermore, despite being an instance-agnostic perturbation function, our attack outperforms the conventionally much stronger instance-specific attack methods., Comment: Accepted at NeurIPS 2019 (Camera Ready). Source Code along with pretrained adversarial generators is available at https://github.com/Muzammal-Naseer/Cross-domain-perturbations
- Published
- 2019
8. Image Super-Resolution as a Defense Against Adversarial Attacks
- Author
-
Mustafa, Aamir, Khan, Salman H., Hayat, Munawar, Shen, Jianbing, and Shao, Ling
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Convolutional Neural Networks have achieved significant success across multiple computer vision tasks. However, they are vulnerable to carefully crafted, human-imperceptible adversarial noise patterns which constrain their deployment in critical security-sensitive systems. This paper proposes a computationally efficient image enhancement approach that provides a strong defense mechanism to effectively mitigate the effect of such adversarial perturbations. We show that deep image restoration networks learn mapping functions that can bring off-the-manifold adversarial samples onto the natural image manifold, thus restoring classification towards correct classes. A distinguishing feature of our approach is that, in addition to providing robustness against attacks, it simultaneously enhances image quality and retains models performance on clean images. Furthermore, the proposed method does not modify the classifier or requires a separate mechanism to detect adversarial images. The effectiveness of the scheme has been demonstrated through extensive experiments, where it has proven a strong defense in gray-box settings. The proposed scheme is simple and has the following advantages: (1) it does not require any model training or parameter optimization, (2) it complements other existing defense mechanisms, (3) it is agnostic to the attacked model and attack type and (4) it provides superior performance across all popular attack algorithms. Our codes are publicly available at https://github.com/aamir-mustafa/super-resolution-adversarial-defense., Comment: Published in IEEE Transactions in Image Processing
- Published
- 2019
- Full Text
- View/download PDF
9. From Known to the Unknown: Transferring Knowledge to Answer Questions about Novel Visual and Semantic Concepts
- Author
-
Farazi, Moshiur R, Khan, Salman H, and Barnes, Nick
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Current Visual Question Answering (VQA) systems can answer intelligent questions about `Known' visual content. However, their performance drops significantly when questions about visually and linguistically `Unknown' concepts are presented during inference (`Open-world' scenario). A practical VQA system should be able to deal with novel concepts in real world settings. To address this problem, we propose an exemplar-based approach that transfers learning (i.e., knowledge) from previously `Known' concepts to answer questions about the `Unknown'. We learn a highly discriminative joint embedding space, where visual and semantic features are fused to give a unified representation. Once novel concepts are presented to the model, it looks for the closest match from an exemplar set in the joint embedding space. This auxiliary information is used alongside the given Image-Question pair to refine visual attention in a hierarchical fashion. Since handling the high dimensional exemplars on large datasets can be a significant challenge, we introduce an efficient matching scheme that uses a compact feature description for search and retrieval. To evaluate our model, we propose a new split for VQA, separating Unknown visual and semantic concepts from the training set. Our approach shows significant improvements over state-of-the-art VQA models on the proposed Open-World VQA dataset and standard VQA datasets.
- Published
- 2018
10. Task-generalizable Adversarial Attack based on Perceptual Metric
- Author
-
Naseer, Muzammal, Khan, Salman H., Rahman, Shafin, and Porikli, Fatih
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep neural networks (DNNs) can be easily fooled by adding human imperceptible perturbations to the images. These perturbed images are known as `adversarial examples' and pose a serious threat to security and safety critical systems. A litmus test for the strength of adversarial examples is their transferability across different DNN models in a black box setting (i.e. when the target model's architecture and parameters are not known to attacker). Current attack algorithms that seek to enhance adversarial transferability work on the decision level i.e. generate perturbations that alter the network decisions. This leads to two key limitations: (a) An attack is dependent on the task-specific loss function (e.g. softmax cross-entropy for object recognition) and therefore does not generalize beyond its original task. (b) The adversarial examples are specific to the network architecture and demonstrate poor transferability to other network architectures. We propose a novel approach to create adversarial examples that can broadly fool different networks on multiple tasks. Our approach is based on the following intuition: "Perpetual metrics based on neural network features are highly generalizable and show excellent performance in measuring and stabilizing input distortions. Therefore an ideal attack that creates maximum distortions in the network feature space should realize highly transferable examples". We report extensive experiments to show how adversarial examples generalize across multiple networks for classification, object detection and segmentation tasks.
- Published
- 2018
11. Local Gradients Smoothing: Defense against localized adversarial attacks
- Author
-
Naseer, Muzammal, Khan, Salman H., and Porikli, Fatih
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep neural networks (DNNs) have shown vulnerability to adversarial attacks, i.e., carefully perturbed inputs designed to mislead the network at inference time. Recently introduced localized attacks, Localized and Visible Adversarial Noise (LaVAN) and Adversarial patch, pose a new challenge to deep learning security by adding adversarial noise only within a specific region without affecting the salient objects in an image. Driven by the observation that such attacks introduce concentrated high-frequency changes at a particular image location, we have developed an effective method to estimate noise location in gradient domain and transform those high activation regions caused by adversarial noise in image domain while having minimal effect on the salient object that is important for correct classification. Our proposed Local Gradients Smoothing (LGS) scheme achieves this by regularizing gradients in the estimated noisy region before feeding the image to DNN for inference. We have shown the effectiveness of our method in comparison to other defense methods including Digital Watermarking, JPEG compression, Total Variance Minimization (TVM) and Feature squeezing on ImageNet dataset. In addition, we systematically study the robustness of the proposed defense mechanism against Back Pass Differentiable Approximation (BPDA), a state of the art attack recently developed to break defenses that transform an input sample to minimize the adversarial effect. Compared to other defense mechanisms, LGS is by far the most resistant to BPDA in localized adversarial attack setting., Comment: Accepted At WACV-2019
- Published
- 2018
12. Reciprocal Attention Fusion for Visual Question Answering
- Author
-
Farazi, Moshiur R and Khan, Salman H
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language - Abstract
Existing attention mechanisms either attend to local image grid or object level features for Visual Question Answering (VQA). Motivated by the observation that questions can relate to both object instances and their parts, we propose a novel attention mechanism that jointly considers reciprocal relationships between the two levels of visual details. The bottom-up attention thus generated is further coalesced with the top-down information to only focus on the scene elements that are most relevant to a given question. Our design hierarchically fuses multi-modal information i.e., language, object- and gird-level features, through an efficient tensor decomposition scheme. The proposed model improves the state-of-the-art single model performances from 67.9% to 68.2% on VQAv1 and from 65.7% to 67.4% on VQAv2, demonstrating a significant boost., Comment: To appear in the British Machine Vision Conference (BMVC), September 2018
- Published
- 2018
13. Adversarial Training of Variational Auto-encoders for High Fidelity Image Generation
- Author
-
Khan, Salman H., Hayat, Munawar, and Barnes, Nick
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Variational auto-encoders (VAEs) provide an attractive solution to image generation problem. However, they tend to produce blurred and over-smoothed images due to their dependence on pixel-wise reconstruction loss. This paper introduces a new approach to alleviate this problem in the VAE based generative models. Our model simultaneously learns to match the data, reconstruction loss and the latent distributions of real and fake images to improve the quality of generated samples. To compute the loss distributions, we introduce an auto-encoder based discriminator model which allows an adversarial learning procedure. The discriminator in our model also provides perceptual guidance to the VAE by matching the learned similarity metric of the real and fake samples in the latent space. To stabilize the overall training process, our model uses an error feedback approach to maintain the equilibrium between competing networks in the model. Our experiments show that the generated samples from our proposed model exhibit a diverse set of attributes and facial expressions and scale up to high-resolution images very well.
- Published
- 2018
14. Indoor Scene Understanding in 2.5/3D for Autonomous Agents: A Survey
- Author
-
Naseer, Muzammal, Khan, Salman H, and Porikli, Fatih
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
With the availability of low-cost and compact 2.5/3D visual sensing devices, computer vision community is experiencing a growing interest in visual scene understanding of indoor environments. This survey paper provides a comprehensive background to this research topic. We begin with a historical perspective, followed by popular 3D data representations and a comparative analysis of available datasets. Before delving into the application specific details, this survey provides a succinct introduction to the core technologies that are the underlying methods extensively used in the literature. Afterwards, we review the developed techniques according to a taxonomy based on the scene understanding tasks. This covers holistic indoor scene understanding as well as subtasks such as scene classification, object detection, pose estimation, semantic segmentation, 3D reconstruction, saliency detection, physics-based reasoning and affordance prediction. Later on, we summarize the performance metrics used for evaluation in different tasks and a quantitative comparison among the recent state-of-the-art techniques. We conclude this review with the current challenges and an outlook towards the open research problems requiring further investigation., Comment: IEEE Access
- Published
- 2018
- Full Text
- View/download PDF
15. A Unified approach for Conventional Zero-shot, Generalized Zero-shot and Few-shot Learning
- Author
-
Rahman, Shafin, Khan, Salman H., and Porikli, Fatih
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Prevalent techniques in zero-shot learning do not generalize well to other related problem scenarios. Here, we present a unified approach for conventional zero-shot, generalized zero-shot and few-shot learning problems. Our approach is based on a novel Class Adapting Principal Directions (CAPD) concept that allows multiple embeddings of image features into a semantic space. Given an image, our method produces one principal direction for each seen class. Then, it learns how to combine these directions to obtain the principal direction for each unseen class such that the CAPD of the test image is aligned with the semantic embedding of the true class, and opposite to the other classes. This allows efficient and class-adaptive information transfer from seen to unseen classes. In addition, we propose an automatic process for selection of the most useful seen classes for each unseen class to achieve robustness in zero-shot learning. Our method can update the unseen CAPD taking the advantages of few unseen images to work in a few-shot learning scenario. Furthermore, our method can generalize the seen CAPDs by estimating seen-unseen diversity that significantly improves the performance of generalized zero-shot learning. Our extensive evaluations demonstrate that the proposed approach consistently achieves superior performance in zero-shot, generalized zero-shot and few/one-shot learning problems.
- Published
- 2017
- Full Text
- View/download PDF
16. Wind generated rogue waves in an annular wave flume
- Author
-
Toffoli, A., Proment, D., Salman, H., Monbaliu, J., Frascoli, F., Dafilis, M., Stramignoni, E., Forza, R., Manfrin, M., and Onorato, M.
- Subjects
Physics - Fluid Dynamics - Abstract
We investigate experimentally the statistical properties of a wind-generated wave field and the spontaneous formation of rogue waves in an annular flume. Unlike many experiments on rogue waves, where waves are mechanically generated, here the wave field is forced naturally by wind as it is in the ocean. What is unique about the present experiment is that the annular geometry of the tank makes waves propagating circularly in an {\it unlimited-fetch} condition. Within this peculiar framework, we discuss the temporal evolution of the statistical properties of the surface elevation. We show that rogue waves and heavy-tail statistics may develop naturally during the growth of the waves just before the wave height reaches a stationary condition. Our results shed new light on the formation of rogue waves in a natural environment.
- Published
- 2016
- Full Text
- View/download PDF
17. Learning deep structured network for weakly supervised change detection
- Author
-
Khan, Salman H, He, Xuming, Porikli, Fatih, Bennamoun, Mohammed, Sohel, Ferdous, and Togneri, Roberto
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Conventional change detection methods require a large number of images to learn background models or depend on tedious pixel-level labeling by humans. In this paper, we present a weakly supervised approach that needs only image-level labels to simultaneously detect and localize changes in a pair of images. To this end, we employ a deep neural network with DAG topology to learn patterns of change from image-level labeled training data. On top of the initial CNN activations, we define a CRF model to incorporate the local differences and context with the dense connections between individual pixels. We apply a constrained mean-field algorithm to estimate the pixel-level labels, and use the estimated labels to update the parameters of the CNN in an iterative EM framework. This enables imposing global constraints on the observed foreground probability mass function. Our evaluations on four benchmark datasets demonstrate superior detection and localization performance.
- Published
- 2016
18. Helicity within the vortex filament model
- Author
-
Hänninen, R., Hietala, N., and Salman, H.
- Subjects
Physics - Fluid Dynamics ,Condensed Matter - Quantum Gases - Abstract
Kinetic helicity is one of the invariants of the Euler equations that is associated with the topology of vortex lines within the fluid. In superfluids, the vorticity is concentrated along vortex filaments. In this setting, helicity would be expected to acquire its simplest form. However, the lack of a core structure for vortex filaments appears to result in a helicity that does not retain its key attribute as a quadratic invariant. By defining a spanwise vector to the vortex through the use of a Seifert framing, we are able to introduce twist and henceforth recover the key properties of helicity. We present several examples for calculating internal twist to illustrate why the centreline helicity alone will lead to ambiguous results if a twist contribution is not introduced. Our choice of the spanwise vector can be expressed in terms of the tangential component of velocity along the filament. Since the tangential velocity does not alter the configuration of the vortex at later times, we are able to recover a similar equation for the internal twist angle for classical vortex tubes. Our results allow us to explain how a quasi-classical limit of helicity emerges from helicity considerations for individual superfluid vortex filaments., Comment: 10 pages, 10 figures. Ver2: moderate changes
- Published
- 2016
19. Leapfrogging Kelvin waves
- Author
-
Hietala, N., Hänninen, R., Salman, H., and Barenghi, C. F.
- Subjects
Physics - Fluid Dynamics ,Condensed Matter - Other Condensed Matter - Abstract
Two vortex rings can form a localized configuration whereby they continually pass through one another in an alternating fashion. This phenomenon is called leapfrogging. Using parameters suitable for superfluid helium-4, we describe a recurrence phenomenon that is similar to leapfrogging, which occurs for two coaxial straight vortex filaments with the same Kelvin wave mode. For small-amplitude Kelvin waves we demonstrate that our full Biot-Savart simulations closely follow predictions obtained from a simpified model that provides an analytical approximation developed for nearly parallel vortices. Our results are also relevant to thin-cored helical vortices in classical fluids.
- Published
- 2016
- Full Text
- View/download PDF
20. Cost Sensitive Learning of Deep Feature Representations from Imbalanced Data
- Author
-
Khan, Salman H., Hayat, Munawar, Bennamoun, Mohammed, Sohel, Ferdous, and Togneri, Roberto
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Class imbalance is a common problem in the case of real-world object detection and classification tasks. Data of some classes is abundant making them an over-represented majority, and data of other classes is scarce, making them an under-represented minority. This imbalance makes it challenging for a classifier to appropriately learn the discriminating boundaries of the majority and minority classes. In this work, we propose a cost sensitive deep neural network which can automatically learn robust feature representations for both the majority and minority classes. During training, our learning procedure jointly optimizes the class dependent costs and the neural network parameters. The proposed approach is applicable to both binary and multi-class problems without any modification. Moreover, as opposed to data level approaches, we do not alter the original data distribution which results in a lower computational cost during the training process. We report the results of our experiments on six major image classification datasets and show that the proposed approach significantly outperforms the baseline algorithms. Comparisons with popular data sampling techniques and cost sensitive classifiers demonstrate the superior performance of our proposed method.
- Published
- 2015
21. A Spatial Layout and Scale Invariant Feature Representation for Indoor Scene Classification
- Author
-
Hayat, Munawar, Khan, Salman H., Bennamoun, Mohammed, and An, Senjian
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Unlike standard object classification, where the image to be classified contains one or multiple instances of the same object, indoor scene classification is quite different since the image consists of multiple distinct objects. Further, these objects can be of varying sizes and are present across numerous spatial locations in different layouts. For automatic indoor scene categorization, large scale spatial layout deformations and scale variations are therefore two major challenges and the design of rich feature descriptors which are robust to these challenges is still an open problem. This paper introduces a new learnable feature descriptor called "spatial layout and scale invariant convolutional activations" to deal with these challenges. For this purpose, a new Convolutional Neural Network architecture is designed which incorporates a novel 'Spatially Unstructured' layer to introduce robustness against spatial layout deformations. To achieve scale invariance, we present a pyramidal image representation. For feasible training of the proposed network for images of indoor scenes, the paper proposes a new methodology which efficiently adapts a trained network model (on a large scale data) for our task with only a limited amount of available training data. Compared with existing state of the art, the proposed approach achieves a relative performance improvement of 3.2%, 3.8%, 7.0%, 11.9% and 2.1% on MIT-67, Scene-15, Sports-8, Graz-02 and NYU datasets respectively.
- Published
- 2015
- Full Text
- View/download PDF
22. A Discriminative Representation of Convolutional Features for Indoor Scene Recognition
- Author
-
Khan, Salman H., Hayat, Munawar, Bennamoun, Mohammed, Togneri, Roberto, and Sohel, Ferdous
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Indoor scene recognition is a multi-faceted and challenging problem due to the diverse intra-class variations and the confusing inter-class similarities. This paper presents a novel approach which exploits rich mid-level convolutional features to categorize indoor scenes. Traditionally used convolutional features preserve the global spatial structure, which is a desirable property for general object recognition. However, we argue that this structuredness is not much helpful when we have large variations in scene layouts, e.g., in indoor scenes. We propose to transform the structured convolutional activations to another highly discriminative feature space. The representation in the transformed space not only incorporates the discriminative aspects of the target dataset, but it also encodes the features in terms of the general object categories that are present in indoor scenes. To this end, we introduce a new large-scale dataset of 1300 object categories which are commonly present in indoor scenes. Our proposed approach achieves a significant performance boost over previous state of the art approaches on five major scene classification datasets.
- Published
- 2015
- Full Text
- View/download PDF
23. An Acoustical and Physiological Investigation of the Arabic /E/.
- Author
-
Academy of the Socialist Republic of Rumania, Bucharest. and Al-Ani, Salman H.
- Abstract
Using acoustical evidence from spectrograms and physiological evidence from X-ray sound films, it appears that the most common allophone for the Arabic voiced pharyngeal fricative, at least in Iraqi, is a voiceless stop, and not a voiced fricative, as many believe. The author considers the phoneme in different environments and describes its behavior. Comments from other linguists are included along with photographs of the spectrogram findings. (VM)
- Published
- 1970
24. Arabic Phonology: An Acoustical and Physiological Investigation.
- Author
-
Al-Ani, Salman H.
- Abstract
This book presents an acoustical and physiological Investigation of contemporary standard Arabic as spoken in Iraq. Spectrograms and X-ray sound films are used to perform the analysis for the study. With this equipment, the author considers the vowels, consonants, pharyngealized consonants, pharyngeals and glottals, duration, gemination, and consonant clusters. He also studies syllables, stress, and intonation. All these phenomena are discussed in acoustic and physiological terms. Spectrographic displays, drawings depicting the physiology of a particular sound, diagrams, and charts are all used to illustrate the physical characteristics and relationships of the sounds. (VM)
- Published
- 1970
25. A Basic Course of Literary Arabic. Volume 1.
- Author
-
McGill Univ., Montreal (Quebec). Inst. of Islamic Studies., Al-Ani, Salman H., and Shammas, Jacob Y.
- Abstract
The material presented in this workbook, which is in preliminary form under revision, has been designed to introduce the basic aspects of the morphology and syntax of literary Arabic. It is intended to be used with and as a continuation of "The Phonology and Script of Literary Arabic," by the same authors. (See ED 012 912.) These two volumes, together with a forthcoming second volume on morphology and syntax, will provide a full basic course in elementary literary Arabic on the college and university levels. The present volume begins with the most basic grammatical features of the language--such as sentence structure and sentence analysis--and gradually introduces different features on the basis of continuity and grammatical build-up. Dialogs and oral exercises have been included to provide practice in spoken Arabic. (AMM)
- Published
- 1969
26. PHONOLOGY AND SCRIPT OF LITERARY ARABIC.
- Author
-
McGill Univ., Montreal (Quebec). Inst. of Islamic Studies., AL-ANI, SALMAN H., and SHAMMAS, JACOB Y.
- Abstract
THIS WORKBOOK IS DESIGNED TO INTRODUCE THE SOUND SYSTEM AND WRITING SYSTEM OF LITERARY ARABIC. THE MATERIAL IS LINGUISTICALLY ORIENTED, BASED ON A CONTRASTIVE ANALYSIS OF ENGLISH AND ARABIC. ACCOMPANYING TAPES FOR EACH UNIT PROVIDE THE STUDENT WITH PRACTICE IN LISTENING COMPREHENSION AND ORAL PRODUCTION. READING, WRITING, AND HOMEWORK EXERCISES REINFORCE AND SUPPLEMENT THE ORAL PRACTICE. UNIT 1 PRESENTS THE VOWELS, UNITS 2-13 PRESENT THE CONSONANTS. FINAL UNITS 14-16 COMPRISE A REVIEW OF THE PHONOLOGY AS WELL AS AN INTRODUCTION TO CERTAIN MORPHOLOGICAL FEATURES, INCLUDING THE DEFINITE ARTICLE, ASSIMILATION, AND CASE ENDINGS. A SUBSEQUENT VOLUME ON GRAMMAR (MORPHOLOGY AND SYNTAX) IS CURRENTLY UNDER PREPARATION BY THE AUTHORS. THIS 118-PAGE WORKBOOK IS PUBLISHED BY THE INSTITUTE OF ISLAMIC STUDIES, MCGILL UNIVERSITY, MONTREAL, CANADA. (AM)
- Published
- 1967
27. Assessment of heavy metals pollution in the upper Arkansas river of Colorado
- Author
-
Salman, H
- Published
- 1975
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.