Edge detection based on single layer CNN simulator using RK6(4)

Size: px
Start display at page:

Download "Edge detection based on single layer CNN simulator using RK6(4)"

Transcription

1 Edge detection based on single layer CNN simulator using RK64) Osama H. Abdelwahed 1, and M. El-Sayed Wahed 1 Mathematics Department, Faculty of Science, Suez Canal University, Egypt Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Egypt Abstract We proposed RK64) as a new method to make an ecient single layer CNN simulator to improve the computation time and to detect the edges of an input image. Choosing an adaptive step size using RK64) has a good impact to get better results for edge detection and to obtain a faster algorithm. Experimental results and comparisons are introduced. Index Terms Cellular neural network; Image processing; Single layer CNN simulator; Edge detection; RK64) 1 Introduction Edge detection is used in several elds such as image processing. It is useful especially, in the areas of feature detection and feature extraction. Dierent techniques have been proposed to detect the edges of an input image. Chua and Yang presented Cellular Neural Network CNN ) in 1988 []. CNN has many advantages such as its capability for parallel processing and continuous time dynamics. The applications in image processing include edge detection, noise removal and image segmentation especially in the medical elds such as mass detection in mammograms. Dierent numerical integration methods have been proposed in designing a single layer CNN simulator for edge detection. V. Murugesh and K. Kyung [5] modied the single layer CNN simulator [4] using RK-Gill [1] and RK-Butcher [1, 7, 8]. But the problem in their work is that edge detection results need to be improved since the edges are not accurately determined. In addition, the computation time cost is a little high. So our proposed method is presented to improve the quality and the accuracy of the edge detection and to save the computation time needed for detecting the edges of an input image. There are two types of cellular neural networks. The rst type is a single layer cellular neural network in which there is only one single state variable in each cell. The second type is a multilayer cellular neural network in which there are several state variables in each cell of CNN. The concept of multilayer cellular neural network implies that the interactions among the state variables of the same layer should be occurred []. However, in our work, our proposed method is based on using a single layer cellular neural network which has several applications in image processing. One of the most eective methods for analyzing the convergence properties of cellular neural networks is the lyapunov's method. It is is only a function of the input function and output function of CNN. From the properties of the function which represent lyapunov's method, the properties of steady state variables of CNN can be easily derived. The lyapunov's method always converges to a local minimum where CNN produces the desired output. We proposed the numerical integration algorithm RK64) which improved the edge detection results and saved the CPU time or the computation time. Our proposed method is based on using the adaptive selection step size algorithm to minimize the simulation time for single layer CNN simulator. This paper is organized as follows: in section ) the CNN technique was explained. Section 3) presented single layer CNN simulator. In section 4) the numerical integration algorithms in the related work and our algorithm were presented. Results were discussed in section 5). In section 6) conclusion was presented. Cellular Neural Network CNN is a mechanism used to process its nearby elements in parallel as in neural networks. CNN can be represented in a regular matrix form as shown in Fig. 1). It is composed of M x N elements. The elements of CNN are called cells. Cells which have indirectly connections can be aected with each other due to the the properties of CNN []. 1

2 Figure 1: A two dimensional CNN with 4 x 4 cells Fig. 1) shows a D-CNN with size equal to four. Each cell ci, j) has interactions with its nearest neighbors. CNN can be modeled by means of three parameters: A, B, and Z. The parameters A and B specify the interaction among CNN cells and Z is the bias value. Any image of size M N pixels is typically CNN with size M N. Each pixel is corresponding to a cell in CNN. The r-neighborhood of a cell, n m i, j) with radius m is: n r i, j) = {ca, b} max i=1,m;j=1,n { a i, b j } r, 1) Since r is a number greater than 0. Frequently, The expression "3 3 neighborhood" is used for r = 1, " 5 5 neighborhood" is used for r =, "7 7 neighborhood" is used for r = 3, etc. According to [], CNN is represented by the following equation: C dx ij dt t) = 1 R x x ij t) + Ca,b) Ai; j; k, l)y ab t) + Ca,b) Bi; j; k, l)u ab t) + I ij ) Figure : The output function The output of the cell y ij is set by the current source I yx as illustrated in the following equation:

3 I yx = 1 R y f x ij ) 3) f x) = 1 x + 1 x 1 ) 4) The output function f is illustrated in Fig. ). The output voltage y ij = I yx R y has the following form: y ij = f x ij t)) = 1 x ij t) + 1 x ij t) 1 ) 5) C and R x represent the parameters of the circuit. τ takes values from seconds. This parameter has impact on the behavior of CNN. To measure the time in units, we set τ = CR x = 1. Z ij = I ij /C represents the bias of the cell. The state equation can be abbreviated as in the following equation: C dx ij dt t) = x ijt) + Ca,b) Ai; j; k, l)y ab t) + Ca,b) Bi; j; k, l)u ab t) + Z ij 6) Equation 6) represents the general equation of the standard CNN dynamics. The output equation depends mainly on the state values, the input values and the bias value. So the system of dierential equations of CNN is controlled by the templates {Ai, j; k, l), Bi, j; k, l), Z ij }. A and B are represented as in the following form: A = B = a 1, 1 a 1,0 a 1,1 a 0, 1 a 0,0 a 0,1 a 1, 1 a 1,0 a 1,1 b 1, 1 b 1,0 b 1,1 b 0, 1 b 0,0 b 0,1 b 1, 1 b 1,0 b 1,1,, Z The concept of space-invariant templates are exploited in CNN. This means that Ai, j; i + 1, j) is the same for all i, j) coordinates. The values of the template A and the template B in addition to the bias value Z are nineteen parameters which dene CNN in the case of 1-neighborhood. 3 The proposed method Our presented method was based on the single layer CNN algorithm mentioned in [5]. We introduced the numerical integration method, RK64) in the single layer CNN algorithm for edge detection. Our method has decreased the CPU time or the computation time of this algorithm. This improvement was accomplished by choosing an adaptive step size when RK64) was applied. So when the step size was increased to some extent, this means that the computation time would be decreased. This point is one of the most essential parts in the proposed algorithm. So our contribution lies in increasing the value of the chosen step size gradually to some extent using RK64) to obtain shorter CPU time. In addition, the algorithm improved the edge detection results. Our results will be compared to those introduced in the literature [5]. Actually the idea of the algorithm in [5] is mentioned as follows: the centers of the templates A and B are passed to the input image pixel by pixel through CNN processor till the algorithm converges to the steady state values [5]. This means that the nal state is the approximated output image with some error tolerance. Three dierent values for the templates A, B and the bias value Z of CNN processor are applied according to the kind of the application. The application will be edge detection, averaging template, or connected component. Although 3

4 Figure 3: Flow chart of single layer CNN algorithm 4

5 our proposed algorithm essentially for edge detection only, but the other two templates, averaging template and connected component are used for comparison purposes as we will mention below. The ow chart of the single layer CNN algorithm[5] is shown in Fig. 3). The essential part in the ow chart will be the proposed numerical integration algorithm RK64) that will be discussed in section 4.). As we mentioned before that our purposed numerical integration algorithm has two important points: First, to make a faster algorithm for edge detection by decreasing the CPU time; Second, to improve the edge detection results. 4 The numerical integration methods CNN is represented by a system of dierential equations which is solved using numerical integration algorithms. Three numerical integration methods were used in the literature [5]. They were Euler, RK-Gill and RK-Butcher. Our proposed method RK64) used the adaptive step size formula [11] to minimize the local truncation error. Since by increasing the step size to some extent, the CPU time of the single layer simulator will be improved. These algorithms can be represented as shown in the following equation[5]: x ij n + 1)τ) x ij nτ) = ˆ τn+1 τ n f x nτ)) dnτ 7) In section 4.1), we will discuss the numerical integration algorithms mentioned in the literature [5]. In section 4., the proposed numerical integration algorithm RK64) will be mentioned in details. 4.1 The numerical integration algorithms used in the previous work Euler method Euler's method is very simple to be used to solve a system of nonlinear dierential equations. It is a rst order method that uses local truncation error for each step and it uses a global truncation error at a given time. It is approximated according to Taylor series as in the following equation [3, 8, 9]: 4.1. RK-Gill method x ij n + 1)τ) = x ij nτ) + τf x ij nτ)) 8) The RK-Gill algorithm which was proposed by [1] requires four calculations per step as shown in the following equation: x ij n + 1) τ) = x ij nτ) + Where, 1 = x τf ij nτ)) ) = τf x ij nτ) + 1 kij 1 3 = τf x ij nτ) ) = τf x ij nτ) ) 1 1 ) ) k ij 3 ) 1 [ ) + + ) ] 3 + kij 4 9) RK-Butcher The RK-Butcher algorithm [3, 8, 9] requires six calculations for each step as shown in the following equation : x ij n + 1) τ) = x ij nτ) [ ] kij 3 + 1kij 4 + 7kij 6 10) Where, 5

6 1 = τf x ij nτ)) = τf x ij nτ) + 1 ) 4 kij 1 3 = τf x ij nτ) kij ) 8 kij 4 = τf x ij nτ) 1 ) kij + kij 3 5 = τf x ij nτ) kij ) 16 kij 4 6 = τf x ij nτ) 3 7 kij kij kij kij ) 7 kij 5 4. The proposed numerical integration algorithm RK64) RK64) is a numerical integration method used in single layer CNN simulator. The equations of RK64) [11] are : 1 = τf x ij nτ)) = x τf ij nτ)) kij 1 3 = x τf ij nτ)) kij kij 4 = x τf ij nτ)) kij kij kij 3 5 = x τf ij nτ)) kij kij kij kij 4 6 = x τf ij nτ)) kij kij kij kij kij 5 7 = x τf ij nτ)) kij kij kij kij kij kij 6 Therefore, we have the following equation which represent the solution for RK6): x ij n + 1) τ) = x ij nτ) kij kij kij kij kij kij 7 11) Also the solution of RK4) as follows: y ij n + 1) τ) = y ij nτ) kij kij kij kij kij kij 7 1) Our contribution is based on applying the adaptive step size selection method in the single layer CNN simulator using RK64). According to [6], The step size h of rs) order RK methods was modied in terms of the error by stepeps) [10] by using the following equation: h n+1 = f h n tol error n ) 1 s+1, 13) Since f is a safety value and h n+1 = x n+1 x n is approximated according to the estimation of the local truncation error error n which is approximated using the equation[6]: error n xˆ n yˆ n 14) 6

7 Since xˆ n and yˆ n represents the approximated solutions of order rth and sth respectively. And tol represents the required tolerance. If error n+1 tol, this implies that y n+1 is acceptable otherwise, Equation 13) is recomputed by substituting error n error n+1. By substitutingr = 6 and s = 4, the value of the step size as follows: h n+1 = f h n tol error n ) 1 5, 15) So we use Rk64) to make an ecient single layer CNN simulator for edge detection and higher performance. 5 Experimental Results As we mentioned above that the simulation time used in the algorithm is the real CPU time. Our simulator was executed on a machine with processor core i5. The input image is a boat image. The edge detection results are shown in Fig. 4). The input image and output image are shown in Fig. 4a) and Fig. 4b) respectively. The performance measures are shown in Fig. 5). Using our proposed algorithm, from Fig. 5a), we notice that the simulation time due to simulating a small diamond image used to detect the edges of the input image is better than those used in the literature. a) Input image b) Output image Figure 4: Results of edge detection Another very important point is choosing an adaptive value for the step size. Our proposed method used RK64) to optimize the value of step size to some extent using the adaptive step size algorithm. In Fig. 5b) we notice that the value of step size for our proposed algorithm is higher than those used in the literature. If the value of step size is very small, the algorithm will take much time otherwise if the value of step size is very high, the algorithm might diverge. The results of gure 5b) obtained by simulating a small diamond image more than one hundred times. Actually, choosing a proper value of the step size helped in designing an ecient single layer CNN simulator which has some capabilities like improving the simulation time and enhancing the edge detection results. i.e. this means that the local truncation error for each step is decreasing when compared by the numerical integration algorithms which are used in the literature. So using RK64) in the single layer CNN simulator increased the eciency of the single layer CNN simulator because using the selection step size algorithm in RK64) enhanced the 7

8 quality of the edge detection results and minimized the local truncation error which implies a faster performance for the proposed simulator. a) CPU time for 4 dierent methods b) Maximum step size for 4 dierent methods: 1- Edge detection - Averaging template 3- Connected component Figure 5: Measures of performance Table 1) summarizes the results of CPU time and the corresponding maximum step size for the proposed method and the methods used in the literature. We notice that our proposed method has the maximum value of step size and this means that the corresponding CPU is absolutely has the minimum value. Also, table ) shows the maximum step size for both averaging and connected component templates. According to these results, our proposed numerical integration algorithm has shown faster CPU time i.e. shorter time for the single layer CNN simulator. Method CPU time Maximum step size Euler 5.5 RK-Gill 0 1 RK-Butcher 6 RK 64) Table 1: Results of CPU time and maximum step size for edge detection Method Averaging template Connected component Euler.7 RK-Gill RK-Butcher 3 RK 64).8 4. Table : Results of maximum step size for averaging template and connect component 6 Conclusion Using our proposed numerical integration algorithm RK64), we achieved better results than those presented in the literature. So our method improved the simulation time or CPU time for the single layer CNN simulator. This 8

9 contribution utilized the adaptive step size algorithm using RK64) which implied a faster single CNN simulator. There are further studies needed to improve the obtained results by choosing an ecient numerical integration algorithm which improves the CPU time and edge detection for the single layer CNN simulator. References [1] JC. Ban and CH. Chang. When are two multi-layer cellular neural networks the same? Neural Networks, March 016. [] L. O. Chua and L. Yang. Cellular neural networks: Theory and applications. IEEE Trans. Circuits and Systems, [3] N. Huang and CF. Ma. Modied conjugate gradient method for obtaining the minimum-norm solution of the generalized coupled sylvester-conjugate matrix equations. Applied Mathematical Modelling, 40):160175, January 016. [4] C.C. Lee and JP. de. Gyvez. Single-layer cnn simulator. In IEEE International Symposium on Circuits and Systems, [5] V. Murugesh and K. Kyung. An ecient edge detection using raster cnn simulator. In Proceedings of the 5th international conference on Convergence and hybrid information technology, pages 63464, 011. [6] TD. Papanikolaou and D. Tsoulis. Assessment of numerical integration methods in the context of low earth orbits and inter-satellite observation analysis. Acta Geodaetica et Geophysica, January 016. [7] G. C. Paul and S. Senthilkumar. Exploration on initial structures of extrasolar protoplanets via new explicit rkahem4,4) method. The Egyptian Journal of Remote Sensing and Space Science, 181):18, June 015. [8] G. C. Paul and S. Senthilkumar. Execution of novel explicit rkarms4,4) technique in determining initial congurations of extra-solar protoplanets formed by disk instability. NRIAG Journal of Astronomy and Geophysics, January 016. [9] S. Senthilkumar, M. Lee, and G. Jeong. A modied improved runge-kutta fth-order ve stage technique to study industrial robot arm. Int. J. Patt. Recogn. Artif. Intell, 76), September 013. [10] L. F. Shampine. Some practical runge-kutta formulas. Math. Comp., 46:135150, [11] CH. Tsitouras and S. N. Papakostas. Cheap error estimation for rungekutta methods. SIAM J. Sci. Comput., 06):067088, [1] W. Xu, D. Meng, Y. Chen, H. Qian, and Y. Xu. Dynamics modeling and analysis of a exible-base space robot for capturing large exible spacecraft. Multibody System Dynamics, Springer, 33):357401,

Investigation on Multilayer Raster Cellular Neural Network by Arithmetic and Heronian Mean RKAHeM(4,4)

Investigation on Multilayer Raster Cellular Neural Network by Arithmetic and Heronian Mean RKAHeM(4,4) Proceedings of the World Congress on Engineering 007 Vol I WCE 007 July - 4 007 London U.K. Investigation on Multilayer Raster Cellular Neural Networ by Arithmetic and Heronian Mean RKAHeM(44 R. Ponalagusamy

More information

Time-Multiplexing Cellular Neural Network in FPGA for image processing

Time-Multiplexing Cellular Neural Network in FPGA for image processing 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), Mexico City, Mexico. September 20-22, 2017 Time-Multiplexing Cellular Neural Network in FPGA

More information

Neuro-Remodeling via Backpropagation of Utility. ABSTRACT Backpropagation of utility is one of the many methods for neuro-control.

Neuro-Remodeling via Backpropagation of Utility. ABSTRACT Backpropagation of utility is one of the many methods for neuro-control. Neuro-Remodeling via Backpropagation of Utility K. Wendy Tang and Girish Pingle 1 Department of Electrical Engineering SUNY at Stony Brook, Stony Brook, NY 11794-2350. ABSTRACT Backpropagation of utility

More information

Genetic Algorithm Based Template Optimization for a Vision System: Obstacle Detection

Genetic Algorithm Based Template Optimization for a Vision System: Obstacle Detection ISTET'09 Umair Ali Khan, Alireza Fasih, Kyandoghere Kyamakya, Jean Chamberlain Chedjou Transportation Informatics Group, Alpen Adria University, Klagenfurt, Austria. Genetic Algorithm Based Template Optimization

More information

Skill. Robot/ Controller

Skill. Robot/ Controller Skill Acquisition from Human Demonstration Using a Hidden Markov Model G. E. Hovland, P. Sikka and B. J. McCarragher Department of Engineering Faculty of Engineering and Information Technology The Australian

More information

Reinforcement Control via Heuristic Dynamic Programming. K. Wendy Tang and Govardhan Srikant. and

Reinforcement Control via Heuristic Dynamic Programming. K. Wendy Tang and Govardhan Srikant. and Reinforcement Control via Heuristic Dynamic Programming K. Wendy Tang and Govardhan Srikant wtang@ee.sunysb.edu and gsrikant@ee.sunysb.edu Department of Electrical Engineering SUNY at Stony Brook, Stony

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

CNN Template Design Using Back Propagation Algorithm

CNN Template Design Using Back Propagation Algorithm 2010 12th International Workshop on Cellular Nanoscale Networks and their Applications (CNNA) CNN Template Design Using Back Propagation Algorithm Masashi Nakagawa, Takashi Inoue and Yoshifumi Nishio Department

More information

Issues with Curve Detection Grouping (e.g., the Canny hysteresis thresholding procedure) Model tting They can be performed sequentially or simultaneou

Issues with Curve Detection Grouping (e.g., the Canny hysteresis thresholding procedure) Model tting They can be performed sequentially or simultaneou an edge image, nd line or curve segments present Given the image. in Line and Curves Detection 1 Issues with Curve Detection Grouping (e.g., the Canny hysteresis thresholding procedure) Model tting They

More information

Detection of objects in moving images and implementation of the purification algorithm on Analog CNN and DSP processors

Detection of objects in moving images and implementation of the purification algorithm on Analog CNN and DSP processors Detection of objects in moving images and implementation of the purification algorithm on Analog CNN and DSP processors Emel Arslan 1, Zeynep Orman 2, Sabri Arik 2 1 Research and Application Center for

More information

An Angle Estimation to Landmarks for Autonomous Satellite Navigation

An Angle Estimation to Landmarks for Autonomous Satellite Navigation 5th International Conference on Environment, Materials, Chemistry and Power Electronics (EMCPE 2016) An Angle Estimation to Landmarks for Autonomous Satellite Navigation Qing XUE a, Hongwen YANG, Jian

More information

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10 MATH 573 LECTURE NOTES 77 13.8. Predictor-corrector methods. We consider the Adams methods, obtained from the formula xn+1 xn+1 y(x n+1 y(x n ) = y (x)dx = f(x,y(x))dx x n x n by replacing f by an interpolating

More information

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch

More information

Optimize Performance in the Presence of Time Delays 1. J. K. Yook, D. M. Tilbury, N. R. Soparkary. The University of Michigan

Optimize Performance in the Presence of Time Delays 1. J. K. Yook, D. M. Tilbury, N. R. Soparkary. The University of Michigan A Design Methodology for Distributed Control Systems to Optimize Performance in the Presence of Time Delays 1 J. K. ook, D. M. Tilbury, N. R. Soparkary The University of Michigan Mechanical Engineering

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

REDUCTION OF CODING ARTIFACTS IN LOW-BIT-RATE VIDEO CODING. Robert L. Stevenson. usually degrade edge information in the original image.

REDUCTION OF CODING ARTIFACTS IN LOW-BIT-RATE VIDEO CODING. Robert L. Stevenson. usually degrade edge information in the original image. REDUCTION OF CODING ARTIFACTS IN LOW-BIT-RATE VIDEO CODING Robert L. Stevenson Laboratory for Image and Signal Processing Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556

More information

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory Computers and Mathematics with Applications 61 (2011) 2101 2106 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa An

More information

Classifier C-Net. 2D Projected Images of 3D Objects. 2D Projected Images of 3D Objects. Model I. Model II

Classifier C-Net. 2D Projected Images of 3D Objects. 2D Projected Images of 3D Objects. Model I. Model II Advances in Neural Information Processing Systems 7. (99) The MIT Press, Cambridge, MA. pp.949-96 Unsupervised Classication of 3D Objects from D Views Satoshi Suzuki Hiroshi Ando ATR Human Information

More information

Networks for Control. California Institute of Technology. Pasadena, CA Abstract

Networks for Control. California Institute of Technology. Pasadena, CA Abstract Learning Fuzzy Rule-Based Neural Networks for Control Charles M. Higgins and Rodney M. Goodman Department of Electrical Engineering, 116-81 California Institute of Technology Pasadena, CA 91125 Abstract

More information

Open Access Robust Design for Generalized Point Extract CNN with Application in Image Processing

Open Access Robust Design for Generalized Point Extract CNN with Application in Image Processing Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 205, 7, 33-337 33 Open Access Robust Design for Generalized Point Extract CNN with Application in

More information

Sine Cosine Taylor Like Technique for Connected Component Detector by ICNN Simulation

Sine Cosine Taylor Like Technique for Connected Component Detector by ICNN Simulation I.J. Image, Graphics and Signal Processing, 01, 3, 8-34 Published Online April 01 in MECS (http://www.mecs-press.org/ DOI: 10.5815/igsp.01.03.05 Sine Cosine Taylor Lie Technique for Connected Component

More information

Road Traffic Analysis on the CNN Universal Machine

Road Traffic Analysis on the CNN Universal Machine , October 19-21, 2011, San Francisco, USA Road Traffic Analysis on the CNN Universal Machine Emel Arslan, Zeynep Orman Abstract CNN Universal Machines that contain two different processors working interactively

More information

arxiv: v1 [cs.cv] 2 May 2016

arxiv: v1 [cs.cv] 2 May 2016 16-811 Math Fundamentals for Robotics Comparison of Optimization Methods in Optical Flow Estimation Final Report, Fall 2015 arxiv:1605.00572v1 [cs.cv] 2 May 2016 Contents Noranart Vesdapunt Master of Computer

More information

June Wesley, Cambridge Univ. Press,

June Wesley, Cambridge Univ. Press, [6] P Dupuis and J Oliensis. An optimal control formulation and related numerical methods for a problem in shape reconstruction. Ann. Appl. Probab., 4():87{ 346, 994. [7] B K P Horn. Obtaining shape from

More information

Data Assimilation and Retrieval Theory

Data Assimilation and Retrieval Theory Data Assimilation and Retrieval Theory Course Project: Integration of Neural Network Training into 4D Variational Data Assimilation and Application to the Lorenz Model Andre R. Erler December 18, 2008

More information

The WENO Method in the Context of Earlier Methods To approximate, in a physically correct way, [3] the solution to a conservation law of the form u t

The WENO Method in the Context of Earlier Methods To approximate, in a physically correct way, [3] the solution to a conservation law of the form u t An implicit WENO scheme for steady-state computation of scalar hyperbolic equations Sigal Gottlieb Mathematics Department University of Massachusetts at Dartmouth 85 Old Westport Road North Dartmouth,

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

AN INTELLIGENT APPROACH TO IMAGE DENOISING

AN INTELLIGENT APPROACH TO IMAGE DENOISING AN INTELLIGENT APPROACH TO IMAGE DENOISING TANZILA SABA, AMJAD REHMAN AND GHAZALI SULONG Department of Computer Graphics and Multimedia Faculty of Computer Science and Information Systems University Technology

More information

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and

More information

Image Edge Detection Based on Cellular Neural Network and Particle Swarm Optimization

Image Edge Detection Based on Cellular Neural Network and Particle Swarm Optimization Transactions on Computer Science and Technology March 2014, Volume 3, Issue 1, PP.1-8 Image Edge Detection Based on Cellular Neural Network and Particle Swarm Optimization Zhengxia Wang #, Lili Li Department

More information

Using the Holey Brick Tree for Spatial Data. in General Purpose DBMSs. Northeastern University

Using the Holey Brick Tree for Spatial Data. in General Purpose DBMSs. Northeastern University Using the Holey Brick Tree for Spatial Data in General Purpose DBMSs Georgios Evangelidis Betty Salzberg College of Computer Science Northeastern University Boston, MA 02115-5096 1 Introduction There is

More information

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t FAST CALCULATION OF GEOMETRIC MOMENTS OF BINARY IMAGES Jan Flusser Institute of Information Theory and Automation Academy of Sciences of the Czech Republic Pod vodarenskou vez 4, 82 08 Prague 8, Czech

More information

A COMPARISON OF PARALLEL ALGORITHMS FOR THE NUMERICAL SIMULATION OF MULTIPHASE FLOWS. E. Wassen, Th. Frank, Q. Yu

A COMPARISON OF PARALLEL ALGORITHMS FOR THE NUMERICAL SIMULATION OF MULTIPHASE FLOWS. E. Wassen, Th. Frank, Q. Yu The 1. Euro{Conference on Parallel and Distributed Computing for Computational Mechanics. April 6 { May 1st, 1997, Lochinver, Scotland, UK. A COMPARISON OF PARALLEL ALGORITHMS FOR THE NUMERICAL SIMULATION

More information

. Introduction Image moments and various types of moment-based invariants play very important role in object recognition and shape analysis [], [2], [

. Introduction Image moments and various types of moment-based invariants play very important role in object recognition and shape analysis [], [2], [ On the Calculation of Image Moments Jan Flusser and Tomas Suk Institute of Information Theory and Automation Academy of Sciences of the Czech Republic Pod vodarenskou vez 4, 82 08 Prague 8, Czech Republic

More information

Minimization of the Truncation Error by Grid Adaptation

Minimization of the Truncation Error by Grid Adaptation NASA/CR-999-0979 ICASE Report No. 99-46 Minimization of the Truncation Error by Grid Adaptation Nail K. Yamaleev NASA Langley Research Center, Hampton, Virginia Institute for Computer Applications in Science

More information

Transactions on Information and Communications Technologies vol 19, 1997 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 19, 1997 WIT Press,   ISSN Hopeld Network for Stereo Correspondence Using Block-Matching Techniques Dimitrios Tzovaras and Michael G. Strintzis Information Processing Laboratory, Electrical and Computer Engineering Department, Aristotle

More information

MORPHOLOGICAL BOUNDARY BASED SHAPE REPRESENTATION SCHEMES ON MOMENT INVARIANTS FOR CLASSIFICATION OF TEXTURES

MORPHOLOGICAL BOUNDARY BASED SHAPE REPRESENTATION SCHEMES ON MOMENT INVARIANTS FOR CLASSIFICATION OF TEXTURES International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 125-130 MORPHOLOGICAL BOUNDARY BASED SHAPE REPRESENTATION SCHEMES ON MOMENT INVARIANTS FOR CLASSIFICATION

More information

Department of Electrical Engineering, Keio University Hiyoshi Kouhoku-ku Yokohama 223, Japan

Department of Electrical Engineering, Keio University Hiyoshi Kouhoku-ku Yokohama 223, Japan Shape Modeling from Multiple View Images Using GAs Satoshi KIRIHARA and Hideo SAITO Department of Electrical Engineering, Keio University 3-14-1 Hiyoshi Kouhoku-ku Yokohama 223, Japan TEL +81-45-563-1141

More information

PARALLEL COMPUTATION OF THE SINGULAR VALUE DECOMPOSITION ON TREE ARCHITECTURES

PARALLEL COMPUTATION OF THE SINGULAR VALUE DECOMPOSITION ON TREE ARCHITECTURES PARALLEL COMPUTATION OF THE SINGULAR VALUE DECOMPOSITION ON TREE ARCHITECTURES Zhou B. B. and Brent R. P. Computer Sciences Laboratory Australian National University Canberra, ACT 000 Abstract We describe

More information

New method for edge detection and de noising via fuzzy cellular automata

New method for edge detection and de noising via fuzzy cellular automata International Journal of Physical Sciences Vol. 6(13), pp. 3175-3180, 4 July, 2011 Available online at http://www.academicjournals.org/ijps DOI: 10.5897/IJPS11.047 ISSN 1992-1950 2011 Academic Journals

More information

Proceedings of the 6th Int. Conf. on Computer Analysis of Images and Patterns. Direct Obstacle Detection and Motion. from Spatio-Temporal Derivatives

Proceedings of the 6th Int. Conf. on Computer Analysis of Images and Patterns. Direct Obstacle Detection and Motion. from Spatio-Temporal Derivatives Proceedings of the 6th Int. Conf. on Computer Analysis of Images and Patterns CAIP'95, pp. 874-879, Prague, Czech Republic, Sep 1995 Direct Obstacle Detection and Motion from Spatio-Temporal Derivatives

More information

Coarse-to-Fine Search Technique to Detect Circles in Images

Coarse-to-Fine Search Technique to Detect Circles in Images Int J Adv Manuf Technol (1999) 15:96 102 1999 Springer-Verlag London Limited Coarse-to-Fine Search Technique to Detect Circles in Images M. Atiquzzaman Department of Electrical and Computer Engineering,

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

A New Orthogonal Multiprocessor and its Application to Image. Processing. L. A. Sousa M. S. Piedade DEEC IST/INESC. R.

A New Orthogonal Multiprocessor and its Application to Image. Processing. L. A. Sousa M. S. Piedade DEEC IST/INESC. R. A New Orthogonal ultiprocessor and its Application to Image Processing L. A. Sousa. S. Piedade email:las@molly.inesc.pt email: msp@inesc.pt DEEC IST/INESC R. Alves Redol,9 1000 Lisboa, PORTUGAL Abstract

More information

UNSTRUCTURED GRIDS ON NURBS SURFACES. The surface grid can be generated either in a parameter. surfaces. Generating grids in a parameter space is

UNSTRUCTURED GRIDS ON NURBS SURFACES. The surface grid can be generated either in a parameter. surfaces. Generating grids in a parameter space is UNSTRUCTURED GRIDS ON NURBS SURFACES Jamshid Samareh-Abolhassani 1 Abstract A simple and ecient computational method is presented for unstructured surface grid generation. This method is built upon an

More information

ET-based Test Data Generation for Multiple-path Testing

ET-based Test Data Generation for Multiple-path Testing 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 ET-based Test Data Generation for Multiple-path Testing Qingjie Wei* College of Computer

More information

Motion Vector Estimation Search using Hexagon-Diamond Pattern for Video Sequences, Grid Point and Block-Based

Motion Vector Estimation Search using Hexagon-Diamond Pattern for Video Sequences, Grid Point and Block-Based Motion Vector Estimation Search using Hexagon-Diamond Pattern for Video Sequences, Grid Point and Block-Based S. S. S. Ranjit, S. K. Subramaniam, S. I. Md Salim Faculty of Electronics and Computer Engineering,

More information

First approach to solve linear system of equations by using Ant Colony Optimization

First approach to solve linear system of equations by using Ant Colony Optimization First approach to solve linear system equations by using Ant Colony Optimization Kamil Ksia z ek Faculty Applied Mathematics Silesian University Technology Gliwice Poland Email: kamiksi862@studentpolslpl

More information

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T.

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T. Document Image Restoration Using Binary Morphological Filters Jisheng Liang, Robert M. Haralick University of Washington, Department of Electrical Engineering Seattle, Washington 98195 Ihsin T. Phillips

More information

1 Introduction Data format converters (DFCs) are used to permute the data from one format to another in signal processing and image processing applica

1 Introduction Data format converters (DFCs) are used to permute the data from one format to another in signal processing and image processing applica A New Register Allocation Scheme for Low Power Data Format Converters Kala Srivatsan, Chaitali Chakrabarti Lori E. Lucke Department of Electrical Engineering Minnetronix, Inc. Arizona State University

More information

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M. 322 FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING Moheb R. Girgis and Mohammed M. Talaat Abstract: Fractal image compression (FIC) is a

More information

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,

More information

A Hierarchical Statistical Framework for the Segmentation of Deformable Objects in Image Sequences Charles Kervrann and Fabrice Heitz IRISA / INRIA -

A Hierarchical Statistical Framework for the Segmentation of Deformable Objects in Image Sequences Charles Kervrann and Fabrice Heitz IRISA / INRIA - A hierarchical statistical framework for the segmentation of deformable objects in image sequences Charles Kervrann and Fabrice Heitz IRISA/INRIA, Campus Universitaire de Beaulieu, 35042 Rennes Cedex,

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of

More information

Dierential-Linear Cryptanalysis of Serpent? Haifa 32000, Israel. Haifa 32000, Israel

Dierential-Linear Cryptanalysis of Serpent? Haifa 32000, Israel. Haifa 32000, Israel Dierential-Linear Cryptanalysis of Serpent Eli Biham, 1 Orr Dunkelman, 1 Nathan Keller 2 1 Computer Science Department, Technion. Haifa 32000, Israel fbiham,orrdg@cs.technion.ac.il 2 Mathematics Department,

More information

Non-Hierarchical Clustering with Rival. Retrieval? Irwin King and Tak-Kan Lau. The Chinese University of Hong Kong. Shatin, New Territories, Hong Kong

Non-Hierarchical Clustering with Rival. Retrieval? Irwin King and Tak-Kan Lau. The Chinese University of Hong Kong. Shatin, New Territories, Hong Kong Non-Hierarchical Clustering with Rival Penalized Competitive Learning for Information Retrieval? Irwin King and Tak-Kan Lau Department of Computer Science & Engineering The Chinese University of Hong Kong

More information

APPROXIMATION AND COMPARISON OF ORDINARY DIFFERENTIAL EQUATION USING BY NEW ITERATION METHODS

APPROXIMATION AND COMPARISON OF ORDINARY DIFFERENTIAL EQUATION USING BY NEW ITERATION METHODS Review of the Air Force Academy No.1 (33)/2017 APPROXIMATION AND COMPARISON OF ORDINARY DIFFERENTIAL EQUATION USING BY NEW ITERATION METHODS Necdet BİLDİK *, Yasemin BAKIR ** * Celal Bayar University,

More information

SP-CNN: A SCALABLE AND PROGRAMMABLE CNN-BASED ACCELERATOR

SP-CNN: A SCALABLE AND PROGRAMMABLE CNN-BASED ACCELERATOR .. SP-CNN: A SCALABLE AND PROGRAMMABLE CNN-BASED ACCELERATOR.. IN THIS ARTICLE, THE AUTHORS USE A CELLULAR NEURAL NETWORK (CNN) A NEURAL Dilan Manatunga Hyesoon Kim Saibal Mukhopadhyay Georgia Institute

More information

Finite difference methods

Finite difference methods Finite difference methods Siltanen/Railo/Kaarnioja Spring 8 Applications of matrix computations Applications of matrix computations Finite difference methods Spring 8 / Introduction Finite difference methods

More information

Implementation and Analysis of Efficient Lossless Image Compression Algorithm

Implementation and Analysis of Efficient Lossless Image Compression Algorithm Implementation and Analysis of Efficient Lossless Image Compression Algorithm Megha S. Chaudhari 1, S.S.Shirgan 2 Department of Electronics & Telecommunication, N.B.Navale college of engineering, Solapur,

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

Geodetic Iterative Methods for Nonlinear Acoustic Sources Localization: Application to Cracks Eects Detected with Acoustic Emission

Geodetic Iterative Methods for Nonlinear Acoustic Sources Localization: Application to Cracks Eects Detected with Acoustic Emission 6th NDT in Progress 2011 International Workshop of NDT Experts, Prague, 10-12 Oct 2011 Geodetic Iterative Methods for Nonlinear Acoustic Sources Localization: Application to Cracks Eects Detected with

More information

Texture Sensitive Image Inpainting after Object Morphing

Texture Sensitive Image Inpainting after Object Morphing Texture Sensitive Image Inpainting after Object Morphing Yin Chieh Liu and Yi-Leh Wu Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taiwan

More information

TENTH WORLD CONGRESS ON THE THEORY OF MACHINES AND MECHANISMS Oulu, Finland, June 20{24, 1999 THE EFFECT OF DATA-SET CARDINALITY ON THE DESIGN AND STR

TENTH WORLD CONGRESS ON THE THEORY OF MACHINES AND MECHANISMS Oulu, Finland, June 20{24, 1999 THE EFFECT OF DATA-SET CARDINALITY ON THE DESIGN AND STR TENTH WORLD CONGRESS ON THE THEORY OF MACHINES AND MECHANISMS Oulu, Finland, June 20{24, 1999 THE EFFECT OF DATA-SET CARDINALITY ON THE DESIGN AND STRUCTURAL ERRORS OF FOUR-BAR FUNCTION-GENERATORS M.J.D.

More information

University of Malaga. Image Template Matching on Distributed Memory and Vector Multiprocessors

University of Malaga. Image Template Matching on Distributed Memory and Vector Multiprocessors Image Template Matching on Distributed Memory and Vector Multiprocessors V. Blanco M. Martin D.B. Heras O. Plata F.F. Rivera September 995 Technical Report No: UMA-DAC-95/20 Published in: 5th Int l. Conf.

More information

Pictures at an Exhibition

Pictures at an Exhibition Pictures at an Exhibition Han-I Su Department of Electrical Engineering Stanford University, CA, 94305 Abstract We employ an image identification algorithm for interactive museum guide with pictures taken

More information

Module1: Numerical Solution of Ordinary Differential Equations. Lecture 6. Higher order Runge Kutta Methods

Module1: Numerical Solution of Ordinary Differential Equations. Lecture 6. Higher order Runge Kutta Methods Module1: Numerical Solution of Ordinary Differential Equations Lecture 6 Higher order Runge Kutta Methods Keywords: higher order methods, functional evaluations, accuracy Higher order Runge Kutta Methods

More information

Steganography by using Logistic Map Function and Cellular Automata

Steganography by using Logistic Map Function and Cellular Automata Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01

More information

LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES. Karin Sobottka Ioannis Pitas

LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES. Karin Sobottka Ioannis Pitas LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES Karin Sobottka Ioannis Pitas Department of Informatics, University of Thessaloniki 540 06, Greece e-mail:fsobottka, pitasg@zeus.csd.auth.gr Index

More information

Algorithm research of 3D point cloud registration based on iterative closest point 1

Algorithm research of 3D point cloud registration based on iterative closest point 1 Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,

More information

Modeling and Estimation of FPN Components in CMOS Image Sensors

Modeling and Estimation of FPN Components in CMOS Image Sensors Modeling and Estimation of FPN Components in CMOS Image Sensors Abbas El Gamal a, Boyd Fowler a,haomin b,xinqiaoliu a a Information Systems Laboratory, Stanford University Stanford, CA 945 USA b Fudan

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Blocking vs. Non-blocking Communication under. MPI on a Master-Worker Problem. Institut fur Physik. TU Chemnitz. D Chemnitz.

Blocking vs. Non-blocking Communication under. MPI on a Master-Worker Problem. Institut fur Physik. TU Chemnitz. D Chemnitz. Blocking vs. Non-blocking Communication under MPI on a Master-Worker Problem Andre Fachat, Karl Heinz Homann Institut fur Physik TU Chemnitz D-09107 Chemnitz Germany e-mail: fachat@physik.tu-chemnitz.de

More information

PRINCIPAL COMPONENT ANALYSIS IMAGE DENOISING USING LOCAL PIXEL GROUPING

PRINCIPAL COMPONENT ANALYSIS IMAGE DENOISING USING LOCAL PIXEL GROUPING PRINCIPAL COMPONENT ANALYSIS IMAGE DENOISING USING LOCAL PIXEL GROUPING Divesh Kumar 1 and Dheeraj Kalra 2 1 Department of Electronics & Communication Engineering, IET, GLA University, Mathura 2 Department

More information

Fast and Effective Interpolation Using Median Filter

Fast and Effective Interpolation Using Median Filter Fast and Effective Interpolation Using Median Filter Jian Zhang 1, *, Siwei Ma 2, Yongbing Zhang 1, and Debin Zhao 1 1 Department of Computer Science, Harbin Institute of Technology, Harbin 150001, P.R.

More information

1e+07 10^5 Node Mesh Step Number

1e+07 10^5 Node Mesh Step Number Implicit Finite Element Applications: A Case for Matching the Number of Processors to the Dynamics of the Program Execution Meenakshi A.Kandaswamy y Valerie E. Taylor z Rudolf Eigenmann x Jose' A. B. Fortes

More information

Fuzzy Bidirectional Weighted Sum for Face Recognition

Fuzzy Bidirectional Weighted Sum for Face Recognition Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 447-452 447 Fuzzy Bidirectional Weighted Sum for Face Recognition Open Access Pengli Lu

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

2 ATTILA FAZEKAS The tracking model of the robot car The schematic picture of the robot car can be seen on Fig.1. Figure 1. The main controlling task

2 ATTILA FAZEKAS The tracking model of the robot car The schematic picture of the robot car can be seen on Fig.1. Figure 1. The main controlling task NEW OPTICAL TRACKING METHODS FOR ROBOT CARS Attila Fazekas Debrecen Abstract. In this paper new methods are proposed for intelligent optical tracking of robot cars the important tools of CIM (Computer

More information

THE COMPUTER MODELLING OF GLUING FLAT IMAGES ALGORITHMS. Alekseí Yu. Chekunov. 1. Introduction

THE COMPUTER MODELLING OF GLUING FLAT IMAGES ALGORITHMS. Alekseí Yu. Chekunov. 1. Introduction MATEMATIČKI VESNIK MATEMATIQKI VESNIK 69, 1 (2017), 12 22 March 2017 research paper originalni nauqni rad THE COMPUTER MODELLING OF GLUING FLAT IMAGES ALGORITHMS Alekseí Yu. Chekunov Abstract. In this

More information

sizes. Section 5 briey introduces some of the possible applications of the algorithm. Finally, we draw some conclusions in Section 6. 2 MasPar Archite

sizes. Section 5 briey introduces some of the possible applications of the algorithm. Finally, we draw some conclusions in Section 6. 2 MasPar Archite Parallelization of 3-D Range Image Segmentation on a SIMD Multiprocessor Vipin Chaudhary and Sumit Roy Bikash Sabata Parallel and Distributed Computing Laboratory SRI International Wayne State University

More information

ODEs occur quite often in physics and astrophysics: Wave Equation in 1-D stellar structure equations hydrostatic equation in atmospheres orbits

ODEs occur quite often in physics and astrophysics: Wave Equation in 1-D stellar structure equations hydrostatic equation in atmospheres orbits Solving ODEs General Stuff ODEs occur quite often in physics and astrophysics: Wave Equation in 1-D stellar structure equations hydrostatic equation in atmospheres orbits need workhorse solvers to deal

More information

Research on Evaluation Method of Product Style Semantics Based on Neural Network

Research on Evaluation Method of Product Style Semantics Based on Neural Network Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:

More information

Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata

Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata 2009 International Conference on Information and Multimedia Technology Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata R.Enayatifar

More information

Real Time Control of the MIT Vehicle Emulator System

Real Time Control of the MIT Vehicle Emulator System Proceedings of the 1991 American Control Conference June, 1991, Boston, MA Real Time Control of the MIT Vehicle Emulator System William K. Durfee, Husni R. Idris and Steven Dubowsky Department of Mechanical

More information

Hardware Description of Multi-Directional Fast Sobel Edge Detection Processor by VHDL for Implementing on FPGA

Hardware Description of Multi-Directional Fast Sobel Edge Detection Processor by VHDL for Implementing on FPGA Hardware Description of Multi-Directional Fast Sobel Edge Detection Processor by VHDL for Implementing on FPGA Arash Nosrat Faculty of Engineering Shahid Chamran University Ahvaz, Iran Yousef S. Kavian

More information

Automatic Visual Inspection of Bump in Flip Chip using Edge Detection with Genetic Algorithm

Automatic Visual Inspection of Bump in Flip Chip using Edge Detection with Genetic Algorithm Automatic Visual Inspection of Bump in Flip Chip using Edge Detection with Genetic Algorithm M. Fak-aim, A. Seanton, and S. Kaitwanidvilai Abstract This paper presents the development of an automatic visual

More information

Simulation in Computer Graphics. Particles. Matthias Teschner. Computer Science Department University of Freiburg

Simulation in Computer Graphics. Particles. Matthias Teschner. Computer Science Department University of Freiburg Simulation in Computer Graphics Particles Matthias Teschner Computer Science Department University of Freiburg Outline introduction particle motion finite differences system of first order ODEs second

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

Two Image-Template Operations for Binary Image Processing. Hongchi Shi. Department of Computer Engineering and Computer Science

Two Image-Template Operations for Binary Image Processing. Hongchi Shi. Department of Computer Engineering and Computer Science Two Image-Template Operations for Binary Image Processing Hongchi Shi Department of Computer Engineering and Computer Science Engineering Building West, Room 331 University of Missouri - Columbia Columbia,

More information

Parallel Pipeline STAP System

Parallel Pipeline STAP System I/O Implementation and Evaluation of Parallel Pipelined STAP on High Performance Computers Wei-keng Liao, Alok Choudhary, Donald Weiner, and Pramod Varshney EECS Department, Syracuse University, Syracuse,

More information

Fuzzy C-means Clustering with Temporal-based Membership Function

Fuzzy C-means Clustering with Temporal-based Membership Function Indian Journal of Science and Technology, Vol (S()), DOI:./ijst//viS/, December ISSN (Print) : - ISSN (Online) : - Fuzzy C-means Clustering with Temporal-based Membership Function Aseel Mousa * and Yuhanis

More information

Introduction to Scientific Computing Lecture 8

Introduction to Scientific Computing Lecture 8 Introduction to Scientific Computing Lecture 8 Professor Hanno Rein Last updated: October 30, 06 7. Runge-Kutta Methods As we indicated before, we might be able to cancel out higher order terms in the

More information

over The idea is to construct an algorithm to solve the IVP ODE (9.1)

over The idea is to construct an algorithm to solve the IVP ODE (9.1) Runge- Ku(a Methods Review of Heun s Method (Deriva:on from Integra:on) The idea is to construct an algorithm to solve the IVP ODE (9.1) over To obtain the solution point we can use the fundamental theorem

More information

Applying Kohonen Network in Organising Unstructured Data for Talus Bone

Applying Kohonen Network in Organising Unstructured Data for Talus Bone 212 Third International Conference on Theoretical and Mathematical Foundations of Computer Science Lecture Notes in Information Technology, Vol.38 Applying Kohonen Network in Organising Unstructured Data

More information

3.1. Solution for white Gaussian noise

3.1. Solution for white Gaussian noise Low complexity M-hypotheses detection: M vectors case Mohammed Nae and Ahmed H. Tewk Dept. of Electrical Engineering University of Minnesota, Minneapolis, MN 55455 mnae,tewk@ece.umn.edu Abstract Low complexity

More information

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology.

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology. A Fast Recursive Mapping Algorithm Song Chen and Mary M. Eshaghian Department of Computer and Information Science New Jersey Institute of Technology Newark, NJ 7 Abstract This paper presents a generic

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information