123. 範例 Database D Scan D C 1 L 1 L 2 C 2 C 2 Scan D C 3 L 3 Scan D
124.
125.
126. {} f:4 c:1 b:1 p:1 b:1 c:3 a:3 b:1 m:2 p:2 m:1 Header Table Item frequency head f 4 c 4 a 3 b 3 m 3 p 3
127.
128. Step 1: 對 FP-tree 內的每個 node, 建置 conditional pattern base Conditional pattern bases item cond. pattern base c f:3 a fc:3 b fca:1, f:1, c:1 m fca:2, fcab:1 p fcam:2, cb:1 {} f:4 c:1 b:1 p:1 b:1 c:3 a:3 b:1 m:2 p:2 m:1 Header Table Item frequency head f 4 c 4 a 3 b 3 m 3 p 3
129.
130. Mining Frequent Patterns by Creating Conditional Pattern-Bases Empty Empty f {(f:3)}|c {(f:3)} c {(f:3, c:3)}|a {(fc:3)} a Empty {(fca:1), (f:1), (c:1)} b {(f:3, c:3, a:3)}|m {(fca:2), (fcab:1)} m {(c:3)}|p {(fcam:2), (cb:1)} p Conditional FP-tree Conditional pattern-base Item
131. Step 3: Recursively mine the conditional FP-tree Cond. pattern base of “am”: (fc:3) Cond. pattern base of “cm”: (f:3) {} f:3 cm-conditional FP-tree Cond. pattern base of “cam”: (f:3) {} f:3 cam-conditional FP-tree {} f:3 c:3 a:3 m-conditional FP-tree {} f:3 c:3 am-conditional FP-tree
157. Paper study: topic 2 Indexing methods for approximate string matching IEEE data engineering bulletin,2000 Gonzalo Navarro, Ricardo Baeza-Yates, Erkki Sutinen, Jorma Tarhio
158.
159.
160.
161. Suffix trees 1 g a a c c g a c c t 2 a a c c g a c c t 3 a c c g a c c t 4 c c g a c c t 5 c g a c c t 6 g a c c t 7 a c c t 8 c c t 9 c t 10 t Weak point:large space requirement,about 9 times of text size.
162. Suffix array Require less space,about 4 times of text size a $ a a a a b b c d r a b b c d r r a a r r a a $ c a a c $ $ c
163. Q-grams,Q-samples TEXT 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 5 INDEX a b r a b r a c r a c a a c a d c a d a 1 8 2 3 4 5 Q-samples,unlike q-grams, do not overlap , and may even be some space between each pair of samples. a b r a c a d a b r a
164. Edit distance ed(“SURVEY”,”SURGERY”) Final result 2 2 2 3 3 4 5 6 Y 3 2 1 2 2 3 4 5 E 4 3 2 1 1 2 3 4 V 4 3 2 1 0 1 2 3 R 5 4 3 2 1 0 1 2 U 6 5 4 3 2 1 0 1 S 7 6 5 4 3 2 1 0 Y R E G R U S
165.
166. Neighborhood generation Pattern :abc with 1 error { * bc, a * c,ab * } U {ab,ac,bc} U{ * abc,a * bc,abc * } Text a b r a c a d a b r a {abr},{ac},{abr},.. results K-Neignborhood K-neighborhood(candidate) could be quite large, So,this approach works well for small m and k. searching
167.
168. Partitioning into exact search Pattern :abr with 1 error {a},{br} Text a b r a c a d a b r a {abra},{abra}.. results Partition pattern 1.For large error level the text areas to verify cover almost almost all the text. 2.If s grow,pieces get shorter, more match to check,but make the filter stricter. Exact search verification Text a b r a c a d a b r a into (K+s) pieces filtration
169.
170. Intermediate Partitioning Pattern :abr with 1 error {a},{br} Text a b r a c a d a b r a {abra},{abra}.. results Partition pattern Neighborhood generation allow floor of k/j verification Text a b r a c a d a b r a into j (j=2)pieces J=2 (j=K+1;partitioning into exact search) searching
171. Intermediate Partitioning Pattern :abr with 1 error {abr} Text a b r a c a d a b r a {abra},{abra}.. results Partition pattern 1.Which j value to use? the search time decreases when j move from 1 to k+1. but the verification cost grows, oppositiely. Neighborhood generation allow floor of k/j into j (j=1)pieces J=1 (neighborhood generation) searching {*abr,a*br,ab*r,abr*}U {ab,br,ar}U{ab*,*br,a*r}
174. Paper study: topic 3 Lazy Users and automatic Video Retrieval Tools in (the) Lowlands The Lowlands Team CWI 1 , TNO 2 , University of Amsterdam 3 , University of Twente 4 The Netherlands Jan Baan 2 , Alex van Ballegooij 1 , Jan Mark Geusenbroek 3 , Jurgen den Hartog 2 , Djoerd Hiemstra 4 , Johan List 1 , Thijs Westerveld 4 , Ioannis Patras 3 , Stephan Raaijmakers 2 , Cees Snoek 3 , Leon Todoran 3 , Jeroen Vendrig 3 , Arjen P. de Vries 1 and Marcel Worring 3 . Proceeding of the 10 th Text Retrieval Conference(TREC), 2001
175.
176.
177.
178.
179. Introduction Combined 1-4, interactive, by a lazy user 5 Query articulation, interactive 4 Transcript-base, automatic 3 Combined 1-3, automatic 2 Detector-base, automatic 1 Description Run
180.
181.
182. Detector-base processing (cont) Selected detector Analysis of the topic description Query by example Filter-out irrelevant material Final ranked results
183.
184.
185.
186.
187.
188.
189.
190. Topic 33: White fort Using Run 1: Any color-based technique worked out well for this query Example known-item keyframe
191.
192.
193.
194.
195.
196.
197. Paper study : topic 4 VIDEO INDEXING BY MOTION ACTIVITY MAPS Wei Zeng; Wen Gao; Debin Zhao; Image Processing. 2002. Proceedings. 2002 International Conference on , Volume: 1 , 2002 Page(s): 912 -915
198.
199.
200.
201.
202.
203.
204.
205.
206.
207.
208.
209.
210.
211.
212. Generation of MAM Demo video segmentation Hall shall Motion vector field Video Video Video Temporal video Segmentation MAM Computing MAM Quantization MAM spatial Segmentation MAM Region- Based MAMs
213.
214. Organization of MAMs Interactive Video Retrieval Video Video Video Temporal Segmentation MAM Computing Layered spatial segmentation MAM display MAM Database
217. Paper study : topic 5 SOM-Base R*-Tree for Similarity Retrieval Database Systems for Advanced Applications, 2001. Proceedings. Seventh International Conference on , 2001 Kun-seok. Oh, Yaokai Feng, Kunihiko Kaneko, Akifumi Makinouchi, Sang-hyun Bae
218.
219. Self-Organizing Maps (SOM) What is SOM 1.SOM provide mapping from high-demensional feature vectors onto a two-dismensional space 2.The mapping preserves the topology of the feature vector. 3.The map is called to topological feature map , and preserves the mutual relationships(similarity) in feature space of input data. 4.The vectors contained in each node of the topological feature map are usually called codebook vectors .