Using an Adaptive Invasion–based Model for Fast Range Image Registration Ivanoe De Falco Antonio Della Cioppa Domenico Maisto ICAR–CNR Via P. Castellino, 111 Naples, Italy University of Salerno Via Ponte Don Melillo, 1 Fisciano (SA), Italy ICAR–CNR Via P. Castellino, 111 Naples, Italy [email protected] [email protected] [email protected] Umberto Scafuri Ernesto Tarantino ICAR–CNR Via P. Castellino, 111 Naples, Italy ICAR–CNR Via P. Castellino, 111 Naples, Italy [email protected] [email protected] ABSTRACT Keywords This paper presents an adaptive model for automatically pair–wise registering range images. Given two images and set one as the model, the aim is to find the best possible spatial transformation of the second image causing 3D reconstruction of the original object. Registration is effected here by using a distributed Differential Evolution algorithm characterized by a migration model inspired by the phenomenon known as biological invasion, and by applying a parallel Grid Closest Point algorithm. The distributed algorithm is endowed with two adaptive updating schemes to set the mutation and the crossover parameters, whereas the subpopulation size is assumed to be set in advance and kept fixed throughout the evolution process. The adaptive procedure is tied to the migration and is guided by a performance measure between two consecutive migrations. Experimental results achieved by our approach show the capability of this adaptive method of picking up efficient transformations of images and are compared with those of a recently proposed evolutionary algorithm. This efficiency is evaluated in terms of both quality and robustness of the reconstructed 3D image, and of computational cost. Distributed Differential Evolution, adaptive control parameter setting, range image registration. 1. INTRODUCTION Range Image Registration (RIR) is a crucial task in computer vision used for integrating information acquired under diverse viewing angles (multi–view analysis). Over the years, several multi–view RIR techniques have been developed [21, 29, 17, 30] to tackle many practical applications, such as 3D modeling ranging from medical imaging, remote sensing, digital archeology, restoration of historic buildings, virtual museum, artificial vision, reverse engineering and computer–aided design (CAD) [27]. Since a physical object cannot be completely scanned with a single image due to the limited field of view of a sensor, a set of images taken from different positions is required to supply the information needed to build the whole 3D model. To avoid manually producing such a model by means of error–prone CAD–based techniques, multiple images are acquired by using range scanners [2] and joined together by a registration algorithm. The registration strategy can differ according to whether all range views of the objects are registered at the same time (multi–view registration) or only a pair of adjacent range images is processed in every execution (pair–wise registration). This paper is focused on the pair–wise registration of range images. As a consequence, starting from two views, i.e., the model and the scene, the objective of our registration process consists in finding the best spatial transformation that, when applied to the scene, aligns it with the model in a common coordinate system. Image registration is usually formulated as an optimization problem solved by iterative procedures. Among these, examples are Iterative Closest Point (ICP) methods [28], centered on the point–to–point and point–to–plane correspondences. However, as a drawback, the majority of these iterative algorithms requires to provide either a rough or a near–optimal prealignment of the images to avoid being trapped in local optima. Unfortunately, an exhaustive exploration of the search space of all the candidate solutions becomes impracticable in case of absence of constraints for Categories and Subject Descriptors I.2.8 [Artificial Intelligence]: Problem Solving, Control Methods, and Search—heuristic methods; I.4.3 [Image Processing and Computer Vision]: Enhancement— Registration Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. GECCO’14, July 12–16, 2014, Vancouver, BC, Canada. Copyright 2014 ACM 978-1-4503-2662-9/14/07 ...$15.00. http://dx.doi.org/10.1145/2576768.2598340. 1095 the possible transformations. Moreover, most of the computation time is spent in finding the closest point in the model image to every point in the aligned image. Thus stochastic optimization algorithms, such as Evolutionary Algorithms (EAs) [1], capable of providing a solution acceptably close to the global optimum in a reasonable time, have been successfully applied to complex real–world problems in computer vision and image registration [3, 8, 11, 12, 20, 26, 30]. Although these methods constitute an interesting alternative because they do not necessitate a good prealignment of the views to converge to the global optimum, they require a careful tuning of many control parameters. The setting of these parameters can strongly affect the performance of the algorithms [15] and is a very time–consuming task. Therefore, automatic procedures for efficiently setting these crucial control parameters for dealing with complex optimization problems are highly recommended. Moreover, the computation time to find the closest point in the model image can be significantly reduced by applying a Grid Closest Point (GCP) transformation [37] before the registration process. With the aim to overcome the above drawbacks, within this paper we examine the ability of a recently proposed adaptive model for distributed Differential Evolution (DE) [25] to perform automatic pair–wise image registration by exploiting a distributed implementation of GCP without any a priori knowledge of the pose of the views. The distributed adaptive model is characterized by a migration model inspired by the phenomenon known as biological invasion [34] and is endowed with two updating schemes for automatically setting DE control parameters. Hereinafter, this adaptive algorithm is referred to as Adaptive Invasion– based migration Model for distributed DE (AIM–dDE) [7]. The adaptive procedure occurs at each migration time and is based on two steps. Firstly a local performance measure related to the average fitness improvement for each subpopulation is computed between two consecutive migration steps. Secondly, a specific updating scheme based on these measures takes place to update the control parameter values of some subpopulations. The evolutionary system has been tested by means of a set of eight widely used 3D range images. To further estimate its effectiveness, it is also compared with a Self–adaptive Evolutionary Optimization algorithm, named SaEvO, recently proposed by Santamaria et al. [33] for facing RIR problems. The experimental results demonstrate the ability of the proposed adaptive approach in facing these RIR problems. Paper structure is as follows: Section 2 describes the state of the art. Section 3 contains a brief description of AIM– dDE algorithm and illustrates the application of our system to the registration task defining the encoding and the fitness of the related optimization problem. Section 4 reports the results achieved by our tool. The last section contains final remarks and future works. applied to the image registration problems. Differently from methods based on the ICP algorithm, EAs can work with images without any kind of prealignment. An extensive review of evolutionary image registration methods is reported in [30]. He and Narayana [16] propose a real coding scheme that makes use of arithmetic crossover and uniform mutation operators within an elitist generational model including a restart mechanism. The evolutionary method uses a real–coded Genetic Algorithm (GA) to estimate the rigid transformation and a local search procedure to refine the obtained preliminary solution. Chow et al. [3] still propose the use of real–coded GA considering a rigid transformation but introduce a crossover operator that randomly selects the number of genes to be swapped and a different sophisticated restart mechanism. Silva et al. [35] face the pair–wise registration problem of range images captured by 3D laser range scanner by means of a parameter–based approach for rigid transformations. The proposed technique is inspired to the steady–state evolutionary scheme of GAs. Tournament selection, uniform crossover, and random selection mutation operator are used together with a hill–climbing algorithm in order to improve the precision of the results. In [20] a new method for the pair–wise registration is introduced. The novelty is represented by the inclusion of a degree of overlapping parameter in the solution vector and the utilization of the trimmed square metric as objective function to be minimized. Cordón et al. [4] present a Scatter Search [18] EA adopting a matching–based approach while Santamaria et al. propose different memetic–based image registration techniques to deal with 3D reconstruction of forensic objects [31, 32]. As regards the adaptive approaches, De Falco et al. [10] propose a novel adaptive updating scheme based on chaos theory for setting the control parameters for a DE algorithm to tackle pair–wise registration problem. Moreover, Santamaria et al. [33] illustrate a self–adaptive memetic evolutionary optimization algorithm, named SaEvO, for facing real–world RIR problems. 3. ADAPTIVE INVASION–BASED MODEL Among EAs, DE has proven fast and reliable to face several multivariable optimization tasks in many applications [6, 24]. As underlined in Section 1, one of the ways to improve the DE chance to generate solutions with higher quality is to devise suitable control parameter adaptive strategies. Based on these considerations we introduced AIM–dDE, a novel adaptive distributed model endowed with updating schemes for setting the values of mutation and crossover parameters. Our model is different from the others in literature relative to dDEs in the following aspects: • the control parameter updating is strictly tied to the migration process in order to balance exploration and exploitation in the parameter space; 2. STATE OF THE ART Several surveys on RIR are available in literature. A complete study focused on pair–wise registration is presented in [5], while different techniques for both pair– wise and multi–view registration, and a new classification, can be found in [29]. In the last two decades, EAs have been extensively • the choice of the subpopulations which update the parameter values is driven by a performance measure related to the average fitness improvements of each subpopulation between two consecutive migration times; 1096 • the subpopulations involved by the parameter changing are unknown a priori, in that they are selected based on the performance feedback coming from the same subpopulations. eters are sampled from two independent sequences of an uniform distribution U (0.1, 1.0). This distribution has been used in the following each time a parameter is randomly generated. AIM–dDE is based on IM–dDE [9], a previous distributed invasion–based model proposed by us, with the addition of an adaptive strategy for the DE control parameters. Therefore, in the next subsections we firstly report a brief description of our IM–dDE, and then we present the associated adaptive schemes. 2. At a generic invasion time t = kT , with k as above, and before the new founding subpopulations have been created on all the nodes, for each subpopulation the local improvement ∆⟨Φp (t)⟩ of the average fitness is evaluated as the difference between the average fitness values after the last invasion and at the current generation (for the first invasion time only, the initial generation is taken into account as ‘last invasion’): 3.1 The IM–dDE algorithm IM–dDE is a stepping–stone dDE using a migration inspired by the biological invasion process instead of the canonical exchange mechanism. The model makes use of a locally connected topology where each node p hosts an instance of a DE, and is connected to its neighboring nodes. At each generation t, the subpopulation Pp (t) of each node p performs a sequential DE until t equals tmax generations. At every T generations, T being an algorithm parameter named invasion interval, neighboring subpopulations exchange individuals. Hence, at a generic invasion ⌋} and tmax the time t = kT , with k ∈ {1, . . . , ⌊ tmax T maximum number of generations, the set of individuals each subpopulation Pp (t) sends to its neighbors, i.e., the propagule, is indicated as MPp (t) and is determined by collecting the individuals of Pp (t) which are fitter than its current average fitness ⟨Φp (t)⟩: ∆⟨Φp (t)⟩ =⟨Φp (t − T )⟩ − ⟨Φp (t)⟩, } { (2) tmax ⌋ . with t = kT , k ∈ 1, . . . , ⌊ T 3. According to a predefined updating scheme a set of subpopulations is chosen and the values of their control parameters are changed. As concerns the step 3, several updating schemes can be devised in order to select the set of subpopulations on which the adaptive setting of control parameters has to take place. To this end, we propose two updating schemes, i.e., RandAvg and ChAvg. • RandAvg. According to this scheme, the average of all the local improvements, i.e., the global average improvement ⟨∆⟨Φp (t)⟩⟩ is computed: { } MPp (t) = xpi (t) ∈ Pp (t) Φ(xpi (t)) ≻ ⟨Φp (t)⟩ l 1∑ Φ(xpj (t)), l j=1 { } tmax t = kT , k ∈ 1, . . . , ⌊ ⌋ T with ⟨Φp (t)⟩ = (1) ⟨∆⟨Φp (t)⟩⟩ = N 1 ∑ ∆⟨Φp (t)⟩, N p=1 with t = kT , k ∈ where Φ(xpi (t)) is the fitness associated to the individual xpi (t) and “≻” is a binary relation stating that the left member is fitter than the right member. All of the chosen individuals are sent to all of the neighboring subpopulations Pp̃ (t), with p̃ belonging to the set of neighbors of the node p. Then, at each invasion ∑ time, each subpopulation receives a total number of p̃ MPp̃ (t) elements where MPp̃ (t) is the cardinality of the set MPp̃ (t) . Afterwards, in each node, a founding subpopulation, formed by both native and exogenous individuals, is constructed by adding this massive number of invading individuals to the local subpopulation. Hence, the founding subpopulation constitutes a source of heterogeneity exploitable by the algorithm to improve its ability to search new evolutionary paths. Subsequently, a fitness–proportionate selection mechanism is applied to the founding subpopulation to generate the new subpopulation Pp′ (t). { } tmax 1, . . . , ⌊ ⌋ . T (3) The control parameter values of each subpopulation for which ∆⟨Φp (t)⟩ < ⟨∆⟨Φp (t)⟩⟩ are randomly replaced. Then the control parameter values of all the subpopulations are kept constant until next invasion when the procedure takes place again. • ChAvg. At each invasion time, the mutation and the crossover parameter values of all the subpopulations are generated according to a chaotic series. The control parameter values of each subpopulation for which ∆⟨Φp (t)⟩ < ⟨∆⟨Φp (t)⟩⟩ are updated as follows: { Ft+1 = µ · Ft · (1 − Ft ) (4) CRt+1 = µ · CRt · (1 − CRt ) Then the control parameter values of all the subpopulations are kept constant until next invasion when the procedure takes place again. The ChAvg scheme is based on one of the simplest and most commonly used dynamic systems evidencing chaotic behavior known as the logistic map [23] which is described by the following quadratic recurrence equation: 3.2 Adaptive Strategy If, without loss of generality, minimization problems are considered, the procedure on which the adaptive model is based occurs in three steps as follows: 1. At the beginning of the evolution for each subpopulation random values for mutation and crossover param- yt+1 = µ · yt · (1 − yt ), with t = 1, 2, 3, . . . 1097 (5) transformation f ∗ achieving the best alignment of both f (IS ) and IM based on the chosen similarity metric Φ to optimize: Algorithm 1 Pseudo-code of AIM–dDE on a generic node p with p ∈ {1, ..., PN } t=0 randomly initialize a subpopulation Pp (t) = {xp1 (t), · · · , xpl (t)} evaluate the fitness Φ(xpi (t)), ∀i ∈ {1, . . . , l} randomly initialize the values for F and CR from two independent U (0.1, 1.0) while halting conditions are not satisfied do t=t+1 update the subpopulation Pp (t) using the evolutionary operators of the DE evaluate the fitness Φ(xpi (t)), ∀i ∈ {1, . . . , l} if ((t mod T ) = 0) then create the propagule MPp (t) for the current subpopulation send the propagule MPp (t) to the neighboring subpopulations receive the propagules MPp̃ (t) from the neighboring subpopulations construct the founding subpopulation Πp (t) select l individuals in Πp (t) through a fitness– proportionate selection mechanism insert the l selected individuals into a new subpopulation Pp′ (t) replace the subpopulation Pp (t) with Pp′ (t) set the values for F and CR according to the chosen updating scheme end if end while f ∗ = arg min Φ(IS , IM ; f ) f (6) Due to its robustness in presence of outliers (i.e., acquired noisy range images), the similarity metric Φ usually considered in 3D modeling is the median square error (MedSE ) [27]. It can be formulated as: Φ(IS , IM ; f ) = M edSE(d2i ), ∀i = {1, . . . , n} (7) where MedSE corresponds to the median value of all the 2 squared Euclidean distances, d2i = ||f (⃗ pi ) − p ⃗ ′j || (j = 1, . . . , m), between the transformed scene point, f (⃗ pi ), and its corresponding closest point, p ⃗ ′j , in the model view IM . To speed up the computation of the closest point the GCP transform is used. It is important to remark here that, although performed only once before the registration, such a computation is the most time–consuming part of the RIR problem. In fact, the amount of time needed for this computation strongly depends on the discretization of the physical space into which the object is, and on the number of points composing the two images to register. In a sequential environment this computation can last even hours, before evolution can start and a suitable transformation is found. Yet, the computation of the GCP can highly profit from a distributed approach as the one we are proposing. In fact, it can be easily and completely parallelized without introducing any parallel overhead: each image can be divided into slices along one of the axes, and each slice can be assigned to a different core. In this way, this task can be completed in an amount of time depending on the quantity of hardware available, the higher the number of processing units the higher the number of slices and, consequently, the lower the computation time. where µ is a positive constant sometimes known as biotic potential. The behavior of the system is greatly affected by the value of µ which determines whether y stabilizes at a constant size, oscillates among a limited sequence of sizes, or behaves chaotically in an unpredictable pattern. A very small difference in the initial value y1 causes large differences in the long–time dynamic behavior [19]. Eq. (5) exhibits chaotic dynamics with values within the range [0, 1] at µ approximately 3.57. Beyond µ = 4 and y1 ̸= 0, 0.25, 0.50, 0.75, 1, the values eventually leave the interval [0, 1] and diverge for almost all initial values. 4. EXPERIMENTAL RESULTS To investigate the behavior of AIM–dDE in the RIR field, a set of benchmarks from the image repository [22] collected at Signal Analysis and Machine Perceptron Laboratory (SAMPL) at the Ohio State University has been taken into account. From that repository, the following eight objects have been considered: Angel, Bird, Buddha, Bunny, Duck, Frog, Lobster, and Teletubby. For each of them the pair of images taken at angles 0 and 40 degrees has been chosen as exemplary instances for pair–wise RIR. The parallel algorithms, which use the Message Passing Interface (MPI) [36], are written in C language. All the experiments have been carried out on an Apple iMac that is equipped with an Intel Core i7 Quad–core, each core running at 3.4 GHz. Throughout the experiments we have made use of a DE/rand /1/bin strategy. After a preliminary tuning, for the whole experimental phase the parameter setting has been chosen as follows: number of subpopulations N equal to 16, size of each subpopulation l = 10, the value for the migration interval T equal to 30. Finally, AIM–dDE has been executed for each of the two updating schemes. For the logistic map, we have used µ = 4 and y(1) =]0, 0.5[−{0.25}. As concerns the number of generations for our distributed algorithm, its exact value has been set after making a great deal of careful consideration. In fact, to assess in a fair way Depending on the specific scheme selected, we have two algorithms for AIM–dDE, namely AIM–dDE–RandAvg and AIM–dDE–ChAvg. The pseudo–code of the AIM–dDE model for a generic node, regardless of the specific updating scheme chosen, is reported in Algorithm 1. 3.3 Encoding and Fitness Given two input images, named scene IS = {⃗ p1 , . . . , p ⃗n } and model IM = {⃗ p ′1 , . . . , p ⃗ ′m } with n and m points respectively, RIR aims to find the best possible Euclidean motion f for IS determined by the rotation Rθ of an angle θ around an axis A and the translation ⃗t = (tx , ty , tz ). Then the transformed points are denoted as: f (⃗ pi ) = Rθ (⃗ pi ) + ⃗t, i = 1, . . . , n. Actually unit quaternions are used to manage rotations in order to avoid singularities and discontinuities, e.g. gimbal lock. In this notation Rθ = (θ, Ax , Ay , Az ). The pair–wise RIR problem can then be seen as a numerical optimization problem in which solutions are encoded as seven–dimensional vectors of real values x = (θ, Ax , Ay , Az , tx , ty , tz ). The aim is to search the Euclidean 1098 Table 1: RIR results in terms of best and average values, and standard deviations obtained over 25 runs. Algorithm AIM–dDE–RandAvg AIM–dDE–ChAvg SaEvO Φb ⟨Φ⟩ σΦ Φb ⟨Φ⟩ σΦ Φb ⟨Φ⟩ σΦ Angel 0.5550 0.5622 0.0045 0.5524 0.5611 0.0049 0.3493 0.4983 0.2175 Bird 0.2274 0.2279 0.0005 0.2274 0.2280 0.0005 0.2028 0.4451 0.3052 Buddha 0.6571 0.6592 0.0046 0.6524 0.6541 0.0018 0.3990 0.6120 0.1224 the quality of the results achieved, in this paper we also wish to compare our results against those obtained by the best–so–far algorithm used in the literature to perform range image registration over the same eight objects, i.e., SaEvO described in [33]. The fitness function used in that paper is the same as in ours, so comparisons in terms of averaged final fitness values are sensible. Unfortunately, in that paper the exact number of fitness evaluations performed to achieve those results is not given, rather their sequential algorithm is allowed an execution time of 20 seconds for evolution over an Intel Pentium IV 2.6 GHz processor, and then evolution is stopped. Therefore, to carry out an as–fair–as–possible comparison, we need to carefully set for our distributed algorithm an execution time for evolution that is equivalent to that of their sequential one, and we should also take into account the differences in the number and types of processors used and in their clock rates. Since we use four 3.4 Ghz cores, the following equality has to hold: 20 · 2.6 = (4 · τ ) · 3.4 where τ is the execution time for the evolution of our distributed program over each core. This equality yields τ = 3.824 seconds. Furthermore, we wish to run our distributed algorithm over 16 subpopulations, that means that each core should run four subpopulations. Therefore, the actual time for the evolution of each subpopulation is 0.956 seconds. The images of the eight test objects contain different numbers of points, ranging from a minimum of 5, 612 up to a maximum of 14, 258. Depending on the different numbers of points, different times would be needed to carry out the computation of the quality of each registration proposed by the evolutionary algorithm over the objects, so different numbers of fitness evaluations could be carried out for the different problems in the 0.956 seconds allowed. Following [33] we randomly sample the points composing the images by means of a uniform distribution, and choose 5, 000 points for each image, exactly as in that paper. In this way, by running our distributed code we see that over each core we can execute 30 generations for each of the four there allocated subpopulations in a time equal to 42.61 milliseconds. The number of 30 generations has been chosen due to the value assigned to the migration interval, so as to include in this time also that needed to carry out migration. Therefore, in the time allowed to each subpopulation, we can carry out a number of generations equal to 0, 956 · 30/0.04261 = 673.08. This, multiplied by the population size and by the number of subpopulations, yields a total number of fitness evaluations equal to 107, 693. Actually, we have decided to use a number of fitness evaluations lower than the one computed above, because we wish to take into account also other issues, including, among others, the fact that the Intel Pentium IV used in Bunny 0.2015 0.2025 0.0007 0.2015 0.2030 0.0008 0.0712 0.1800 0.2052 Duck 0.2245 0.2262 0.0012 0.2240 0.2261 0.0012 0.1585 0.2355 0.1135 Frog 0.2364 0.2399 0.0025 0.2362 0.2396 0.0026 0.2536 0.3991 0.1963 Lobster 0.3886 0.3949 0.0034 0.3926 0.3950 0.0021 0.2505 0.3787 0.1984 Teletubby 0.1723 0.1746 0.0022 0.1707 0.1732 0.0017 0.1050 0.1911 0.1667 the reference paper has several features that are no longer up–to–date, which are reflected in an execution a bit slower than the one that can be achieved with our more modern processors. Therefore, we have limited that number to 100, 000. This latter figure results in 625 generations. As regards the GCP, our distributed approach allows strongly reducing the computation time to just some minutes. As examples, for the image with the lowest number of points, i.e., Teletubby, the sequential time for the GCP is 3,077 s, whereas the distributed is 87 s. The corresponding times for the image with highest number of points, i.e., Buddha, are 8,489 s and 272 s respectively. This is a noticeable by-product offered by a distributed approach such as ours. For each algorithm and for each problem Table 1 reports the best final value Φb achieved in 25 runs, the average value ⟨Φ⟩ over the 25 final values, and the related standard deviation σΦ . With reference to each such index, the table shows in bold the algorithm with the best value for each problem. As a first remark, the superiority of one algorithm with respect to the others in terms of performance is not evident. In fact, SaEvO outperforms the other methods in terms of Φb , whereas the average results achieved by all the methods are at first glance comparable. On the other hand, AIM– dDE shows an evident superiority as far as σΦ is accounted. In fact, on all the eight problems both the adaptive versions of AIM–dDE show lower values for σΦ with respect to SaEvO, meaning that the adaptive invasion model is very robust. Nevertheless, it should be noted that the standard deviation values shown by SaEvO are very high and of the same magnitude of the average values. As an example of the results obtained by AIM–dDE, Fig. 1 shows the outcome for Angel object, while Fig. 2 shows the registered images. It is worth noting that the differences between the aligned images by AIM–dDE– RndAvg and AIM–dDE–ChAvg are barely perceivable as evidenced by the numerical results. 4.1 Statistical analysis To compare the algorithms from a statistical point of view, a classical approach based on nonparametric statistical tests has been carried out, following [13, 14]. To do so, the ControlTest package [14] has been used. It is a Java package freely downloadable at http://sci2s.ugr.es/sicidm/, developed to compute the rankings for these tests, and to carry out the related post–hoc procedures and the computation of the adjusted p–values. The results for the one–to–all analysis are reported in the following. Table 2 contains the results of the Friedman, Aligned Friedman, and Quade tests in terms of average rankings obtained by the three algorithms. The last two 1099 Figure 1: Some examples of results for Angel problem. Top left: original model image at zero degrees. Top right: original scene image at forty degrees. Bottom left: the best transformation of the scene image achieved by AIM–dDE–RandAvg. Bottom right: the best transformation of the scene image achieved by AIM–dDE–ChAvg. Figure 2: Reconstructed objects. Left pane: AIM–dDE–RndAvg. Right pane: AIM–dDE–ChAvg. the other algorithms, SaEvO is the second in Friedman and Quade, whereas AIM–dDE–RandAvg is the second in Aligned Friedman. Furthermore, with the aim to examine if some hypotheses of equivalence between the best performing algorithm and the other ones can be rejected, the complete statistical analysis based on the post–hoc procedures ideated by Holm, Hochberg, Hommel, Holland, Rom, Finner, and Li has been carried out following [14]. Moreover, the adjusted p–values have been computed by means of [14]. Table 3 reports the results of this analysis performed at a level of significance α = 0.05. The level of significance represents the maximum allowable probability of incorrectly rejecting a given null hypothesis. In our case, α = 0.05 means that if an equivalence hypothesis is rejected, there is a 5% probability of making a mistake in rejecting it, so a 95% that we are correctly rejecting it. Table 2: Rankings of the algorithms. Algorithm AIM–dDE–ChAvg AIM–dDE–RandAvg SaEvO test statistic p–value Friedman 1.875 2.125 2.000 0.250 0.896 Aligned Friedman 12.000 12.250 13.250 5.968 0.051 Quade 1.861 2.083 2.056 0.082 0.921 rows show the statistic and the p–value for each test, respectively. For Friedman and Aligned Friedman tests the statistic is distributed according to chi–square with 2 degrees of freedom, whereas for Quade test it is distributed according to F–distribution with 2 and 14 degrees of freedom. In each of the three tests, the lower the value for an algorithm, the better the algorithm. AIM–dDE–ChAvg turns out to be the best in all of the three tests. Among 1100 In this table the other algorithms are ranked in terms of distance from the best performing one, and each algorithm is compared against this latter to investigate whether or not the equivalence hypothesis can be rejected. For each algorithm each table reports the z value, the unadjusted p– value, and the adjusted p–values according to the different post-hoc procedures. The variable z represents the test statistic for comparing the algorithms, and its definition depends on the main nonparametric test used. In [14] all the different definitions for z, corresponding to the different tests, are reported. The last row in each sub–table contains for each procedure the threshold value T h such that the procedure considered rejects those equivalence hypotheses that have an adjusted p–value lower than or equal to T h. Summarizing the results of these tables, in each of the three tests AIM–dDE–ChAvg is for all the post–hoc procedures statistically better than the third classified algorithm, whereas statistical equivalence hypothesis cannot be rejected with the runner up. [5] Dalley, G., Flynn, P.: Pair-wise range image registration: a study in outlier classification. Computer Vision and Image Understanding 87(1–3), 104–115 (2002) [6] De Falco, I., Della Cioppa, A., Iazzetta, A., Tarantino, E.: An evolutionary approach for automatically extracting intelligible classification rules. Knowledge and Information Systems 7(2), 179–201 (2005) [7] De Falco, I., Della Cioppa, A., Maisto, D., Scafuri, U., Tarantino, E.: An adaptive invasion–based model for distributed differential evolution. Information Sciences (2014), http://dx.doi.org/10.1016/j.ins.2014.03.083 [8] De Falco, I., Della Cioppa, A., Maisto, D., Scafuri, U., Tarantino, E.: Satellite image registration by distributed differential evolution. In: Lecture Notes in Computer Science, vol. 4448, pp. 251–260. Springer–Verlag (2007) [9] De Falco, I., Della Cioppa, A., Maisto, D., Scafuri, U., Tarantino, E.: Biological invasion–inspired migration in distributed evolutionary algorithms. Information Sciences 207, 50–65 (2012) [10] De Falco, I., Della Cioppa, A., Maisto, D., Scafuri, U., Tarantino, E.: Adding chaos to differential evolution for range image registration. In: Lecture Notes in Computer Science, vol. 7835, pp. 344–353. Springer–Verlag (2013) [11] De Falco, I., Della Cioppa, A., Maisto, D., Tarantino, E.: Differential evolution as a viable tool for satellite image registration. Applied Soft Computing 8(4), 1453–1462 (2008) [12] De Falco, I., Maisto, D., Scafuri, U., Tarantino, E., Della Cioppa, A.: Distributed differential evolution for the registration of remotely sensed images. In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-based Processing. pp. 358–362. IEEE (2007) [13] Dems̆ar, J.: Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research 7, 1–30 (2006) [14] Derrac, J., Garcı́a, S., Molina, D., Herrera, F.: A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm and Evolutionary Computation 1, 3–18 (2011) [15] Eiben, A.E., Hinterding, R., Michalewicz, Z.: Parameter control in evolutionary algorithms. IEEE Transactions on Evolutionary Computation 3(2), 124–141 (1999) [16] He, R., Narayana, P.A.: Global optimization of mutual information: application to three–dimensional retrospective registration of magnetic resonance images. Comput. Med. Imag. Grap 26, 277–292 (2002) [17] Kurogi, S., Nagi, T., Yoshinaga, S., Koya, H., Nishida, T.: Multiview range image registration using competitive associative net and leave-one-image-out cross-validation error. In: Neural Information Processing. pp. 621–628. Springer (2011) [18] Laguna, M., Martı́, R., Martı́, R.C.: Scatter search: methodology and implementations in C, vol. 24. Springer (2003) [19] Liu, J., Lampinen, J.: A fuzzy adaptive differential evolution algorithm. Soft Computing-A Fusion of 5. CONCLUSIONS AND FUTURE WORKS In this paper an adaptive distributed Differential Evolution technique based on invasions has been investigated to optimize a 3D rigid transformation for automatic pair–wise registration of range images without considering any previous knowledge of the pose of the view. A parallel version of Grid Closest Point has been used to speed up the computation of the closest points. The experimental phase, carried out on a set of benchmark range images, shows that our AIM–dDE with the adaptive scheme based on chaos theory is at least statistically equivalent the best–so–far algorithm from literature in terms of performance, while it performs better in terms of robustness of the reconstructed 3D image, and of computational cost. If computational costs are considered, our approach has two positive features. Firstly, the time for the computation of GCP has been strongly reduced, which is very useful when large images are to be registered. Secondly, the time for the evolution has been decreased from 20 s to 3.824 s. Although promising, there is plenty of work still to do to further evaluate the effectiveness of our system, and its limitations as well. Firstly, a wide tuning phase will be carried out to investigate if other chaotic parameter settings for AIM– dDE–ChAvg are, on average, more fruitful than others. Moreover, the use of other chaotic maps will be investigated. 6. REFERENCES [1] Bäck, T., Fogel, D., Michalewicz, Z.: Handbook of Evolutionary Computation. IOP Publishing Ltd. (1997) [2] Campbell, R.J., Flynn, P.J.: A survey of free-form object representation and recognition techniques. Computer Vision and Image Understanding 81(2), 166–210 (2001) [3] Chow, K.W., Tsui, T.: Surface registration using a dynamic genetic algorithm. Pattern Recognition 37, 105–117 (2004) [4] Cordón, O., Damas, S., Santamarı́a, J., Martı́, R.: Scatter search for the point-matching problem in 3D image registration. Informs J. on Computing 20(1), 55–68 (2008) 1101 Table 3: Results of post–hoc procedures for Friedman(top), Aligned Friedman (center), and Quade (bottom) tests over all tools (at α = 0.05). [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] i 2 1 Th Algorithm AIM–dDE–RandAvg SaEvO z = (R0 − Ri )/SE 0.500 0.250 p 0.617 0.803 Holm/Hochberg/Hommel 0.025 0.050 0.025/–/0.025 Holland 0.025 0.050 0.025 Rom 0.025 0.050 0.025 Finner 0.025 0.050 0.025 Li 0.010 0.050 0.010 i 2 1 Th Algorithm SaEvO AIM–dDE–RandAvg z = (R0 − Ri )/SE 0.354 0.071 p 0.724 0.944 Holm/Hochberg/Hommel 0.025 0.050 0.025/–/0.025 Holland 0.025 0.050 0.025 Rom 0.025 0.050 0.025 Finner 0.025 0.050 0.025 Li 0.003 0.050 0.003 i 2 1 Th Algorithm AIM–dDE–RandAvg SaEvO z = (R0 − Ri )/SE 0.396 0.347 p 0.692 0.729 Holm/Hochberg/Hommel 0.025 0.050 0.025/–/0.025 Holland 0.025 0.050 0.025 Rom 0.025 0.050 0.025 Finner 0.025 0.050 0.025 Li 0.014 0.050 0.014 [31] Santamarı́a, J., Cordón, O., Damas, S., Aleman, I., Botella, M.: A scatter search-based technique for pair-wise 3d range image registration in forensic anthropology. Soft Computing-A Fusion of Foundations, Methodologies and Applications 11(9), 819–828 (2007) [32] Santamarı́a, J., Cordón, O., Damas, S., Garcı́a-Torres, J.M., Quirin, A.: Performance evaluation of memetic approaches in 3d reconstruction of forensic objects. Soft Computing-A Fusion of Foundations, Methodologies and Applications 13(8), 883–904 (2009) [33] Santamarı́a, J., Damas, S., Cordón, O., Escámez, A.: Self–adaptive evolution toward new parameter free image registration methods. IEEE Transactions on Evolutionary Computation 17(4), 545–557 (2013) [34] Shigesada, N., Kawasaki, K.: Biological invasions: theory and practice. Oxford University Press, USA (1997) [35] Silva, L., Bellon, O.R.P., Boyer, K.L.: Precision range image registration using a robust surface interpenetration measure and enhanced genetic algorithms. IEEE Transactions on Pattern Analysis 27(5), 762–776 (2005) [36] Snir, M., Otto S, Huss-Lederman, S., Walker, D., Dongarra, J.: MPI: The Complete Reference – The MPI Core, vol. 1. MIT Press, Cambridge, MA, USA (1998) [37] Yamany, S.M., Ahmed, M.N., Heyamed, E.E., Farag, A.A.: Novel surface registration using the grid closest point (cgp) transform. In: Int. Conf. on Image Processing. vol. 3, pp. 809–813. IEEE Press (1998) Foundations, Methodologies and Applications 9(6), 448–462 (2005) Lomonosov, E., Chetverikov, D., Ekárt, A.: Pre-registration of arbitrarily oriented 3D surfaces using a genetic algorithm. Pattern Recognition Lett. 27(11), 1201–1208 (2006) Matsuda, T.: Log–polar height maps for multiple range image registration. Computer Vision and Image Understanding 87(1–3) (2009) Ohio State University: SAMPL image repository, http://sampl.eng.ohio-state.edu/ sampl/database.htm (2009) Peitgen, H.O., Jürgens, H., Saupe, D.: Chaos and Fractals: New Frontiers of Science. Springer Verlag (2004) Price, K., Storn, R., Lampinen, J.: Differential Evolution: A Practical Approach to Global Optimization. Natural Computing Series, Springer–Verlag (2005) Price, K., Storn, R.: Differential evolution. Dr. Dobb’s Journal 22(4), 18–24 (1997) Robertson, C., Fisher, R.: Parallel evolutionary registration of range data. Computer Vision and Image Understanding 87(1), 39–50 (2002) Rodrigues, M., Fisher, R., Liu, Y.: Introduction: Special issue on registration and fusion of range images. Computer Vision and Image Understanding 87, 1–7 (2002) Rusinkiewicz, S., Levoy, M.: Efficient variant of the icp algorithm. In: Third International Conference on 3–D Digital Imaging and Modeling. pp. 145–152 (2001) Salvi, J., Matabosch, C., Fofi, D., Forest, J.: A review of recent range image registration methods with accuracy evaluation. Image and Vision Computing 25(5), 578–596 (2007) Santamarı́a, J., Cordón, O., Damas, S.: A comparative study of state–of–the–art evolutionary image registration methods for 3d modeling. Computer Vision and Image Understanding 115(9), 1340–1354 (2011) 1102
© Copyright 2026 Paperzz