<samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
<ul id="e4iaa"></ul>
<blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>

      代做COCMP5328、代寫Python設(shè)計(jì)程序

      時(shí)間:2024-05-07  來源:  作者: 我要糾錯(cuò)



      COCMP5328 - Advanced Machine Learning 
      Assignment 1 
      This assignment is to be completed in groups of 2 to 3 students. It is worth 25% of your 
      total mark. 
      1 Objective 
      The objective of this assignment is to implement Non-negative Matrix Factorization 
      (NMF) algorithms and analyze the robustness of NMF algorithms when the dataset is 
      contaminated by large magnitude noise or corruption. More specifically, you should 
      implement at least two NMF algorithms and compare their robustness. 
      2 Instructions 
      2.1 Dataset description 
      In this assignment, you need to apply NMF algorithms on two real-world face image 
      datasets: (1) ORL dataset
      1; (2) Extended YaleB dataset
      2

      • ORL dataset: it contains 400 images of 40 distinct subjects (i.e., 10 images per 
      subject). For some subjects, the images were taken at different times, varying the 
      lighting, facial expressions, and facial details (glasses / no glasses). All the images 
      were taken against a dark homogeneous background with the subjects in an 
      upright, frontal position. All images are cropped and resized to 92×112 pixels. 
      • Extended YaleB dataset: it contains 2414 images of 38 subjects under 9 poses 
      and 64 illumination conditions. All images are manually aligned, cropped, and 
      then resized to 168×192 pixels. 
       
           1    https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html    
      2    http://vision.ucsd.edu/    iskwak/ExtYaleDatabase/ExtYaleB.html    2    
      Figure 1: An example face image and its occluded versions by b × b-blocks with b = 
      10,12, and 14 pixels. 
      Note: we provide a tutorial for this assignment, which contains example code for 
      loading a dataset to numpy array. Please find more details in assignment1.ipynb. 
      2.2 Assignment tasks 
      1. You need to implement at least two Non-negative Matrix Factorization (NMF) 
      algorithms: 
      • You should implement at least two NMF algorithms with at least one not 
      taught in this course (e.g., L1-Norm Based NMF, Hypersurface Cost Based 
      NMF, L1-Norm Regularized Robust NMF, and L2,1-Norm Based NMF). 
      • For each algorithm, you need to describe the definition of cost function as 
      well as the optimization methods used in your implementation. 
      2. You need to analyze the robustness of each algorithm on two datasets: 
      • You are allowed to design your own data pre-processing method (if 
      necessary). 
      • You need to use a block-occlusion noise similar to those shown in Figure 1. 
      The noise is generated by setting the pixel values to be 255 in the block. You 
      should design your own value for b (not necessary to be 10,12 or 14). You 
      are also encouraged to design your own noise other than the block-occlusion 
      noise. 
      • You need to demonstrate each type of noise used in your experiment (show 
      the original image as well as the image contaminated by noise). 
      • You should carefully choose the NMF algorithms and design experiment 
      settings to clearly show the different robustness of the algorithms you have 
      implemented. 
      3. You are only allowed to use the python standard library, numpy and scipy (if 
      necessary) to implement NMF algorithms. 3    
      2.3 Programming and External Libraries Python
      This assignment is required to be finished by 3. When you implement NMF 
      algorithms, you are not allowed to use external libraries which contains NMF 
      implementations, such as scikit-learn, and Nimfa (i.e., you have to implement the NMF 
      algorithms by yourself). You are allowed to use scikit-learn for evaluation only (please 
      find more details in assignment1.ipynb). If you have any ambiguity whether you can 
      use a particular library or a function, please post on canvas under the Assignment 1 
      thread. 
      2.4 Evaluate metrics 
      To compare the performance and robustness of different NMF algorithms, we provide 
      three evaluation metrics: (1) Root Means Square Errors; (2) Average Accuracy; (3) 
      Normalized Mutual Information. For all experiments, you need to use at least two 
      metrics, i.e., Root Means Square Errors and Average Accuracy. 
      • Root Means Square Errors (RMSE): let X denote the contaminated dataset (by 
      adding noise), and      ̂ denote the clean dataset. Let   and   denote the 
      factorization results on      ̂ , the Root Means Square Errors then can be defined 
      as follows: 
      (1) 
      • Average Accuracy: You need to perform some clustering algorithms (i.e., Kmeans)
      with num clusters equal to num classes. Each example is assigned with 
      the cluster label (please find more details in assignment1.ipynb). Lastly, you can 
      evaluate the accuracy of predictions Ypred as follows: 
       (3) 
      where I(·,·) is mutual information and H(·) is entropy. 
      Note: we expect you to have a rigorous performance evaluation. To provide an estimate 
      of the performance of the algorithms in the report, you can repeat multiple times (e.g., 
      5 times) for each experiment by randomly sampling 90% data from the whole dataset 
      and average the metrics on different subset. You are also required to report the standard 
      deviations. 4    
      3 Report 
      The report should be organized like research papers, and should contain the following 
      sections: 
      • In abstract, you should briefly introduce the topic of this assignment and describe 
      the organization of your report. 
      • In introduction, you should first introduce the main idea of NMF as well as its 
      applications. You should then give an overview of the methods you want to use. 
      • In related work, you are expected to review the main idea of related NMF 
      algorithms (including their advantages and disadvantages). 
      • In methods, you should describe the details of your method (including the 
      definition of cost functions as well as optimization steps). You should also 
      describe your choices of noise and you are encouraged to explain the robustness 
      of each algorithm from theoretical view. 
      • In experiment, firstly, you should introduce the experimental setup (e.g., datasets, 
      algorithms, and noise used in your experiment for comparison). 
      Second, you should show the experimental results and give some comments. 
      • In conclusion, you should summarize your results and discuss your insights for 
      future work. 
      • In reference, you should list all references cited in your report and formatted all 
      references in a consistent way. 
      The layout of the report: 
      • Font: Times New Roman; Title: font size 14; Body: font size 12 
      • Length: Ideally 10 to 15 pages - maximum 20 pages 
      Note: You are encouraged to use LaTeX. Optionally, a MS-Word template is provided. 
      4 Submissions 
      The submission contains two parts: source code and report. Detailed instructions are 
      as follows: 
      1. Go to Canvas and upload the following files. 5    
      1. report (a pdf file): the report should include each member’s details 
      (student id and name). 
      2. code (a folder) as zip file 
      i. algorithm (a sub-folder): your code could be multiple files inside 
      algorithm sub-folder. 
      ii. data (an empty sub-folder): although two datasets should be inside the 
      data folder, please do not include them in the zip file. We will copy two 
      datasets to the data folder when we test the code. 
      2. Only one student needs to submit the report as pdf file and code as zip file which 
      must be named as student ID numbers of all group members separated by 
      underscores. 
      E.g., “xxxxx_xxxxx_xxxxx_code.zip and xxxxx_xxxxx_xxxxx_report.pdf”. 
      3. Your submission should include the report and the code. A plagiarism checker 
      will be used. 
      4. You need to clearly provide instructions on how to run your code in the appendix 
      of the report. 
      5. Indicate the contribution of each group member. 
      6. A penalty of minus 1.25 (5%) marks per each day after due (email late 
      submissions to TA and confirm late submission dates with TA). Maximum delay 
      is 5 days, Assignments more than 5 days late will get 0. 
       
      5 Plagiarism 
      • Please read the University Policy on Academic Honesty carefully: 
      http://sydney.edu.au/elearning/student/EI/academic_honesty.shtml 
      • All cases of academic dishonesty and plagiarism will be investigated. 
      • There is a new process and a centralised University system and database. 
      • Three types of offences: 
      1. Plagiarism – When you copy from another student, website or other 
      source. This includes copying the whole assignment or only a part of it. 
      2. Academic Dishonesty – When you make your work available to another 
      student to copy (the whole assignment or a part of it). There are other 
      examples of academic dishonesty. 6    
      3. Misconduct - When you engage another person to complete your 
      assignment (or a part of it), for payment or not. This is a very serious 
      matter, and the Policy requires that your case is forwarded to the 
      University Registrar for investigation. 
      • The penalties are severe and include: 
      1. A permanent record of academic dishonesty, plagiarism, and misconduct 
      in the University database and on your student file. 
      2. Mark deduction, ranging from 0 for the assignment to Fail for the course. 
      3. Expulsion from the University and cancelling of your student visa. 
      • When there is copying between students, note that both students are penalised – 
      the student who copies and the student who makes his/her work available for 
      copying. 
      • It is noted that only 30% (including references) is acceptable. The high 
      plagiarism will be reported to the school. 
       
       7    
      6 Marking scheme 
      Category Criterion Marks Comments 
      Report [20] Abstract [0.75] 
      •Problem, methods, organization. 
      Introduction [1.25] 
      •What is the problem you intend to solve? 
      •Why is this problem important? 
      Previous work [1.5] 
      •Previous relevant methods used in literature? 
      Methods [6.25] 
      •Pre-processing (if any) •NMF 
      Algorithm’s formulation. 
      •Noise choice and description. 
      Experiments and Discussions [6.25] 
      •Experiments, comparisons, and evaluation 
      •Extensive analysis and discussion of results 
      •Relevant personal reflection 
      Conclusions and Future work [0.75] 
      •Meaningful conclusions based on results 
      •Meaningful future work suggested 
      Presentation [1.25] 
      •Grammatical sentences, no spelling mistakes 
      •Good structure and layout, consistent 
      formatting 
      •Appropriate citation and referencing 
      •Use graphs and tables to summarize data 
      Other [2] 
      •At the discretion of the marker: for impressing 
      the marker, excelling expectation, etc. 
      Examples include clear presentation, welldesigned
      experiment, fast code, etc. 
       8    
      Code [5] 
      •Code runs within a feasible time 
      •Well organized, commented and documented 
       
      Penalties [−] 
      •Badly written code: [−5] 
      •Not including instructions on how to run your 
      code: [−5] 
       
      Note: Marks for each category is indicated in square brackets. The minimum mark for the assignment will be 0 (zero). 

      請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp























       

      標(biāo)簽:

      掃一掃在手機(jī)打開當(dāng)前頁
    • 上一篇:代寫COMP4403、代做Java編程語言
    • 下一篇:COMP1212代寫、代做Java/c++程序設(shè)計(jì)
    • 無相關(guān)信息
      昆明生活資訊

      昆明圖文信息
      蝴蝶泉(4A)-大理旅游
      蝴蝶泉(4A)-大理旅游
      油炸竹蟲
      油炸竹蟲
      酸筍煮魚(雞)
      酸筍煮魚(雞)
      竹筒飯
      竹筒飯
      香茅草烤魚
      香茅草烤魚
      檸檬烤魚
      檸檬烤魚
      昆明西山國家級風(fēng)景名勝區(qū)
      昆明西山國家級風(fēng)景名勝區(qū)
      昆明旅游索道攻略
      昆明旅游索道攻略
    • 幣安app官網(wǎng)下載 幣安app官網(wǎng)下載

      關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

      Copyright © 2023 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
      ICP備06013414號-3 公安備 42010502001045

      主站蜘蛛池模板: 韩国免费a级作爱片无码| 亚洲一区二区三区国产精品无码| 精品人妻无码一区二区三区蜜桃一| 少妇人妻无码精品视频| 亚洲va成无码人在线观看 | 人妻系列无码专区久久五月天| 亚洲精品国产日韩无码AV永久免费网| 亚洲一区无码中文字幕| 久久国产精品成人无码网站| 国产av无码专区亚洲av桃花庵| 性色AV一区二区三区无码| 熟妇人妻AV无码一区二区三区| 亚洲Av无码乱码在线znlu| AV大片在线无码永久免费| 国产成人无码一区二区三区| 免费无遮挡无码永久在线观看视频| 久久亚洲AV成人无码电影| 亚洲精品无码久久久久sm| 无码AV动漫精品一区二区免费| 一本天堂ⅴ无码亚洲道久久| 亚洲Av无码精品色午夜| 国产成人无码精品久久久性色 | 亚洲精品无码久久| 日日麻批免费40分钟无码| 在线高清无码A.| 在线观看片免费人成视频无码| 无码人妻久久一区二区三区蜜桃 | 久久久久亚洲AV无码麻豆| 国产aⅴ激情无码久久| 久久av高潮av无码av喷吹| 国产午夜无码片在线观看| 精品少妇人妻AV无码专区不卡| 亚洲av无码成人精品区一本二本| 日韩人妻无码一区二区三区99| 亚洲av无码成h人动漫无遮挡| 亚洲av无码乱码国产精品fc2| 国产精品无码av在线播放| 无码精品一区二区三区在线| 日韩人妻精品无码一区二区三区 | 久久精品无码一区二区日韩AV| 日韩免费无码一区二区视频|