By continuing to browse this website, you implicitly agree with our Legal Disclaimer

Bob 2.0 Universal Background Model (UBM) training

This algorithm is a **legacy** one. The API has changed since its implementation. New versions and forks will need to be updated.

Algorithms have at least one
**input** and one **output**. All
algorithm endpoints are organized in **groups**.
Groups are used by the platform to indicate which inputs and
outputs are synchronized together. The first group is
automatically synchronized with the channel defined by the
block in which the algorithm is deployed.

Endpoint Name | Data Format | Nature |
---|---|---|

features | system/array_2d_floats/1 | Input |

ubm | tutorial/gmm/1 | Output |

Parameters allow users to change the configuration of an algorithm when scheduling an experiment

Name | Description | Type | Default | Range/Choices |
---|---|---|---|---|

maximum-number-of-iterations | The maximum number of iterations for the EM algorithm | uint32 | 10 | |

number-of-gaussians | The number of Gaussian Components | uint32 | 100 |

The code for this algorithm in Python

The ruler at 80 columns indicate suggested POSIX line breaks (for readability).

The editor will automatically enlarge to accomodate the entirety of your input

Use keyboard shortcuts for search/replace and faster editing. For example, use Ctrl-F (PC) or Cmd-F (Mac) to search through this box

Implements a GMM-based UBM training

Updated | Name | Databases/Protocols | Analyzers | |||
---|---|---|---|---|---|---|

pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_lbp_hist_ratios_lr-fusion_lr-pa_aligned | avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_verify_train,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_antispoofing,avspoof/2@physicalaccess_verification_spoof | pkorshunov/spoof-score-fusion-roc_hist/1 | ||||

pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_gmm-fusion_lr-pa | avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_verify_train,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_antispoofing,avspoof/2@physicalaccess_verification_spoof | pkorshunov/spoof-score-fusion-roc_hist/1 | ||||

pkorshunov/pkorshunov/isv-speaker-verification-spoof/1/isv-speaker-verification-spoof-pa | avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_verification_spoof | pkorshunov/eerhter_postperf_iso_spoof/1 | ||||

pkorshunov/pkorshunov/isv-speaker-verification/1/isv-speaker-verification-licit | avspoof/2@physicalaccess_verification | pkorshunov/eerhter_postperf_iso/1 |

This table shows the number of times this algorithm
has been **successfully** run using the given environment. Note
this does not provide sufficient information to evaluate if the
algorithm will run when submitted to different conditions.

Terms of Service | Contact Information | BEAT platform version 1.5.3b0 | © Idiap Research Institute - 2013-2019