A new Algorithm for Lossless Compression applied to two-dimensional Static Images
|
|
- Archibald Neal
- 5 years ago
- Views:
Transcription
1 A new Algorthm for Lossless Comresson aled to two-dmensonal Statc Images JUAN IGNACIO LARRAURI Deartment of Technology Industral Unversty of Deusto Avda. Unversdades, Blbao SPAIN Abstract: - In ths aer, a new lossless comresson algorthm method for two-dmensonal contnuous-tone mages s resented. The roosed method acheves hgher comresson ratos than unversal methods. Tradtonal methods use codng technques based on reducton of the exstng redundancy n the data or xels, manly alyng methods based on statstcal models, substtuton models, dctonary models, redctve models, wavelet transform doman, etc The roosed method s based on a model whch ncororates a new algorthm (INA Algorthm). Ths method conssts of three stes: segmentaton, comresson algorthm and encodng. In the frst, the whole mage s contnuously dvded nto blocks of a fxed sze. Each block generates two searate grous: a sequence of the dfferent xels of the block sorted n ncreasng order and the other one n a sequence formed of xels organsed n grous of ordered ars. The second one s the new develoment and man contrbuton of ths method. A new algorthm rocesses n arallel the executon of the two sequences obtaned n the segmentaton rocess by means of a data structure n the form of a bnary tree and a redctve scheme resectvely. Lastly, a fast and effcent encoder s used to generate the bnary codes. The arallel executon of ths algorthm reduces resonse tmes of the comresson and decomresson cycles. Ths method ensures a comresson rato of : to :4 wth very hgh robablty. In order to evaluate the advantages of ths method comared wth the conventonal lossless methods and the JPEG-LS standard, exermental studes have been carred out usng a set of ISO standard mages. From the exermental results we can asserted that the roosed method obtans a hgher comresson rato. Key-Words: - Lossless comresson, mage comresson, bnary tree Introducton In data comresson lterature, we can fnd the descrton of methods, technques and algorthms for lossless mage comresson. The evaluaton of these methods s resented n endless lsts that show the comresson rato acheved by each method. In order to evaluate the roosed method, we resent an alternatve classfcaton of the lossless mage comresson methods based on the crtera of the model aled. In ths secton the most relevant methods are descrbed, ncludng the JPEG-LS standard.. Lossless methods based on substtuton models The early methods used to comress mages were based more on substtuton technques than on comresson schemes. These lnear codng technques were very smle and were desgned accordng to secfcatons of comuters at the tme. These technques made use of the exstng redundancy n the data (xels) of an mage, through the relatonsh of xels wth the adjacent xels. The most sgnfcant methods used by these models are Btma Comresson [] and RLE Run Length Encodng [].. Lossless methods based on statstcal models The comresson methods based on ths model arse from the modern nformaton theory suorted by the works of C.E. Shannon, R.M-. Fano, and Davd Huffman. These methods marked a relevant ste forward regardng revous data comresson methods. The comresson method conssts of a model and an encodng technque. The statstcal model can be statc or adatve. Statstcal models exlot the redundancy n xels accordng to the robablty of occurrence n the mage. Ths means that the codec must make a revous readng of all xels before calculatng the robablty of each one. The codng s stored together wth the table of robabltes. The measure of the model s effcency ISBN:
2 s the aroxmaton to the entroy of the mage. The most reresentatve methods are Shannon-Fano Codng [3] [4], Huffman Codng [5], and Arthmetc Codng [6] [7]..3 Lossless methods based on dctonary models Models based on dctonary technques use a code to relace a strng of varable symbols. The encoder rocesses the nut xels and runs the dctonary n order to fnd ts corresondence. If the strng s found, a onter to the dctonary s used as code. Otherwse, the strng rocessed s added to the dctonary. The most relevant methods are LZ77 [8], LZ78 [9], and LZW [0]. Statstcal models and dctonary models, n ther statc model versons, requre storng the robablty table and the dctonary together wth data. Ths ncreases the comressed fle sze consderably. Adatve models avod storage of dctonares and tables of robabltes. However, the model has no avalable nformaton on the data before startng the rocess..4 Lossless methods based on satal doman models These methods use models n the sace doman to remove the satal redundancy exstng n an mage, ether locally or globally. The codng rocess s done by means of statstcal models of substtuton. The most reresentatve s the lossless JPEG standard []. The model s based on a redcton algorthm of a xel, once the revously rocessed xels are known. The result of the redcton of a xel s a value very close to zero or resdual redcton error. Ths value s encoded usng one of the two methods recommended by the standardzaton commttee: Huffman Codng and Arthmetc Codng. There are other methods n the sace doman that exlot satal redundancy locally or globally usng models based on segmentaton strateges, nterolaton and so on. In ths aer, the frst standard method develoed by the lossless JPEG standardzaton commttee based on redcton technques s evaluated. Due to the lmtatons of the comresson ratos t was reconsdered and n a few years was relaced by another standard wth a new aroach and a dfferent model. Ths standard s called JPEG-LS..5 Lossless methods based on wavelet transform These methods have ther orgns n the methods aled to loss comresson technques. Although ths currently contnues to be ts feld of ractcal alcaton, the lossless verson s ncreasng. Unlke revous methods that exlot the satal nformaton, these methods use algorthms n the transform doman to exlot the satal nformaton through frequency analyss. The most relevant methods based on wavelet transform are S- Transform [], Haar Transform [3], and Lftng Scheme [4]. Other otmzed methods lke S+P Transform [5] have acheved a sgnfcant sace n the feld of medcal mages comresson. In ths aer, the Haar Transform and Lftng Scheme are evaluated..6 JPEG-LS standard JPEG-LS s the new lossless comresson method / near-lossless roosed standard for stll mages n contnuous tone changes. Ths new standard method (ISO-4495-/ITU-T.87) [6] s based on the LOCO-I (Low Comlexty Lossless) [7]. The term "near-lossless" refers to a standard way of accetng an nsgnfcant loss of data not vsble to the human eye. A value or lmt of error s defned ror to comresson to determne the maxmum acceted error wthout losng orgnal mage qualty. Alternatvely, we roose a method wth a new aroach that acheved a better comresson rato than the tradtonal methods [8] [9]. A hgher comresson rato may be obtaned when the source mage has hgher data redundancy. Ths aer s dvded nto four sectons. In the frst one, a bref summary of the state-of art s resented accordng to a classfcaton of the methods based on the model. In the second secton, the roosed method s descrbed n detal. In the thrd secton, the exermental results are shown usng a standard test mages and the results are comared wth conventonal methods. Fnally, n the last secton, the conclusons of ths research are stated whle ontng out future work oen to researchers.. Descrton of the method roosed The method roosed n ths aer adds a dfferent aroach to the tradtonal methods. Ths method resents a new model based on the INA algorthm [0] that executes two arallel rocesses n order to dramatcally reduce comresson tme. In the frst one, the algorthm generates a seral sorted and formed by the dfferent xels of the block whch are coded usng a artcularly redctve scheme. By arallel executon, the second rocess encodes the xels of the block by means of a bnary tree structure. Ths structure s bult usng ordered ars of xels, and n turn, defnes the nodes of the bnary tree. The nodes are coded usng transversal codng. Fg. shows the comresson cycle model. ISBN:
3 Source Image Segmentaton Process,,,, 4 INA Algorthm Block Elements Predctve Codng Parallel Executon Bnary Tree Structure Bnary Codng B = {,,,,,3,,4,,, 4 } () Ste. The dfferent values of the xels are sorted n ascendng order. These values determne where each xel s laced n the seres and are used as redctors (second rocess). Block Codeword Comressed Image Fg. Comresson cycle model of the method roosed The man contrbuton of ths method s the INA Algorthm and arallel executon n order to reduce resonse tmes of the comresson and decomresson cycles. Intally, the whole mage s contnuously dvded nto blocks of 4x4 xels, from left to rght and to to bottom. The codng algorthm s aled to each block, once and agan untl the entre mage s rocessed. Fg. Segmentaton rocess The segmentaton rocess does not generate data comresson but has the followng benefts [0]: Increase the executon seed by oeratng wth small blocks of 4x4 xels. Reduce memory storage requrements. Adat the data to a bnary tree data structure for the next stes of the algorthm. Formal descrton of INA Algorthm P, P, P,3 P,4 P P P 3 P 4 P P P 3 P 4 P P P 3 P 4 Ste. The mage s dvded nto blocks of a fxed sze (4x4 xels). The xels of each block are rocessed n order to buld a bnary tree (frst rocess). < < 3 <,, < n () where, n s the number of dfferent xels. Ste 3. Parallel executon. Ste 3. Frst rocess: bnary tree Ths rocess conssts on buldng and codng a bnary tree for each block. The xels are organsed nto grous of ordered ars.,, Each ar generates a node n the bnary tree. Therefore, each block s coded usng a bnary tree that contans a maxmum of eght nodes. When the bnary tree s comlete, all the xels are reresented n the bnary tree and the branches of the tree contan at least one node [0]. (, 3) ( ) Fg. Bnary tree The codeword of each node s made u of a sequence of consecutves ones and zeros known as a transversal codng technque. The oston of the frst element n each ar defnes the number of ones and the absolute value of the dfference between the frst and the second defnes the number of zeros.,, (, 3 ) ==> 00 ( 3, 3 ) ==> 0 (3) ( 5, 6) ( 5) (4) ISBN:
4 Theorem When alyng ths roosed algorthm to each block B, the total number of bts requred to code ths block s gven by the followng exresson: [ log (n) ] 6log (n) T(B) = 8 = where n s the number of dfferent xels n a block. The comlete codng of the block s a sequence of bnary codes generated by each of the xel ars. Ste 3. Second rocess: redctve codng. A seres s made u of the dfferent values of the block, as n (). The frst xel s coded usng eght bts. Once the frst xel s coded, we know f t s even or odd. Then, the next xel can be redcted usng a resdual value (r v ). m = 8 (n ) rv Theorem The dfference of two natural numbers, x and y, n whch x-y s even, and x>y, thus the result of (x-y)/ wll be an even natural number. Theorem 3 The dfference of two natural numbers, x and y, wth ooste arty, must be odd. Thus, the result of (x-y)/ wll be a decmal number. In ths case, t s necessary to add one bt n order for t to be reversble. Table. Predctve Codng Pxel Predcton Number of Bts Pxel 8 bts P V r =( 7 - )/ N = log (( 7 - )/) (4) P 3 V r3 = ( - )/ N = log (( - )/) P 4 V r4 = ( 3 - )/ N 3= log (( 3 - )/) P 5 V r5 = ( 4-3 )/ N 4= log (( 4-3 )/) P 6 V r6 = ( 5-4 )/ N 5= log (( 5-4 )/) P 7 V r7 = ( 6-5 )/ N 6= log (( 6-5 )/) P 8 V r7 = ( 7-6 )/ N 7= log (( 7-6 )/) The comlete bnary codng of the block s the sequence of codes generated by each one of the xels and the codeword of the bnary tree. Each codeword s made u of a seres of consecutve ones and zeros, whch allows us to further reduce the codeword. = 8 m (4) (5) (6) Ste 4. Go to Ste. The rocess contnues block by block untl the segmentaton rocess of the whole mage s fnshed. The algorthm s aled block by block untl The decomresson rocess s reversble because t allows to recover the exact orgnal data from the comressed data alyng the same model of the comresson rocess. 3. Exermental results In ths secton we resent comresson results obtaned wth the basc confguraton of the roosed method descrbed above. These results are comared wth those obtaned wth other conventonal methods reorted n the lterature []. The average comresson ratos for each model are shown n the Table. The rato obtaned s hgher than the one obtaned usng conventonal methods. Table. Average Comresson Rato and b. Methods Comresson BPP ratos,03 7,79 Substtuton models Arthmetc models, 7, Dctonary models,3 6,53 Predctve models,57 5,09 Transformed models,76 54 JPEG-LS Standard,75 57 Method roosed,77 5 The exermental studes have been carred out usng a collecton of ISO standard mages. Lena Baboon Peers Boats Entroy: Entroy: Entroy: Entroy: -7.9 Mean Value: 05 Mean Value :9,4 Mean Value:00 Mean Value: 9,70 Cameraman Barbara Goldhll Zelda Entroy: Entroy: -.7,63 Entroy:-7.48 Entroy:-7,6 Mean Value:8,7 Mean Value: 7,39 Mean Value:0 Mean Value: 9,6 Fg. 4 A set of ISO standard mages ISBN:
5 4. Conclusons A new method for the lossless comresson of statc mages based on INA Algorthm has been develoed and resented n ths aer. Its major contrbutons are: Imrovement of rato comresson as comared to conventonal methods. Parallel executon Faster codng-decodng rocess. The method roosed s sutable for comresson of colour mages and grayscales mages. The dentfyng features of ths new method allow the blocks to be rocessed n arallel. In future research the method roosed should be mroved. Imrovement wll be orented towards comactng of the codeword. References: [] H. Glbert and M. Thomas. Data comresson: technques and alcatons, hardware and software consderatons. John Wley and Sons Ltd; New York, 987,. 06. ISBN: [] J. A. Storer, Data Comresson: Methods and Theory Comuter Scence Press, Rockvlle, MD, 988. [3] C.E. Shannon, A Mathematcal Theory of Communcaton", Bell System Techncal Journal, vol. 7, , July, October, 948. [4] R.M. Fano, The transmsson of Informaton Techncal Reort 65, Reseca Laboratory of Electroncs, MIT, Cambrdge, M.A [5] D.A. Huffman, A method for the constructon of Mnmum Redundancy Codes Proceedngs of the I.R.E., vol. 40 No. 9, , ISSN: [6] J.J. Rssanen and G.G. Langdon, Arthmetc Codng IBM Journal of Research and Develoment, Vol. 3 No March 979. [7] I. Wtten, H. Neal, M. Rradford, J.G. Cleary, Arthmetc Codng for Data Comresson Communcatons of the ACM, vol. 30, No 6, June 987. [8] J. Zv and A. Lemel, A Unversal Algorthm for Sequental Data Comresson IEEE Trans. Inform. Theory 3 (May), May 977. [9] Zv, J., and A. Lemel, Comresson of Indvdual Sequences va Varable-Rate Codng IEEE Trans. Inform. Theory Setember 978. [0] T. A. Welch, A Technque for Hgh- Performance Data Comresson IEEE Comuter. vol. 7, No. 6, June 984. [] G.K. Wallace, The JPEG Stll Pcture Comresson Standard Communcatons of the ACM, Vol. 3 No [] A. Sad and W. Pearlman, "A new fast and effcent mage codec based on set arttonng n herarchcal trees" IEEE Trans. on Crcuts and Systems Vdeo Technology, 6, 996, [3] A. Haar, Zur Theore der orthogonalen Funktonensysteme, Mathematsche Annalen, 69, , 90. [4] I. Daubeches and W. Sweldens, "Factorng wavelet transforms nto lftng stes," rernt, Bell Laboratores, Lucent Technologes, 996. [5] A. Sad and W. A. Pearlman, "Reversble Image Comresson va Multresoluton reresentaton and redctve codng" IEEE Trans. Image Processng, vol Nov [6] Informaton Technology, Lossless and Near- Lossless Comresson of Contnuous-Tone Stll Images, ISO/IEC 4495-, ITU Recommend. T [7] M. J. Wenberger, G. Serouss, and G. Saro, LOCO-I: A low comlexty, context-based, lossless mage comresson algorthm, Data Comresson Conference, Snowbrd, UT, Mar. 996, [8] J.I. Larraur, "A New Lossless Comresson Algorthm for Statc Color Images", Proc. IS&T, [9] J.I. Larraur and E. Kahoraho, "A Fast Bnary Tree Encoder for Lossless Image Comresson", Proc. Sgnal Proc., Pattern Recog. & Alcatons", 00 [0] J.I. Larraur and E. Kahoraho, A new Method for Real Tme Lossless Image Comresson aled to Artfcal Vson PCS003 Proceedng of Pcture Codng Symosum, INRIA, , Arl 003. ISBN [] A.E. Savaks, Evaluaton of algorthms for lossless comresson of contnuous-tone mages Journal of Electronc Imagng (), January 00. ISBN:
THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY
Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING
ACCUATE BIT ALLOCATION AND ATE CONTOL FO DCT DOMAIN VIDEO TANSCODING Zhjun Le, Ncolas D. Georganas Multmeda Communcatons esearch Laboratory Unversty of Ottawa, Ottawa, Canada {lezj, georganas}@ mcrlab.uottawa.ca
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationRecognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network
Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationTraffic Classification Method Based On Data Stream Fingerprint
5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence
More informationPattern Based Lossless Data Compression
Pattern Based Lossless Data Compresson ANGEL KURI-MORALES Insttuto Tecnológco Autónomo de Méxco Río Hondo No. 1 Méxco 01000, D.F. MEXICO Abstract. In ths paper we dscuss a method for lossless data compresson
More informationRegion Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided
Regon Segmentaton Readngs: hater 10: 10.1 Addtonal Materals Provded K-means lusterng tet EM lusterng aer Grah Parttonng tet Mean-Shft lusterng aer 1 Image Segmentaton Image segmentaton s the oeraton of
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationLossless Compression of Map Contours by Context Tree Modeling of Chain Codes
Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes Alexander Akmo, Alexander Kolesnko, and Pas Fränt Department of Computer Scence, Unersty of Joensuu, P.O. Box 111, 80110 Joensuu,
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationApplication of Genetic Algorithms in Graph Theory and Optimization. Qiaoyan Yang, Qinghong Zeng
3rd Internatonal Conference on Materals Engneerng, Manufacturng Technology and Control (ICMEMTC 206) Alcaton of Genetc Algorthms n Grah Theory and Otmzaton Qaoyan Yang, Qnghong Zeng College of Mathematcs,
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationIMRT workflow. Optimization and Inverse planning. Intensity distribution IMRT IMRT. Dose optimization for IMRT. Bram van Asselen
IMRT workflow Otmzaton and Inverse lannng 69 Gy Bram van Asselen IMRT Intensty dstrbuton Webb 003: IMRT s the delvery of radaton to the atent va felds that have non-unform radaton fluence Purose: Fnd a
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationView-Dependent Multiresolution Representation for a Height Map
Internatonal Journal of Innovaton, Management and echnology, Vol. 4, No. 1, February 013 Vew-Deendent Multresoluton Reresentaton for a Heght Ma Yong H. Chung, Won K. Hwam, Dae S. Chang, Jung-Ju Cho, and
More informationFRACTAL COMPRESSION TECHNIQUE FOR COLOR IMAGES USING VARIABLE BLOCK
ISSN: 0976-910 (ONLINE) ICTACT JOURNAL ON IMAGE AND VIDEO PROCESSING, NOVEMBER 017, VOLUME: 08, ISSUE: 0 DOI: 10.1917/jvp.017.030 FRACTAL COMPRESSION TECHNIQUE FOR COLOR IMAGES USING VARIABLE BLOCK Nsar
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationSkew Estimation in Document Images Based on an Energy Minimization Framework
Skew Estmaton n Document Images Based on an Energy Mnmzaton Framework Youbao Tang 1, Xangqan u 1, e Bu 2, and Hongyang ang 3 1 School of Comuter Scence and Technology, Harbn Insttute of Technology, Harbn,
More informationEfficient Video Coding with R-D Constrained Quadtree Segmentation
Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationWavelet-Based Image Compression System with Linear Distortion Control
Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationAdvanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs
Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,
More informationA note on Schema Equivalence
note on Schema Equvalence.H.M. ter Hofstede and H.. Proer and Th.P. van der Wede E.Proer@acm.org PUBLISHED S:.H.M. ter Hofstede, H.. Proer, and Th.P. van der Wede. Note on Schema Equvalence. Techncal Reort
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationLecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method
Lecture Note 08 EECS 4101/5101 Instructor: Andy Mrzaan Introducton All Nearest Neghbors: The Lftng Method Suose we are gven aset P ={ 1, 2,..., n }of n onts n the lane. The gven coordnates of the -th ont
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationA Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet
IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun
More informationChinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks
Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationTime-Varying Volume Geometry Compression with 4D Lifting Wavelet Transform
Tme-Varyng Volume Geometry Compresson wth 4D Lftng Wavelet Transform Yan Wang and Heba Hamza NSF Center for e-desgn, Unversty of Central Florda, Orlando, FL 32816-2996, USA {wangyan, hhamza}@mal.ucf.edu
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationAn Improved Face Recognition Technique Based on Modular Multi-directional Two-dimensional Principle Component Analysis Approach
301 JOURNAL OF SOFWARE, VOL. 9, NO. 1, DECEMBER 014 An Imroved Face Recognton echnque Based on Modular Mult-drectonal wo-dmensonal Prncle Comonent Analyss Aroach Deartment of Deartment of Xaoqng Dong Physcs
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationClassic Term Weighting Technique for Mining Web Content Outliers
Internatonal Conference on Computatonal Technques and Artfcal Intellgence (ICCTAI'2012) Penang, Malaysa Classc Term Weghtng Technque for Mnng Web Content Outlers W.R. Wan Zulkfel, N. Mustapha, and A. Mustapha
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationA High-Accuracy Algorithm for Surface Defect Detection of Steel Based on DAG-SVM
Sensors & Transducers, Vol. 57, Issue 0, October 203,. 42-48 Sensors & Transducers 203 by IFSA htt://www.sensorsortal.com A Hgh-Accuracy Algorthm for Surface Defect Detecton of Steel Based on DAG-SVM,
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationExercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005
Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationSemantic Image Retrieval Using Region Based Inverted File
Semantc Image Retreval Usng Regon Based Inverted Fle Dengsheng Zhang, Md Monrul Islam, Guoun Lu and Jn Hou 2 Gppsland School of Informaton Technology, Monash Unversty Churchll, VIC 3842, Australa E-mal:
More informationTIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS
TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS Kestuts Jankauskas Kaunas Unversty of Technology, Deartment of Multmeda Engneerng, Studentu st. 5, LT-5368 Kaunas, Lthuana, kestuts.jankauskas@ktu.lt Abstract:
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationCHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar
CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationCHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly
65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are
More informationCodebook Generation for Vector Quantization using Interpolations to Compress Gray Scale Images
Internatonal Journal of Computer Applcatons (097 8887) Volume No.9, March 0 Codebook Generaton for Vector Quantzaton usng Interpolatons to Compress Gray Scale Images S.Vmala Dept. of Comp. Sc. Mother Teresa
More informationA fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationAvailable online at ScienceDirect. Procedia Computer Science 94 (2016 )
Avalable onlne at www.scencedrect.com ScenceDrect Proceda Comuter Scence 94 (2016 ) 176 182 The 13th Internatonal Conference on Moble Systems and Pervasve Comutng (MobSPC 2016) An Effcent QoS-aware Web
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationBackground Removal in Image indexing and Retrieval
Background Removal n Image ndexng and Retreval Y Lu and Hong Guo Department of Electrcal and Computer Engneerng The Unversty of Mchgan-Dearborn Dearborn Mchgan 4818-1491, U.S.A. Voce: 313-593-508, Fax:
More informationReport on On-line Graph Coloring
2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationA Computer Vision System for Automated Container Code Recognition
A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationSpeed of price adjustment with price conjectures
Seed of rce adustment wh rce conectures Mchael Olve Macquare Unversy, Sydney, Australa Emal: molve@efs.mq.edu.au Abstract We derve a measure of frm seed of rce adustment that s drectly nversely related
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationFULL-FRAME VIDEO STABILIZATION WITH A POLYLINE-FITTED CAMCORDER PATH
FULL-FRAME VIDEO STABILIZATION WITH A POLYLINE-FITTED CAMCORDER PATH Jong-Shan Ln ( 林蓉珊 ) We-Tng Huang ( 黃惟婷 ) 2 Bng-Yu Chen ( 陳炳宇 ) 3 Mng Ouhyoung ( 歐陽明 ) Natonal Tawan Unversty E-mal: {marukowetng}@cmlab.cse.ntu.edu.tw
More information