參考文獻 |
[1] D. H. Jang, K. S. Kwon, J. K. Kim, K. Y. Yang, and J. B. Jim, "Dog Identification Method Based on Muzzle Pattern Image," Applied Science, vol. 10, no. 24, pp. 8994, 2020.
[2] H. S. Kühl and T. Burghardt, “Animal biometrics: quantifying and detecting phenotypic appearance,” Trends in Ecology and Evolution, vol. 28, no. 7, pp. 432-441, 2013.
[3] T. Ojala, M. Pietikainen, and D. Harwood, “Performance evaluation of texture measures with classification based on kullback discrimination of distributions,” in Proceedings of 12th International Conference on Pattern Recognition, vol. 1, pp. 582-585, 1994.
[4] H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-up robust features (SURF),” Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346-359, 2008.
[5] S. Kumar and S. K. Singh, “Monitoring of pet animal in smart cities using animal biometrics,” Future Generation Computer Systems, vol. 83, pp. 553-563, 2018.
[6] S. Kumar and S. K. Singh, “Biometric recognition for pet animal,” Journal of Software Engineering and Applications, vol. 2014, 2014.
[7] J. Ouyang, H. He, Y. He, and H. Tang, “Dog recognition in public places based on convolutional neural network,” International Journal of Distributed Sensor Networks, vol. 15, no. 5, pp. 1550147719829675, 2019.
[8] F. Sung, Y. Yang, L. Zhang, T. Xiang, P. H. S. Torr, and T. M. Hospedales, “Learning to compare: Relation network for few-shot learning,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1199-1208, 2018.
[9] O. Vinyals, C. Blundell, T. Lillicrap, and D. Wierstra, “Matching networks for one shot learning,” Advances in Neural Information Processing Systems, vol. 29, pp. 3630-3638, 2016.
[10] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815-823, 2015.
[11] YOON, Bohan; SO, Hyeonji; RHEE, Jongtae. A Methodology for Utilizing Vector Space to Improve the Performance of a Dog Face Identification Model. Applied Sciences, 2021
[12] 李庆,曾凯, 赵宇 ,李广 ,陈旸 ,陈旸, "一种狗鼻纹特征点的检测方法、装置、系统及存储介质," 2018.
[13] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779-788, 2016.
[14] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016.
[15] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, ”Joint face detection and alignment using multitask cascadedconvolutional networks,“ IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
[16] D. H. Jang, K. S. Kwon, J. K. Kim, K. Y. Yang, and J. B. Jim, "Dog Identification Method Based on Muzzle Pattern Image," Applied Science, vol. 10, no. 24, pp. 8994, 2020.
[17] O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional networks for biomedical image segmentation,” in Proceedings of Medical Image Computing and Computer-Assisted Intervention , pp. 234-241, 2015, Springer International Publishing.
[18] L. C. Chen, G. Papandreou, F. Schroff, and H. Adam, “Rethinking atrousconvolution for semantic image segmentation,” CoRR, abs/1706.05587, 2017.
[19] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016.
[20] P. Wang, P. Chen, Y. Yuan, D. Liu, Z. Huang, X. Hou, and G. Cottrell, “Understanding Convolution for Semantic Segmentation,” in 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1451-1460, 2018.
[21] AHMED, Nasir. Recent review on image clustering. IET Image Processing, 2015, 9.11: 1020-1032.
[22] YU, Jun, et al. Image clustering based on sparse patch alignment framework. Pattern Recognition, 2014, 47.11: 3512-3519.
JAIN, Anil K.; MURTY, M. Narasimha; FLYNN, Patrick J. Data clustering: a review. ACM computing surveys (CSUR), 1999, 31.3: 264-323
[23] R.David, “Grafcet: A powerful tool for specification of logic controllers ,” IEEE Transactions on Control Systems Technology, vol. 3, no. 3, pp. 253-268, 1995.
[24] J. MacQueen, “Some methods for classification and analysis of multivariate observations,” in Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, no. 14, pp. 281-297, 1967.
[25] XIE, Junyuan; GIRSHICK, Ross; FARHADI, Ali. Unsupervised deep embedding for clustering analysis. In: International conference on machine learning. PMLR, 2016. p. 478-487.
[26] LI, Fengfu; QIAO, Hong; ZHANG, Bo. Discriminatively boosted image clustering with fully convolutional auto-encoders. Pattern Recognition, 2018, 83: 161-173.
[27] A. Krizhevsky, I. Sutskever, and G. Hinton. “Imagenet classificationwith deep convolutional neural networks,” Advances in Neural Information Processing Systems, vol. 25, pp. 1097-1105, 2012.
[28] Y. Bengio, P. Simard, and P. Frasconi, “Learning long-term dependencies with gradient descent is difficult,” IEEE Transactions on Neural Networks, vol. 5, no. 2, pp. 157-166, 1994.
[29] X. Glorot and Y. Bengio, “Understanding the difficulty of trainingdeep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 249-256, 2010.
[30] S. Hochreiter, “Untersuchungen zu dynamischen neuronalen netzen. diploma thesis,” Technical University of Munich, 1991.
[31] Y. LeCun, L. Bottou, G. B. Orr, and K.-R. M ̈uller. Efficient backprop.InNeural Networks: Tricks of the Trade, pages 9–50. Springer, 1998.
[32] A. M. Saxe, J. L. McClelland, and S. Ganguli, “Exact solutions tothe nonlinear dynamics of learning in deep linear neural networks,” arXiv preprint arXiv:1312.6120, 2013.
[33] K. He, X. Zhang, S. Ren, and J. Sun, “Delving deep into rectifiers:Surpassing human-level performance on imagenet classification,” in Proceedings of the IEEE International Conference on Computer Vision, pp. 1026-1034, 2015.
[34] K. He and J. Sun, “Convolutional neural networks at constrained timecost,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5353-5360, 2015.
[35] R. K. Srivastava, K. Greff, and J. Schmidhuber, “Training very deep networks,” ArXiv Preprint ArXiv:1507.06228, 2015.
[36] T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, 2002.
[37] S. Ma and L. Bai, “A face detection algorithm based on Adaboost andnew Haar-Like feature,” in Proceedings of the IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 651-654, 2016.
[38] C. Lu and X. Tang, “Surpassing human-level face verification performance on LFW with gaussian face,” in Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp.3811–3819, 2015.
[39] Y. Sun, X. Wang, and X. Tang, “Deep learning face representation by joint identification-verification,” in Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, pp. 1988–1996, 2014.
[40] Y. Sun, X. Wang, and X. Tang, “Deeply learned face representations are sparse, selective, and robust,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2892-2900, 2015.
[41] V. Jain and E. G. Learned-Miller, “FDDB: A benchmark for face detection in unconstrained settings,” Univ. Massachusetts, Amherst, MA, USA, Tech. Rep. UMCS-2010-009, 2010.
[42] S. Yang, P. Luo, C. C. Loy, and X. Tang, “WIDER FACE: A Face detection benchmark,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5525-553, 2016.
[43] Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “Deepface: Closing the gap to human-level performance in face verification,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701-1708, 2014.
[44] Y. Sun, X. Wang, and X. Tang, ”Deep learning face representation from predicting 10,000 classes,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1891-1898, 2014.
[45] A. Presley and D. H. Liles , “The use of IDEF0 for the design and specification of methodologies,” in Proceedings of the 4th Industrial Engineering Research Conference, 1995.
[46] R.David, “Grafcet: A powerful tool for specification of logic controllers ,” IEEE Transactions on Control Systems Technology, vol. 3, no. 3, pp. 253-268, 1995. |