lecture01_Intro_2in1

合集下载

中科大程序设计与计算机系统lec01-intro_20141116173438874

中科大程序设计与计算机系统lec01-intro_20141116173438874

°Observation
• Need to understand which abstractions apply in which contexts • Important issues for compiler writers and serious application programmers
Computer Systems: A Programmer’s Perspective 程序设计与计算机系统 Lecture 1 Intro November 17, 2014
Wu junmin (jmwu@)
CSAPP L1 Intro.1
Wu Fall 14 ©USTC
Outline
CSAPP L1 Intro.10
Wu Fall 14 ©USTC
Code to Read Counter
• Write small amount of assembly code using GCC’s asm facility
• Inserts assembly code into machine code generated by compiler
°Course Theme
°Five great realities of computer systems °Administrative Matters °Lecture topics and assignments
CSAPP L1 Intro.2
Wu Fall 14 ©USTC
Course Theme °Abstraction is good, but don’t forget reality!
°But :Understanding assembly is key to machinelevel execution model

新时代研究生学术英语教程1第一单元

新时代研究生学术英语教程1第一单元

新时代研究生学术英语教程1第一单元Here is an essay with over 1,000 words on the topic "New Era Graduate Academic English Course 1 Unit 1":In the new era of globalization and technological advancements, the acquisition of academic English proficiency has become increasingly crucial for graduate students. As they embark on their research journeys, the ability to effectively communicate their ideas, findings, and insights to an international audience has become a critical skill. The "New Era Graduate Academic English Course 1 Unit 1" aims to equip students with the necessary tools and strategies to thrive in this dynamic academic landscape.The first unit of this course focuses on the fundamental aspects of academic writing, a cornerstone of graduate-level research and scholarship. Students will be introduced to the core elements of academic discourse, including the organization and structure of research papers, the use of appropriate language and tone, and the importance of coherence and clarity in their written communication.One of the primary objectives of this unit is to help students develop a strong foundation in the conventions of academic writing. Thisincludes understanding the purpose and structure of different sections within a research paper, such as the introduction, literature review, methodology, results, and discussion. By mastering these components, students will be better equipped to effectively convey their research objectives, contextualize their work within the existing body of knowledge, and present their findings in a logical and compelling manner.Furthermore, this unit emphasizes the significance of academic voice and tone. Graduate students are expected to adopt a formal, objective, and impersonal style in their writing, demonstrating their depth of understanding and critical thinking abilities. Through targeted exercises and feedback, students will learn to avoid common pitfalls, such as the overuse of personal pronouns, colloquial language, and emotional appeals, and instead cultivate a more academic and authoritative writing style.In addition to the structural and stylistic aspects of academic writing, this unit also addresses the fundamental principles of effective paragraph and sentence construction. Students will explore techniques for developing coherent and well-structured paragraphs, including the use of topic sentences, supporting evidence, and logical transitions. They will also delve into the nuances of sentence structure, exploring ways to vary sentence length, complexity, and rhythm to enhance the overall flow and readability of their work.One of the key focuses of this unit is the development of critical thinking and analysis skills. Graduate students are expected to engage in in-depth research, synthesize complex information, and formulate original arguments. This unit will guide students in honing these essential skills, teaching them how to critically evaluate sources, identify key themes and patterns, and construct persuasive and well-reasoned arguments.Furthermore, this unit emphasizes the importance of academic integrity and proper citation practices. Students will learn how to effectively incorporate and cite sources, ensuring that they avoid plagiarism and maintain the highest standards of scholarly ethics. They will be introduced to various citation styles, such as APA and MLA, and will practice implementing these guidelines throughout their academic writing.Another crucial aspect of this unit is the development of research skills. Graduate students are expected to be proficient in searching for, evaluating, and integrating relevant literature into their work. This unit will equip students with strategies for effectively navigating academic databases, identifying authoritative sources, and synthesizing the existing body of knowledge to support their research objectives.In addition to the core components of academic writing, this unit also addresses the importance of audience awareness and professional communication. Students will learn how to tailor their writing style and tone to specific academic or professional contexts, ensuring that their work is accessible and impactful to their intended readers. This includes strategies for effectively communicating complex ideas to both specialist and non-specialist audiences.Throughout this unit, students will have ample opportunities to apply the concepts and skills they have learned through a series of practical exercises and writing assignments. These activities will not only reinforce their understanding of academic writing but also provide valuable feedback and guidance from experienced instructors.By the end of this unit, students will have developed a comprehensive set of academic writing skills that will serve them well throughout their graduate studies and beyond. They will be equipped with the confidence and competence to effectively communicate their research, engage in scholarly discourse, and contribute to the advancement of knowledge in their respective fields.In conclusion, the "New Era Graduate Academic English Course 1 Unit 1" is a crucial stepping stone in the academic journey ofgraduate students. By mastering the fundamental principles of academic writing, critical thinking, and research skills, students will be well-positioned to excel in their graduate programs and to make meaningful contributions to the global academic community.。

Lecture0.Introdnction

Lecture0.Introdnction

Camera:
• Light & photograph
Robot arm:
• Movement & motor speed
Introduction: Smart Phone with Camera, GPS etc. iPhone
From /tw/
Feng-LiLian Lian© ©2013 2011 Feng-Li NTUEE-SS0-Intro-13
Introduction: Modulation & Demodulation in Communication
Feng-LiLian Lian© ©2012 2011 Feng-Li NTUEE-SS0-Intro-8
Signal Frequency Characteristics:
f (Hz) 10 20K 100M 300M 40G 2.4G 300G
Introduction: Digital Signal Processing
Feng-LiLian Lian© ©2013 2011 Feng-Li NTUEE-SS0-Intro-10
Signals and Systems
Feng-LiLian Lian© ©2013 2011 Feng-Li NTUEE-SS0-Intro-11
LTI & Convolution
(Chap 2)
Course Flowchart
Signals & Systems
(Chap 1)
Feng-LiLian Lian© ©2013 2011 Feng-Li NTUEE-SS0-Intro-18
LTI & Convolution

Lecture_1_Introduction

Lecture_1_Introduction
– – – – What do the people believe in? What do they value most in life? What motivates them? Why do they behave the way they do?
Life in the United States
Life in the United States
The Size of the US
– Imagine that you drove from New York to Los Angeles, stopping only for gas, to eat, and sleep. It would take you four or five days – It takes two days to drive from New York to Florida
Population by Ethnicity
White 71% Black 13% Hispanic 10% Asian 4% Native American 2%
A Nation of Immigration
Immigration is the act of coming to a foreign country to live. The act of leaving one's country to settle in another is called emigration. Immigrants who flee their country because of persecution(迫害), war, or such disasters as famines or epidemics are known as refugees or displaced persons.

Lecture1

Lecture1

1.6
Important Distributions
1 2 2 p(x) = √ e−(x−µ) /(2σ ) . σ 2π
X ∼ N (µ, σ 2 ) if
If X ∈ Rd then X ∼ N (µ, Σ) if p ( x) = 1 (2π )d/2 |Σ| 1 exp − (x − µ)T Σ−1 (x − µ) . 2
1.1
Random Variables
A random variable is a map X from a set Ω (equipped with a probability P ) to R. We write P (X ∈ A) = P ({ω ∈ Ω : X (ω ) ∈ A}) and we write X ∼ P to mean that X has distribution P . The cumulative distribution function (cdf ) of X is FX (x) = F (x) = P (X ≤ x). If X is discrete, its probability mass function (pmf ) is pX (x) = p(x) = P (X = x). If X is continuous, then its probability density function function (pdf ) satisfies P (X ∈ A ) =
The Law of Total Expectation or Law of Iterated Expectation: E(Y ) = E E(Y |X ) = The Law of Total Variance is Var(Y ) = Var E(Y |X ) + E Var(Y |X ) . The moment generating function (mgf ) is MX (t) = E etX . If MX (t) = MY (t) for all t in an interval around 0 then X = Y .

学术英语课后答案 unit1

学术英语课后答案  unit1

学术英语理工教师手册Unit 1 Choosing a TopicI Teaching ObjectivesIn this unit , you will learn how to:1.choose a particular topic for your research2.formulate a research question3.write a working title for your research essay4.enhance your language skills related with reading and listening materials presented in this unit II. Teaching Procedures1.Deciding on a topicTask 1Answers may vary.Task 21 No, because they all seem like a subject rather than a topic, a subject which cannot be addressed even by a whole book, let alone by a1500-wordessay.2Each of them can be broken down into various and more specific aspects. For example, cancer can be classified into breast cancer, lung cancer, liver cancer and so on. Breast cancer can have such specific topics for research as causes for breast cancer, effects of breast cancer and prevention or diagnosis of breast cancer.3 Actually the topics of each field are endless. Take breast cancer for example, we can have the topics like:Why Women Suffer from Breast Cancer More Than Men?A New Way to Find Breast TumorsSome Risks of Getting Breast Cancer in Daily LifeBreast Cancer and Its Direct Biological ImpactBreast Cancer—the Symptoms & DiagnosisBreastfeeding and Breast CancerTask 31 Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text2 describes the various electronic threats a computer may face.2 Both focus on the vulnerability of a computer.3 Text 1 analyzes the ways of computer hackers, while Text 2 describes security problems of a computer.4 Text 1: The way hackers “get inside” a computerText 2: Electronic threats a computer facesYes, I think they are interesting, important, manageable and adequate.Task 41Lecture1:Ten Commandments of Computer EthicsLecture 2:How to Deal with Computer HackersLecture 3:How I Begin to Develop Computer Applications2Answersmay vary.Task 5Answers may vary.2 Formulating a research questionTask 1Text 3Research question 1: How many types of cloud services are there and what are they? Research question 2: What is green computing?Research question 3: What are advantages of the cloud computing?Text 4Research question 1: What is the Web 3.0?Research question 2: What are advantages and disadvantages of the cloud computing? Research question 3: What security benefits can the cloud computing provide?Task 22 Topic2: Threats of Artificial IntelligenceResearch questions:1) What are the threats of artificial intelligence?2) How can human beings control those threats?3) What are the difficulties to control those threats?3 Topic3: The Potentials of NanotechnologyResearch questions:1) What are its potentials in medicine?2) What are its potentials in space exploration?3) What are its potentials in communications?4 Topic4: Global Warming and Its EffectsResearch questions:1) How does it affect the pattern of climates?2) How does it affect economic activities?3) How does it affect human behavior?Task 3Answers may vary.3 Writing a working titleTask 1Answers may vary.Task 21 Lecture 4 is about the security problems of cloud computing, while Lecture 5 is about the definition and nature of cloud computing, hence it is more elementary than Lecture 4.2 The four all focus on cloud computing. Although Lecture 4 and Text 4 address the same topic, the former is less optimistic while the latter has more confidence in the security of cloud computing. Text3 illustrates the various advantages of cloud computing.3 Lecture 4: Cloud Computing SecurityLecture 5: What Is Cloud Computing?Task 3Answers may vary.4 Enhancing your academic languageReading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical15range 16exploit 17networking 18involve19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从……到)arise from some misunderstandings(来自于对……误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。

Lec01intro教学提纲

Lec01intro教学提纲
Lec01intro
Switched Networks
A network can be defined recursively as...
– two or more nodes connected by a link, or
two or more networks connected by a node

Application programs
Reques t/reply Mes sage s tream
channel
channel
Hos t-to-host connectivity
Hardware
10
Protocols
Building blocks of a network architecture Each protocol object has two different interfaces
link Buffer packets that are contending for the link Buffer (queue) overflow is called congestion
■■■
6
Inter-Process Communication
Turn host-to-host connectivity into process-to-process communication.
Request/Reply
– distributed file systems
– digital libraries (web)
Stream-Based video: sequence of frames
1/4 NTSC = 352x240 pixels (352 x 240 x 24)/8=247.5KB 30 fps = 7500KBps = 60Mbps

深度学习讲义-intro

深度学习讲义-intro
Chapter 1 1 Deep Learning for AI
Artificial in intelligence telligence (AI) requires computers to ha hav ve kno knowledge wledge of the world around us, kno knowledge wledge they can use to answ answer er questions and mak make e decisions. Knowledge can be Artificial intelligence (AI) requires computers to ha ve kno wledge of the world around either hard-wired or learned from data and usually both sources of information are used. us, kno wledge they can use to answ er and mak e decisions. can be Mac Machine hine learning algorithms endo endow wquestions computers with the ability to Knowledge acquire knowledge eitherexamples. hard-wired orthe learned from and usually of information are used. from In age of big data data, there is a both greatsources potential in the abilit ability y to tap Macimme

intro1数学课程简介

intro1数学课程简介

课程号:20100440 课程名:泛函分析课程英文名:Functional Analysis学时:68 学分:4先修课程:实变函数、高等代数基本面向:数学学院教材:《泛函分析》江泽坚、孙善利编高等教育出版社1998 一版参考书:1.《实变函数与泛函分析》(下册)夏道行等等教育出版社1984 一版2.《实变函数与泛函分析》(下册)曹广福、严从荃编人民教育出版社第2版3. W.Rudin,Functional Analysis,McGraw_HillBook Company,1973课程简介:线性赋范空间,Banach空间,Hilbert空间(包括有界,紧集,列紧集,完全有界集等)。

Banach 空间上有界线性算子(包括算子范数,有界性,连续性,Hahn-Banach定理,闭图象定理,逆算子定理,谱理论,紧算子Riesz-Schauder理论等)Hilbert 空间上的有界线性算子(射影定理、Riesz表示定理)。

课程号:20100640 课程名:概率统计课程英文名Probability and Statistics学时:68 学分:4先修课程:数学分析、线性代数基本面向:数学学院各专业教材:《概率论基础》(第二版)李贤平高等教育出版社1997参考书:1.《概率论》(第一册概率论基础)复旦大学高等教育出版社,1979。

2.《概率论引论》汪仁官北京大学出版社19943.《概率论及数理统计》(第二版)(上)梁之舜等高等教育出版社1988课程简介:事件与概率,条件概率与统计独立性,随机变量与分布函数,数字特征与特征函数,极限定理。

课程号:20100850 课程名:高等代数-1课程英文名:Advanced Algebra-1学时:102 学分:5先修课程:高中数学基本面向:数学数院各专业教材:《Advanced Algebra》彭国华、李德琅高等教育出版社-Springer(计划2004年出版参考书:1。

《高等代数》北京大学数学系几何代数教研空编高等教育出版社2.《高等代数》张禾瑞、郝锅新高等教育出版社3.《Linear Slgebra》B。

Lecture 1

Lecture 1

1-7
1.0.2 Course Overview (Syllabus)

Syllabus_2008F.doc
Elementary Linear Algebra Larsen & Falvo (6th Edition)
1-8
TKUEE翁慶昌-NTUEE SCC_09_2008
1.1 Introduction to Systems of Linear Equations
b1 b2 b3 bm

A system of linear equations has at least one solution.

Inconsistent:
A system of linear equations has no solution.
1 - 13

Notes: Every system of linear equations has either (1) exactly one solution, (2) infinitely many solutions, or
Elementary Linear Algebra Larsen & Falvo (6th Edition)
TKUEE翁慶昌-NTUEE SCC_09_2008
Purchasing Mix Problem


Mr. Wang has NT$1,000,000 and he wants to spend all the money to buy 100 animals Price tags:
(1) (2) (3)
x1 3x2 x3 1 5 x 2 4 x3 0 5 x 2 4 x3 2

大学英语一课程讲义第二单元Unit2

大学英语一课程讲义第二单元Unit2

Part I Get StartedSection A : Study the Following Quotes⊙Whoever is not acquainted with foreign languages knows nothing of his own.— Goethe⊙Language is not an abstract (抽象的) construction of the learned (有学问的人), or of dictionary-makers, but is something arising out of the work, needs, ties, joys, affections, tastes of long generations of humanity, and has its bases broad and low, close to the ground.— Walt Whitman⊙I haven’t conquered Spanish yet. I’m learning and understand what’s said during training. I’m progressing little by little. Spanish is very difficult for me, although I am getting used to it. I am making an effort. It’s complicated. But if I can conquer Spanish, it will have been a great achievement.— David BeckhamSection B段落与标题匹配题。

1) Para 1: _________ 2) Para 2: _________ 3) Para 3: _________4) Para 4: _________ 5) Para 5: _________ 6) Para 6: _________A) Two False Traditional Attitudes toward Foreign Language Learning.B) The Role of Having Other People to Talk to and Listen to in Learning a Language.C) The False Impression Advertisements Often GiveD) The Role of Interest in Learning a Language.E) Teaching Methods Based on the Behaviorist TheoryF) No Good Method for Suiting All Students in Every Situation.Part II :Key Words and Expressions in Text APara.1 personal a.[无比较级]个人的;私人的. 指属于或关于某人或某些特定的人,以区别于其他人。

Lecture01-Intro

Lecture01-Intro
第1章 移动计算简介
§ 1.1 基本概念 § 1.2 相关概念分析 § 1.3 移动应用
The Era of “Mobile Computing”
Mobile Computing
Mobile/Wireless Network
2
Mobile Computing Architecture
3
Mobile Computing Is
4
Mobile Computing
Mobile computing refers to computing in a distributed system in which some processes or processors can move.
Moving processes logical mobility, realized by agents. Moving processors physical mobility, realized by moving devices.
Pervasive computing extends again mobile computing, making use of small equipment and sensors.
The number of devices and volume of data can increase several orders of magnitude new issues like data streaming need to be handled.
Recap on Distributed Systems
A distributed system is a system supporting distributed computing. There is no universal definition. It is generally a collection of autonomous computers, connected together by some communication media, usually a network. They are capable of sharing resources and capable of providing service for one another. The processors cooperate to achieve an overall goal. Users may view the resulting environment as a single computing facility.

lecture1-NN的简介

lecture1-NN的简介

lecture1-NN的简介这是DL的发明⼈Hinton在多伦多⼤学的2013年冬季教授de课程,并将视频分享到coursera⽹站上。

其中不但有视频,也有课件,但是Hinton主页上还有他上课的课后问题,Hinton告诉学⽣这些视频作为课前看看,课中在讨论和上课,其实这种⽅法很好。

可惜估计⼀辈⼦也看不到⼤⽜了,只能沾沾他的放到万⾥的光了,不过Hinton的课程的确每节课包含的信息太多了,还是较为难消化的,不如ng说的通俗易懂,看来传道授业上还是ng更胜⼀筹。

Hinton针对研究⽣的课程是很⼤的贴近DL的,但是没有视频,只有课件,可惜了。

⼀、我们为什么需要机器学习要回答这个问题⾸先要知道什么是机器学习。

Hinton认为对于很多问题来说,例如:在⼀个混乱的场景中通过不同的光照条件下如何⽤⼀种新颖的观点去正确的识别⼀个3D对象,计算⼀个信⽤卡的交易是否是诈骗等问题的程序是很难写的。

因为我们不知道我们的⼤脑是如何处理这些问题的,即使我们知道原理,这个程序也是相当,相当复杂的。

⽽且对于第⼆个问题,没有任何的规则既能够很简单⽽且很可靠。

我们需要计算⼤量的弱规则(weak rules),⽽且诈骗是个动态的⽬标,我们没法将程序进⾏固定,这个程序需要⼀直的学习保持changing。

个⼈观点:Hinton认为的机器学习其实就是在模拟⼈脑的情况下如何让程序简单,可靠。

不同于以前针对每个具体的任务我们去写⼀个单独的程序,我们通过收集⼤量的样本,然后在给定输⼊的情况下指定正确的输出,⼀个机器学习算法就是通过在这些样本的基础上通过⽣成⼀个程序来完成这个⼯作。

这个程序是通过学习算法⽣成的,看上去是不同于⼿写的程序,例如它有可能会包含着百万级别关于如何衡量证据的参数(其实就是权重)。

如果我们的⼯作是正确的,那么这个程序在新情况下⼯作的将和我们之前训练情况下的⼀样好。

如果数据集更换了,那么这个程序也能够很容易的改变并在新的数据集上进⾏训练。

学术英语视听说Lesson1

学术英语视听说Lesson1

3. A person’s race is partly determined by skin color and type of hair as well as other physical characteristics.
4. The majority of the U.S. population is of European origin .
3. Would you guess that the U.S. population has increased or decreased since the census in 2010? Why?
BEFORE LISTENING
NOTETAKING PREPARATION
n Number Notation During a lecture, you will sometimes need to write down many numbers. They may be expressed as whole numbers, percentages, fractions, or ratios. Here are some ways to write them as numerals when you are taking notes.
n Answer the following questions with a partner or your classmates.
1. Do the people you see in the picture here match your idea of the kinds of people who live in the United States? In what ways?
BEFORE LISTENING

Lecture 1演示课件-精选.ppt

Lecture 1演示课件-精选.ppt
精品
有什麼問題需要演算法?
• 給定 n 個矩陣 <A1,A2,…,An>,要求出他們 的乘積 A1A2…An。由於矩陣乘法具有結合律的特 性,所以有各種合法的相乘順序。例如當 n=4 時, 以下的順序都是合法的:(A1(A2(A3A4))), (A1((A2A3)A4)),((A1A2)(A3A4)),((A1(A2A3))A4),或 (((A1A2)A3)A4)。如果這些矩陣都是方形的,那麼 相乘的順序不會影響到計算答案的時間;反之, 則相乘的順序對於時間的影響就會非常大。要嘗 試所有的會花費非常長的時間,在之後會介紹一 個有效率的演算法來解決這個問題。
Lecture 1
The role of Algorithms in Computing
精品
1.1 Algorithms
Algorithm: 對一個 computational problem 而言,將 輸入轉換為輸出的一連串計算過程,稱為 Algorithm。
例如,給你一堆數字<31,41,59,26,41,58>, 一個排序的演算法可以把這些數字由小到大輸出 成<26,31,41,41,58,59>。
精品
Exercises
輸入:總共有好幾組測資。每一組測資都包含了由數字或英
文字母構成的兩個字串 s 與 t,中間用一個空白隔開。遇到
檔案結尾 EOF 代表結束。
輸出:對於每一組測資,輸出是否 s 為 t 的subsequence。
精品
以下是一個輸出入的實例:
Sample Input
Sample Output
sequence subsequence
Yes
person compression
No
VERDI vivaVittorioEmanueleReDiItalia Yes
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringEESM 532 Image and Video Signal ProcessingLecture 1:What is digital image processing? Examples and ApplicationsIntroductionWhat is Digital Image/Video Processing (DIP/DVP)? Why is it important?What knowledge do you need in order to take this course? What is going to be covered in this course? What textbooks are we going to use? Where to obtain additional information?Course assessment3The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringWhat is Digital Image/Video Processing?Definition of Image : a 2-D function f (x , y ) Definition of Video : a 3-D function f (x , y , t )Digital image/video:f , x , y , t ,are all finite , discrete quantitiesDigital image/video processing:involves the use of digital computerComputers in Image and Video ProcessingSpecialized digitization hardware, front-end noise averaging, etc.5 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringImportance of DIP/DVPVisual perception is the most important source of information for human being–See it once is more than hear it hundred times(wider bandwidth than any other senses)Spatial structure information in the perceptionNaturally, capturing such information on a computer will yield many important applicationsRelations to other fields:–Signal processing–Image analysis/image understanding/computer visionExamples of DIPSpace Images (One of earliest DIP applications)First picture of moon by USspacecraft (1964)7The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringMedical Imaging (X -Ray)X -RayHead CT ScanTechnique:•Fire electrons between a heated cathode and an anode in a vacuum tube. •X-rays released when electrons meet a nucleus.•Interesting fact: X-rays discovered in 1895 –Nobel Prize in Physics.Examples of DIPMedical Imaging (Nuclear –Gamma Ray)Bone Scan PETTechnique:•Inject patient with radioactive isotope •Measure gamma ray emissions9The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringMedical Imaging (Ultrasound)Technique:•Ultrasound system transmits high frequency sound pulses into body•Sound waves are reflected by tissues in the body, which are measured by a probe• A machine calculates distance from probe to reflected tissue using speed of sound in tissue and time of return •Results displayed on a screenRemote SensingSatellite image of Hurricane Katrina11 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringFingerprintidentification andrecognitionLaw EnforcementFace detection and recognition13 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringManufacturingAutomated productinspection andquality control Defects15 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringMining and Robotics (Machine Vision)Stereo ImagingSource: Fast and Robust Stereo Matching Algorithmsfor Mining Automation, J. Banks, M. Bennamoun, andP. Corke, Digital Signal Processing,pp. 139-148, 1999.Left CameraRight CameraWhy Process Images/Videos?Enhancement and restoration–Remove artifacts and scratches from old photos/videos–Improve contrast and correct blurry images/videosTransmission and storage–Images/video from overseas via internet, or from remove planet, transmission over mobile phone, etcInformation analysis and automatic recognition–Providing “human vision”to machinesSecurity and rights protection–Encryption and watermarking17The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringWhy Digital?Perfect reproduction without degradation (in theory)Convenient and powerful computer -aided processing–Can perform sophisticated processing through hardware or software (as we will see)Easy storage and transmission–Huge capacity of DVDs for storing movies, photos, etc –Advanced digital compression–Allows for digital multiplexing and error protection for transmission…Useful Knowledge in this CourseLinear Algebra: Vectors and matricesProbability: basic distributions, random variablesSignals and Systems: Transforms, linear systems,filtering, samplingDigital Signal ProcessingIf you are not familiar with above knowledge, many useful tools and tutorials at:/root_files_V3/tutorials.htm19The Hong Kong University of Science and Technology Department of Electronic and Computer EngineeringCoverage of This CourseImage and video formationImage enhancement and restorationColor perception and applications to image/video processing Image and video compression Motion estimationImage and video standardsExtra topics:–Image and video communications –Morphological operations –…Example of Image EnhancementOriginal imageImage after contrast enhancement21 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringExample of Image Restoration Original ImageImage afterrestorationFourier Transformof Original ImageFourier Transformafter restoration22 The Hong Kong University of Science and TechnologyDepartment of Electronic and Computer EngineeringExample of Image CompressionColor image of 600x800 pixels–Without compression:600*800*24 bits/pixel = 1.44 MB–After JPEG compression:Approx 89 KBCompression ratio: 16:1Video: 720x480 per frame,30 frames/sec, 24 bits/pixel–Raw video without compression:Approx 243 M bits/sec–DVD (after compression):Approx 5 M bits/sec–Compression ratio: 48:123The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering DIP System Example: Face Recognition Refer to Poster。

相关文档
最新文档