scholarly journals Learning priors for adversarial autoencoders

Author(s):  
Hui-Po Wang ◽  
Wen-Hsiao Peng ◽  
Wei-Jan Ko

Abstract Most deep latent factor models choose simple priors for simplicity, tractability, or not knowing what prior to use. Recent studies show that the choice of the prior may have a profound effect on the expressiveness of the model, especially when its generative network has limited capacity. In this paper, we propose to learn a proper prior from data for adversarial autoencoders (AAEs). We introduce the notion of code generators to transform manually selected simple priors into ones that can better characterize the data distribution. Experimental results show that the proposed model can generate better image quality and learn better disentangled representations than AAEs in both supervised and unsupervised settings. Lastly, we present its ability to do cross-domain translation in a text-to-image synthesis task.

2020 ◽  
Vol 2020 (14) ◽  
pp. 305-1-305-6
Author(s):  
Tianyu Li ◽  
Camilo G. Aguilar ◽  
Ronald F. Agyei ◽  
Imad A. Hanhan ◽  
Michael D. Sangid ◽  
...  

In this paper, we extend our previous 2D connected-tube marked point process (MPP) model to a 3D connected-tube MPP model for fiber detection. In the 3D case, a tube is represented by a cylinder model with two spherical areas at its ends. The spherical area is used to define connection priors that encourage connection of tubes that belong to the same fiber. Since each long fiber can be fitted by a series of connected short tubes, the proposed model is capable of detecting curved long tubes. We present experimental results on fiber-reinforced composite material images to show the performance of our method.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Wenxin Yu ◽  
Xuewen Zhang ◽  
Yunye Zhang ◽  
Zhiqiang Zhang ◽  
Jinjia Zhou

2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


2012 ◽  
Vol 6-7 ◽  
pp. 428-433
Author(s):  
Yan Wei Li ◽  
Mei Chen Wu ◽  
Tung Shou Chen ◽  
Wien Hong

We propose a reversible data hiding technique to improve Hong and Chen’s (2010) method. Hong and Chen divide the cover image into pixel group, and use reference pixels to predict other pixel values. Data are then embedded by modifying the prediction errors. However, when solving the overflow and underflow problems, they employ a location map to record the position of saturated pixels, and these pixels will not be used to carry data. In their method, if the image has a plenty of saturated pixels, the payload is decreased significantly because a lot of saturated pixels will not joint the embedment. We improve Hong and Chen’s method such that the saturated pixels can be used to carry data. The positions of these saturated pixels are then recorded in a location map, and the location map is embedded together with the secret data. The experimental results illustrate that the proposed method has better payload, will providing a comparable image quality.


2021 ◽  
pp. 1-14
Author(s):  
Thiago Henrique Barbosa de Carvalho Tavares ◽  
Bruno Pérez Ferreira ◽  
Eduardo Mazoni Andrade Marçal Mendes

In this work the relationship between the Selic rate and some bank parameters defined by the so-called Basel Accords is studied. The cross-correlation between the Selic rate and the parameters is used to explain how these parameters affect the Selic rate and vice-versa so as to define the predictability of the Selic rate using (some of) these parameters as inputs. A model is then proposed for predicting the Selic rate based on some specific parameters using fuzzy logic ideas, which dealt with a partitioning of the universe of discourse using clusters related to the output data distribution. The proposed model is compared to four other known models in the literature and showed to have better performance in average compared to all other models.


2011 ◽  
Vol 1 ◽  
pp. 375-380
Author(s):  
Shu Ai Wan ◽  
Kai Fang Yang ◽  
Hai Yong Zhou

In this paper the important issue of multimedia quality evaluation is concerned, given the unimodal quality of audio and video. Firstly, the quality integration model recommended in G.1070 is evaluated using experimental results. Theoretical analyses aide empirical observations suggest that the constant coefficients used in the G.1070 model should actually be piecewise adjusted for different levels of audio and visual quality. Then a piecewise function is proposed to perform multimedia quality integration under different levels of the audio and visual quality. Performance gain observed from experimental results substantiates the effectiveness of the proposed model.


2020 ◽  
Author(s):  
Lucas R. V. Messias ◽  
Cristiano R. Steffens ◽  
Paulo L. J. Drews-Jr ◽  
Silvia S. C. Botelho

Image enhancement is a critical process in imagebased systems. In these systems, image quality is a crucial factor to achieve a good performance. Scenes with a dynamic range above the capability of the camera or poor lighting are challenging conditions, which usually result in low contrast images, and, with that, we can have the underexposure and/or overexposure problem. In this work, our aim is to restore illexposed images. For this purpose, we present UCAN, a small and fast learning-based model capable to restore and enhance poorly exposed images. The obtained results are evaluated using image quality indicators which show that the proposed network is able to improve images damaged by real and simulated exposure. Qualitative and quantitative results show that the proposed model outperforms the existing models for this objective.


Author(s):  
Yinan Zhang ◽  
Yong Liu ◽  
Peng Han ◽  
Chunyan Miao ◽  
Lizhen Cui ◽  
...  

Cross-domain recommendation methods usually transfer knowledge across different domains implicitly, by sharing model parameters or learning parameter mappings in the latent space. Differing from previous studies, this paper focuses on learning explicit mapping between a user's behaviors (i.e. interaction itemsets) in different domains during the same temporal period. In this paper, we propose a novel deep cross-domain recommendation model, called Cycle Generation Networks (CGN). Specifically, CGN employs two generators to construct the dual-direction personalized itemset mapping between a user's behaviors in two different domains over time. The generators are learned by optimizing the distance between the generated itemset and the real interacted itemset, as well as the cycle-consistent loss defined based on the dual-direction generation procedure. We have performed extensive experiments on real datasets to demonstrate the effectiveness of the proposed model, comparing with existing single-domain and cross-domain recommendation methods.


Sign in / Sign up

Export Citation Format

Share Document