日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

代做COCMP5328、代寫Python設計程序

時間:2024-05-07  來源:  作者: 我要糾錯



COCMP5328 - Advanced Machine Learning 
Assignment 1 
This assignment is to be completed in groups of 2 to 3 students. It is worth 25% of your 
total mark. 
1 Objective 
The objective of this assignment is to implement Non-negative Matrix Factorization 
(NMF) algorithms and analyze the robustness of NMF algorithms when the dataset is 
contaminated by large magnitude noise or corruption. More specifically, you should 
implement at least two NMF algorithms and compare their robustness. 
2 Instructions 
2.1 Dataset description 
In this assignment, you need to apply NMF algorithms on two real-world face image 
datasets: (1) ORL dataset
1; (2) Extended YaleB dataset
2

• ORL dataset: it contains 400 images of 40 distinct subjects (i.e., 10 images per 
subject). For some subjects, the images were taken at different times, varying the 
lighting, facial expressions, and facial details (glasses / no glasses). All the images 
were taken against a dark homogeneous background with the subjects in an 
upright, frontal position. All images are cropped and resized to 92×112 pixels. 
• Extended YaleB dataset: it contains 2414 images of 38 subjects under 9 poses 
and 64 illumination conditions. All images are manually aligned, cropped, and 
then resized to 168×192 pixels. 
 
     1    https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html    
2    http://vision.ucsd.edu/    iskwak/ExtYaleDatabase/ExtYaleB.html    2    
Figure 1: An example face image and its occluded versions by b × b-blocks with b = 
10,12, and 14 pixels. 
Note: we provide a tutorial for this assignment, which contains example code for 
loading a dataset to numpy array. Please find more details in assignment1.ipynb. 
2.2 Assignment tasks 
1. You need to implement at least two Non-negative Matrix Factorization (NMF) 
algorithms: 
• You should implement at least two NMF algorithms with at least one not 
taught in this course (e.g., L1-Norm Based NMF, Hypersurface Cost Based 
NMF, L1-Norm Regularized Robust NMF, and L2,1-Norm Based NMF). 
• For each algorithm, you need to describe the definition of cost function as 
well as the optimization methods used in your implementation. 
2. You need to analyze the robustness of each algorithm on two datasets: 
• You are allowed to design your own data pre-processing method (if 
necessary). 
• You need to use a block-occlusion noise similar to those shown in Figure 1. 
The noise is generated by setting the pixel values to be 255 in the block. You 
should design your own value for b (not necessary to be 10,12 or 14). You 
are also encouraged to design your own noise other than the block-occlusion 
noise. 
• You need to demonstrate each type of noise used in your experiment (show 
the original image as well as the image contaminated by noise). 
• You should carefully choose the NMF algorithms and design experiment 
settings to clearly show the different robustness of the algorithms you have 
implemented. 
3. You are only allowed to use the python standard library, numpy and scipy (if 
necessary) to implement NMF algorithms. 3    
2.3 Programming and External Libraries Python
This assignment is required to be finished by 3. When you implement NMF 
algorithms, you are not allowed to use external libraries which contains NMF 
implementations, such as scikit-learn, and Nimfa (i.e., you have to implement the NMF 
algorithms by yourself). You are allowed to use scikit-learn for evaluation only (please 
find more details in assignment1.ipynb). If you have any ambiguity whether you can 
use a particular library or a function, please post on canvas under the Assignment 1 
thread. 
2.4 Evaluate metrics 
To compare the performance and robustness of different NMF algorithms, we provide 
three evaluation metrics: (1) Root Means Square Errors; (2) Average Accuracy; (3) 
Normalized Mutual Information. For all experiments, you need to use at least two 
metrics, i.e., Root Means Square Errors and Average Accuracy. 
• Root Means Square Errors (RMSE): let X denote the contaminated dataset (by 
adding noise), and      ̂ denote the clean dataset. Let   and   denote the 
factorization results on      ̂ , the Root Means Square Errors then can be defined 
as follows: 
(1) 
• Average Accuracy: You need to perform some clustering algorithms (i.e., Kmeans)
with num clusters equal to num classes. Each example is assigned with 
the cluster label (please find more details in assignment1.ipynb). Lastly, you can 
evaluate the accuracy of predictions Ypred as follows: 
 (3) 
where I(·,·) is mutual information and H(·) is entropy. 
Note: we expect you to have a rigorous performance evaluation. To provide an estimate 
of the performance of the algorithms in the report, you can repeat multiple times (e.g., 
5 times) for each experiment by randomly sampling 90% data from the whole dataset 
and average the metrics on different subset. You are also required to report the standard 
deviations. 4    
3 Report 
The report should be organized like research papers, and should contain the following 
sections: 
• In abstract, you should briefly introduce the topic of this assignment and describe 
the organization of your report. 
• In introduction, you should first introduce the main idea of NMF as well as its 
applications. You should then give an overview of the methods you want to use. 
• In related work, you are expected to review the main idea of related NMF 
algorithms (including their advantages and disadvantages). 
• In methods, you should describe the details of your method (including the 
definition of cost functions as well as optimization steps). You should also 
describe your choices of noise and you are encouraged to explain the robustness 
of each algorithm from theoretical view. 
• In experiment, firstly, you should introduce the experimental setup (e.g., datasets, 
algorithms, and noise used in your experiment for comparison). 
Second, you should show the experimental results and give some comments. 
• In conclusion, you should summarize your results and discuss your insights for 
future work. 
• In reference, you should list all references cited in your report and formatted all 
references in a consistent way. 
The layout of the report: 
• Font: Times New Roman; Title: font size 14; Body: font size 12 
• Length: Ideally 10 to 15 pages - maximum 20 pages 
Note: You are encouraged to use LaTeX. Optionally, a MS-Word template is provided. 
4 Submissions 
The submission contains two parts: source code and report. Detailed instructions are 
as follows: 
1. Go to Canvas and upload the following files. 5    
1. report (a pdf file): the report should include each member’s details 
(student id and name). 
2. code (a folder) as zip file 
i. algorithm (a sub-folder): your code could be multiple files inside 
algorithm sub-folder. 
ii. data (an empty sub-folder): although two datasets should be inside the 
data folder, please do not include them in the zip file. We will copy two 
datasets to the data folder when we test the code. 
2. Only one student needs to submit the report as pdf file and code as zip file which 
must be named as student ID numbers of all group members separated by 
underscores. 
E.g., “xxxxx_xxxxx_xxxxx_code.zip and xxxxx_xxxxx_xxxxx_report.pdf”. 
3. Your submission should include the report and the code. A plagiarism checker 
will be used. 
4. You need to clearly provide instructions on how to run your code in the appendix 
of the report. 
5. Indicate the contribution of each group member. 
6. A penalty of minus 1.25 (5%) marks per each day after due (email late 
submissions to TA and confirm late submission dates with TA). Maximum delay 
is 5 days, Assignments more than 5 days late will get 0. 
 
5 Plagiarism 
• Please read the University Policy on Academic Honesty carefully: 
http://sydney.edu.au/elearning/student/EI/academic_honesty.shtml 
• All cases of academic dishonesty and plagiarism will be investigated. 
• There is a new process and a centralised University system and database. 
• Three types of offences: 
1. Plagiarism – When you copy from another student, website or other 
source. This includes copying the whole assignment or only a part of it. 
2. Academic Dishonesty – When you make your work available to another 
student to copy (the whole assignment or a part of it). There are other 
examples of academic dishonesty. 6    
3. Misconduct - When you engage another person to complete your 
assignment (or a part of it), for payment or not. This is a very serious 
matter, and the Policy requires that your case is forwarded to the 
University Registrar for investigation. 
• The penalties are severe and include: 
1. A permanent record of academic dishonesty, plagiarism, and misconduct 
in the University database and on your student file. 
2. Mark deduction, ranging from 0 for the assignment to Fail for the course. 
3. Expulsion from the University and cancelling of your student visa. 
• When there is copying between students, note that both students are penalised – 
the student who copies and the student who makes his/her work available for 
copying. 
• It is noted that only 30% (including references) is acceptable. The high 
plagiarism will be reported to the school. 
 
 7    
6 Marking scheme 
Category Criterion Marks Comments 
Report [20] Abstract [0.75] 
•Problem, methods, organization. 
Introduction [1.25] 
•What is the problem you intend to solve? 
•Why is this problem important? 
Previous work [1.5] 
•Previous relevant methods used in literature? 
Methods [6.25] 
•Pre-processing (if any) •NMF 
Algorithm’s formulation. 
•Noise choice and description. 
Experiments and Discussions [6.25] 
•Experiments, comparisons, and evaluation 
•Extensive analysis and discussion of results 
•Relevant personal reflection 
Conclusions and Future work [0.75] 
•Meaningful conclusions based on results 
•Meaningful future work suggested 
Presentation [1.25] 
•Grammatical sentences, no spelling mistakes 
•Good structure and layout, consistent 
formatting 
•Appropriate citation and referencing 
•Use graphs and tables to summarize data 
Other [2] 
•At the discretion of the marker: for impressing 
the marker, excelling expectation, etc. 
Examples include clear presentation, welldesigned
experiment, fast code, etc. 
 8    
Code [5] 
•Code runs within a feasible time 
•Well organized, commented and documented 
 
Penalties [−] 
•Badly written code: [−5] 
•Not including instructions on how to run your 
code: [−5] 
 
Note: Marks for each category is indicated in square brackets. The minimum mark for the assignment will be 0 (zero). 

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp























 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫COMP4403、代做Java編程語言
  • 下一篇:COMP1212代寫、代做Java/c++程序設計
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              9000px;">

                        www.色小姐com| 中国美女黄色一级片| 久久久久久久片| 欧美丰满熟妇bbb久久久| 日本黄色福利视频| 添女人荫蒂视频| 亚洲精品免费在线观看视频| 夜夜爽8888| 国产微拍精品一区| 欧美精品二区三区| 婷婷五月综合激情| 亚洲综合欧美在线| 国产三级国产精品| 欧美a视频在线观看| 午夜免费福利影院| 亚洲最大天堂网| 精产国品一二三区| 日日夜夜精品免费| 亚洲综合婷婷久久| 国产尤物视频在线观看| 日韩a级片在线观看| 最新国产中文字幕| 国产区二区三区| 少妇人妻一区二区| 99久久99久久精品国产| 久久午夜福利电影| 中文字幕一区二区三区人妻电影 | 99国产在线播放| 精品欧美一区二区精品少妇| 熟妇高潮一区二区三区| av大片免费观看| 刘亦菲久久免费一区二区| 亚洲成人中文字幕在线| 成人不卡免费视频| 日韩av手机在线免费观看| 91精品人妻一区二区三区蜜桃欧美| 国产一区二区三区影院| 午夜精品久久久久久久蜜桃| www日韩在线| 日本黄色免费视频| www.17c.com喷水少妇| 日本道在线观看| ass极品国模人体欣赏| 人人妻人人澡人人爽人人精品| 一级久久久久久| 欧美 日韩 中文字幕| 91精品人妻一区二区| 日韩精品成人一区| 高h视频免费观看| 手机看片久久久| 国产免费的av| 亚洲男人的天堂在线视频| 看欧美ab黄色大片视频免费| 一级欧美一级日韩| 色噜噜噜噜噜噜| 国产精品久久久久久69| 中文字幕第24页| 欧美成人乱码一二三四区免费| 99精品中文字幕| 午夜精品一区二区三| 国产精品免费在线视频| 中文字幕5566| 日本不卡视频一区| 国产伦精品一区二区三区四区 | 国产精久久一区二区三区| 天天躁日日躁狠狠躁av| 国产又粗又猛又色又| 亚洲综合图片一区| 五月天婷婷亚洲| 老女人性生活视频| 国产女人18水真多毛片18精品 | 亚洲aⅴ在线观看| 内射中出日韩无国产剧情| 不卡的日韩av| 亚洲熟女一区二区| 性感美女一级片| 青青草av网站| 加勒比av中文字幕| 国产盗摄x88av| 91精品人妻一区二区三区蜜桃2| 无码人妻精品一区二区三 | 99久热在线精品996热是什么| 无码人妻精品一区二区三区99不卡 | 中国黄色片一级| 日韩精品久久久久久久的张开腿让| 国产又粗又猛又爽又黄| 北条麻妃亚洲一区| 亚洲另类在线观看| 亚洲 欧美 日韩 在线| 日韩精品一区二区三区高清免费| 激情综合激情五月| 国产精品久久久久野外| tube国产麻豆| 亚洲婷婷在线观看| 中文字幕有码在线播放| 亚洲va综合va国产va中文| 日批在线观看视频| 日韩欧美三级视频| 秋霞午夜鲁丝一区二区| 欧美极品视频在线观看| 久久亚洲AV成人无码国产野外| 精品久久久99| 久久av高潮av无码av喷吹| 国产精品一品二区三区的使用体验| 久久精品99国产精| 婷婷五月综合久久中文字幕| 欧美一级片在线视频| 久久久久亚洲av成人网人人软件| 韩国av电影在线观看| 国产一区二区在线不卡| 黄色av片三级三级三级免费看| 国产视频123区| 黄色一级大片在线免费看国产一| 国产精品成人av久久| 超碰人人草人人| 国产情侣一区二区| 国产又粗又黄又猛| 美国精品一区二区| 日本免费观看网站| 四虎免费在线视频| 在线观看亚洲网站| 亚洲天堂日韩av| 丁香六月激情综合| 国产又粗又猛又爽又黄的视频小说| 国产又黄又粗又爽| 久久午夜无码鲁丝片午夜精品| 欧美成人一区二区三区四区| 三区视频在线观看| 中文字幕一区在线播放| 波多野结衣不卡视频| 国产精品爽爽久久| 免费黄色网址在线| 无码人妻精品一区二| 亚洲麻豆一区二区三区| 国产成人精品免费看视频| 国产尤物在线观看| 日本一级特级毛片视频| 中文字幕av免费观看| av中文字幕网址| 精品中文字幕在线播放| 日韩久久中文字幕| 亚洲三级在线视频| 国产视频三区四区| 日本少妇毛茸茸高潮| 在线观看免费成人av| 二区三区四区视频| 欧美久久久久久久久久久| 一区二区视频播放| www.日本高清| 麻豆精品国产传媒av| 在线免费观看毛片| 国产精品第一页在线观看| 欧美人妻精品一区二区三区| 中文字幕人妻一区| 国产精品suv一区二区| 人妻大战黑人白浆狂泄| 亚洲熟女综合色一区二区三区| 国产亚洲精品久久久久久无几年桃 | 五月婷婷一区二区| 成人h动漫精品一区二区无码| 毛片网站免费观看| 中文字幕一区二区三区人妻在线视频| 国产成人在线播放视频| 人妻无码中文久久久久专区| 亚洲系列第一页| 久久精品视频久久| 亚洲国产精品18久久久久久| 精品成人免费视频| 中文字幕第一页在线播放| 国产网址在线观看| 亚洲av无码一区二区二三区 | www日本在线| 日韩精品一区二区三区高清免费| 一道本在线观看| 日本高清一区二区视频| www.黄色片| 无码人妻aⅴ一区二区三区有奶水 无码人妻aⅴ一区二区三区69岛 | 免费人成视频在线| 亚洲精品激情视频| 美女av免费看| www.这里只有精品| 五月天激情播播| 国产精品探花在线播放| 中文字幕国产高清| 久久国产精品国产精品| 538精品在线视频| 日韩精品在线免费看| 国产三级国产精品| 亚洲色大成网站www| 强伦人妻一区二区三区| 国产成人麻豆免费观看| 亚洲妇女无套内射精| 久久精品女人毛片国产| av在线播放网址| 午夜一级黄色片| 久久久久精彩视频| 国产激情视频在线播放| 亚洲精品乱码久久久久久久| 欧美亚洲另类小说| 国产一二三四在线视频|