Mathematical Morphology Applied to Computer Go Author: Bruno Bouzy Presenter: Ling Zhao June 30, 2004.

Slides:



Advertisements
Similar presentations
Communication for Managers Testing the Evidence What is the source of the evidence? Is the source valid and credible? Is the evidence accurate, current.
Advertisements

Fuzzy Reasoning in Computer Go Opening Stage Strategy P.Lekhavat and C.J.Hinde.
Scale & Affine Invariant Interest Point Detectors Mikolajczyk & Schmid presented by Dustin Lennon.
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Why Systolic Architecture ?. Motivation & Introduction We need a high-performance, special-purpose computer system to meet specific application. I/O and.
DIGITAL IMAGE PROCESSING
Morphological Image Processing Md. Rokanujjaman Assistant Professor Dept of Computer Science and Engineering Rajshahi University.
Life in the Game of Go David B. Benson Surveyed by Akihiro Kishimoto.
Medical Imaging Mohammad Dawood Department of Computer Science University of Münster Germany.
Lecture 4 Linear Filters and Convolution
Mahmoud S. Hamid, Neal R. Harvey, and Stephen Marshall IEEE Transactions on Circuits and Systems for Video Technology, 2003 Genetic Algorithm Optimization.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
The Move Decision Strategy of Indigo Author: Bruno Bouzy Presented by: Ling Zhao University of Alberta March 7, 2007.
Neural Networks Basic concepts ArchitectureOperation.
Combining Tactical Search and Monte-Carlo in the Game of Go Presenter: Ling Zhao University of Alberta November 1, 2005 by Tristan Cazenave & Bernard Helmstetter.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
1 Preprocessing for JPEG Compression Elad Davidson & Lilach Schwartz Project Supervisor: Ari Shenhar SPRING 2000 TECHNION - ISRAEL INSTITUTE of TECHNOLOGY.
Strategies Based On Threats Ling Zhao University of Alberta March 10, 2003 Comparative evaluation of strategies based on the values of direct threats by.
Binary Image Analysis: Part 2 Readings: Chapter 3: mathematical morphology region properties region adjacency 1.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
Pattern Matching in Computer Go Ling Zhao University of Alberta August 7, 2002.
CSE (c) S. Tanimoto, 2008 Image Understanding II 1 Image Understanding 2 Outline: Guzman Scene Analysis Local and Global Consistency Edge Detection.
1 Solving Ponnuki-Go on Small Board Paper: Solving Ponnuki-Go on small board Authors: Erik van der Werf, Jos Uiterwijk, Jaap van den Herik Presented by:
Matlab Tutorial Continued Files, functions and images.
1 Influence Calculation in Go Paper: Semi-empirical Quantitative Theory of GO Part 1: Estimation of the Influence of a Wall ICGA Journal Vol.25 No.4 December.
GUIDED BY: C.VENKATESH PRESENTED BY: S.FAHIMUDDIN C.VAMSI KRISHNA ASST.PROFESSOR M.V.KRISHNA REDDY (DEPT.ECE)
Despeckle Filtering in Medical Ultrasound Imaging
Chapter 9.  Mathematical morphology: ◦ A useful tool for extracting image components in the representation of region shape.  Boundaries, skeletons,
Computer Go : A Go player Rohit Gurjar CS365 Project Proposal, IIT Kanpur Guided By – Prof. Amitabha Mukerjee.
Chap 3 : Binary Image Analysis. Counting Foreground Objects.
Takuya Matsuo, Norishige Fukushima and Yutaka Ishibashi
Department of Computer Science & Engineering Background Subtraction Algorithm for the Intelligent Scarecrow System Francisco Blanquicet, Mentor: Dr. Dmitry.
University of Toronto Aug. 11, 2004 Learning the “Epitome” of a Video Sequence Information Processing Workshop 2004 Vincent Cheung Probabilistic and Statistical.
Enhancing Interactive Visual Data Analysis by Statistical Functionality Jürgen Platzer VRVis Research Center Vienna, Austria.
10/24/2015 Content-Based Image Retrieval: Feature Extraction Algorithms EE-381K-14: Multi-Dimensional Digital Signal Processing BY:Michele Saad
Image Processing and Pattern Recognition Jouko Lampinen.
Bara Lilla Nyíri Gergely Piotr Czekański Kovács Laura Team H: Automatic Poker Player.
Optical Coherence Tomography for Retinal Imaging ECE 172A Julio Flores.
Automated Target Recognition Using Mathematical Morphology Prof. Robert Haralick Ilknur Icke José Hanchi Computer Science Dept. The Graduate Center of.
CS-498 Computer Vision Week 8, Day 3 Thresholding and morphological operators My thesis? 1.
Mathematical Morphology Mathematical morphology (matematická morfologie) –A special image analysis discipline based on morphological transformations of.
1 Eye Detection in Images Introduction To Computational and biological Vision Lecturer : Ohad Ben Shahar Written by : Itai Bechor.
Mobile Image Processing
CS654: Digital Image Analysis
Hand Gesture Recognition Using Haar-Like Features and a Stochastic Context-Free Grammar IEEE 高裕凱 陳思安.
Mathematical Morphology
Mammographic image analysis for breast cancer detection using complex wavelet transforms and morphological operators.
CS654: Digital Image Analysis
Solving Tsumego on Computers M2 Hirokazu Ishii Chikayama & Taura Lab.
1 By Anna Zaidman Road detection via entropy 1. What is entropy? Entropy is a mathematically - defined thermodynamic quantity that helps to account for.
Nottingham Image Analysis School, 23 – 25 June NITS Image Segmentation Guoping Qiu School of Computer Science, University of Nottingham
Digital Image Processing Morphological Image Processing.
TOPIC 12 IMAGE SEGMENTATION & MORPHOLOGY. Image segmentation is approached from three different perspectives :. Region detection: each pixel is assigned.
A Scalable Machine Learning Approach to Go Pierre Baldi and Lin Wu UC Irvine.
Morphological Image Processing (Chapter 9) CSC 446 Lecturer: Nada ALZaben.
Morphological Image Processing
1 Evaluation Function for Computer Go. 2 Game Objective Surrounding most area on the boardSurrounding most area on the board.
Technological Uncanny K. S'hell, C Kurtz, N. Vincent et E. André et M. Beugnet 1.
Mathematical Morphology
Digital Image Processing (Digitaalinen kuvankäsittely) Exercise 5
Game Theoretic Image Segmentation
HIT and MISS.
Medical Images Edge Detection via Neutrosophic Mathematical Morphology
Department of Computer Engineering
Binary Image Analysis: Part 2 Readings: Chapter 3:
ECE 692 – Advanced Topics in Computer Vision
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Digital Image Processing Lecture 14: Morphology
A Novel Smoke Detection Method Using Support Vector Machine
What are the real world implications of this project?
Presentation transcript:

Mathematical Morphology Applied to Computer Go Author: Bruno Bouzy Presenter: Ling Zhao June 30, 2004

Outline  Motivations  Contributions  Mathematical Morphology (MM) & Go  Zobrist’s model for influence recognition  Adaptation of MM to Go  Implementation issue  Experimental results  Conclusions

Motivations  Influence  Territory  Position evaluation

Contributions  Link Zobrist’s model with mathematical morphology  Extend Zobrist’s model  Good results for territory recognition  Implemented in both Indigo and GnuGo and is working

Mathematical morphology (MM)  “Analysis of signals in terms of shape”  Widely used for image processing  Applications: 1. Image restoration 2. Edge detection 3. Texture analysis 4. Noise reduction 5. Computer Go!

Operators in MM Input: a set of elements  Dilation: A + neighboring elements of A  Erosion: A – neighboring elements of ~A  Closing set: E(D(A)), Opening set: D(E(A)) Dilation Erosion

Liberties and eyes in Go Find liberties Find eyes

Simple territory Macro Operator:

Fuzzy territory Problems: Boolean values are not sufficient.

Zobrist’s model (’69)  Used to recognize influence  Init: +64 -> black intersections -64 -> white intersections, 0 -> all else  Iterations (4 times) positive points -> send out +1 to neighbors negative points -> send out –1 to neighbors

Improved model using MM terms  Key fact: forbid points who has neighbors (including itself) with both positive values and negative values.  Dz(point): value(point) + num_of(points with values of same sign)  Ez(point): abs(value(point))-num_of(points with value of zero or of opposite sign) no sign change (put it zero then)

Examples D1D D2D D3D E 1 o D E 7 o D 3 e = d (d-1) +1

“Efficient” implementation of D Bouzy’s implementation // init line[0] = line[t+1] = 0; void SI::dilation(SI *q) { for (int i=1; i<=t; i++) { q->line[i] = line[i] | line[i-1] | line[i+1] | (line[i]<<1) & mask | (line[i]>>1) & mask; } My implementation

Experimental results  Xz(d, d(d-1)=1) when d=4 or 5 is very good  Example using Xz(4,13)

Build into Go program  Indigo  GnuGo “The Bouzy 5/21 algorithm is interesting in that it corresponds reasonably well to the human concept of territory. This algorithm is still used in GNU Go 3.4 in the function estimate_score “  Author’s claim: 1. “a model which recognized “territories”... as human players do”. 2. “The recognition is accurate and robust”.

My conclusions  Nice model to apply mathematical morphology to Go.  Quite accurate in territory recognition compared to other computer approaches.  Can be efficiently computed.