EE Seminar: Coherent Clustering and its Use for Image Denoising

~~
Moran Vatelmacher, 
M.Sc. student under the supervision of Prof. Shai Avidan

Monday, June 22, 2015 at 15:00
Room 011, Kitot Bldg., Faculty of Engineering

Coherent Clustering and its Use for Image Denoising

Abstract

Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups (clusters). Today, the classical clustering methods are based on appearance information only. This information is sometimes insufficient, especially in the case of noisy data where there is a need to differentiate inliers from outliers. The human eye can sometimes see that a certain area belongs to a certain cluster even if the appearance distance from another cluster is shorter. This is partially done using context analysis. When using context information it is easier to identify outliers. This kind of analysis can help in image analysis applications such as image denoising - discussed here - for which segmentation of the image into clusters is relevant. Our results show that better clustering improves denoising.

22 ביוני 2015, 15:00 
חדר 011, בניין כיתות-חשמל  

סמינר מחלקתי

11 ביוני 2015, 13:00 
חדר 206 בניין וולפסון  

The Impact of Low Workload on Safety Drivers in TaxiBot Robotic Tugs

Inbal Levi - Department of Industrial Engineering

Abstract

The TaxiBot is a semi-robotic pilot-controlled towing vehicle designed to taxi airplanes to and from the gate and the runway, without using the airplane engines.

Airplane engines are inefficient when operated on the ground, creating air pollution and noise. The TaxiBot towing system provides an economic and effective solution that can help overcome this by reducing fuel cost, noise, vulnerability to Foreign Object Damage (FOD) and CO2 emissions.

The towing system allows airplanes to move on the ground while leaving the airplane pilot in control. After the airplane is pushed back from passenger gates all taxiing processes are controlled by the pilot from the cockpit. When towing the airplane the pilot steers the TaxiBot by using the tiller and braking pedals. In the TaxiBot rides a safety driver. The driver's primary role is to push back the airplane from the gate and to take the vehicle back from the runway. However, in emergency situations, the safety driver is supposed to take over the steering and breaking action.

The pilot's control at all times during the taxiing process causes prolonged low workload for safety drivers. The boredom due to low workload causes drops in driver performance, attention lapses, tiredness and out-of-the-loop-unfamiliarity (OOTLUF).

This study looks at ways to keep the driver involved in the taxiing mission, to improve his performance in emergency situations. During the first stage of the study, I interviewed 32 pilots about their experience and views regarding taxiing and help from a system like the TaxiBot. Based on these interviews and the relevant literature we developed an experimental system that simulates the taxiing. The experimental conditions differed in the task the driver performed while the plane is taxiing under the control of the pilot (no task , Dead Man Switch, hazard detection, navigation) and the frequency of adverse events (low vs. high). Twenty participants performed the task in each of the eight experimental conditions. Results showed that involving the operator in the taxiing mission improves the detection probability and thus helps dealing with the boredom. user behavior.

This work was performed under the supervision of Prof. Joachim Meyer.

ההרצאה תתקיים ביום חמישי 11.06.15, בשעה 13:00 בחדר 206, בנין וולפסון הנדסה, הפקולטה להנדסה, אוניברסיטת תל-אביב.

EE Seminar: Polar Codes for Noisy Write Once Memories

~~
Speaker: Adi Guzi Yitzhak
M.Sc. student under the supervision of Prof. David Burshtein

Wednesday, June 10th, 2015 at 15:30
Room 011, Kitot Bldg., Faculty of Engineering
Polar Codes for Noisy Write Once Memories
Abstract

Write once memories (WOM) are storage devices in which it is impossible or costly
to erase some memory cells. Flash memory is a one important example.
The problem of rewriting on a noisy WOM is considered.
We present a Blahut-Arimoto algorithm for computing the max sum rate of the noisy WOM, and show some numerical results.
A coding scheme for the noisy WOM using polar codes is also presented.
It is shown empirically that the scheme is close to the max sum-rate of noisy
WOMs when an arbitrary number of multiple writes is permitted.
The encoding and decoding complexities scale as O(N logN) where N is the blocklength.

10 ביוני 2015, 15:30 
חדר 011, בניין כיתות-חשמל  

Morphology and microstructure evolution in Au-Fe bilayers on sapphire

17 ביוני 2015, 16:00 - 17:00 
Room 103, Engineering Class (Kitot) Building  
Morphology and microstructure evolution in Au-Fe bilayers on sapphire

The diffusion of molecules through polymer solar cells: a processing and characterization tool

10 ביוני 2015, 16:00 - 17:00 
Room 103, Engineering Class (Kitot) Building  
The diffusion of molecules through polymer solar cells: a processing and characterization tool

EE Seminar: Blind User Identification in OFDRMA

~~
Ben Shilo, 
M.Sc. student under the supervision of Dr. Ofer Amrani

Monday, June 15, 2015 at 15:30
Room 011, Kitot Bldg., Faculty of Engineering

Blind User Identification in OFDRMA

Abstract

In the uplink communication of multiple-access OFDM (OFDMA) user identification is usually performed via a preamble (pilot series) where users keep transmitting until the base-station acknowledges them. Thereafter, end-user communication is either assigned by the base-station (e.g. TDD) or, in random access schemes, some sort of collision avoidance mechanism or protocol is used (CSMA/CA, slotted Aloha or more complex frequency hopping schemes).
In a Random OFDMA uplink, the base-station has no knowledge of (who and) when end-users are active, nor does it manage them in any form and no active collision avoidance is exercised. We show that in this scenario, using a one-dimensional decision rule, we can reliably identify the active users subject to target misdetection and false alarm probabilities.

15 ביוני 2015, 15:30 
חדר 011, בניין כיתות-חשמל  

EE Seminar: Simultaneous Matrix Decompositions for Gaussian Communication Networks

~~Speaker: Anatoly Khina
Ph.D. student under the supervision of Prof. Uri Erez

Wednesday, July 8th, 2015 at 15:00
Room 011, Kitot Bldg., Faculty of Engineering

Simultaneous Matrix Decompositions for Gaussian Communication Networks

Abstract
A central concept in matrix analysis is the decomposition of a matrix into a product of orthogonal (or unitary) matrices and a diagonal/triangular one, e.g., unitary diagonalization of a symmetric matrix, and more generally the singular-value decomposition, and the QR decomposition. Such decompositions are of particular importance for multi-antenna point-to-point physical-layer communications, where the channel gains are represented by a (channel) matrix. Transforming the channel matrix into diagonal/triangular forms, in this case, allows to reduce the coding task to that of coding for scalar (single-antenna) channels. Thus, the modulation and coding tasks are effectively decoupled and the performance is dictated by the diagonal values. In this work we develop new joint matrix decompositions of several matrices using the same unitary matrix on one side (corresponding to a joint transmitter or receiver) to achieve desired properties for the resulting diagonals. An important special case is a transformation leading to equal diagonals for all matrices simultaneously. This, in turn, allows to construct practical schemes for various communications settings, as well as deriving new theoretic bounds for others.

08 ביולי 2015, 15:00 
חדר 011, בניין כיתות-חשמל  

תערוכת הפוסטרים של פרויקטי גמר בבית הספר להנדסה מכנית

07 ביוני 2015, 10:00 - 13:00 
במסדרון המקורה שבחזית בניין כיתות חשמל  
תערוכת הפוסטרים של פרויקטי גמר בבית הספר להנדסה מכנית

תערוכת הפוסטרים של פרויקטי גמר בבית הספר להנדסה מכנית

EE Seminar: Unsupervised methods for joint segmentation of an image set

~~
Gal Malach, 
M.Sc. student under the supervision of Prof. Nahum Kiryati and Prof. Nir Sochen

Wednesday, June 24th, 2015 at 15:00
Room 011, Kitot Bldg., Faculty of Engineering

Unsupervised methods for joint segmentation of an image set

Abstract

Segmentation of a region of interest in an image is significantly influenced by the availability of prior information. However, in many cases such prior information is not available or not compatible with the image in hand. Luckily, nowadays applications can benefit from the large availability of images with similar or close contents, e.g., multiple overlapping viewpoints of the same object or use of various image acquisition methods. As a result, there is a shift from the classical prior based segmentation to a co-segmentation approach. Under the co-segmentation framework simultaneous segmentation of two images is applied where each segmentation is supported by the other to utilize the large commonality between the two images. In the first part of this work we review the current state-of-the-art co-segmentation methods and present a generalization of the pair-wise methods to account for image ensemble. Furthermore, we set a theoretical framework to draw the connection between our generalized pair-wise co-segmentation method to a probabilistic atlas-based approach.

In the second part of this work, we present a novel method for co-segmentation of common regions of interest (ROIs) in multiple image volumes of possibly different qualities or in the presence of inconsistencies. In contrast to the classical atlas-based approaches, only a single annotated image is used as a prior. The joint segmentation process is supported by the evolving segmentation of each of the individual images while accounting for the varying confidence levels. The proposed approach uses soft segmentation. Labeling uncertainty of a given voxel is determined by its spatial proximity to the estimated ROI's boundaries and the dynamically changing segmentation's confidence, learned throughout the joint segmentation process. Our contribution consists of a robust segmentation method that advances existing co-segmentation algorithms. The proposed algorithm is supported by a theoretical derivation which shows that it is a generalization of previous approaches. Promising results are demonstrated for the joint segmentation of neuroanatomical structures across 50 MR scans of different subjects. The proposed algorithm supports multi-modal data where each modality reveals different features of the ROI. A significant variance in the confidence levels was observed when using the proposed method for cross-modality joint segmentation of brain tumor tissues (BraTS).

 

24 ביוני 2015, 15:00 
חדר 011, בניין כיתות-חשמל  

סמינר מחלקתי

09 ביוני 2015, 14:00 
חדר 206 בניין וולפסון  

 

Effects of Security Warnings and Blocking on Risk Taking in IT Systems

Omer Dembinsky - Department of Industrial Engineering

Abstract

While working on an IT system (computer, smartphone) a user might choose to perform a risky behavior, such as browsing to an unknown website, downloading a file/application or connecting an external device. These actions are meant to assist the user in trying to achieve a specific goal (work, entertainment) which gives a certain value to the user. The result may be the desired one, but it might also be a negative outcome if a malicious program (virus, Trojan horse) is hidden and activated.

In order to help the user decide whether it is safe to perform a certain action or not a security system can be used. The system monitors the actions performed by the user and when relevant provides a warning or even blocks the action in order to protect the user.

This work examines different security system designs, focusing on the comparison between a Warning and a Blocking system, and their influence on the user’s risk taking, as well as on the productivity of work and the amount of security events (i.e. downloading malware). A normative mathematical model of the human behavior in this situation was developed and an experiment was carried out to examine the model and to compare its predictions to the actual user behavior.

 

This work was performed under the supervision of Prof. Joachim Meyer.

 

ההרצאה תתקיים ביום שלישי 09.06.15, בשעה 14:00 בחדר 206, בנין וולפסון הנדסה, הפקולטה להנדסה, אוניברסיטת תל-אביב.

 

עמודים

אוניברסיטת תל אביב עושה כל מאמץ לכבד זכויות יוצרים. אם בבעלותך זכויות יוצרים בתכנים שנמצאים פה ו/או השימוש שנעשה בתכנים אלה לדעתך מפר זכויות
שנעשה בתכנים אלה לדעתך מפר זכויות נא לפנות בהקדם לכתובת שכאן >>