Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Size: px
Start display at page:

Download "Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images"

Transcription

1 th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto Tecnológico de Informática Univeridad Politécnica de Valencia, Spain {vromero, ahector, Abtract To date, automatic handwring recognition ytem are far from being perfect and heavy human intervention i often required to check and correct the reult of uch ytem. In order to achieve correct trancription, human knowledge can be integrated into the trancription proce, following an Interactive Predictive paradigm. We have recently propoed Moue Action a a ignificant feedback information ource for the underlying interactive ytem to improve the poductivity of the human trancriptor. In thi paper we review thi way to interact with the ytem and report comparative reult uing the publicly available IAMDB dataet. 1. Introduction Many document ued every day include handwritten text and, in many cae, it would be intereting to recognize thee text image automatically. However, tateof-the-art handwritten text recognition ytem (HTR) can not uppre the need of human work when high quality trancription are needed. HTR ytem can achieve fairly high accuracy for retricted application with rather limited vocabulary (reading of potal addree or bank check) and/or form-contrained handwriting. However, in the cae of uncontrained trancription application, the current HTR technology typically only achieve reult which do not meet the quality requeriment of practical application. Therefore, once the full recognition proce of one document ha finihed, heavy human expert reviion i required to really produce a trancription of tandard quality. Such a pot-editing olution i ratherinefficientand uncomfortable for the human corrector. Work upported by the EC (FEDER), the Spanih MEC under the MIPRCV Conolider Ingenio 2010 reearch programme (CSD ) and the grant TIN C02-01 by the Univeritat Politècnica de València (FPI fellowhip ) A way of taking advantage of the HTR ytem i to combine them with the knowledge of a human trancriptor, contituting the o-called Computer Aited Trancription of Text Image (CATTI) cenario [8, 5]. In thi cenario, the ytem ue the text image and a previouly validated part (prefix) of it trancription to propoe a uitable continuation. Then the uer find and correct the next ytem error, thereby providing a longer prefix which the ytem ue to ugget a new, hopefully better continuation. The reult obtained how that thi ytem can ave ignificant amount of human effort. Moue Action (MA) can be ued a an additional information ource: a oon a the uer point to the next ytem error, the ytem propoe a new, hopefully more correct, continuation. Thi way, many explicit uer correction are avoided. Preliminary reult of thi new kind of interaction were reported on tak uch a the trancription of old document and pontaneou entence extracted from urvey form [4]. In thi paper we review thi way to interact with the ytem uing the MA and report comparative reult uing the publicly available IAMDB dataet. 2. CATTI Framework In the CATTI framework, the uer i directly involved in the trancription proce ince he/he i reponible of validating and/or correctiong the HTR output. The proce tart when the HTR ytem propoe a full trancription of the input image. Then, the uer read thi trancription until finding a mitake; i.e, he or he validate a prefix of the trancription which i error-free. Now, the uer enter a word to correct the erroneou text that follow the validated prefix. Thi generate a new, extended prefix (the previou validated prefix, plu the uer amendment), which i ued by the HTR ytem to attempt a new prediction hypothei, thereby tarting a new cycle that i repeated until a final correct trancription i achieved [8, 5]. The traditional handwritten text recognition problem can /09 $ IEEE DOI /ICDAR

2 be formulated a the problem of finding a mot likely word equence, ŵ, for a given handwritten entence image repreented by a feature vector equence x, thati: ŵ =argmax w Pr(w x) = arg max Pr(x w) Pr(w) (1) w Pr(x w) i typically approximated by concatenated character Hidden Markov Model (HMM) [3] and Pr(w) i uually approximated by a n-gram word language model [2]. In the CATTI framework, in addition to x, a uervalidated prefix p of the trancription i available. The HTR hould try to complete thi prefix by earching for a mot likely uffix ŝ a: ŝ =argmax Pr( x, p) = arg max Pr(x, p) Pr( p) (2) Accordingly, the earch mut be performed over all poible uffixe of p and the language model probability Pr( p) mut account for the word that can be written after p. A in Eq. (1), Pr(x, p) can be modelled by HMM. On the other hand, to implement the language model contraint involved in Pr( p), we can take advantage of the information coming from p, a dicued in [8]: Pr( p) k+n 1 i=k+1 i n+1 ) l i=k+n i n+1 ) where the conolidated prefix i w k 1 = p and wl k+1 = i a poible uffix. The firt term of Eq. (3) account for the probability of the n 1 word of the uffix conditioned by word from the prefix, and the econd one i the uual n-gram probability for the ret of the word in the uffix CATTI uing word graph The earch problem correponding to Eq. 2 and 3 can be olved uing earch technique baed on word-graph. A word graph repreent the trancription with higher Pr(w x) of the image entence. In thi cae, the word graph i jut (a pruned verion of) the Viterbi earch trelli [2] obtained when trancripting the whole image entence. During the CATTI proce the ytem make ue of thi word graph to complete the prefixe accepted by the uer. A word graph can be repreented a a weighted directed acyclic graph, where each edge (e) i labeled with a word (w e )andacore(core(e)), and each node (n) i labeled with a point (horizontal poition) of the handwritten image (t n ). For each edge, we denote S e and E e it tart and end node. The graph ha a ingle tart node, that point to the tart of the text image, and a ingle end node. (3) The core of an edge i computed by multiplying the morplhological-lexical probability of the image between it tart and end node point Pr(x tee t Se w e ), by the language model probability of the given word at the edge Pr(w e ). However, in practice, the imple multiplication i modified to balance the abolute value of both probabilitie. The mot comon modification i to ue the language weight α and the inertion penalty β [1]: core(e) =logpr(x tee t Se w e )+α log Pr(w e )+β (4) The word label of any path from the tart node to the end node form a trancription hypothei, whoe core i computed a the um of the core of the edge along the path. A the word graph i a repreentation of a ubet of the poible trancription for a ource handwritten text image, it may happen that ome prefixe given by the uer can not be exactly found in the word graph. To circumvent thi problem ome heuritic need to be implemented. In thi work, we modified the core aociated to each edge in order to cope with the difference between the word in the prefix and the word in the path that bet match the given prefix. Thi heuritic can be implemented a an errorcorrecting paring dynamic programming algorithm. Moreover, thi algorithm take advantage of the incremental way in which the uer prefix i generated, paring only the new uffix appended by the uer in the lat interaction (ee [4]). The computational cot of thi approach i much lower than ue the naïve Viterbi adaptation we had ued in previou work. Therefore, uing word-graph technique the ytem i able to interact with the human trancriptor in a time efficient way. However, a drawback of thi implementation i that ome accuracy can be lot. 3. Enriching the CATTI Interaction Proce In CATTI application the uer i repeatedly interacting with the ytem. Hence, making the interaction proce eay i crucial for the ucce of the ytem. In conventional CATTI, before typing a new word in order to correct a hypothei, the uer need to poition the curor in the place where he want to type the word. Thi i done by performing a MA (or equivalent pointer-poitioning keytroke). By doing o, the uer i already providing ome very ueful information to the ytem: he i validating a prefix up to the poition where he poitioned the curor, and, in addition, he i ignalling that the following word located after the curor i incorrect. Hence, the ytem can already capture thi fact and directly propoe a new uitable uffix in which the firt word i different to the firt word of the previou uffix. In fig. 1 we can ee an example of uch behaviour. A in conventional CATTI, the proce tart when the HTR ytem propoe a full trancription ŝ of the input image x. Then, 97

3 x INTER-0 p ŝ oppoed thi Comment Bill in that thought m p oppoed INTER ŝ thee Comment Bill in that thought c the p oppoed the INTER-2 ŝ Government Bill in that thought m p oppoed the Government Bill FINAL ŝ which brought c p t oppoed the Government Bill which brought # Figure 1. Example of CATTI operation uing MA. the uer read thi prediction until a trancription error i found (e)andmakeama(m) to poition the curor at thi point. Thi way, the uer validate an error-free trancription prefix p. Now, before the uer introduce a word to correct the erroneou one, the HTR ytem, taking into account the new prefix p and the wrong word that follow p, ugget a uitable continuation (i.e., a new ŝ). If the new ŝ correct the erroneou word (e) a new cycle tart. However, if the new ŝ ha an error in the ame poition that the previou one, the uer can enter a word, c, to correct the erroneou text e. Thi action produce a new prefix p (the previouly validated prefix, p, followed by c). Then, the HTR ytem take into account the new prefix to ugget a new uffix and a new cycle tart. Thi proce i repeated until a correct trancription of x i accepted by the uer. In fig. 1 the underlined boldface word in the final trancription i the only one which wa phiically corrected by uer. Note that in the iteration 1 a (ingle) MA doe not ucced and the correct word need to be phiically typed. However, the iteration 2 only need a MA. Thi new kind of interaction need not be retricted to a ingle pointer-poitioning MA. Several cenario arie, depending on the number of time the uer perform a MA. In the implet one, the uer only make a MA when it i neceary to diplace the curor (ingle-ma). In thi cae the MA doe not involve any extra human effort, becaue it i the ame action that the uer hould make in the conventional CATTI to poition the curor before typing the correct word. Another cenario that can be conidered conit in performing a MA ytematically before writing, although the curor i in the correct poition. In thi cae, however, there i a cot aociated to thi kind of MA, ince the uer doe need to perform additional action, which may or may not be beneficial. Thi cenario can be eaily extended allowing to the uer to make everal MA before having to write a correct word him/herelf. Since we have already dealt, in the ection 2, with the problem of finding a uitable uffix ŝ when the uer validate a prefix p and introduce a correct word c, we focu now on the problem in which the uer only make a MA. In thi cae the decoder ha to cope with the input image x, the validated prefix p and the erroneou word that follow the validated prefix e, in order to earch for a trancription uffix ŝ: ŝ =argmaxpr( x, p,e) =argmaxpr(x p,,e) Pr( p,e) (5) A in Eq. (1), Pr(x p,,e) can be modelled uing HMM. On the other hand, Pr( p,e) can be approached by adapting an n-gram language model o a to cope with the validated prefix p and with the erroneou word e. The language model preented in ection 2 would provide a model for the probability Pr( p ), but now the firt word of i conditioned by e. Therefore, ome change are needed. Let p = w k 1 be the validated prefix and = wl k+1 be a poible uffix and conidering that the wrong-recognized word e only affect the firt word of the uffix w k+1, Pr( p,e) can be computed a: Pr( p,e) Pr(w k+1 wk+2 n k,e) k+n 1 l i n+1 ) i n+1 ) (6) i=k+2 i=k+n Now, taking into account that the firt word of the poible uffix w k+1 ha to be different to the erroneou word e, Pr(w k+1 wk+2 n k,e) can be formulated a follow: δ(w Pr(w k+1 wk+2 n,e)= k k+1,e) Pr(w k+1 wk+2 n k ) δ(w w,e) Pr(w w k k+2 n ) (7) where δ(i, j) i 0 when i = j and 1 otherwie. 98

4 Figure 2. Example of word-graph generated after the uer validate the prefix oppoed the Government Bill. The edge correponding to the wrong-recognized word in wa diabled. A in the conventional CATTI, thi decoding can be implemented uing word-graph. The retriction entailed by (7) can be eaily implemented by deleting the edge labeled with the word e after the prefix ha been matched. An example i hown in fig HTR Sytem Overview The HTR ytem ued here follow a claical architecture compoed of three module: preproceing, feature extraction and recognition. The firt one entail different wellknown tandard technique uch a kew and lant correction and ize normalization. On the other hand, the feature extraction proce tranform a preproceed text line image into a equence of 60-dimenional feature vector (ee [6]). The recognition proce i baed on HMM. Character are modeled by continuou denity left-to-right HMM with 6 tate and 64 Gauian mixture component per tate. On the other hand, each lexical word i modelled by a Stochatic Finite-State automaton, and text entence are modelled uing bi-gram. All thee finite-tate model can be integrated into a ingle global model in which the decoding proce i performed uing the word-graph obtained by the Viterbi algorithm [2]. 5. Experimental Reult In order to tet the effectivene of uing MA in the CATTI ytem, different experiment were carried out. The corpu, the different meaure and the obtained experimental reult are explained below IAMDB Corpu Thi publicly acceible corpu wa compiled by the Reearch Group on Computer Viion and Artificial Intelligence (FKI) at Intitute of Computer Science an Applied Mathematic (IAM). The acquiition wa baed on the Lancater-Olo/Bergen Corpu (LOB). Fig. 1 how an example of a handwritten entence image from thi corpu. The lat releaed verion (3.0) i compoed of 1,539 canned text page, handwritten by 657 different writer. The databae i provided at different egmentation level: word, line, entence and page image. In our cae, the entence egmentation level i conidered (ee [9]). The corpu wa partitioned into training and tet et. The former i compoed of 5,799 text line which add up to 2,124 entence, handwritten by 448 different writer, wherea the latter comprie 200 entence, written by 100 different writer. Table 1 ummarize all thi information. Table 1. Baic tatitic of the IAMDB corpu Number of: Training Tet Total Lex. writer entence 2, ,324 word 42,832 3,957 46,789 8,938 character 216,774 20, , Aement Meaure Different evaluation meaure have been adopted. On the one hand, the quality of the trancription without any ytem-uer interactivity i given by the well known word error rate (WER). On the other hand, the word troke ratio (WSR) can be defined a the number of (word level) uer interaction that are neceary to produce correct trancription uing the CATTI ytem, divided by the total number of reference word. Finally, the word click rate (WCR) can be defined a the number of additional MA per word that the uer ha to do uing the new interaction with repect to uing the conventional CATTI ytem. The relative difference between WER and WSR (called Etimated Effort-Reduction) give u an etimation of the reduction in human effort achieved, in term of word to be corrected, by uing CATTI with repect to uing a conventional HTR ytem followed by human potediting. 99

5 Note that the additional human effort needed for the verification of the trancription and poitioning the curor in the appropriate place i the ame in both conventional CATTI and new ingle-ma uer-catti interaction ytem. In both cae the uer hould read the trancription propoed by the ytem until he or he find an error and then poition the curor in the place where the new word ha to be typed Reult Table 2 how the obtained reult. In the firt part (left), we can ee an etimation of the reduction in human effort (E-R) achieved by uing the conventional CATTI ytem with repect to the claic HTR pot editing. In the econd part (right), the reult obtained with the new ingle- MA interaction mode are hown. It i important to notice Table 2. Reult obtained with the corpu IAMDB uing the conventional CATTI (left) and the new ingle-ma interaction (right) Conventional CATTI ingle-ma interaction WER WSR E-R WSR E-R 25.6% 23.4% 8.6% 19.6% 23.4% that ome of the reult in table 2 do not correpond with thoe reported in [7]. The difference are becaue in [7] full Viterbi earch wa ued, while in thi work a much fater earch technique baed on (pruned) word graph i adopted. According to table 2, the etimated human effort to produce error-free trancription uing MA i ignificantly reduced with repect to uing a conventional HTR ytem or the conventional CATTI. The new interaction mode can ave about 23% of the overall effort. Fig. 3 how the WSR, the Etimated Effort-Reduction (E-R) and the word click rate (WCR) a a function of the maximal number of MA allowed by the uer before writing the correct word. The firt point (0) correpond to the reult of the conventional CATTI, and the point S correpond to the the ingle- MA interaction conidered in the previou table. A good trade-off i obtained when the maximum number of click i around 3, becaue a ignificant amount of expected human effort i aved with a fairly low number of extra click per word. 6. Remark and Concluion In thi paper, we have conidered new uer feedback ource for CATTI. By conidering MA, we have hown that a ignificant benefit can be obtained, in term of wordtroke reduction. A imple implementation uing wordgraph ha been decribed and ome experiment have been carried out. WSR E-R WSR WCR E-R IAMDB 0 S N. max. click Figure 3. WSR, E-R and WCR a a function of the maximal number of MA allowed by the uer before writing the correct word. It i worth noting that alternative (n-bet) uffixe could alo be obtained with the conventional CATTI ytem. However, by conidering the rejected word to propoe the alternative uffixe, the interaction method here tudied are more effective and more comfortable for the uer. Moreover, uing the ingle-ma interaction method, a econd alternative uffix i obtained without extra human effort. Reference [1] K. T. A. Ogawa and F. Itakura. Balancing acoutic and linguitic probabilite. Proc. IEEE Conf. Acoutic, Speech, and Signal Proceing, page , [2] F. Jelinek. Statitical Method for Speech Recognition. MIT Pre, [3] L. Rabiner. A Tutorial of Hidden Markov Model and Selected Application in Speech Recognition. Proc. IEEE, 77: , [4] V. Romero et al. Improvement in the computer aited tranciption ytem of handwritten text image. In Proc. of the PRIS 2008, page , June [5] V. Romero, A. H. Toelli, L. Rodríguez, and E. Vidal. Computer aited trancription for ancient text image. In Proc. of ICIAR 2007, Vol. 4633: , [6] A. H. Toelli et al. Integrated Handwriting Recognition and Interpretation uing Finite-State Model. IJPRAI, 18(4): , June [7] A. H. Toelli et al. Computer aited trancription of text image and multimodal interaction. In Proc. of the MLMI, volume 5237 of LNCS, page [8] A. H. Toelli, V. Romero, L. Rodríguez, and E. Vidal. Computer aited trancription of handwritten text. In Proc. of ICDAR 2007, page IEEE Computer Society, [9] M. Zimmermann, J.-C. Chappelier, and H. Bunke. Offline grammar-baed recognition of handwritten entence,. IEEE TPAMI, 28(5): , May WCR 100

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Compiler Construction

Compiler Construction Compiler Contruction Lecture 6 - An Introduction to Bottom- Up Paring 3 Robert M. Siegfried All right reerved Bottom-up Paring Bottom-up parer pare a program from the leave of a pare tree, collecting the

More information

Audio-Visual Voice Command Recognition in Noisy Conditions

Audio-Visual Voice Command Recognition in Noisy Conditions Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

A study on turbo decoding iterative algorithms

A study on turbo decoding iterative algorithms Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

Parallel MATLAB at FSU: Task Computing

Parallel MATLAB at FSU: Task Computing Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10 Computer Aided Drafting, Deign and Manufacturing Volume 5, umber 3, September 015, Page 10 CADDM Reearch of atural Geture Recognition and Interactive Technology Compatible with YCbCr and SV Color Space

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL Robert A. Kilmer Department of Sytem Engineering Unite State Military Acaemy Wet Point, NY 1996 Alice E. Smith

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco

More information

Tracking High Speed Skater by Using Multiple Model

Tracking High Speed Skater by Using Multiple Model Vol. 2, No. 26 Tracing High Speed Sater by Uing Multiple Model Guojun Liu & Xianglong Tang School of Computer Science & Engineering Harbin Intitute of Technology Harbin 5000, China E-mail: hitliu@hit.edu.cn

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110

More information

Handwriting Recognition of Historical Documents with few labeled data

Handwriting Recognition of Historical Documents with few labeled data 2018 13th IAPR International Workhop on Document Analyi Sytem Handwriting Recognition of Hitorical Document with few labeled data Edgard Chamma and Chafic Mokbel Univerity of Balamand El-Koura, Lebanon

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information