代做COCMP5328、代写Python设计程序
OCMP5328 - Advanced Machine Learning
Assignment 1
This assignment is to be completed in groups of 2 to 3 students. It is worth 25% of your
total mark.
1 Objective
The objective of this assignment is to implement Non-negative Matrix Factorization
(NMF) algorithms and analyze the robustness of NMF algorithms when the dataset is
contaminated by large magnitude noise or corruption. More specifically, you should
implement at least two NMF algorithms and compare their robustness.
2 Instructions
2.1 Dataset description
In this assignment, you need to apply NMF algorithms on two real-world face image
datasets: (1) ORL dataset
1; (2) Extended YaleB dataset
2
.
• ORL dataset: it contains 400 images of 40 distinct subjects (i.e., 10 images per
subject). For some subjects, the images were taken at different times, varying the
lighting, facial expressions, and facial details (glasses / no glasses). All the images
were taken against a dark homogeneous background with the subjects in an
upright, frontal position. All images are cropped and resized to 92×112 pixels.
• Extended YaleB dataset: it contains 2414 images of 38 subjects under 9 poses
and 64 illumination conditions. All images are manually aligned, cropped, and
then resized to 168×192 pixels.
1 https://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
2 http://vision.ucsd.edu/ iskwak/ExtYaleDatabase/ExtYaleB.html 2
Figure 1: An example face image and its occluded versions by b × b-blocks with b =
10,12, and 14 pixels.
Note: we provide a tutorial for this assignment, which contains example code for
loading a dataset to numpy array. Please find more details in assignment1.ipynb.
2.2 Assignment tasks
1. You need to implement at least two Non-negative Matrix Factorization (NMF)
algorithms:
• You should implement at least two NMF algorithms with at least one not
taught in this course (e.g., L1-Norm Based NMF, Hypersurface Cost Based
NMF, L1-Norm Regularized Robust NMF, and L2,1-Norm Based NMF).
• For each algorithm, you need to describe the definition of cost function as
well as the optimization methods used in your implementation.
2. You need to analyze the robustness of each algorithm on two datasets:
• You are allowed to design your own data pre-processing method (if
necessary).
• You need to use a block-occlusion noise similar to those shown in Figure 1.
The noise is generated by setting the pixel values to be 255 in the block. You
should design your own value for b (not necessary to be 10,12 or 14). You
are also encouraged to design your own noise other than the block-occlusion
noise.
• You need to demonstrate each type of noise used in your experiment (show
the original image as well as the image contaminated by noise).
• You should carefully choose the NMF algorithms and design experiment
settings to clearly show the different robustness of the algorithms you have
implemented.
3. You are only allowed to use the python standard library, numpy and scipy (if
necessary) to implement NMF algorithms. 3
2.3 Programming and External Libraries Python
This assignment is required to be finished by 3. When you implement NMF
algorithms, you are not allowed to use external libraries which contains NMF
implementations, such as scikit-learn, and Nimfa (i.e., you have to implement the NMF
algorithms by yourself). You are allowed to use scikit-learn for evaluation only (please
find more details in assignment1.ipynb). If you have any ambiguity whether you can
use a particular library or a function, please post on canvas under the Assignment 1
thread.
2.4 Evaluate metrics
To compare the performance and robustness of different NMF algorithms, we provide
three evaluation metrics: (1) Root Means Square Errors; (2) Average Accuracy; (3)
Normalized Mutual Information. For all experiments, you need to use at least two
metrics, i.e., Root Means Square Errors and Average Accuracy.
• Root Means Square Errors (RMSE): let X denote the contaminated dataset (by
adding noise), and ̂ denote the clean dataset. Let and denote the
factorization results on ̂ , the Root Means Square Errors then can be defined
as follows:
(1)
• Average Accuracy: You need to perform some clustering algorithms (i.e., Kmeans)
with num clusters equal to num classes. Each example is assigned with
the cluster label (please find more details in assignment1.ipynb). Lastly, you can
evaluate the accuracy of predictions Ypred as follows:
(3)
where I(·,·) is mutual information and H(·) is entropy.
Note: we expect you to have a rigorous performance evaluation. To provide an estimate
of the performance of the algorithms in the report, you can repeat multiple times (e.g.,
5 times) for each experiment by randomly sampling 90% data from the whole dataset
and average the metrics on different subset. You are also required to report the standard
deviations. 4
3 Report
The report should be organized like research papers, and should contain the following
sections:
• In abstract, you should briefly introduce the topic of this assignment and describe
the organization of your report.
• In introduction, you should first introduce the main idea of NMF as well as its
applications. You should then give an overview of the methods you want to use.
• In related work, you are expected to review the main idea of related NMF
algorithms (including their advantages and disadvantages).
• In methods, you should describe the details of your method (including the
definition of cost functions as well as optimization steps). You should also
describe your choices of noise and you are encouraged to explain the robustness
of each algorithm from theoretical view.
• In experiment, firstly, you should introduce the experimental setup (e.g., datasets,
algorithms, and noise used in your experiment for comparison).
Second, you should show the experimental results and give some comments.
• In conclusion, you should summarize your results and discuss your insights for
future work.
• In reference, you should list all references cited in your report and formatted all
references in a consistent way.
The layout of the report:
• Font: Times New Roman; Title: font size 14; Body: font size 12
• Length: Ideally 10 to 15 pages - maximum 20 pages
Note: You are encouraged to use LaTeX. Optionally, a MS-Word template is provided.
4 Submissions
The submission contains two parts: source code and report. Detailed instructions are
as follows:
1. Go to Canvas and upload the following files. 5
1. report (a pdf file): the report should include each member’s details
(student id and name).
2. code (a folder) as zip file
i. algorithm (a sub-folder): your code could be multiple files inside
algorithm sub-folder.
ii. data (an empty sub-folder): although two datasets should be inside the
data folder, please do not include them in the zip file. We will copy two
datasets to the data folder when we test the code.
2. Only one student needs to submit the report as pdf file and code as zip file which
must be named as student ID numbers of all group members separated by
underscores.
E.g., “xxxxx_xxxxx_xxxxx_code.zip and xxxxx_xxxxx_xxxxx_report.pdf”.
3. Your submission should include the report and the code. A plagiarism checker
will be used.
4. You need to clearly provide instructions on how to run your code in the appendix
of the report.
5. Indicate the contribution of each group member.
6. A penalty of minus 1.25 (5%) marks per each day after due (email late
submissions to TA and confirm late submission dates with TA). Maximum delay
is 5 days, Assignments more than 5 days late will get 0.
5 Plagiarism
• Please read the University Policy on Academic Honesty carefully:
http://sydney.edu.au/elearning/student/EI/academic_honesty.shtml
• All cases of academic dishonesty and plagiarism will be investigated.
• There is a new process and a centralised University system and database.
• Three types of offences:
1. Plagiarism – When you copy from another student, website or other
source. This includes copying the whole assignment or only a part of it.
2. Academic Dishonesty – When you make your work available to another
student to copy (the whole assignment or a part of it). There are other
examples of academic dishonesty. 6
3. Misconduct - When you engage another person to complete your
assignment (or a part of it), for payment or not. This is a very serious
matter, and the Policy requires that your case is forwarded to the
University Registrar for investigation.
• The penalties are severe and include:
1. A permanent record of academic dishonesty, plagiarism, and misconduct
in the University database and on your student file.
2. Mark deduction, ranging from 0 for the assignment to Fail for the course.
3. Expulsion from the University and cancelling of your student visa.
• When there is copying between students, note that both students are penalised –
the student who copies and the student who makes his/her work available for
copying.
• It is noted that only 30% (including references) is acceptable. The high
plagiarism will be reported to the school.
7
6 Marking scheme
Category Criterion Marks Comments
Report [20] Abstract [0.75]
•Problem, methods, organization.
Introduction [1.25]
•What is the problem you intend to solve?
•Why is this problem important?
Previous work [1.5]
•Previous relevant methods used in literature?
Methods [6.25]
•Pre-processing (if any) •NMF
Algorithm’s formulation.
•Noise choice and description.
Experiments and Discussions [6.25]
•Experiments, comparisons, and evaluation
•Extensive analysis and discussion of results
•Relevant personal reflection
Conclusions and Future work [0.75]
•Meaningful conclusions based on results
•Meaningful future work suggested
Presentation [1.25]
•Grammatical sentences, no spelling mistakes
•Good structure and layout, consistent
formatting
•Appropriate citation and referencing
•Use graphs and tables to summarize data
Other [2]
•At the discretion of the marker: for impressing
the marker, excelling expectation, etc.
Examples include clear presentation, welldesigned
experiment, fast code, etc.
8
Code [5]
•Code runs within a feasible time
•Well organized, commented and documented
Penalties [−]
•Badly written code: [−5]
•Not including instructions on how to run your
code: [−5]
Note: Marks for each category is indicated in square brackets. The minimum mark for the assignment will be 0 (zero).
请加QQ:99515681 邮箱:99515681@qq.com WX:codinghelp
- 第七届寒亭西瓜推介博览会开幕
- 中国医疗设备产业:创新引领,铸就健康新篇章
- EB5项目考察之行:世贸通移民集团因何受美国国会议员接见
- 数字化引爆,转化率狂飙 WhatsApp拉群工具 数字营销的巅峰之选
- 星辰大陆的创新魔法 WhatsApp拉群工具是科幻魔法师业务探险的必备法宝
- ins群发软件,ins营销助手,欧美爆粉联系天宇预约软件测试
- 数据摆在面前 WhatsApp拉群营销工具助我在全球范围内建立了稳健的品牌形象
- ADMCF326BRZ: Precision Analog Front-End for Sensory Perfection | ChipsX
- instagram群发引流软件,ins批量私信群发器,ig引流营销工具
- Instagram群发引流软件,ins批量私信引流群发助手,ig群发器
- VDP160直流无刷水泵在水循环冷却应用分析报告
- MAX7463USA+: Enhancing Video Signal Filtering for Superior Image Quality | ChipsX
- FSDH0265RLX: Revolutionizing Power Supply Efficiency for Sustainable Electronics | ChipsX
- 虚拟商城的跨境电商 Line 群发云控笑料奇遇:在虚拟商城的幻境中,经历一场科技笑话盛宴
- Instagram全球营销利器,ins如何快速引粉工具,ig博主引流软件
- Instagram引流神器 - ins接粉软件/ig打粉软件/ins私信软件
- 电报群发最强引流软件,Telegram自动拉群发工具/TG营销提升
- ins群发软件好用吗?Instagram独家引流推广群发软件,博主推荐购买!
- instagram营销软件,ins群发拉群,天宇爆粉【TG:@cjhshk199937】
- Instagram群发筛选软件,Ins群发注册工具,助你轻松推广!
- ins营销软件怎么自动群发私信?最稳instagram引流营销软件推荐
- 砺剑铸魂,赋能强军丨舒华体育用专业服务深化精英培育
- 数字大法宝 科技魔法师揭秘 在WhatsApp拉群营销工具的世界里开启业务新篇章
- Instagram营销软件推荐,ins引流工具吸客教程,ig群发软件
- 代写Operations Analytics、代做Python程序设计
- Instagram营销群发工具,ins私信采集软件/ig博主采集神器/测试联系大轩
- Ig引流神器,Instagram批量私信群发助手,ig引流工具
- 代写small-cap bio stocks程序
- Instagram批量养号 - ins自动登录/ig采集指定地区/ins群发软件
- Ins采集工具+私信群发神器,Instagram引流推广双管齐下!
推荐
- 丰田章男称未来依然需要内燃机 已经启动电动机新项目 尽管电动车在全球范围内持续崛起,但丰田章男 科技
- 升级的脉脉,正在以招聘业务铺开商业化版图 长久以来,求职信息流不对称、单向的信息传递 科技
- 全力打造中国“创业之都”名片,第十届中国创业者大会将在郑州召开 北京创业科创科技中心主办的第十届中国创业 科技
- 如何经营一家好企业,需要具备什么要素特点 我们大多数人刚开始创办一家企业都遇到经营 科技
- 苹果罕见大降价,华为的压力给到了? 1、苹果官网罕见大降价冲上热搜。原因是苹 科技
- 疫情期间 这个品牌实现了疯狂扩张 记得第一次喝瑞幸,还是2017年底去北京出差的 科技
- B站更新决策机构名单:共有 29 名掌权管理者,包括陈睿、徐逸、李旎、樊欣等人 1 月 15 日消息,据界面新闻,B站上周发布内部 科技
- 智慧驱动 共创未来| 东芝硬盘创新数据存储技术 为期三天的第五届中国(昆明)南亚社会公共安 科技
- 老杨第一次再度抓握住一瓶水,他由此产生了新的憧憬 瘫痪十四年后,老杨第一次再度抓握住一瓶水,他 科技
- 创意驱动增长,Adobe护城河够深吗? Adobe通过其Creative Cloud订阅捆绑包具有 科技