Source Code and Datasets [Return to Homepage]

The source code and datasets provided below are for research and educational purpose only and appropriate citation to the research paper(s) where mentioned and/or this website should be included. 

------------------------------------------------------------------------------------------------------------------------------------------------------

Copyright (c) Asad Ali

Website: https://sites.google.com/site/asad82/code

Email: asad_82@yahoo.com

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated 

documentation files (the "Software"), to deal in the Software with restriction for its use for research and educational 

purpose only, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the 

Software. The Software is provided "as is", without warranty of any kind.

-----------------------------------------------------------------------------------------------------------------------------------------------------

 Datasets

 Spectral Graph Clustering Algorithms

Note: Citation to this website should be included when the above spectral clustering codes are used.

Affine Invariants for Object and Pattern Recognition

Note: Citation to the following papers should be included when any of the above affine invariants codes are used with a mention to this website:

[1] A. Ali, S.A.M Gilani, N.A Memon, Affine Invariant Contour Descriptors using Independent Component Analysis and Dyadic Wavelet Transform, Journal of Computing and Information Technology (CIT), vol. 16, issue 3, page 169-181, September 2008

[2] A.Ali, S.A.M Gilani, N.A Memon,  Affine Normalized Invariant functionals using Independent Component Analysis,

IEEE International Multi-topic Conference (INMIC 06), page 94-99, 2006

[3] A. Ali, S.A.M Gilani, Affine Normalized Invariant Feature Extraction using Multiscale Gabor Autoconvolution, IEEE International Conference on Emerging Technologies (ICET 06), page 167-174, 2006

[4] A. Ali, S.A.M Gilani, Affine Normalized Contour Invariants using Independent Component Analysis and Dyadic Wavelet Transform, 21st  International Conference on Image and Vision Computing (IVCNZ 06), page 85-90, New Zealand, 2006

Machine Learning

[1]. Back-propagation Multi-layer Neural Network 

[2]. Reinforcement Learning (Q-Learning)

Zip File

Zip File

Note: Citation to the following papers should be included when backpropagation code is used with a mention to this website

[1] Learning representations by back-propagating errors, Nature 

[2] A. Chaudhry, A. Khan, A.M. Mirza, A. Ali, et. al, Neuro Fuzzy and Punctual Kriging Based Filter for Image Restoration,

Applied Soft Computing, vol. 13, issue 2, page 817-832, February 2013

BRDF Model Parameter Estimation, HDR Imaging

[1]. EPF. Lafortune, Non-Linear Approximation of Reflectance Function, SIGGRAPH, (Lafortune BRDF Model)

[2]. GJ. Ward, Measuring and Modeling Aniostropic Reflection, SIGGRAPH, (Ward BRDF Model)

[3]. Camera Response Function Estimation for HDR Imaging

Zip File

Zip File

Zip File

Note: Citation to the following thesis should be included when above BRDF model / HDR Imaging codes are used:

[1] A. Ali, Reflectance Modeling with Optimized Sampling Strategy, PhD Thesis, University of Tokyo, September 2013.

Reversible Image Watermarking

Note: Citation to the following papers should be included when the above watermarking codes are used in your work with a mention to this website::

[1] A. Ali, A. Khan, Reversible Watermarking for 3D Cameras: Hiding Depth Maps, Recent Advances in Multimedia Signal Processing and Communications, vol. 231, page 495-521, Springer, October 2009

[2] A. Khan, S.A. Malik, A. Ali, et al., Intelligent Reversible Watermarking and Authentication: Hiding Depth Map Information for 3D Cameras Information Science, vol. 216, page 155-175, December 2012

[3] A. Khan, A. Ali, M.T. Mahmood, I. Usman, T.S. Choi, Variable Threshold Based Reversible Watermarking: Hiding Depth Maps, IEEE International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), page 59-64, China, October 2008

Utilities (Computer Vision, Image Processing, Data Compression, Thread Library, Graphs)

Note: Citation to this website must be included when any of the utilities are used