unsupervised linear unmixing for hyperspectral data exploitation mingkai hsueh

48
1 Unsupervised Linear Unsupervised Linear Unmixing Unmixing for Hyperspectral Data for Hyperspectral Data Exploitation Exploitation Mingkai Hsueh Mingkai Hsueh Remote Sensing Signal and Image Processing Remote Sensing Signal and Image Processing Laboratory Laboratory Department of Computer Science and Electrical Department of Computer Science and Electrical

Upload: davin

Post on 23-Jan-2016

49 views

Category:

Documents


0 download

DESCRIPTION

Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh Remote Sensing Signal and Image Processing Laboratory Department of Computer Science and Electrical Engineering University of Maryland Baltimore County 1000 Hilltop Circle, Baltimore, MD 21250. Outline. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

1

Unsupervised Linear UnmixingUnsupervised Linear Unmixingfor Hyperspectral Data Exploitationfor Hyperspectral Data Exploitation

Mingkai HsuehMingkai Hsueh

Remote Sensing Signal and Image Processing LaboratoryRemote Sensing Signal and Image Processing LaboratoryDepartment of Computer Science and Electrical EngineeringDepartment of Computer Science and Electrical Engineering

University of Maryland Baltimore CountyUniversity of Maryland Baltimore County1000 Hilltop Circle, Baltimore, MD 212501000 Hilltop Circle, Baltimore, MD 21250

Page 2: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

2

Outline

Introduction to Hyperspectral Image Processing and its Introduction to Hyperspectral Image Processing and its

ApplicationsApplications

Endmember ExtractionEndmember Extraction

Pixel Purity Index Algorithm (PPI)Pixel Purity Index Algorithm (PPI)

Block of Skewers (BOS) based PPIBlock of Skewers (BOS) based PPI

Anomaly DetectionAnomaly Detection

Anomaly Detection Algorithms and its real-time implementationAnomaly Detection Algorithms and its real-time implementation

Speed-up of Adaptive Causal Anomaly DetectionSpeed-up of Adaptive Causal Anomaly Detection

ConclusionsConclusions

Page 3: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

3

0

1000

2000

3000

4000

5000

300 600 900 1200 1500 1800 2100 2400

Wavelength (nm)R

efl

ecta

nce

0

1000

2000

3000

4000

300 600 900 1200 1500 1800 2100 2400

Wavelength (nm)

Refl

ecta

nce

Water

Mixed pixel(soil + mineral)

Mixed pixel(trees + soil)

0

1000

2000

3000

4000

300 600 900 1200 1500 1800 2100 2400

Wavelength (nm)

Refl

ecta

nce

Hyperspectral Image

Page 4: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

4

Applications of Hyperspectral Image Processing

ApplicationsApplications Man-made objects: canvas, camouflage, Man-made objects: canvas, camouflage,

military vehicles in defense applicationsmilitary vehicles in defense applications Toxic waste, oil spills in environmental Toxic waste, oil spills in environmental

monitoringmonitoring LandminesLandmines Trafficking in law enforcementTrafficking in law enforcement Chemical/biological agent detectionChemical/biological agent detection Special species in agriculture, ecologySpecial species in agriculture, ecology

Page 5: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

5

Types of Signatures

Endmembers: Endmembers: Pure signatures for a spectral class used Pure signatures for a spectral class used

for spectral unmixingfor spectral unmixing Anomalies:Anomalies: Signals/signatures spectrally distinct fromSignals/signatures spectrally distinct from

their surroundings, i.e., abnormality.their surroundings, i.e., abnormality. rare minerals in geologyrare minerals in geology abnormal activities in military abnormal activities in military

applications.applications.

Page 6: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

6

Part I :Part I :

Endmember ExtractionEndmember Extraction

Page 7: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

7

Endmember Extraction

An endmember pixel is defined as a pixel with An endmember pixel is defined as a pixel with idealized, pure spectral signature for a class.idealized, pure spectral signature for a class.

Page 8: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

8

Pixel Purity Index (PPI)

The idea of PPI was first proposed by Boardman The idea of PPI was first proposed by Boardman and has been one of most popular endmember and has been one of most popular endmember extraction algorithms (EEAs) due to its publicity extraction algorithms (EEAs) due to its publicity and availability in ENVI software.and availability in ENVI software.

For the PPI to work effectively, a large number of For the PPI to work effectively, a large number of dot products between skewers (random vectors) and dot products between skewers (random vectors) and data sample vectors are required.data sample vectors are required.

Page 9: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

9

PPI Algorithm

e1

e3

e2

skewer1

skewer2

Minimum Projection

skewer3

Minimum Projection

Minimum Projection

Maximum Projection

Maximum Projection

NPPI(e1)=0

NPPI(e3)=0

NPPI(e2)=0

NPPI(e1)=1NPPI(e1)=2

NPPI(e3)=1NPPI(e3)=2NPPI(e3)=3

NPPI(e2)=1

Page 10: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

10

Block of Skewer – An Example

Given Given KK11 & & KK22 are skewers, are skewers, KK33 ~ ~ KK66 are linear are linear

combinations of combinations of KK11 & & KK2 2 and “and “rr” is a pixel vector ” is a pixel vector

from hyperspectral image cube.from hyperspectral image cube.

11 prK K4= – K1 + K2

K3= – K1 – K2

K5= + K1 – K2

K6= + K1 + K2

22 prK

213 pprK

214 pprK

215 pprK

216 pprK

In stead of generating more skewers for projection, we In stead of generating more skewers for projection, we perform perform linear combination between the projection linear combination between the projection results of the generated skewers.results of the generated skewers.

Page 11: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

11

C-BOS

Ideally, aIdeally, a11, a, a22 and a and a33 can be can be any real numbers. However, any real numbers. However, given limited hardware given limited hardware resource, fixed-point resource, fixed-point implementation are usually implementation are usually preferred.preferred.

Here we constrain the Here we constrain the coefficients to +1 or -1 to coefficients to +1 or -1 to form 8 combinations as a form 8 combinations as a cube shown on the left.cube shown on the left.

(-1, 1, -1) (1, 1, -1)

(-1, 1, 1)

(1, -1, -1)

(1, -1, 1)(-1, -1, 1)

(-1, -1, -1)

(0, 0, 0)x

z

y

(1, 1, 1)

DskewerDskewer = a = a11IskewerIskewer1 1 + a+ a22IskewerIskewer2 2 + a+ a33IskewerIskewer33

Page 12: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

12

P-BOS

(-1, 0, 0)

(0, 0, 1)

(0, -1, 0)

(0, 1, 0)

(0, 0, -1)

(1, 0, 0)

Page 13: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

13

Skewer Redundancy

In the previous example, there exist redundancy among In the previous example, there exist redundancy among skewers.skewers.

K4= – K1 + K2

K3= – K1 – K2

K5= K1 – K2

K6= K1 + K2

Same thing happens to the C-BOS.Same thing happens to the C-BOS.D1= + I1 + I2 + I3

D2= + I1 + I2 – I3

D3= + I1 – I2 + I3

D4= + I1 – I2 – I3

D5 = – I1 – I2 – I3

D6 = – I1 – I2 + I3

D7 = – I1 + I2 – I3

D8 = – I1 + I2 + I3

Page 14: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

14

S-BOS

(-1, 1, 1)

(1, -1, 1)(-1, -1, 1)

(1, 1, 1) (1, 1, -1) (1, -1, -1)

(1, -1, 1)(1, 1, 1)

(-1, 1, -1) (1, 1, -1)

(-1, 1, 1) (1, 1, 1)

(-1, 1, -1) (1, 1, -1)

(1, -1, -1)(-1, -1, -1)

(-1, 1, -1)

(-1, 1, 1) (-1, -1, 1)

(-1, -1, -1)

(1, -1, -1)

(1, -1, 1)(-1, -1, 1)

(-1, -1, -1)

Front

Back Top

Bottom

Right

Left

Decompose cube into 6 squaresDecompose cube into 6 squares

Page 15: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

15

T-BOS

A tetrahedron shape can A tetrahedron shape can be considered as half of be considered as half of a pyramid.a pyramid.

A cube can be shifted so A cube can be shifted so that coordinates of 8 that coordinates of 8 vertices are holding vertices are holding values 0 or 1.values 0 or 1.(0, 1, 0)

(1, 1, 0)

(0, 1, 1)

(1, 0, 0)

(1, 0, 1)(0, 0, 1)

(0, 0, 0)x

z

y

(1, 1, 1)

Page 16: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

16

HYDICE Data

HYDICE (Hyperspectral Digital Imagery Collection Experiment)HYDICE (Hyperspectral Digital Imagery Collection Experiment) 15 panels of five types with three different materials.15 panels of five types with three different materials. They are arranged into a matrix in such a way that each row represents 3 They are arranged into a matrix in such a way that each row represents 3

panels of the same type with three different sizes, 3panels of the same type with three different sizes, 3mm33mm, 2, 2mm22mm, , 11mm11mm. Each column represents 5 panels of different types with the same . Each column represents 5 panels of different types with the same size.size.

Original image Target masked image

Anomaly

Page 17: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

17

Experimental results of HYDICE real imageExperimental results of HYDICE real image

Experiments with Real Image (Cont’d)

(c) P-BOS (d) T-BOS

(a) C-BOS (b) S-BOS

Page 18: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

18

BOS based PPIHardware module

Dot product module

MINMAX

MINMAX

MINMAX

Dskewer Generator .

.

.

.

.

.

A large amount of independent dot products make it A large amount of independent dot products make it particularly suitable for FPGA implementation due to particularly suitable for FPGA implementation due to the readily parallel design architecture.the readily parallel design architecture.

Page 19: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

19

Dot-Product Module

PE unit PE PE

PE unit PE PE

PE unit PE PE

Iskewer 2

PE

PE

PE

Iskewer 1

Iskewer 3

1st band 2nd band 3rd band 4th band

1st b

and

2nd band 3rd band 4th band

1st pixel vector

2nd pixel vector

Dsk

ewer

Gen

erat

or

Page 20: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

20

S-BOS Dskewer Generators

P1

P2

P3

P1

P2

P3

–P1 + P2 – P3

–P1 – P2 – P3

P1 – P2 + P3

– P1 – P2 + P3

Page 21: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

21

FPGA Implementation

Four different Dskewer generators are Four different Dskewer generators are implemented in XESS XSB-300E board which implemented in XESS XSB-300E board which carries a Spartan II E (XC2S300E) FPGA. carries a Spartan II E (XC2S300E) FPGA.

Occupied flip-flop Occupied flip-flop slicesslices

I/O BlocksI/O Blocks

C-BOSC-BOS 8383 133133

P-BOSP-BOS 4242 9797

S-BOSS-BOS 3636 8585

T-BOST-BOS 2424 8585

Page 22: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

22

Computational Complexity

The computational complexity is calculated based on the The computational complexity is calculated based on the number of multiplications and additions performed with number of multiplications and additions performed with different BOS design. different BOS design.

KK is the total number of skewers, is the total number of skewers, LL is is the number of spectral the number of spectral bands and bands and NN is the total number of pixel vectors. is the total number of pixel vectors.

MultiplicationMultiplication AdditionAddition

MATLAB-PPIMATLAB-PPI K × L × NK × L × N 00

C-BOS-PPIC-BOS-PPI (3/8) × K × L × N(3/8) × K × L × N K × NK × N

P-BOS-PPIP-BOS-PPI (3/8) × K × L × N(3/8) × K × L × N K × NK × N

S-BOS-PPIS-BOS-PPI (3/8) × K × L × N(3/8) × K × L × N (1/2) × K × N(1/2) × K × N

T-BOS-PPIT-BOS-PPI (3/8) × K × L × N(3/8) × K × L × N (1/2) × K × N(1/2) × K × N

Page 23: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

23

Part II :Part II :

Anomaly DetectionAnomaly Detection

Page 24: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

24

RX Algorithm

RX algorithm basically performs RX algorithm basically performs the Mahalanobis distance that is the Mahalanobis distance that is specified by specified by

(r(rii--))TT ×× (K) (K)-1 -1 ×× (r (ri i --))

The required mean vector The required mean vector μμ hinder the possibility of hinder the possibility of implementing the algorithm in implementing the algorithm in real-time fashion.real-time fashion.

Page 25: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

25

Causal RX Filter (CRXF)

By replacing the covariance matrix by By replacing the covariance matrix by correlation matrix, we can achieve the correlation matrix, we can achieve the real-time real-time processingprocessing..

The functional form of CRXFThe functional form of CRXF

rriiTT ×× ( (RRii))-1 -1 ×× r rii

The major drawback is that if a detected The major drawback is that if a detected anomaly remains on the image to be processed, it anomaly remains on the image to be processed, it may decrease the detectability of the following may decrease the detectability of the following anomalies.anomalies.

Page 26: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

26

Adaptive Causal Anomaly Detector (ACAD)

ACAD has the same functional form as does ACAD has the same functional form as does CRXF, except the sample correlation matrix CRXF, except the sample correlation matrix R’R’ is is formed by all the arrived pixel vectors except the formed by all the arrived pixel vectors except the detected anomalous target pixel vectors that have detected anomalous target pixel vectors that have been removed.been removed.

rriiTT ×× ( (R’R’ii))-1 -1 ×× r rii

An anomalous target map is generated at the same An anomalous target map is generated at the same time as the detection process takes place.time as the detection process takes place.

Page 27: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

27

HYDICE Data

HYDICE (Hyperspectral Digital Imagery Collection Experiment)HYDICE (Hyperspectral Digital Imagery Collection Experiment) 15 panels of five types with three different materials.15 panels of five types with three different materials. They are arranged into a matrix in such a way that each row represents 3 They are arranged into a matrix in such a way that each row represents 3

panels of the same type with three different sizes, 3panels of the same type with three different sizes, 3mm33mm, 2, 2mm22mm, , 11mm11mm. Each column represents 5 panels of different types with the same . Each column represents 5 panels of different types with the same size.size.

Original image Target masked image

Anomaly

Page 28: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

28

CRXF Results

row 8 row 16 row 24 row 32

row 40 row 48 row 56 row 64

Page 29: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

29

ACAD Results

row 8 row 16 row 24 row 32

row 40 row 48 row 56 row 64

Page 30: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

30

ACAD Target Map

row 8 row 16 row 24 row 32

row 40 row 48 row 56 row 64

Page 31: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

31

ACAD Hardware Design

Ri = Ri-1 + ri × riT

(Ri)-1 = (Qi × Riupper )-1

= ( Riupper )-1 × Qi

T

δACAD (ri) = riT × (Ri

T)-1 × ri

tK ≤ τ

Auto CorrelatorAuto Correlator

QR Matrix InverseQR Matrix Inverse

Abundance CalculationAbundance Calculation

Anomalous Target DiscriminatorAnomalous Target Discriminator

Page 32: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

32

(A+BCD)-1 = A-1 – A-1B(C-1+DA-1B)-1 DA-1

(A+rrT)-1 = A-1 – (A-1rrT A-1) / (1+rTA-1r)

By Woodbury’s identity, set B a column vector, C a scalar of unity, and D a row vector

Let Let AA be the current correlation matrix and be the current correlation matrix and rr be the incoming pixel vector.be the incoming pixel vector.

Matrix Inversion Lemma

Page 33: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

33

Matrix Inversion Lemma (Cont’d)

With Matrix Inversion Lemma (MIL), we With Matrix Inversion Lemma (MIL), we

only need to computeonly need to compute

Using MIL the matrix inversion is reduced Using MIL the matrix inversion is reduced

to matrix multiplications. to matrix multiplications.

Simulation is provided to evaluate the Simulation is provided to evaluate the

performance of MIL.performance of MIL.

rRr1

RrrR1T

1T1

Page 34: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

34

ACAD Hardware Design

Ri = Ri-1 + ri × riT

(Ri)-1 = (Qi × Riupper )-1

= ( Riupper )-1 × Qi

T

δACAD (ri) = riT × (Ri

T)-1 × ri

tK ≤ τ

i

1i

Ti

-1i

Tii

-1i1-

i

1Tiii rRr1

RrrRRrrR

Auto CorrelatorAuto Correlator

QR Matrix InverseQR Matrix Inverse

Matrix Inversion LemmaMatrix Inversion Lemma

Abundance CalculationAbundance Calculation

Anomalous Target DiscriminatorAnomalous Target Discriminator

Page 35: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

35

Speed-up of MIL

We use two versions of the MATLAB program to We use two versions of the MATLAB program to

perform the ACAD on the same image cube. One uses perform the ACAD on the same image cube. One uses

the MATLAB inv() function and another one uses the the MATLAB inv() function and another one uses the

MIL.MIL.

As we can see, the speed-up is about “2” times As we can see, the speed-up is about “2” times

faster for the 64x64 HYDICE image than the one faster for the 64x64 HYDICE image than the one

without MIL. without MIL.

With MILWith MIL Without MILWithout MIL

Computation timeComputation time 26.609026.6090 45.656045.6560

Page 36: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

36

The Matrix Inversion Lemma has been successfully The Matrix Inversion Lemma has been successfully applied to reduce the matrix inversion performed by applied to reduce the matrix inversion performed by Adaptive Causal Anomaly Detection (ACAD) into Adaptive Causal Anomaly Detection (ACAD) into matrix multiplications.matrix multiplications.

Since the Causal RX Filter (CRXF) and Real-time CEM Since the Causal RX Filter (CRXF) and Real-time CEM (Constrained Energy Minimization) previously proposed (Constrained Energy Minimization) previously proposed in Wang [2003] also involve inverse matrix in Wang [2003] also involve inverse matrix computation, the same MIL-based approach can be also computation, the same MIL-based approach can be also applied to reduce the computational load.applied to reduce the computational load.

ConclusionsConclusions

Page 37: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

37

New block design of BOS including Square based and New block design of BOS including Square based and Tetrahedron based BOS have been introduced to Tetrahedron based BOS have been introduced to improve the drawback of the Pyramid-based and Cube-improve the drawback of the Pyramid-based and Cube-based BOS design. based BOS design.

The FPGA design and implementation of the four BOS The FPGA design and implementation of the four BOS design has also been evaluated and analyzed.design has also been evaluated and analyzed.

Conclusions (Cont’d)Conclusions (Cont’d)

Page 38: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

38

Future Work

An effective Dimensionality Reduction (DR) or An effective Dimensionality Reduction (DR) or Band Selection (BS) may need to reduce the Band Selection (BS) may need to reduce the number of bands to an acceptable range so that we number of bands to an acceptable range so that we can further reduce the computation cost in both can further reduce the computation cost in both applications.applications.

Heterogeneous platform may be also considered to Heterogeneous platform may be also considered to reduce the design time and possibly achieve better reduce the design time and possibly achieve better performance.performance.

Page 39: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

39

Projects Conducted in RSSIPL

Joint Service Agent Water Monitor Joint Service Agent Water Monitor MissionMission

Develop GUI image analysis software for detecting Develop GUI image analysis software for detecting Biological Threat Agent on Handheld Assays Biological Threat Agent on Handheld Assays

Ported developed algorithms onto embedded system, Ported developed algorithms onto embedded system, Stargate Gateway (SPB400, Linux single board Stargate Gateway (SPB400, Linux single board computer) with external hand held scanner device. computer) with external hand held scanner device.

SponsorSponsor US Army Edgewood Chemical and Biological Center US Army Edgewood Chemical and Biological Center

(ECBC) (ECBC) ANP Technologies, Inc.ANP Technologies, Inc.

Page 40: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

40

Software for Detecting Agents

Page 41: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

41

Projects Conducted in RSSIPL (Cont’d)

Multi-band Multi-threat warning sensor Multi-band Multi-threat warning sensor MissionMission

Developed detection algorithms for missile and grenade Developed detection algorithms for missile and grenade images captured from real-time Multispectral imaging images captured from real-time Multispectral imaging system. system.

Developed MATLAB based GUI for image analysis.Developed MATLAB based GUI for image analysis. SponsorSponsor

Surface Optics Corporation (SOC)Surface Optics Corporation (SOC)

Page 42: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

42

Projects Conducted in RSSIPL (Cont’d)

Page 43: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

43

Projects Conducted in RSSIPL (Cont’d)

Multi-band Multi-threat warning sensor Multi-band Multi-threat warning sensor MissionMission

Developed detection algorithms for missile and grenade Developed detection algorithms for missile and grenade images captured from real-time Multispectral imaging images captured from real-time Multispectral imaging system. system.

Developed MATLAB based GUI for image analysis.Developed MATLAB based GUI for image analysis. SponsorSponsor

Surface Optics Corporation (SOC)Surface Optics Corporation (SOC)

Page 44: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

44

Publication

Book ChapterBook Chapter

J. Wang, M. Hsueh and C.-I Chang, “FPGA Design for Second-order J. Wang, M. Hsueh and C.-I Chang, “FPGA Design for Second-order Statistics Based Target Detection Algorithm for Hyperspectral Imagery Statistics Based Target Detection Algorithm for Hyperspectral Imagery Applications,” High Performance Computing in Remote Sensing, Applications,” High Performance Computing in Remote Sensing, Chapman & Hall/CR, Oct 2007.Chapman & Hall/CR, Oct 2007.

J. Wang, M. Hsueh and C.-I Chang, “FPGA Implementation for Real-J. Wang, M. Hsueh and C.-I Chang, “FPGA Implementation for Real-time Orthogonal Subspace Projection for Hyperspectral Imagery time Orthogonal Subspace Projection for Hyperspectral Imagery Applications,” High Performance Computing in Remote Sensing, Applications,” High Performance Computing in Remote Sensing,

Chapman & Hall/CR, Oct 2007.Chapman & Hall/CR, Oct 2007.

Page 45: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

45

Publication (cont’d)

JournalJournal

C.-I Chang and M. Hsueh, “Characterization of Anomaly Detection in C.-I Chang and M. Hsueh, “Characterization of Anomaly Detection in Hyperspectral Imagery,” Hyperspectral Imagery,” Sensor ReviewSensor Review, Volume 26, Issue 2, pp. 137-, Volume 26, Issue 2, pp. 137-146, 2006.146, 2006.

M. Hsueh and C.-I Chang, “Field Programmable Gate Arrays for Pixel M. Hsueh and C.-I Chang, “Field Programmable Gate Arrays for Pixel Purity Index Using Blocks of Skewers for Endmember Extraction in Purity Index Using Blocks of Skewers for Endmember Extraction in Hyperspectral Imagery,” International Journal of High Performance Hyperspectral Imagery,” International Journal of High Performance Computing Applications, Dec 2007. (to appear)Computing Applications, Dec 2007. (to appear)

C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C.-C. Wu, G. Solyar, “A C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C.-C. Wu, G. Solyar, “A pyramid-based block of skewers for pixel purity index for endmember pyramid-based block of skewers for pixel purity index for endmember Extraction in hyperspectral imagery,” International Journal of High Speed Extraction in hyperspectral imagery,” International Journal of High Speed Electronics and Systems. (to appear)Electronics and Systems. (to appear)

M. Hsueh and C.-I Chang, “Adaptive Causal Anomaly Detection on M. Hsueh and C.-I Chang, “Adaptive Causal Anomaly Detection on Reconfigurable Computing,” Reconfigurable Computing,” IEEE Transaction on Industrial ElectronicsIEEE Transaction on Industrial Electronics. . (To be submitted) (To be submitted)

Page 46: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

46

Publication (cont’d)

ConferenceConference

M. Hsueh and C.-I Chang, “FPGA implementation of Adaptive Causal M. Hsueh and C.-I Chang, “FPGA implementation of Adaptive Causal Anomaly Detection,” Anomaly Detection,” 2006 CIE Annual Convention2006 CIE Annual Convention, Newark, NJ, Sep 16, , Newark, NJ, Sep 16, 2006.2006.

C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C. C. Wu, A. Plaza and G. C.-I Chang, M. Hsueh, F. Chaudhry, W. Liu, C. C. Wu, A. Plaza and G. Solyar, “A Pyramid-based Block of Skewers for Pixel Purity Index for Solyar, “A Pyramid-based Block of Skewers for Pixel Purity Index for Endmember Extraction in Hyperspectral Imagery,” Endmember Extraction in Hyperspectral Imagery,” 2006 International 2006 International Symposium on Spectral Sensing ResearchSymposium on Spectral Sensing Research, Bar Harbor, ME, May 29 to , Bar Harbor, ME, May 29 to Jun 2, 2006.Jun 2, 2006.

D. Valencia, A. Plaza, M. A. Vega-Rodriguez, R. M. Perez and M. D. Valencia, A. Plaza, M. A. Vega-Rodriguez, R. M. Perez and M. Hsueh, “FPGA Design and Implementation of a Fast Pixel Purity Index Hsueh, “FPGA Design and Implementation of a Fast Pixel Purity Index Algorithm for Endmember Extraction in Hyperspectral Imagery,” Algorithm for Endmember Extraction in Hyperspectral Imagery,” SPIE SPIE Optics East, Optics East, Boston, MA, Oct 23-26 2005.Boston, MA, Oct 23-26 2005.

L. Wu, J. Wang, B. Ramakrishna, M. Hsueh, J. Liu, Q. Wu, C. Wu, M. L. Wu, J. Wang, B. Ramakrishna, M. Hsueh, J. Liu, Q. Wu, C. Wu, M. Cao, C. Chang, J. L. Jensen, J. O. Jensen, H. Knapp, R. Daniel, R. Yin, Cao, C. Chang, J. L. Jensen, J. O. Jensen, H. Knapp, R. Daniel, R. Yin, “An embedded system developed for hand held assay used in water “An embedded system developed for hand held assay used in water monitoring,” monitoring,” SPIE Optics East, SPIE Optics East, Boston, MA, Oct 23-26, 2005.Boston, MA, Oct 23-26, 2005.

Page 47: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

47

Publication (cont’d)

ConferenceConference

M. Hsueh and C.-I Chang, “Adaptive Causal Anomaly Detection for M. Hsueh and C.-I Chang, “Adaptive Causal Anomaly Detection for Hyperspectral Imagery”, Hyperspectral Imagery”, IEEE International Geoscience and Remote IEEE International Geoscience and Remote Sensing Symposium,Sensing Symposium, Alaska, Sep 19-26, 2004. Alaska, Sep 19-26, 2004.

M. Hseuh, A. Plaza, J. Wang, S. Wang, W. Liu, C.-I Chang, J. L. Jensen M. Hseuh, A. Plaza, J. Wang, S. Wang, W. Liu, C.-I Chang, J. L. Jensen and J. O. Jensen, “Morphological algorithms for processing tickets by and J. O. Jensen, “Morphological algorithms for processing tickets by hand held assay,” hand held assay,” OpticsEast, Chemical and Biological Standoff OpticsEast, Chemical and Biological Standoff Detection IIDetection II (OE120), Vol. 5584, Philadelphia, PA, Oct 25-28, 2004. (OE120), Vol. 5584, Philadelphia, PA, Oct 25-28, 2004.

C.-I Chang, H. Ren, M. Hsueh, F. D’Amico and J.O. Jensen, “A Revisit C.-I Chang, H. Ren, M. Hsueh, F. D’Amico and J.O. Jensen, “A Revisit to Target-Constrained Interference-Minimized Filter,” to Target-Constrained Interference-Minimized Filter,” 48th Annual 48th Annual Meeting, SPIE International Symposium on Optical science and Meeting, SPIE International Symposium on Optical science and Technology, Imaging Spectrometry IX ( AM110), Technology, Imaging Spectrometry IX ( AM110), San Diego, CA, Aug 3-San Diego, CA, Aug 3-8, 2003.8, 2003.

S. T. Sheu, M. Hsueh, “An Intelligent Cell Checking Policy for S. T. Sheu, M. Hsueh, “An Intelligent Cell Checking Policy for Promoting Data Transfer Performance in Wireless ATM Networks,” Promoting Data Transfer Performance in Wireless ATM Networks,” IEEE ATM Workshop '99, Kochi City, Kochi, Japan, May 24-27, 1999. IEEE ATM Workshop '99, Kochi City, Kochi, Japan, May 24-27, 1999.

Page 48: Unsupervised Linear Unmixing for Hyperspectral Data Exploitation Mingkai Hsueh

48

Thank you!!