The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

Size: px
Start display at page:

Download "The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand)."

Transcription

1 Research Commons at the University of Waikato Copyright Statement: The igital copy of this thesis is protecte by the Copyright Act 99 (New Zealan). The thesis may be consulte by you, provie you comply with the provisions of the Act an the following conitions of use: Any use you make of these ocuments or images must be for research or private stuy purposes only, an you may not make them available to any other person. Authors control the copyright of their thesis. You will recognise the author s right to be ientifie as the author of the thesis, an ue acknowlegement will be mae to the author where appropriate. You will obtain the author s permission before publishing any material from the thesis.

2 Department of Computer Science Hamilton, NewZealan Fast Algorithms for Nearest Neighbour Search Ashraf Masoo Kibriya This thesis is submitte in partial fulfilment of the requirements for the egree of Master of Science at The University of Waikato. March 007 c 007 Ashraf Masoo Kibriya

3

4 Abstract The nearest neighbour problem is of practical significance in a number of fiels. Often we are intereste in fining an object near to a given query object. The problem is ol, an a large number of solutions have been propose for it in the literature. However, it remains the case that even the most popular of the techniques propose for its solution have not been compare against each other. Also, many techniques, incluing the ol an popular ones, can be implemente in a number of ways, an often the ifferent implementations of a technique have not been thoroughly compare either. This research presents a etaile investigation of ifferent implementations of two popular nearest neighbour search ata structures, KDTrees an Metric Trees, an compares the ifferent implementations of each of the two structures against each other. The best implementations of these structures are then compare against each other an against two other techniques, Metho an Cover Trees. Metho is an ol technique that was reiscovere uring the research for this thesis. Cover Trees are one of the most novel an promising ata structures for nearest neighbour search that have been propose in the literature. i

5

6 Acknowlegments The continue support of Department of Computer Science s Machine Learning group, an particularly my supervisor Dr. Eibe Frank, is greatly appreciate, without which this thesis woul not have been possible. iii

7

8 Contents Abstract Acknowlegments i iii Introuction: The Nearest Neighbour Problem. Basic Definition Extensions an Variations of the Problem Applications of the NN Problem Characteristics Common to NN Applications Objectives an Scope of the Thesis Thesis Overview Towars Solving the NN problem 7. Techniques Propose as Solution Partial Distance Search (PDS) k-dimensional Trees (KDTrees), BBF-Trees an Variants Metric (Ball) Trees, vp-trees an Hybri Sp-Trees Voronoi Diagrams Orchar s Metho Metho AESA an LAESA R-Trees, X-Trees, M-Trees, TV-Trees, SR-Trees an VA-Files Locality Sensitive Hashing (LSH) Navigating Nets an Cover Trees Techniques Selecte for Evaluation Evaluate Techniques in epth 9 3. KDTrees Basic Construction Basic query proceure Construction in etail v

9 3.. Query in etail Implementation etails Metric Trees Basic Construction Basic Query Construction in Detail Query in Detail Implementation Details Metho Metho s Preprocessing Metho s Query Proceure s Basic Construction Basic Query Structures in etail Implementation etails Experimental Evaluation 69. Evaluation Proceure Evaluation Datasets Results KDTrees Construction Methos Metric Trees Construction Methos NN Methos Conclusion 3 A Aitional Results for KDTrees 5 B Aitional Results for Metric Trees 5 C Aitional Results for NN Methos 33 vi

10 List of Figures. ɛ-approximate Nearest Neighbour Typical KDTree/BBFTree ecomposition A (a) KDTree vs a (b) BBD-Tree on the same ata A typical metric tree ecomposition Illustration of a vp-tree ecomposition An orer- Voronoi space ecomposition Orchar s metho metho Graphical illustration of metho AESA s elimination AESA s approximation VA-File structure (Weber et al., 99) Illustration of KDTree construction Illustration of KDTree query Different KDTree construction methos Sproull s metho of overlap etection for KDTrees Incremental Distance Calculation Top Down construction metho for Metric Trees Mile Out construction metho of Metric Trees Illustration of Metric Trees query proceure Different construction methos of Metric Trees Metric Trees pruning criterion Different reference points for Metho Illustration of Cover Trees construction process Illustration of Cover Tree query Pruning uring a Cover Tree s query proceure Evaluate Point Distributions KDTrees construction time for increasing n vii

11 .3 KDTrees construction time for increasing Avg query points visite by KDTrees for increasing n on non-uniform query. 7.5 Avg query points visite by KDTrees for increasing n on uniform query....6 Avg query points visite by KDTrees for increasing on non-uniform query. 9.7 Avg query points visite by KDTrees for increasing on uniform query Metric Trees construction time for increasing n Metric Trees construction time for increasing Avg points visite by Metric Trees for increasing n on non-uniform query Avg points visite by Metric Trees for increasing n on uniform query Avg points visite by Metric Trees for increasing on non-uniform query Avg points visite by Metric Trees for increasing on uniform query Preprocessing time of NN methos for increasing n Preprocessing time of NN methos for increasing Avg points visite by NN Methos for increasing n on non-uniform query Avg points visite by NN Methos for increasing n on uniform query..... Avg points visite by NN Methos for increasing on non-uniform query Avg points visite by NN Methos for increasing on uniform query CPU query time of NN Methos for increasing n on non-uniform query.... CPU query time of NN Methos for increasing n on uniform query CPU query time of NN Methos for increasing on non-uniform query....3 CPU query time of NN Methos for increasing on uniform query A. KDTrees construction time for increasing n A. KDTrees construction time for increasing A.3 O(.5 ) construction time A. Degraation of KDTrees towars n at higher s A.5 CPU query time of KDTrees for increasing n on non-uniform query A.6 CPU query time of KDTrees for increasing n on uniform query A.7 CPU query time of KDTrees for increasing on non-uniform query..... A. CPU query time of KDTrees for increasing on uniform query B. Metric Trees construction time for increasing n with = B. Metric Trees construction time for increasing with n=k B.3 CPU query time of Metric Trees for increasing n on non-uniform query... B. CPU query time of Metric Trees for increasing n on uniform query B.5 CPU query time of Metric Trees for increasing on non-uniform query viii

12 B.6 CPU query time of Metric Trees for increasing on uniform query C. Preprocessing time of NN methos for increasing n with = C. Preprocessing time of NN methos for increasing with n=6k ix

13

14 List of Tables. Exact an approx. NN techniques Evaluate methos Measurements mae for each NN metho on each generate ataset Aitional measurements mae for tree base NN methos Distributions on which the NN methos were evaluate xi

15 Department of Computer Science Hamilton, NewZealan Fast Algorithms for Nearest Neighbour Search Ashraf Masoo Kibriya This thesis is submitte in partial fulfilment of the requirements for the egree of Master of Science at The University of Waikato. March 007 c 007 Ashraf Masoo Kibriya

16

17 Abstract The nearest neighbour problem is of practical significance in a number of fiels. Often we are intereste in fining an object near to a given query object. The problem is ol, an a large number of solutions have been propose for it in the literature. However, it remains the case that even the most popular of the techniques propose for its solution have not been compare against each other. Also, many techniques, incluing the ol an popular ones, can be implemente in a number of ways, an often the ifferent implementations of a technique have not been thoroughly compare either. This research presents a etaile investigation of ifferent implementations of two popular nearest neighbour search ata structures, KDTrees an Metric Trees, an compares the ifferent implementations of each of the two structures against each other. The best implementations of these structures are then compare against each other an against two other techniques, Metho an Cover Trees. Metho is an ol technique that was reiscovere uring the research for this thesis. Cover Trees are one of the most novel an promising ata structures for nearest neighbour search that have been propose in the literature. i

18

19 Acknowlegments The continue support of Department of Computer Science s Machine Learning group, an particularly my supervisor Dr. Eibe Frank, is greatly appreciate, without which this thesis woul not have been possible. iii

20

21 Contents Abstract Acknowlegments i iii Introuction: The Nearest Neighbour Problem. Basic Definition Extensions an Variations of the Problem Applications of the NN Problem Characteristics Common to NN Applications Objectives an Scope of the Thesis Thesis Overview Towars Solving the NN problem 7. Techniques Propose as Solution Partial Distance Search (PDS) k-dimensional Trees (KDTrees), BBF-Trees an Variants Metric (Ball) Trees, vp-trees an Hybri Sp-Trees Voronoi Diagrams Orchar s Metho Metho AESA an LAESA R-Trees, X-Trees, M-Trees, TV-Trees, SR-Trees an VA-Files Locality Sensitive Hashing (LSH) Navigating Nets an Cover Trees Techniques Selecte for Evaluation Evaluate Techniques in epth 9 3. KDTrees Basic Construction Basic query proceure Construction in etail v

22 3.. Query in etail Implementation etails Metric Trees Basic Construction Basic Query Construction in Detail Query in Detail Implementation Details Metho Metho s Preprocessing Metho s Query Proceure s Basic Construction Basic Query Structures in etail Implementation etails Experimental Evaluation 69. Evaluation Proceure Evaluation Datasets Results KDTrees Construction Methos Metric Trees Construction Methos NN Methos Conclusion 3 A Aitional Results for KDTrees 5 B Aitional Results for Metric Trees 5 C Aitional Results for NN Methos 33 vi

23 List of Figures. ɛ-approximate Nearest Neighbour Typical KDTree/BBFTree ecomposition A (a) KDTree vs a (b) BBD-Tree on the same ata A typical metric tree ecomposition Illustration of a vp-tree ecomposition An orer- Voronoi space ecomposition Orchar s metho metho Graphical illustration of metho AESA s elimination AESA s approximation VA-File structure (Weber et al., 99) Illustration of KDTree construction Illustration of KDTree query Different KDTree construction methos Sproull s metho of overlap etection for KDTrees Incremental Distance Calculation Top Down construction metho for Metric Trees Mile Out construction metho of Metric Trees Illustration of Metric Trees query proceure Different construction methos of Metric Trees Metric Trees pruning criterion Different reference points for Metho Illustration of Cover Trees construction process Illustration of Cover Tree query Pruning uring a Cover Tree s query proceure Evaluate Point Distributions KDTrees construction time for increasing n vii

24 .3 KDTrees construction time for increasing Avg query points visite by KDTrees for increasing n on non-uniform query. 7.5 Avg query points visite by KDTrees for increasing n on uniform query....6 Avg query points visite by KDTrees for increasing on non-uniform query. 9.7 Avg query points visite by KDTrees for increasing on uniform query Metric Trees construction time for increasing n Metric Trees construction time for increasing Avg points visite by Metric Trees for increasing n on non-uniform query Avg points visite by Metric Trees for increasing n on uniform query Avg points visite by Metric Trees for increasing on non-uniform query Avg points visite by Metric Trees for increasing on uniform query Preprocessing time of NN methos for increasing n Preprocessing time of NN methos for increasing Avg points visite by NN Methos for increasing n on non-uniform query Avg points visite by NN Methos for increasing n on uniform query..... Avg points visite by NN Methos for increasing on non-uniform query Avg points visite by NN Methos for increasing on uniform query CPU query time of NN Methos for increasing n on non-uniform query.... CPU query time of NN Methos for increasing n on uniform query CPU query time of NN Methos for increasing on non-uniform query....3 CPU query time of NN Methos for increasing on uniform query A. KDTrees construction time for increasing n A. KDTrees construction time for increasing A.3 O(.5 ) construction time A. Degraation of KDTrees towars n at higher s A.5 CPU query time of KDTrees for increasing n on non-uniform query A.6 CPU query time of KDTrees for increasing n on uniform query A.7 CPU query time of KDTrees for increasing on non-uniform query..... A. CPU query time of KDTrees for increasing on uniform query B. Metric Trees construction time for increasing n with = B. Metric Trees construction time for increasing with n=k B.3 CPU query time of Metric Trees for increasing n on non-uniform query... B. CPU query time of Metric Trees for increasing n on uniform query B.5 CPU query time of Metric Trees for increasing on non-uniform query viii

25 B.6 CPU query time of Metric Trees for increasing on uniform query C. Preprocessing time of NN methos for increasing n with = C. Preprocessing time of NN methos for increasing with n=6k ix

26

27 List of Tables. Exact an approx. NN techniques Evaluate methos Measurements mae for each NN metho on each generate ataset Aitional measurements mae for tree base NN methos Distributions on which the NN methos were evaluate xi

28

29 Chapter Introuction: The Nearest Neighbour Problem Nearest neighbour (NN) search is an ol problem that is of practical importance in a number fiels. It involves fining, from a given set of points, one or more points that are nearest to another given point, calle the query point. The problem comes up in fiels as iverse as ata compression, computational biology, computer vision an information retrieval. It was originally propose in 969 by Minsky an Papert (Minsky & Papert, 969). Since then, it has been extensively stuie an a vast number of ata structures, algorithms an techniques have been propose for its solution. Though nearest neighbour is the most ominant term use, it is also known as the best-match, closest-match, closest point an the post office problem. The term similarity search is also often use in the information retrieval fiel an the atabase community.. Basic Definition The NN search problem is: Given a set of n points S in some -imensional space X an a istance (or issimilarity) measure M, our task is to preprocess the points in S in such a way that, given a query point q X, we can quickly fin the point in S which is nearest (or most similar) to q.. Extensions an Variations of the Problem A natural an straight forwar extension of this problem is k-nearest neighbour (knn) search, in which we are intereste in the k ( S ) nearest points to q, containe in S. The NN search then just becomes a special case of knn search with k=. A slight variation of NN search, avocate by some (Inyk & Motwani, 99; Datar et al., 00) in place of NN search, is ɛ-approximate NN (ɛ-nn) search, where given a

30 p q r p' Figure.: ɛ-approximate Nearest Neighbour. user efine error boun ɛ 0, the task is to fin a point p in S which is at most ɛ times farther than the exact NN p (also in S), i.e. p, p S M(p, q) ( + ɛ)m(p, q). For the knn case this simply extens to fining k neighbours p, p,..p k such that any of the i th ɛ-approximate NN p i is at most ɛ times farther than the exact ith NN p i, i.e. M(p i, q) ( + ɛ)m(p i, q). Fig.. illustrates this graphically..3 Applications of the NN Problem The knn search is of practical significance in a number of fiels. Some of those, along with examples of their use of knn search, inclue: Data compression: Here, it is use in a metho calle vector quantization for speech an image compression (Gersho & Gray, 99). It involves blocking speech or image waveform signals into vectors of fixe length. A set of coevectors is first compute base on a set of training vectors, then each new vector is encoe with the inex of its nearest neighbour among the coevectors. Pattern recognition, atamining an machine learning: Here, one of the most wiely use classifier/learner is the knn classifier (Cover & Hart, 967). It is base on straight forwar aoption of the knn search, an works by assigning a given test point the majority class of its k-nearest neighbours. Also, Locally weighte learning (Atkeson et al., 997) is another technique which utilizes knn search. It works by training its base classifier/learner on training points that are nearest neighbours of a given test point. Bioinformatics: Here, knn an its variant classifiers have been applie with success to biological an clinical ata. They have been use for cancer classification

31 (Niijima & Kuhara, 005), for etecting rrna sequences (Robinson-Cox et al., 995), an, using gene-expression ata for tumour classification (Duoit et al., 00) an tissue classification, (Li et al., 00). In cases involving gene selection (Niijima & Kuhara, 005; Duoit et al., 00; Li et al., 00), these classifiers have been observe to perform as well or even better than state-of-the-art SVM base classifiers. Multimeia atabases an libraries: Here, similarity search is often use to retrieve multimeia content similar to a user query. The systems usually allow content-base queries, i.e. queries in the form of object shapes, texture, ominant colours, an scene escriptions etc. for images an vieo (Flickner et al., 995; Pentlan et al., 99; Smith & Chang, 996; Bach et al., 996), an in the form of ominant frequency an pitch (which can also be given as an acoustic input from the user) etc. in case of an auio/music library (Ghias et al., 995; McNab et al., 997; Tseng, 999; Uitenboger & Zobel, 00; Zhu et al., 003). Computer vision: Here, NN search is an important tool use for the task of object classification, which involves fining similarities between images (Marshall, 006). It has also been applie recently in a prototype of a robust multi-target tracking system, which tracks players in a hockey rink (Cai et al., 006). Document/information retrieval: Here, NN search is often use metho to retrieve an rank ocuments given a user query (Lucarella, 9; Deerwester et al., 990; Faloutsos & Oar, 995).. Characteristics Common to NN Applications In almost all of the above, the general representation of objects of interest (ocuments, images, etc.) incluing the queries is as vectors or points in some real -imensional space X = R, sometimes also calle the feature vector representation; since each of the imensions of the vectors correspon to some feature or attribute of the objects they represent. The closeness or (is)similarity of the vectors (or points) is measure using a measure M which is usually a metric (a.k.a. istance function). However, both the object representation an the choice of similarity/nearness measure are usually epenent on the application omain. In string classification, for example, the objects are generally represente as string sequences rather than vectors (Aggarwal, 00; Mollinea et al., 003), even in cases when the employe istance measure (usually eit istance) is a 3

32 metric (Mollinea et al., 003). Similarly, the Dynamic Time Warping (DTW) istance measure use in speech recognition (Vial et al., 9), an the NEM r shape-istance measure employe in IBM s QBIC system (Flickner et al., 995), as note by Faragó et al. (Faragó et al., 993) an Fagin an Stockmeyer (Fagin & Stockmeyer, 99) respectively, are not exact metrics. Nevertheless, almost all of the stuies of (k)nn search that were reviewe as part of the research for this thesis, have concentrate on points/vectors in a real -imensional metric space. Because often it is easier to represent objects in terms of vectors, an for some omain specific measure to be mappe to a metric. Some of the techniques that have been propose for the problem have even been evise for some particular metric (e.g. the initial version of LSH (Inyk & Motwani, 99)). Many times even the NNsearch problem itself has been efine with insistence on points being in a metric space (Arya et al., 99; Maneewongvatana & Mount, 00; Inyk & Motwani, 99; Inyk, 99, 00). This, though, is pretty restrictive, given some of the earliest stuies of the problem use more general measures instea of metrics (Frieman et al., 977)..5 Objectives an Scope of the Thesis It was observe uring the review of the literature that even the most popular of the large number of techniques propose since the initial inception of the problem, have not been thoroughly evaluate against each other. Also observe was the fact that there exists some consierable variation in how many of these techniques can be implemente. This also has not been thoroughly investigate either (either theoretically or empirically). When this research project was starte it was intene to implement an empirically evaluate all the algorithms an techniques propose in the literature. However, given the sheer volume of solutions propose, compoune with the fact of ifferent ways of implementing many of them an their ifferent possible parameter settings, plus the fact that many solutions have been propose for some specific similarity measure, an not to mention the fact that a number of those eal with some slight variation of the problem (e.g. ɛ-knn) or the ifficulties of gaps that exist between abstract theoretical escriptions to concrete implementations of the algorithms, that the initially intene goal was eeme unattainable. This was further exacerbate by the fact that a large number of techniques that exist have been esigne for external memory (in orer to reuce the I/O overhea in atabases), an often cannot be fairly compare to those esigne to work in main memory. Inyk an his group have correcte this in their latest publications (Anoni & Inyk, 006; Shakhnarovich et al., 006a)

33 Hence, to make the project more tractable, the goal of the research was narrowe own to inclue only the most popular of the ol an the most promising of the novel techniques, that (a) work in main memory, (b) are applicable to vector/point representation, (c) use the Eucliean metric as istance measure, () have not been cross-evaluate, an (e) support exact NN search. This resulte in a etaile investigation of two popular ata structures, KDTrees an Metric Trees, an their ifferent propose implementation methos were compare against each other. Later, the best implementations of the two techniques were evaluate against each other, an against one inepenently evelope oler technique, the Metho, an one recently propose promising but not well evaluate ata structure, the Cover Trees..6 Thesis Overview The remainer of this thesis is structure as follows. The next chapter is evote to solving the NN problem. It iscusses the properties that woul be require of an ieal solution, an the apparent ifficulties of arriving at one. It also lists an escribes many of the methos propose so far, incluing the ones that were selecte for evaluation, along with the reasons of their selection. The chapter that follows next (Chapter 3) elves more eeply into the etails of each of the selecte methos. Chapter outlines the strategy use for evaluating these methos an presents the results. First, the various construction methos of the two popular algorithms, KDTrees an Metric Trees, are compare, an then the best of their construction methos are cross-evaluate against each other an against the rest of the selecte methos. The thesis conclues with some comments an remarks in Chapter 5. 5

34

35 Chapter Towars Solving the NN problem Given n -imensional ata points, a simple linear search (the brute force metho) takes O(n) time to fin an exact NN of a given query point, while taking O(n) space an only O() preprocessing time (since no preprocessing is performe). Hence, in orer to o better than that, a ata structure or an algorithm must try to fin a NN in time sublinear in either or n, or both an n. Moreover, it shoul try to achieve that in space an preprocessing time that is linear or near linear in an n. Since intuitively it s far simpler to eliminate points rather than trying to reuce the number imensions looke at uring a NN search, all known NN search techniques with the exception of two, PDS & TV-Tree, try to achieve a query time sublinear in n. In terms of n, ieal solutions exist with logarithmic query time, an near linear preprocessing an linear space requirements, for. For =, a simple binary search on a sorte array gives O() query time in the worst case, while requiring only O(n) space an O(n) preprocessing time (which equates to time require for sorting the array in this case). For =, O() query time in the worst case, with linear space an near linear preprocessing time, is possible using methos base on Voronoi iagrams (Lee, 9; Aurenhammer, 99). However, for >, no known solution exists that can guarantee a sublinear query time while still keeping the space complexity linear an the preprocessing time near linear. Still, for moerate values of ( ), algorithms exist that, though not in the worst case, but in practice (i.e. query time, with linear space an near linear preprocessing. expecte case) give sublinear However, for higher values of ( ) almost all of the known techniques are plague with what is calle the curse-of-imensionality. Roughly speaking what this means is that for points which are istribute somewhat uniformly, as their imensionality increases, they become more an more sparse/scattere, an ten to lie more towars the bounaries of the space, making them almost equally istant from each other. This breaks own the iea of locality of Time to fin (k)nns of given a query q, here an elsewhere. Originally coine by Bellman in 96 in Aaptive Control Processes: A Guie Tour, Princeton University Press, 96. 7

36 the points, since the local neighbourhoos become so large that they ten to comprise the entire point space. As a consequence most of the propose algorithms, when searching for the nearest neighbour of a given query, egenerate to simple linear search, since (almost) all the ata points have to be looke at, an often they take longer than the linear search itself ue to their involve overheas. The curse was the main motivation behin algorithms for ɛ-nn search, an also the newer algorithms that are base on the concept of intrinsic imensionality (efine below) of the ata. A more meticulous coverage of the curse can be foun in (Hastie et al., 00), (Katayama & Satoh, 00) an (Fayya et al., 996). Also, there is some ebate regaring the usefulness of the NN problem at such high imensions (Beyer et al., 999; Hinneburg et al., 000). In practical problems it often turns out that the ata points, even though being embee in a high imensional space, are not so wiely scattere after all. Due to the epenencies among the imensions (i.e co-relation among the attributes/features of the objects) they are usually clustere in some lower imensional subspace. Inee, many of the algorithms that shoul break own in such cases (e.g. KDTrees, Metric Trees etc.) sometimes o not an work better than expecte. Such low-imensional nature in high imensional embeings is calle the intrinsic imensionality of the points. Some recently propose techniques such as Cover Trees an Navigating Nets try to exploit this peculiar nature common in real worl ata to circumvent the curse. A number of imensionality reuction techniques are also common in practice to mitigate the effect of the curse, even though the inter-point istances are not exactly preserve after the reuction. In the ocument/information retrieval fiel some sort of imensionality reuction technique is essential, since it s often the case that n. Ranom Projections, Singular Value Decomposition (SVD), Principal Components Analysis (PCA), an Latent Semantic Inexing (LSI) (which is specific to IR), are some of the techniques that are generally use.. Techniques Propose as Solution Most of the techniques propose for (k)nn an ɛ-(k)nn search, that are applicable to vector/point representation an try to achieve query time sublinear in n, are base aroun two general traitions of solving the problem. They either partition/ecompose the point space to reuce the points looke at by eliminating regions unlikely to contain a NN, or they project the vectors to one or more scalar values an somehow try to reuce the points looke at using the scalar projections of ata an query vectors. Those of such

37 Exact NN Approx NN Base on Space Partitioning. KDTrees 6. X-Trees. Metrics Trees 7. M-Trees 3. vp-trees. SR-Trees. Voronoi Diagrams 9. TV-Trees 5. R-Trees. VA-Files Base on Scalar Projection. Orchar s Metho. LAESA. Metho 5. LSH 3. AESA Base on Intrinsic Dimensionality. Cover Trees Base on Space Partitioning. BBF-Trees (KDTrees with Priority Queue). BBD-Trees 3. Hybri Sp-Trees Base on Scalar Projection. LSH Base on Intrinsic Dimensionality. Navigating Nets Table.: Exact an approx. NN techniques techniques that have capture the interest of other researchers, an the novel ones base on the iea of trying to exploit the intrinsic imensionality of the ata, are summarize in Table.. The only known techniques that try to achieve query time sublinear in are Partial Distance Search (PDS) (also known as Partial Distance Calculation) an TV- Trees. TV-Trees, however, try to reuce not only but also n (hence are also mentione in Table.). These an the techniques in Table. are escribe in brief in the paragraphs below... Partial Distance Search (PDS) Originally propose by Bei an Gray (Bei & Gray, 95) it provies only moerate acceleration on its own. However, it is extremely simple an is general enough to be applie in conjunction with almost any other technique known for NN search. The technique works by stopping the calculation of a point s istance to the query, if at any point uring the calculation, the accumulate istance of the point becomes larger than the istance of the best (k th )NN, encountere among all the points so far looke at uring the search. So, for example, for any Minkowsky-p (L p ) metric (e.g. Manhattan ( i= (L ) metric an Eucliean (L ) metric) of the form: (x, y) p = x i y i p) /p, it will skip the sum calculation for all imensions > i, if at i the sum becomes larger than the overall sum of the best (k th )NN among all the points so far encountere. 9

38 The technique can be applie to any other issimilarity measure that accumulates or as values for ifferent imensions uring calculation of the istance... k-dimensional Trees (KDTrees), BBF-Trees an Variants Multiimensional binary search trees, calle in short by the author as KDTrees (where k is the imensionality of the space), were originally propose by Bentley in 975 (Bentley, 975) for associative retrieval of recors in a file. Their potential for NN search was observe by Bentley, an hence were quickly aopte for NN searching, with an optimize version by Frieman, Bentley an Finkel in 977 (Frieman et al., 977). Since then, these trees are by far the most popular search technique employe for NN search. The trees hierarchically partition the point space into mutually exclusive rectangular regions by recursively splitting it with axis-parallel hyperplanes. The splitting is binary, with each non-terminal internal noe splitting a region into two sub regions. The search for (k)nn is carrie out recursively, with the region containing the query point being searche first an then only those of the remaining ones which are likely to contain the (k th )NN. More specifically, after recursively narrowing own to the region of a leaf noe containing the query, the points insie the region are looke at, an then a ball (hypersphere to be exact), centre at the query an with raius equal to the query s istance to the best (k th )NN foun so far, is compute. Afterwars uring backtracking only those regions which intersect with this query ball are searche, an the ball is upate each time a better (k th ) NN is encountere in another region. The trees require ata in vector representation. They utilize this representation very efficiently an o not require any istance computation either uring construction or uring much of NN search (istance computations are performe only when looking at points insie a region of a leaf uring the NN search). During both processes they only look at the value of a point s imension that is orthogonal to the hyperplane use to split a region. The original version propose by Frieman, Bentley, an Finkel (Frieman et al., 977) requires O(n) construction (preprocessing) time, an O(n) storage. For a given query it takes O() time in the expecte case for moerate imensions. The query time, however, usually grows exponentially in, an the tree, suffering from the curse-of-imensionality, usually egenerates to simple linear search at higher imensions (with slightly higher query time). The original version is general enough to be applie even to non-metric istance measures, an requires measures to satisfy only a few constraints given by the authors. Still, however, it is only known to be evaluate an foun efficient

39 3 6 7 y [] 9.0<= 9.0> x [] x [3] 76.0<= 76.0> 76.0<= 76.0> y [] [5] y [] y [] 95.5<= 95.5> 6.5<= 6.5> 6.5<= 6.5> 7 x [6] [7] [] [3] [] x [5] 5.0<=.0> 6.0<= 6.0> [] [9] [6] [7] 9 q (a) (b) Figure.: (a) A typical imensional KDTree/BBFTree with (b) its graphical representation. The numbers in the rectangular regions in (b) correspon to the inices (given in brackets) of the leaf noes in (a). for Minkowsky-p metrics. Since the initial version a number of ifferent constructions methos, moifications, an enhancements have been propose for the trees by ifferent researchers. All, however, fall far short of removing the curse-of-imensionality an all, from what is known, have only been evise with at most Minkowsky-p metrics in view. Best-Bin-First (BBF) trees, evelope by (Arya & Mount, 993) an inepenently by (Beis & Lowe, 997), are a moification of KDTrees for ɛ-nn search. Using a priority queue, they visit those regions first uring back tracking that are nearer to the query point, an terminate the search early if the istance to the nearest region in the queue becomes greater than /( + ɛ) times the istance to the best encountere (k th )NN (i.e. > /( + ɛ) the raius of the query ball). As an example, consier Fig..(b). For a given query q, after searching region 9, a typical KDTree woul then search the leaf noe of region 7, which is the first one encountere uring backtracking as can be seen in Fig..(a). A BBF-Tree on the other han, woul first go on to search leaf 5 which is nearer to the query. If L is a region associate with a noe an r the raius of the query ball (equal to the istance of the best encountere (k th )NN), for a given istance measure M a KDTree woul carry on the search until for all remaining noes M(q, L ) > r, whereas a BBF-Tree woul terminate the search if for all remaining noes M(q, L ) > /( + ɛ) r. This way it can be guarantee that any (k th ) neighbour foun is at most by a factor of ɛ further than the true (k th ) nearest neighbour (see fig..).

40 (a) (b) Figure.: A (a) KDTree vs a (b) BBD-Tree on the same ata. A slight variation of BBF-Trees/KDTrees are the Balance Box Decomposition (BBD) trees (Arya et al., 99). The only ifference between these an BBF-Trees/KDTrees is that for some noes in BBD-Trees, their associate region is shrunk into two hyperrectangles (base on some shrinkage rule) instea of being split. The resulting two hyperrectangles after shrinking are set theoretic ifferences of each other an one of them completely encloses the other. These structures guarantee worst case ɛ-nn query time of O(c,ɛ ), where c,ɛ 6/ɛ. However, some new enhancements to BBF/KDTrees by the same authors have remove the performance isparity between BBF/KDTrees an BBD- Trees, an the former are not known to perform significantly worse than the latter. The ifference between the two trees is illustrate graphically in Fig....3 Metric (Ball) Trees, vp-trees an Hybri Sp-Trees Metric trees, which are also known as Ball Trees, were presente by Omohunro (Omohunro, 99) an Uhlmann (Uhlmann, 99a,b). These trees hierarchically partition the point space into (hyper)spherical regions. These regions, unlike the ones in KDTrees, are not mutually exclusive an are allowe to overlap. The points ivie among the regions, however, are not allowe to overlap an can only belong to one region or one of its sub regions. Like in KDTrees, the partitioning is binary, an also like in KDTrees, the search for a (k)nn is one recursively, with the region containing (or in some cases nearest to) the query being examine first, followe by those regions that intersect with the query ball (i.e. the ball centre at the query, with raius equal to the query s istance to the

41 Figure.3: A typical metric tree ecomposition. best (k th )NN encountere so far, just like in KDTrees). Unlike KDTrees, they o not require ata to be in vector form. They are general enough to be applie to any ata representation as long as it is in a metric space. The trees can be constructe in a number ifferent of ways, given by a number of ifferent people, with Omohunro (Omohunro, 99) alone giving 5 ifferent construction methos. Most of the propose construction methos work in O(n) time, while the space requirement regarless of the construction metho, is always O(n). No bouns for query time are known to be given for any of the construction methos, an also no evaluation of the trees seems to have ever been carrie out against establishe NN search methos such as KDTrees. In spite of that these trees have been the centre of attention of researchers recently (Moore, 000; Liu et al., 00; Liu et al., 005), an are even claime to be the state-of-the-art so far for exact NN search in moerately high imensions (Liu et al., 005); though without much theoretical or empirical unerpinning. Like KDTrees, these trees are also known to suffer from the curse-of-imensionality at higher imensions. Fig.3 illustrates graphically a typical metric tree ecomposition of -imensional ata. Yianilos inepenently evelope a slight variation of metric trees, which he calle Vantage Point Trees (vp-trees) (Yianilos, 993). These trees ivie the point space using spherical cuts into mutually exclusive (usually) semi-spherical regions. Each internal noe is associate with a ata point, calle the vantage point, which is the centre of the spherical cut use to ivie a (sub)space. The vantage point is usually chosen from one of the corner points in the (sub)space. Fig. graphically illustrates a vp-tree ecomposition. Liu et al. (Liu et al., 005) note that uring (k)nn search of a given query a metric tree can spen up to 95% of the time in backtracking, i.e. after fining a goo initial 3

42 Figure.: Illustration of a vp-tree ecomposition. caniate for the (k th )NN in a leaf noe, up to 95% of its total time can be taken in making sure it has got the correct answer. To avoi this behaviour, they suggeste a variation of metric trees that reports an approximate answer, that is an ɛ-(k)nn, but in a much shorter time. They calle this variant Spill Tree (Sp-Tree). The key iea behin Sp-Tree is to allow ata points that are at the split bounary to spill over between the two sub regions each time a region is ivie, so that both sub regions contain the points near the bounary. The amount of spill-over is controlle by a istance parameter τ, which allows ɛ guarantees of ɛ-(k)nn. As note by the authors, the Sp-Tree on its own is not pratically viable, as the istance parameter τ can introuce cases where a large number of points overlap an after ivision of a region both sub regions contain the same number of points as the parent region, thereby making the sub-ivision routine go into an infinite loop/recursion. Hence, for practical purposes they suggeste a Hybri Sp-Tree, a cross between Metric Trees an Spill Trees, that contains both overlapping an non-overlapping regions, an makes sure that at least a certain number of points of a region are ivie among the sub regions. It marks a region overlapping only if after ivision with parameter τ both of its sub regions contain < ρ of its total number of points (the authors set ρ to 70%), otherwise it is marke non-overlapping. The search for a (k)nn in a Hybri Sp- Tree is also carrie out in a hybri fashion, with backtracking being skippe only for overlapping regions an not for non-overlapping ones. These structures work very well for ɛ-(k)nn, even in high imensions. The authors in (Liu et al., 005) also presente an empirical evaluation of the structures against the initial version of LSH (iscusse below

43 in section..9), the only technique known to work well in high imensions, an have shown Hybri Sp-Trees to perform consistently better on a number of real-worl atasets... Voronoi Diagrams Voronoi iagrams are of practical importance in a number of fiels, which inclue, in aition to computer science, meteorology, physics, astronomy, archaeology an biology, e.g. see (Okabe et al., 000). The iagrams have a long history of use, with their earliest use being trace back to 6 when they were use by the well known French philosopher an mathematician René Descartes. Their general -imensional case was stuie an formalize by Russian mathematician Georgy Feoseevich Voronoy, whom they are name after. These are are also known as Voronoi tessellations or Dirichlet tessellations. Voronoi iagrams partition a point space into convex polygons. The polygons are constructe in such a way that each polygon is associate with a single ata point an any point that woul be closer to this ata point than any other woul lie in this polygon. The NN search then just becomes a search for the region that contains the query point, an, because of the properties of Voronoi iagrams, the ata point associate with that region is guarantee to be the NN of the query. For knn search with k >, an orer-k Voronoi iagram of the ata is compute. In orer-k Voronoi iagrams, each polygonal partition of the point space is associate with exactly k ata points, an any point falling in that region is closer to those k points than any other k points among the ata. Figure.5 graphically illustrates an orer- Voronoi space ecomposition. These structures are computationally only efficient for at most =, for which they require O(n) preprocessing an O(n) space. For values higher than, their complexity grows exponentially in (O(n / ) accoring to (Arya et al., 00)). The NN search on Voronoi iagrams takes only O() time in the worst case, while knn search takes only O( + k) time. The search is one using an approach for planar point location in straight line graphs. For a long time, a major rawback of this technique was that k for knn search neee to be known in avance before preprocessing, an ha to remain fixe for all queries. However, an approach evelope by Aggarwal et al. (Aggarwal et al., 990) for compacting orer-k Voronoi iagrams, allows all possible orer-k Voronoi iagrams (i.e. for k =...n ) to be store in O(n) space, while still guaranteeing O( + k) query time. An extensive survey of these structures is available in (Aurenhammer, 99) an (Okabe et al., 000). 5

44 Figure.5: An orer- Voronoi space ecomposition...5 Orchar s Metho Orchars s metho (Orchar, 99) was esigne specifically for Vector Quantization. It works by selecting a point p as a caniate NN, computing its istance r to the query q, an then eliminating all the points that are further than r from p, thereby exploiting the geometrical property that they can not be nearer to q than p (See Fig..6). After elimination, the metho looks for a neighbour better than p, in the points remaining, within the circle of raius r centre at p (hypersphere in higher imensions). If a neighbour better than p is foun, the elimination proceure is applie again, an again a better neighbour is sought, in the new circle centre at the new best neighbour (with raius equal to twice the new neighbour s istance to the query). The selection of point p for the first query is arbitrary, an for subsequent queries, it turns out in image compression, that the best caniate is the NN of the last query processe, since a goo initial caniate NN translates to faster performance. The metho requires for the elimination roun compute (an sorte) istances from the point selecte as a caniate NN to all the rest of the points. Since for the first an all the subsequent queries, any point can be selecte as a caniate NN (which can subsequently be upate), it effectively requires all inter-ata point istances to be compute at preprocessing, an thus requires O(n ) space an O(n ) pre-processing time; making it impractical for all but the smallest of NN problems. A slight variation of the metho computes istances of all the points to only m other points, an requires only O(mn) time an space. If uring search a nee arises to go past the m th item on the sorte istance lists, it simply resorts to simple linear search. The original version (the 6

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

Distributed Decomposition Over Hyperspherical Domains

Distributed Decomposition Over Hyperspherical Domains Distribute Decomposition Over Hyperspherical Domains Aron Ahmaia 1, Davi Keyes 1, Davi Melville 2, Alan Rosenbluth 2, Kehan Tian 2 1 Department of Applie Physics an Applie Mathematics, Columbia University,

More information

k-nn Graph Construction: a Generic Online Approach

k-nn Graph Construction: a Generic Online Approach k-nn Graph Construction: a Generic Online Approach Wan-Lei Zhao arxiv:80.00v [cs.ir] Sep 08 Abstract Nearest neighbor search an k-nearest neighbor graph construction are two funamental issues arise from

More information

A Cost Model for Query Processing in High-Dimensional Data Spaces

A Cost Model for Query Processing in High-Dimensional Data Spaces A Cost Moel for Query Processing in High-Dimensional Data Spaces Christian Böhm Luwig Maximilians Universität München This is a preliminary release of an article accepte by ACM Transactions on Database

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Nearest Neighbor Search using Additive Binary Tree

Nearest Neighbor Search using Additive Binary Tree Nearest Neighbor Search using Aitive Binary Tree Sung-Hyuk Cha an Sargur N. Srihari Center of Excellence for Document Analysis an Recognition State University of New York at Buffalo, U. S. A. E-mail: fscha,sriharig@cear.buffalo.eu

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

A fast embedded selection approach for color texture classification using degraded LBP

A fast embedded selection approach for color texture classification using degraded LBP A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Refinement of scene depth from stereo camera ego-motion parameters

Refinement of scene depth from stereo camera ego-motion parameters Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Geometric data structures:

Geometric data structures: Geometric data structures: Machine Learning for Big Data CSE547/STAT548, University of Washington Sham Kakade Sham Kakade 2017 1 Announcements: HW3 posted Today: Review: LSH for Euclidean distance Other

More information

Clustering Billions of Images with Large Scale Nearest Neighbor Search

Clustering Billions of Images with Large Scale Nearest Neighbor Search Clustering Billions of Images with Large Scale Nearest Neighbor Search Ting Liu, Charles Rosenberg, Henry A. Rowley IEEE Workshop on Applications of Computer Vision February 2007 Presented by Dafna Bitton

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen Proceeings of ACIVS 2002 (Avance Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002 CONTENT-BASED RETRIEVAL OF DEFECT IMAGES Jukka Iivarinen an Jussi Pakkanen jukka.iivarinen@hut.fi,

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

A Modified Immune Network Optimization Algorithm

A Modified Immune Network Optimization Algorithm IAENG International Journal of Computer Science, 4:4, IJCS_4_4_3 A Moifie Immune Network Optimization Algorithm Lu Hong, Joarer Kamruzzaman Abstract This stuy proposes a moifie artificial immune network

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Blind Data Classification using Hyper-Dimensional Convex Polytopes

Blind Data Classification using Hyper-Dimensional Convex Polytopes Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

Nearest neighbors. Focus on tree-based methods. Clément Jamin, GUDHI project, Inria March 2017

Nearest neighbors. Focus on tree-based methods. Clément Jamin, GUDHI project, Inria March 2017 Nearest neighbors Focus on tree-based methods Clément Jamin, GUDHI project, Inria March 2017 Introduction Exact and approximate nearest neighbor search Essential tool for many applications Huge bibliography

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Principles of B-trees

Principles of B-trees CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

1/5/2014. Bedrich Benes Purdue University Dec 6 th 2013 Prague. Modeling is an open problem in CG

1/5/2014. Bedrich Benes Purdue University Dec 6 th 2013 Prague. Modeling is an open problem in CG Berich Benes Purue University Dec 6 th 213 Prague Inverse Proceural Moeling (IPM) Motivation IPM Classification Case stuies IPM of volumetric builings IPM of stochastic trees Urban reparameterization IPM

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

A Novel Density Based Clustering Algorithm by Incorporating Mahalanobis Distance

A Novel Density Based Clustering Algorithm by Incorporating Mahalanobis Distance Receive: November 20, 2017 121 A Novel Density Base Clustering Algorithm by Incorporating Mahalanobis Distance Margaret Sangeetha 1 * Velumani Paikkaramu 2 Rajakumar Thankappan Chellan 3 1 Department of

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Data Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis?

Data Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis? Data Mining: Concepts an Techniques Chapter Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign www.cs.uiuc.eu/~hanj Jiawei Han an Micheline Kamber, All rights reserve

More information

1/5/2014. Bedrich Benes Purdue University Dec 12 th 2013 INRIA Imagine. Modeling is an open problem in CG

1/5/2014. Bedrich Benes Purdue University Dec 12 th 2013 INRIA Imagine. Modeling is an open problem in CG Berich Benes Purue University Dec 12 th 213 INRIA Imagine Inverse Proceural Moeling (IPM) Motivation IPM Classification Case stuies IPM of volumetric builings IPM of stochastic trees Urban reparameterization

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

Text Particles Multi-band Fusion for Robust Text Detection

Text Particles Multi-band Fusion for Robust Text Detection Text Particles Multi-ban Fusion for Robust Text Detection Pengfei Xu, Rongrong Ji, Hongxun Yao, Xiaoshuai Sun, Tianqiang Liu, an Xianming Liu School of Computer Science an Engineering Harbin Institute

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous

More information

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009

More information