Various stochastic optimization methods are utilized for training neural networks. The objective of this research is to provide a comprehensive overview of stochastic optimization methods proposed to enhance and expedite the convergence of neural networks. The article presents a highlighting of stochastic optimization methods' advantages and drawbacks, while also analyzing the constraints of their applicability. It commences with an introduction to the problem formulation, followed by sections dedicated to various algorithmic modifications: SGD-based stochastic optimization methods, adaptive gradient methods, and methods of adaptive moment estimation. In conclusion, the article underscores the importance of a judicious selection of a method, contingent upon its characteristics, applicability constraints, specific task, model architecture, and data quality.
In object recognition systems based on template matching by calculating the distance metric between preassigned templates and given object, the template selection can severely affect the recognition quality. This article presents a novel method for image selection in object recognition systems, which can improve the identification quality. Its uniqueness lies in the fact that the images, what is the best for further recognition, were selected automatically in a way that provides the best quality. The technique is based on a SOM (Self-Organizing Map) and k-mean clustering. In this article, we describe the selection procedure and show the result of its usage in the system.
It’s hard to see the modern authentication systems without biometrics technologies. Biometrics systems can be used to access the school and university, for payment confirmation, for access to internet banking. Biometric authentication systems can be based on the face, fingerprint, iris, voice, and other modalities. And all of them have security vulnerabilities. This article is about the attacks on facial biometric systems. It presents the classification of the attacks on facial biometric systems and countermeasures for different types of attacks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.