MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE

Size: px
Start display at page:

Download "MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE"

Transcription

1 ISSN: (ONLINE) DOI: /isc ICTACT JOURNAL ON SOFT COMPUTING, OCTOBER 013, VOLUME: 04, ISSUE: 01 MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE S. K. Jayanthi 1 an S. Prema 1 Department of Computer Science, Vellalar College for Women, Inia ayanthiskp@gmail.com Department of Computer Science, K.S.R College of Arts an Science, Inia premashanmuga11@gmail.com Abstract In the current scenario, web page result personalization is playing a vital role. Nearly 80 % of the users expect the best results in the first page itself without having any persistence to browse longer in URL moe. This research work focuses on two main themes: Semantic web search through online an Domain base search through offline. The first part is to fin an effective metho which allows grouping similar results together using BookShelf Data Structure an organizing the various clusters. The secon one is focuse on the acaemic omain base search through offline. This paper focuses on fining ocuments which are similar an how Vector space can be use to solve it. So more weightage is given for the principles an working methoology of similarity propagation. Cosine similarity measure is use for fining the relevancy among the ocuments. Keywors: Semantic Web, BookShelf Data Structure, Similarity Propagation, Cosine Similarity measure, Vector Space Moel 1. INTRODUCTION Information Retrieval is a problem of selecting the relevant information from a ocument atabase in response to search queries given by a user. Information Retrieval Systems (IRSs) eal with ocument atabase that usually consist of textual information an process user queries to provie the user with access to relevant information within a reasonably acceptable time interval. After retrieving the results it is essential for a search engine to rank-orer the ocuments matching a query. To perform this, the search engine calculates, for each matching ocument, a score with respect to the given query. This research work initiate the stuy of assigning a score to a (query, ocument) pair. Two types of moe are iscusse in this research work. One is an online web search an another is an offline search. For both the moe of research the similarity between the retrieve ocuments are calculate using the cosine similarity measure. In summary, this architecture gives much higher quality results yet with similar response time to other systems. The rest of the paper is organize as follows: relate work is iscusse in Section an provies the preliminaries on web search engines. Section 3 provies an iea for fining similarity propagation among ocuments.it also focus on vector space moel an cosine similarity measure. Term frequency an Inverse ocument frequency for similarity calculation is iscusse. Section 4 explains the experimental results of Online an Offline research. Arranging the retrieve results in BookShelf Data Structure is also reporte in this section. Finally, Section 5 gives the concluing remarks.. RELATED WORK Qingtian Han an Xiaoyan Gao [1] analyses a Web mining algorithm base on usage mining. A novel an efficient approach for the etection of nearest uplicate web pages was esigne by V. A. Narayana et al. [].The ocuments with similarity scores greater than a threshol value are consiere as near uplicates. J. Akilaneswari an N. P. Gopalan [3] analyze an architectural framework of a crawler for locating eep web repositories using learning multi-agent Systems. Crawling an Page Rank Algorithms for Internet Searches are esigne by Animesh Tripathy an Prashanta K Patra [4]. An architecture an implementation prototype of web ata mining system base on web service was evelope by Chunying Chen et al. [5]. This approach takes a source-centric perspective on the information-seeking process, aiming to ientify trustworthy sources of relevant information from within the user's social network by Tom Heath [6]. Where an iniviual encounters a problem or task for which their current knowlege is inaequate, they may engage in information-seeking in orer to change their knowlege state (Belkin) [7]. Louis S. Wang [8] presents a moifie vector space moel for measuring similarity between the query an the ocument. Huilian Fan et al. [9] esigne a new crawling strategy which combine the avantages of hyperlinks structure an web content strategies. Topic keywors base VSM is use to evaluate iniviual fitness, an imports new URLs to implement crossover an mutation, an the URLs that have the same prefix are regare as niche. Mehran Sahami et al. [10] propose a similar kernel function, for measuring the similarity between short text snippets. Sean A. Golliher [11], two classes (on-page an off-page variables) of search engine ranking factors an their possible implications for ranking web ocuments are iscusse. Albert Bifet et al. [1] analyze the result rankings for several queries of ifferent categories using statistical methos in Google (via its API) as testbe. Chowhury Farhan Ahme et al. [13] esigne an efficient mining of utility-base web path traversal patterns. Hazem Elmeleegy et al. [14] provies a novel technique for extracting tables from lists. The technique is omain-inepenent an operates in a fully unsupervise manner. The link structure of a web site can be visualize in a link hierarchy consisting of web pages on multiple conceptual levels for user navigation [15]. Duran an Kahn [16] evelope a system calle MAPA to extract a hierarchical structure from an arbitrary web site for navigation. 667

2 S K JAYANTHI AND S P REMA: MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE 3. SIMILARITY PROPAGATION The main contribution of this paper is to fin the similarity propagation among the ocuments. The approach iscusse in this section is common for both the online web search an offline omain-centric approach. To workout this approach one shoul have the basic iea about the following: tf-if calculation, Vector space moel, Query as vector, tf-if weight calculation an cosine similarity measure. All those funamental concepts are iscusse in the following sections. The weight of the components of a ocument vector can be represente by Term Frequency or combination of tf an if. Number of occurrences of a term t in the ocument D is referre by tf. Number of ocuments, where a particular term t occurs is note as f. In if i.e. log (n/f) wor with rare occurrences has more weight.tf-if is calculate as tf-if= tf if t Fig.1. Documents as vector Documents D are points or vectors in this space. Terms are axes of the space. Documents that are close together in vector space talk about the same things. View each ocument as a vector with one component corresponing to each term in the ictionary, together with a weight for each component that is given by tf-if t, = tf t, if t. For ictionary terms that o not occur in a ocument, this weight is zero as in Fig VECTOR SPACE MODEL t The representation of a set of ocuments as vectors in a common vector space is known as the vector space moel an is funamental to a host of information retrieval operations ranging from scoring ocuments on a query, ocument classification an clustering. The tf-if values can now be use to create vector representations of ocuments. Each component of a vector correspons to the tf-if value of a particular term in the corpus ictionary. Dictionary terms that o not occur in a ocument are weighte zero. Using this kin of representation in a common vector space is calle vector space moel, which is not only use in information retrieval but also in a variety of other research fiels like machine learning (e.g. clustering, classification). A vector space provies the possibility to perform calculations like computing ifferences or angles between vectors. Since ocuments are usually not of equal length, simply computing the ifference between two vectors has the isavantage. The ocuments of similar content but ifferent length are not regare as similar in the vector space. Each term from the collection becomes a imension in an n- imensional space. A ocument is a vector in this space, where term weights serve as coorinates. It is important for scoring ocuments for answering queries, Query by example, Document classification an Document clustering (Prabhakar) [17]. Formalizing vector space proximity oesn t use Eucliean istance because it is large for vectors of ifferent lengths. But at the same time using cosine similarity will result in ranking the ocuments in increasing orer of cosine (query, ocument). 3. RELEVANCY MEASURE The vector space representation of text is an increibly powerful tool. Any text can be treate as a vector in a V- imensional vector-space (Jaime Arguello) [18]. Documents are matche with a query base on their similarity. If a ocument is similar to the query, it is likely to be relevant. Non-binary weights for inex terms in queries an ocuments are use in the calculation of egree of similarity. Decreasing orer of this egree of similarity for the retrieve ocuments gives the ranke ocuments with partial match (Manwar et al.) [19]. For the vector moel, the weight w i, associate with a pair (k i, ) is positive an non-binary. Further, the inex terms in the query are also weighte. Let w i,q be the weight associate with the pair(k i, q),where w i,q 0. Then, the query vector q is efine as q = (w 1,q, w,q,. w n,q ) where n is the total number of inex terms in the system. The vector for a ocument is represente by = (w 1,, w,,. w n, ) by Manwar et al. The main obective is to retrieve more ocuments like those labele relevant an fewer ocuments like those labele irrelevant. The combination of tf an f is the most popular weight use in case of ocument similarity exercises. The weight is high when t occurs many times within a small number of ocuments. The weight is low, when the term occurs fewer times in a ocument or in many ocuments. A vector V can be expresse as a sum of elements such as, V = a 1 v i1 + a v i a n v in where, a k are calle scalars or weights an v in as the components or elements. Consier two ocument vectors 1, an a query vector Q. The space contains terms t 1, t, t 3,,t n ).The ocument 1 has components t 1, t 3,.. an has components t, t 4,..So V( 1 ) is represente closer to axis t 1 an V( ) is closer to t.the angle represents the closeness of a ocument vector to the query vector. Its value is calculate by cosine of. 3.3 COSINE SIMILARITY MEASURE To avoi the bias cause by ifferent ocument lengths, a common way to compute the similarity between the two ocuments is using the cosine similarity measure. The inner prouct of the two vectors is ivie by the prouct of their vector lengths. This has the effect that the vectors are normalize to unit length an only the angle, more precisely the cosine of the angle, between the vectors account for their similarity. Documents not sharing a single wor get assigne a similarity value of zero because of the orthogonality of their 668

3 Y-axis ISSN: (ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, OCTOBER 013, VOLUME: 04, ISSUE: 01 vectors while ocuments sharing a similar vocabulary get higher values. Because a query can be consiere a short ocument, it is of course possible to create a vector for the query, which can then be use to calculate the cosine similarities between the query vector an those of the matching ocuments. Finally, the similarity values between the query an the retrieve ocuments are use to rank the results. For any two given ocuments an k, their similarity is: n. w i i w k 1, i, k sim, k n n k w w i1 i, i1 where, w i is a weight of the ocuments. The most popular way to measure the similarity between two frequency vectors (raw or weighte) is to take their cosine value as in Fig.. It is necessary to compute the cosine angle between A (the query) an each ocument an sort these in ecreasing orer of cosine angles. This treatment can be extene to the entire collection of ocuments. C(x 0, y 0 ) Fig.. Cosine angle 3.4 TF AND IDF WEIGHT FOR SIMILARITY CALCULATION i, k Cosine similarity between two ocuments is given by, v sim1, v 1. v v If the vector 1 has component weights w 1, w, w 3 an vector has component weights u 1, u, then the ot prouct = w 1 *u 1 + w *u. Since there is no thir component, w 3 *null = 0. 1 w1 w w3 Eucliean length of. Consier there are 3 ocuments, D 1 = The file contains operating concepts D = My laptop is operating uner winows operating system D 3 = This system is not working properly Q = Operating System Number of ocuments = 3; inverse ocument frequency IDF = log (D/f i ) is calculate as in Table.1. Calculating the vector lengths Eucliean length of the Vector is D W i, A(x 1, y 1 ) X-axis 1 B(x, y ) i D D D Q Term Table.1. tf-if calculation tf i Weights=tf i*if i f i D/f i if i Q D1 D D3 Q D1 D D3 concepts contains file is laptop My not operating properly system The This uner Winows Calculate the ot proucts of the query vector with each Document vector, Q. Di WQ, * Wi, Q.D 1 = * = Q.D = * * = Q.D 3 = * = Cosine value calculation Cosine ( 1 ) = Q.D 1 / Q * D 1 = /(0.489*0.970)=0.18 Cosine ( ) = Q.D / Q * D =0.099/(0.489*0.930) = Cosine ( 3 ) = Q.D 3 / Q * D 3 = /(0.489*0.8630)=0.144 Document D is more similar to the query. Cosine formula gives a score which can be use to orer ocuments. Documents with a partial match are also ientifie an the problem is that positional information about the terms is missing. The implementation of cosine value calculation is one in Java an the source coe is: 669

4 S K JAYANTHI AND S P REMA: MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE if(len1>len) for(int p=0;p<len;p++) System.out.println(" if ss1 "+ss1[p]+" "+ss11[p]+" "+ss[p]+" "+ss[p]); 1=(Double.parseDouble(ss1[p])); =(Double.parseDouble(ss11[p])); 3=(Double.parseDouble(ss[p])); 4=(Double.parseDouble(ss[p])); ouble if1=(1/3); ouble if=(/4); ouble sf=(double.parsedouble(s5[p])); ouble sf1=(double.parsedouble(s6[p])); if(if1>if) sim=(if1*sf*sf1); if(if1<if) sim=(if*sf*sf1); int t=(e+1); String fit=w+" "+t+" "+sim; System.out.println("Dis "+fit); System.out.println("insert into Similarity values("+tt+",'"+w+" "+t+"',"+sim+")"); //b.st.executeupate("insert into Similarity values("+tt+",'"+w+" "+t+"',"+sim+")"); tt++; res.a(fit.trim()); ta.appen(fit+"\n"); else boolean bt=true,bt11=true; for(int p1=0;p1<len1;p1++) System.out.println("ss1 "+ss1[p1]+" "+ss11[p1]+" "+ss[p1]+" "+ss[p1]); 1=(Double.parseDouble(ss1[p1])); //=(Double.parseDouble(ss11[p1])); 3=(Double.parseDouble(ss[p1])); 4. EXPERIMENTAL RESULTS 4.1 ONLINE SEARCH Online results for the search query operating system are consiere for the experimental ataset. The similarity propagation for the retrieve web ocuments are calculate following the proceure as in section 3. The probability measure for all the retrieve ocuments are consiere like, (0,1),(0,),(0,3)(0,4),(0,5),(0,6),(0,7),(0,8),(0,9),(0,10), (1,0),(1,),(1,3)(1,4),(1,5),(1,6),(1,7),(1,8),(1,9),(1,10),.,(10,0),(10,1),(10,),(10,3) (10,4),(10,5),(10,6),(10,7),(10,8),(10,9) For every pair of ocument similarity, automatic upation of SQL table is create with column specification for ocument i of two ocuments an similarity value an the similarity propagation measure is given in Fig.3. String qur="create table Hierarchical (i varchar (500), oc1 numeric (18, 10),"; for (int k=0;k<(out.length-1);k++) if(k<(out.length-)) else qur+="oc"+(k+)+" "+"numeric(18,10)"+","; qur+="oc"+ (k+) +" "+"numeric (18, 10)"+")"; Fig.3. Similarity Propagation Measure Similarity values are automatically calculate for each an every web search, i.e., ynamically store in the Java file for further reference as in Fig.4. The Fig.5 represents the plots of clustering quality against the number of clusters for the given query in online search using the similarity propagation representation. In each of the graphs, the curves corresponing to the two similarity measures are 670

5 ISSN: (ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, OCTOBER 013, VOLUME: 04, ISSUE: 01 shown (Jayanthi an Prema) [1]. It can be clearly seen that the quality of clustering increases monotonically with the number of clusters. Fig.7. Cluster measure Fig.4. Automatic Backup of the Similarity Propagation File 4. OFFLINE SEARCH Two types of moes are focuse in an offline search. One is an IT professional search an the other is a non-professional search. Professional search is base on omain-centric system. Document collection an keywors focuse in this section are all base on computer science omain. Main an sub omain sample ocuments collecte for professional omain-centric search is in Table.. Sample ocuments for non-professional search with their keywors are in Table.3. Table.. Professional Domain-Centric Clustering Fig.5. Documents versus Similarity measure Initially, as expecte, the increase in quality of clusters is rapi. It can also be observe that the curve for the quality of clusters flattens out somewhat for the cluster numbers close to the natural number of clusters for the corresponing ataset. The corresponing screenshots are given in Fig.6 an Fig.7. Main omain Sub-omain keywors Operating System apple, winows, unix, kernel Network "communication"," protocol","topology","layer" DBMS "bms","sql","oracle" Data Structure "ata structures","array","list","vector" "Software Testing, Software SOFT Design","Implementation","Software evelopment" Table.3. Non-Professional ocuments Clustering Main omain winow apple mouse Sub-omain keywors "oor","winow","esign","interior" "history","apple","fruit","season" "history","mouse","home" The moe of search i.e., professional or non-professional is to be ecie by the user. Professional search is focuse on computer science omain. Non-professional search is focuse on general concept. 5. CONCLUSION Fig.6. Clustere Results There is a limite average time they will spen before giving up, or becoming very upset with the search technology available for them. It is foun that people will not search for long on the 671

6 S K JAYANTHI AND S P REMA: MEASURING THE PERFORMANCE OF SIMILARITY PROPAGATION IN AN SEMANTIC SEARCH ENGINE web. To spee up the web search, an alternative approach is iscusse in this paper. Two moes of searching options are provie in this research work. One is an online web search an another one is an offline search. Instea of isturbing all the ocuments, the web search with the most similar propagation is consiere. The highly correlate ocuments are clustere using Agglomerative hierarchical clustering. The clustere ocuments are arrange in BookShelf Data Structure for an easy access (Jayanthi an Prema) [0]. For users, seeing clustere search results has the following benefits such as Bringing those search results into easy view that otherwise woul remain invisible because they are far own the list. Allows users to examine nearly ouble the number of relevant ocuments than in the case of result lists of commercial search engines. Leas to effortless knowlege iscovery as the user learns the types or subtopics of available information relating to the query. Provies context by placing the relate ocuments within a single foler for oint viewing. All of these factors have significant impact on the user s search prouctivity. REFERENCES [1] Qingtian Han an Xiaoyan Gao, Research of Distribute Algorithm Base on Usage Mining, Proceeings of Secon International Workshop on Knowlege Discovery an Data Mining, pp , 009. [] Narayana V.A, P. Premchan an A. Govarhan, A Novel an Efficient Approach For Near Duplicate Page Detection in Web Crawling, Proceeings of IEEE International Avance Computing Conference, pp , 009. [3] Akilaneswari J an Gopalan N. P, An Architectural Framework of a Crawler for Locating Deep Web Repositories using Learning Multi-agent Systems, Proceeings of Thir International Conference on Internet an Web Applications an Services, pp , 008. [4] Tripathy A, Patra P. K, A Web Mining Architectural Moel of Distribute Crawler for Internet Searches Using Page Rank Algorithm, Proceeings of IEEE Asia-Pacific Services Computing Conference, pp , 008. [5] Chunying Chen, Xiongwei Zhou an Jianzhong Zhang, Web Data Mining System Base on Web Services, Proceeings of Ninth International Conference on Hybri Intelligent Systems, Vol. 3, pp. 16-0, 009. [6] Tom Heath, Information-seeking on the Web with Truste Social Networks from Theory to Systems, Ph.D Thesis, Department of Computer Science, 008. [7] N. J. Belkin, Helping People Fin What They Don't Know, Communications of the ACM, Vol. 43, No.8, pp , 000. [8] Louis S. Wang, Relevance Weighting of Multi-Term Queries for Vector Space Moel, IEEE Symposium on Computational Intelligence an Data Mining, pp , 009. [9] Huilian Fan, Guangpu Zeng an Xianli Li, Crawling Strategy of Focuse Crawler Base on Niche Genetic Algorithm, Proceeings of Eighth IEEE International Conference on Depenable, Autonomic an Secure Computing, pp , 009. [10] Mehran Sahami an Timothy D. Heilman, A Web base Kernel Function for Measuring the Similarity of Short Text Snippets, Proceeings of the 15 th International Conference on Worl Wie Web, pp , 006. [11] Sean A. Golliher, Search Engine Ranking Variables an Algorithms, Sem.org, Supplement Issue, Vol. 1, 008. [1] Albert Bifet, Carlos Castillo, Paul-Alexanru Chirita an Ingmar Weber, An Analysis of Factors Use in Search Engine Ranking, AIRWeb 005: Available at: [13] Ahme C. F, Tanbeer S. K, Byeong-Soo Jeong an Young- Koo Lee, Efficient Mining of Utility-Base Web Path Traversal Patterns, Proceeings of International Conference on Avance Communication Technology, Vol. 3, pp , 009. [14] Hazem Elmeleegy, Jayant Mahavan an Alon Halevy, Harvesting Relational Tables from Lists on the Web, The International Journal on Very Large Data Bases, Vol. 0, No., pp. 09-6, 009. [15] Jianhan Zhu, Mining Web Site Link Structures for Aaptive Web Site Navigation an Search, Ph.D Thesis, University of Ulster at Joranstown, 003. [16] Davi Duran an Paul Kahn, MAPA: A System for Inucing an Visualizing Hierarchy in Websites, Proceeings of the ninth ACM Conference on Hypertext an hypermeia: links, obects, time an space- structure in hypermeia systems, pp , [17] Jaime Arguello, Vector Space Moel, INLS 509: Information Retrieval, Lecture Notes, 011. [18] A. B. Manwar, Hemant S. Mahalle, K. D. Chinchkhee an Vinay Chavan, A vector space moel for information retrieval: a matlab approach, Inian Journal of Computer Science an Engineering, Vol. 3, No., pp. -9, 01. [19] S. K. Jayanthi an S. Prema, Facilitating Efficient Integrate Semantic Web Search with Visualization an Data Mining Techniques, Proceeings of International Conference on Information an Communication Technologies, pp , 010. [0] S. K. Jayanthi an S. Prema, CIMG-BSDS: Image Clustering Base on Bookshelf Data Structure in Web Search Engine Visualization, Proceeings of International Conference on Recent Trens in Computing, Communication an Information Technologies, pp ,

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

IMPROVING PERSONALIZED WEB SEARCH USING BOOKSHELF DATA STRUCTURE

IMPROVING PERSONALIZED WEB SEARCH USING BOOKSHELF DATA STRUCTURE S K JAYANTHI AND S PREMA: IMPROVING PERSONALIZED WEB SEARCH USING BOOKSHELF DATA STRUCTURE IMPROVING PERSONALIZED WEB SEARCH USING BOOKSHELF DATA STRUCTURE S.K. Jayanthi 1 and S. Prema 2 1 Department of

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. 1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

A FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES

A FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES A FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES Archana.S 1 an Srihar.S 2 1 Department of Information Science an Technology, College of Engineering, Guiny archana.santhira@gmail.com

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

Implicit and Explicit Functions

Implicit and Explicit Functions 60_005.q //0 :5 PM Page SECTION.5 Implicit Differentiation Section.5 EXPLORATION Graphing an Implicit Equation How coul ou use a graphing utilit to sketch the graph of the equation? Here are two possible

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Information Retrieval. (M&S Ch 15)

Information Retrieval. (M&S Ch 15) Information Retrieval (M&S Ch 15) 1 Retrieval Models A retrieval model specifies the details of: Document representation Query representation Retrieval function Determines a notion of relevance. Notion

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most common word appears 10 times then A = rn*n/n = 1*10/100

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan Sumio FUJITA Yahoo Japan Corporation, Roppongi Hills Mori Tower, 6-10-1, Roppongi, Minato-ku, Tokyo 106-6182, Japan sufujita AT yahoo-corp DOT jp Abstract This

More information

Classification and clustering methods for documents. by probabilistic latent semantic indexing model

Classification and clustering methods for documents. by probabilistic latent semantic indexing model A Short Course at amang University aipei, aiwan, R.O.C., March 7-9, 2006 Classification an clustering methos for ocuments by probabilistic latent semantic inexing moel Shigeichi Hirasawa Department of

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

A half-scan error reduction based algorithm for cone-beam CT

A half-scan error reduction based algorithm for cone-beam CT Journal of X-Ray Science an Technology 12 (2004) 73 82 73 IOS Press A half-scan error reuction base algorithm for cone-beam CT Kai Zeng a, Zhiqiang Chen a, Li Zhang a an Ge Wang a,b a Department of Engineering

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Keywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP

Keywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP Volume 3, Issue 7, July 203 ISSN: 2277 28X International Journal of Avance Research in Computer Science an Software Engineering Research Paper Available online at: wwwijarcssecom Compression Techniques

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P.

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P. Journal of Engineering Science an echnology Vol. 13, No. 1 (2018) 141-157 School of Engineering, aylor s University IMPLEMENAION OF REJECION SRAEGIES INSIDE MALAYALAM CHARACER RECOGNIION SYSEM BASED ON

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Using the disparity space to compute occupancy grids from stereo-vision

Using the disparity space to compute occupancy grids from stereo-vision The 2010 IEEE/RSJ International Conference on Intelligent Robots an Systems October 18-22, 2010, Taipei, Taiwan Using the isparity space to compute occupancy gris from stereo-vision Mathias Perrollaz,

More information

Chapter 6: Information Retrieval and Web Search. An introduction

Chapter 6: Information Retrieval and Web Search. An introduction Chapter 6: Information Retrieval and Web Search An introduction Introduction n Text mining refers to data mining using text documents as data. n Most text mining tasks use Information Retrieval (IR) methods

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Learning to Rank: A New Technology for Text Processing

Learning to Rank: A New Technology for Text Processing TFANT 07 Tokyo Univ. March 2, 2007 Learning to Rank: A New Technology for Text Processing Hang Li Microsoft Research Asia Talk Outline What is Learning to Rank? Ranking SVM Definition Search Ranking SVM

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

SMART IMAGE PROCESSING OF FLOW VISUALIZATION

SMART IMAGE PROCESSING OF FLOW VISUALIZATION SMAR IMAGE PROCESSING OF FLOW VISUALIZAION H Li (A Rinoshika) 1, M akei, M Nakano 1, Y Saito 3 an K Horii 4 1 Department of Mechanical Systems Engineering, Yamagata University, Yamagata 99-851, JAPAN Department

More information

Semantic internet search engine with focus on Arabic language

Semantic internet search engine with focus on Arabic language Semantic internet search engine with focus on Arabic language Naima Tazit, El Hossin Bouyakhf, Soua Sabri Faculty of Sciences Agal, Rabat, Morocco Abellah Yousfi Faculty of Economy Souissi, Rabat, Morocco

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target .IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Try It. Implicit and Explicit Functions. Video. Exploration A. Differentiating with Respect to x

Try It. Implicit and Explicit Functions. Video. Exploration A. Differentiating with Respect to x SECTION 5 Implicit Differentiation Section 5 Implicit Differentiation Distinguish between functions written in implicit form an eplicit form Use implicit ifferentiation to fin the erivative of a function

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

4.2 Implicit Differentiation

4.2 Implicit Differentiation 6 Chapter 4 More Derivatives 4. Implicit Differentiation What ou will learn about... Implicitl Define Functions Lenses, Tangents, an Normal Lines Derivatives of Higher Orer Rational Powers of Differentiable

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information