A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System

Size: px
Start display at page:

Download "A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System"

Transcription

1 A T-Step Ahea Constraine Optimal Target Detection Algorithm for a Multi Sensor Surveillance System K Mahava Krishna Henry Hexmoor an Shravan Sogani International Institute of Information Technology CSCE Department, University of Arkansas Hyeraba 5 9, INDIA Fayetteville, AR 727 mkrishna@iiit.ac.in hexmoor@uark.eu Abstract We present a methoology for optimal target etection in a multi sensor surveillance system. The system consists of mobile sensors that guar a rectangular surveillance zone crisscrosse by moving targets. Targets penetrate the surveillance zone with poisson rates at uniform velocities. Uner these conitions we present a motion strategy computation for each sensor such that it maximizes target etection for the next T time-steps. A coorination mechanism among sensors ensures that overlapping an overlooke regions of observation among sensors are minimize. This coorination mechanism is interleave with the motion strategy computation to reuce etections of the same target by more than one sensor for the same time-step. To avoi an exhaustive search in the oint space of all the sensors the coorination mechanism constrains the search by assigning priorities to the sensors an thereby arbitrating among sensory tasks. A comparison of this methoology with other multi target tracking schemes verifies its efficacy in maximizing etections. Sample an time-step are use equivalently an interchangeably in this paper. Inex Terms- multi sensor system, optimal target etection, sensor network, sensor surveillance, multi-agent system I INTRODUCTION We present a framework for maximizing target etections in a surveillance system consisting of multiple mobile sensors (i.e., robots). The sensors collectively guar a rectangular surveillance zone crisscrosse by moving targets. A-priori information about targets is the knowlege of their poisson rates of entry. Current knowlege about all targets within the sensing range of a sensor is available to the sensor in the form of the target velocity information an motion irection. While current information is use in eterministically computing the best places to be at in the subsequent time steps, it oes not take into account the changes in the environment that occur ue to consistent flow of target traffic into an out of the surveillance zone. Knowlege of the statistics of target entry an exit on the other han are use to compute the statistically optimal places to be at in the future from a given location, but oes not consier the current information gleane through sensor observations. Hence a combination of both current target information an target statistics is use to compute a motion strategy of a sensor that maximizes the number of etections for the next T time steps. Computing the best strategy from its iniviual perspective can result in motions for each sensor with overlapping regions of observation. A priority base coorination mechanism is interleave with the motion strategy computation to reuce etections of the same target by more than one sensor. To avoi an exhaustive search in the oint space of all the sensors the coorination mechanism constrains the search by assigning priorities to the sensors. Hence while optimal from a single sensor s perspective the algorithm is not optimal across all sensors a choice that one is reasonable to assume in light of prevailing real time emans. The etails of this metho are presente in section 3 of this paper. Extensive simulation results confirm the efficacy of this strategy in the form of tabular comparisons presente in section 4. Multi-sensor surveillance fins applications such as in borer patrol, guaring of secure areas, search an rescue an warehouse surveillance [, 2]. It involves etection of multiple intrusions an/or tracking through coorination between the sensors. Detection an target tracking has been researche from multiple viewpoints. Some efforts have focuse on the problem of ientifying targets from a given set of ata through particle filters [3], an probabilistic methos [4]. The problem of ata association or assigning sensor measurements to the corresponing targets were tackle by Joint Probabilistic Data Association Filters by the same researchers such as in [3]. Kluge an others [5] use ynamic timestamps for tracking multiple targets. Krishna an Kalra [] presente clustering base approaches for target etection an further extene it to tracking an avoiance. The focus of these approaches has been on builing reliable estimators for preicting target traectories that is ifferent from the obective of this effort to maximize target etections. In the context of istribute task allocation an sensor coorination Parker propose a scheme for elegating an withrawing robots to an from targets through the ALLIANCE architecture [7]. The protocol for allocation was one base on impatience of the robot towars a target while the withrawal was base on acquiescence. Jung an Sukhatme [8] present a strategy for tracking multiple intruers through a istribute mobile sensor network an a strategy for maximizing sensor coverage[8, 9]. Lesser s group have mae significant avances to the area of istribute sensor networks [] an sensor management []. In [2] Parker presents a scheme calle A-CMOMMT where the goal is to maximize the number of targets observe over a time interval of length T base on the same philosophy of behavior-base control as in [7]. The authors of this paper present their scheme for resource allocation an coorination in a istribute sensor

2 system through a set of fuzzy rules in [3] an further compare various resource allocation strategies in terms of their etection performance in [4]. The author of [] has looke at the problem of static placement of sensors in known polygonal environments an [] escribes a istribute sensor approach to target tracking using fixe sensor locations. The current approach is isparate from those of [,] in that in the current scheme the sensors are mobile. Among the approaches that we have encountere the closest to this are [2] an [8]. In [2] a behavior-base approach, A-CMOMMT, is compare with three other heuristic approaches where the sensor s motion strategy is arbitrary or ranom in the first, stationary (the sensor oes not move) in the secon an base on local force control in the thir. In [8] a motion strategy for tracking multiple targets base on ensity estimates is presente. The robot attempts to maximize target etections by maintaining itself at a particular istance from the center of gravity of currently observe targets. In these approaches since no assumption is mae regaring target arrival statistics the motion strategy oes not guarantee sensors move to best possible locations to optimize their etections. In contrast, our approach presents a constraine optimal scheme that moves the sensor to regions in the surveillance region to maximize etections over the next T samples. The optimality of this approach comes with the traeoff of apriori knowlege regaring target statistics. Nonetheless this situation is not new in robotic an multi-robotic literature where optimal path planning an scheuling algorithms require prior knowlege of the workspace in which they operate in terms of their static an ynamic contents vis-à-vis behavior base approaches that o not guarantee optimality or completeness but require no prior knowlege. III. THE METHODOLOGY A. Description of Surveillance Zone, Sensors an Targets: We consier the surveillance system epicte in figure. The sies of the outer rectangle or the biggest rectangle in figure form the bounary of the surveillance zone the area enclose by it is the area of interest where sensors attempt to optimize their rates of etection. The shae circles are effective sensor ranges in their starting positions. The fiel of vision (FOV) of a sensor is 3 egrees. The squares with thick bounaries in figure with the sensors at their center are the inscribe squares of the circular FOV of a sensor. In other wors, the iameter of the FOV of a sensor is the iagonal of one such inscribe square. Purely from the point of view of facilitating easier computations the sensor consiers only those targets that lie within its inscribe square as targets within its FOV. It nees to be emphasize that this simplification oes not have any bearing on the overall philosophy of this approach. In the results section the efficacy of this metho is verifie by uniformly applying this same conition across all other approaches that are compare an the extension to a case of circular FOV is merely one of more involve but computable computations. The entire surveillance region is iscretize into a lattice of cells. The cells are represente as the small squares insie the FOV of the leftmost an topmost sensor. The ashe lines along the length an breath inicate that the cells procee to fill the entire surveillance zone. At each of the cell locations various aspects of target statistics are compute that are escribe later. The crosses outsie the surveillance zone are the source points from where targets emanate as per Poisson statistics. Targets percolate from each of those sources into that horizontal or vertical half-plane that contains the surveillance zone. Therefore, all targets coming from a particular source will be containe with an angular span of π raians. Furthermore, the following assumptions are mae for sensors an targets A sensor can etect all targets within its FOV or occlusion relations are not consiere. The takeoff angle of a target from its source point is uniformly istribute in [,π ] All targets move with the same uniform velocity within the surveillance zone along linear traectories, which can be ascertaine by the sensor. The last assumption allows that the statistical values of various parameters compute at every cell in the lattice to take a unique value rather than a probability istribution. In case of a istribution the expecte values of the parameters nee to be mae use of. B Problem Statement an Approach The problem attacke in this paper is state as follows. Given: N S : The set of all sensors in the system, N S = { s, s,..., sn s }, where si enotes the sensor with label i, orere in a sequence. Hence n s the label of the last enumerate sensor is also the number of sensors in the system, which is a constant. N, : The set of all targets in the system at time t, where, I t { i, i in } N I, t =,..., I, t, an n I, t is the number of targets in the system at time step t that varies at every time step an hence ynamic. gm,t : A binary variable that takes the value if a target im is observe by any one of the ns sensors at t. Obective: To evelop an algorithm such that the T ni, t following cost function J = gm, t is maximize. In t= m= other wors, the number of etections of the targets present in the system at every time step is maximize over T time steps. Approach: ) At each cell, Pi, in the lattice the following are compute. a). λˆ Pi : The expecte rate of target entry into the FOV of a sensor centere at Pi. If there are Q target sources each

3 Q θ emanating targets at rate λ then ˆ λ Pi = λ, where the π = θ ratio enotes the expecte fraction of the total number of π targets that woul enter the FOV of the sensor at Pi from the th of the Q target sources. In figure Q=8. We also enote by θ λpi, = λ the rate at which the sensor at Pi sees targets π from source. In other wors, among the targets taking off at any angle within [,π ], from source only those that takeoff within the angular span [ δ, δ + θ ] woul enter the FOV of the sensor, where δ is the smallest angle forme by the segment connecting a vertex of the FOV square an source an δ + θ is the largest angle. b) Tˆ epi : The expecte escape time for a target through the fiel of vision of the sensor centere at Pi. The escape time is essentially the time for which a target woul be in the FOV before it escapes from a sensor. c) ˆ Pi = ˆ λpitˆ epi : The number of targets expecte to be etecte by a sensor at Pi for any time step. η ) Pi, : The normalization constant at cell Pi ue to target source. This constant reners the summation of the probability istribution function (pf) of the escape time of a target through the FOV of a sensor at Pi ue to source to go to unity. In other wors if te Pi, is the ranom variable that measures the escape time of a target for a sensor at cell Pi ue to source an f ( te Pi, ) be its pf then η Pi, sees to that tb f ( te Pi, ) =, where the lower an uppe bouns of the ta integral are the minimum an maximum possible escape times. It is to be note that in general f ( te Pi, ) is not the same in [ t a, t b ] an nees to be broken into sub functions for respective time intervals for which it has the same close form representation. 2) For every sensor s in the system locate at a particular cell location P the path it takes for the next T time steps is compute such that the number of target etections is maximize base on steps 3 an 4. 3) For s currently at P compute for all cells, Pk, that are at level n, n = {,,2,..., T} from P, the expecte number of etections, n ˆ,, where the first inex, k, in the superscript refers to the cell Pk an the secon inex t enotes the time step for which it was compute. The computation is base on what s currently observes at P an the target arrival statistics, elements of which are compute in step. This computation is carrie out at the current cell P an those cells one time-step away for the next T time steps. For cells at epth two this computation is carrie T- times, corresponing to time steps starting from 2 an ening at T with T inclusive. For a cell at epth T the computation is one once for time step T alone. This results in a tree where each cell at time step t is connecte to its eight nearest cells as well as itself at t +. Thus every noe in the tree except the leaf noe is connecte to nine noes an the epth of the tree is T. Figure : The surveillance zone is represente by the outer rectangle. The sensors by shae circles, the crosses outsie are the target sources an the small squares within the FOV of top an left sensor are the iscretize cells. The ashe lines along the length an breath inicate that the cells procee to fill the entire surveillance zone. 4) On this nine connecte space-time tree perform a epthlimite search to maximize the etections with n ˆ, as the obective value of a linhat connects a current cell noe P at t- to another noe Pk for the next time step t. 5) The paths of the sensors are orere base on the number of etections. The sensor path that has the highest number of etections has the highest priority. Ties are broken ranomly. ) For overlapping FOV between sensors at certain locations in the paths the number of etections is reuce at the corresponing cell for the corresponing time-step for the sensor with lower priority. The reuction is compute as k, t k, t k, t nˆ = nˆ f nˆ. The fraction f is proportional to the area of overlaps given by the area of overlapping FOV ivie by the area of the FOV. 7) The optimal path for the sensor with the lower priority is recompute base on the upate n ˆ, values through epth limite search. For a sensor with priority p, we check for overlaps with all those sensor traectories with priorities, 2,, p-. 8) The steps two to seven are repeate until the en of simulation.

4 Step of the algorithm is performe only once at the start of the simulation across all the cells an is essentially an offline step unless the target statistics changes ynamically. B Computing n ˆ, Computation of n ˆ, varies if it is being carrie out for the same cell location for a future time or for a ifferent cell location. For the case of computing at the same cell the proceure is as follows: Given that the sensor at cell Pi currently or at t= observes n Pi number of targets then the number of targets it is likely to see T time-steps into the future is given by: Q T i, T nˆ = npi k + ˆ λpit ˆ λpi, P( tepi, < T t) = t= () Here ˆ λ Pi, te Pi,, λpi, have the same connotations as iscusse in step an Q is the number of target sources as before. The first term on the right han sie or RHS of equation () is the eterministic part that is compute purely base on what the sensor senses now. It merely states that out of n Pi particle seen currently k of them woul isappear by T time steps. The secon term onwars on the RHS enote the statistical counterpart. It says that λˆ PiT are likely to enter the FOV in T time steps an of which the number in the thir term are likely to leave the FOV by T. The thir term containing the summation is explaine as follows. P( tepi, < T t) enotes the probability that a target from source that entere the FOV at t woul have escape the FOV by T. Hence ˆλ Pi, P( tepi, < T t) is the estimate of the number of particles that entere at t an escape by T, since ˆλ P i, is the estimate of number of particles entering for every t from into the FOV of the sensor at Pi. The summation over t signifies that estimate of the number of particles that woul have left by T nees to be one in corresponence with the time at which they entere between now an T. The summation over Q signifies that the pf of te Pi, is not the same for every source at that cell location. The P( te < T t) Pi, is given below by its pf with notations from step. ; T t < ta T P( tepi, < T t) = f ( tepi, ); ta T t tb. η Pi, ta ; T t > tb The number of caniates likely to be seen for a ifferent cell Pk at T given that n Pi number of targets then the number of targets are currently seen at Pi is given by: nˆ k + κ ˆ λ PiT Q T k, T = n ˆ Pi λpi, = t= ( κ ) ˆ Pk ( < T t) P te Pi, + (2). Equation (2) has similar connotations as () except for the appearance of κ that represents the fraction of area common to FOV erecte at Pi an Pk an ˆ Pk is as iscusse in step. For that fraction of the FOV at Phat is not visible from Pi, ˆ Pk, which is the expecte number of etections at cell Pk at any instant is mae use of. An since ( κ ) is the fraction of FOV at Phat is not visible ˆ Pk is multiplie by that fraction. This makes use of the assumption that the istribution of targets is uniform across an area. In our plots of ˆ Pk one for the surveillance zone variations between cells are steep only towars the eges of the zone. A more rigorous computation involves evaluating the pf for the overlappe an non-overlappe areas separately. This is being avoie since (2) is compute uring the online phase of the algorithm. This assumption is also invoke in step while reucing the number of etections ue to overlapping FOV. C The Coorination Phase: The coorination phase prevents paths of sensors to come close to one another to avoi overlapping FOV. This is one by imposing penalties an reucing values of n ˆ, an recomputing paths for sensors with lower priorities as escribe in steps 5, an 7. The path of the sensor with highest etections is fixe. The path with the secon highest recompute if there are overlapping areas of observation with the first. The recompute path constitutes a motion strategy that is optimal in terms of etections uner the constraint that the path of highest sensor is fixe. Similarly the path of the sensor with the least priority sensor when recompute is optimal uner the constraint that the paths of the sensors with higher priority are fixe. Hence at the coorination phase the optimality of the algorithm is not complete. A fully complete algorithm woul involve a search in the oint space of all sensors that is combinatorially har.. IV SIMULATION RESULTS This section reports results obtaine through simulations on our environment evelope using Borlan s JBuiler IDE. The value of the number of time steps, T, use for these simulations is 3, carrie out on a P4 workstation with clock spee of.8 GHz. Figure 3 shows a snapshot of the environment with sensors. The current position of the sensor is shown through the bigger shae circle, while the targets through smaller ones. The traces of sensor movements are also shown. Target traces are not shown to avoi cluttering.

5 Table compares the performance of the system in the presence an absence of coorination. The experiments one with sensor coorination are labele as a, 2a,, while those without coorination are labele as b, 2b,. Each experiment laste for time steps in total. The first column of the table enotes the inex of the experiment; the secon enotes the number of sensors in the system, the thir the average etections or the number of targets etecte by atleast one sensor per sample. The fourth signifies the average fraction of targets etecte per sample, which is the number of targets etecte per sample by one or more sensors ivie by the number of targets in the surveillance zone per sample. Columns 5, an 7 represent the number of targets etecte exactly by one, two an three sensors per sample. The last column enotes the target velocity. Detections by more than three sensors are not tabulate for they generally assume insignificant values. Of particular interest in comparing the two schemes are the average fraction of target etections as well as the number of targets etecte by exactly one, two an three sensors. It is expecte that the average fraction of etections as well as the number of targets etecte by exactly one sensor to be more for the metho with coorination incorporate. Simultaneously the number of targets etecte by two or more sensors is anticipate to be higher for the metho that oes not use the coorination phase. As the overlapping areas of FOV are higher in the absence of coorination the number of targets etecte by two or more sensors is also higher. This in turn allows more targets to go unetecte an the average fraction of etections to be lesser. The abbreviations use in the column heaings are explaine in the table caption. Figure 3: A simulation system with ten sensors an several targets. The robots are shown through larger circles an targets through smaller ones. The traces of sensors are also shown. EN NS AD ZD AF DS D2S D3S TV a b a 2b a 3b a 4b a 5b Table : Comparison between motion strategies with an without sensor coorination. Experiments with labels ening in a or the first line in every row have coorination incorporate while those ening in b or the secon line in each row are uncoorinate. Abreviations are as follows: EN = experiment number, NS = number of sensors, AD = Average Detections per sample, ZD = Zero Detections per sample, AF = Average Fraction per sample, DS = Detections by exactly sensor, D2S = Detections by exactly 2 sensors, D3S = Detections by exactly 3 sensors, TV = Targets Velocity As seen from table the performance of the coorinate scheme with ecouple optimization is better for all experiments with iffering NS an TV values than the metho sans coorination. For example the number of targets etecte by exactly one sensor per sample, the DS column, is significantly higher in a number of experiments for the coorinate vis-à-vis the uncoorinate scheme. It is higher by, 4 an etections per sample in experiments, 2 an 3. Also the number of targets etecte by two sensors is significantly lesser across all experiments for the coorinate metho. In experiments an 5 the number of targets etecte by three sensors is almost one per sample for the metho lacking coorination. Corresponingly average fraction of targets etecte per sample for the coorinate metho is higher in all the experiments. The results of the table tally with the expectations an the unerlying reasons for these expectations mentione earlier. In table 2 we compare the current strategy with four of our previous methos of target etection an pursuit [4]. The first column signifies the experiments. Inexes a, 2a, etcetera correspon to the current metho. Those with inices b, c, an e correspon to coorinate-istracte, coorinate - eicate, local-istracte an local-eicate methos of resource allocation of sensors to targets for target etection [4]. Table 2 shows that across all experiments the current scheme surpasses all others in terms of average fraction of targets etecte as well as other criteria such as DS, D2S, AD an AF. It is to be note that a ifference of. in average fraction per sample between two methos correspons to a ifference of 4 or 5 target etections per sample (there are 7 to 8 targets in the zone per time-step on an average), which in turn correspons to a ifference of etections in time-steps of simulation. The value of λ was.3 an Q=8 in these simulations. V DISCUSSIONS an COMMENTS Sub-Optimality: The algorithm is mae suboptimal merely to reuce the search space involve in making it

6 globally optimal. A straightforwar implementation woul involve a irect search in the space of all sensors by extening this approach. The metho of assigning priorities to constrain the search has its counterpart in ecouple priority base approaches to multi robot path planning [7,8]. Generality an Assumptions Involve: The current approach retains its utility of optimality for any given arrival profile or arrival statistics an in that sense generalize in principle. The etails vary with respect to how equations () an (2) are compute for ifferent target statistics but the overall approach remains the same. It is not bining the algorithm that the velocities of the targets be constant an uniform. The algorithm shall continue to be optimal in a statistical sense as long as the velocity profile an irection profile is known or can be moele. Varying the velocity of the targets leas to istributions of various parameters at each gri point rather than unique values that in turn makes the optimality of algorithm less eterministic an more statistical. EN NS AD ZD AF DS D2S D3S TV a b c e a 2b 2c 2 2e 3a 3b 3c 3 3e 4a 4b 4c 4 4e 5a 5b 5c 5 5e V CONCLUSIONS Table 2: Comparison of current metho (label a) with four previous methos calle coorinate-istracte (b), coorinate-eicate (c), local-istracte () an local-eicate (e). The abreviations are same as in table. A metho for motion strategy computation of a sensor that maximizes the number of target etections for the next T-time steps is presente. The metho makes use of a-priori known statistics of target arrivals along with etections reporte for the current sample to estimate the number of etections on a lattice of cells. To reuce overlaps a coorination mechanism is specifie that performs a constraine search, where the constraints are in the form of priorities assigne to sensors. The absence of an exhaustive search in the oint space ue to the constraints reners the algorithm sub-optimal from a multi sensor perspective although optimal with respect to a single sensor in presence of those constraints. The tabulations presente in the results section vinicate the performance of the current approach in comparison to previous approaches for target etection an pursuit. The performance enhancement ue to the coorination phase that reuces overlaps in FOV between sensors is also tabulate in section IV. REFERENCES: [] S. A. Stoerer, P. E. Rybski, M. D. Erickson, M. Wyman, M. Gini, D. F. Hougen, N. Papanikolopoulos, A Robot Team for Exploration an Surveillance: Design an Architecture, Proceeings of the International Conference on Intelligent Autonomous Systems, pp , Venice, Italy, July 2. [2] H R Everett, G A Gilbraeth an R T Lair, Coorinate control of multiple security robots, Proceeings of SPIE Mobile Robots, , 993 [3] D Schulz; W Burgar, D Fox an A Cremers, Tracking multiple moving targets with a mobile robot using particle filters an statistical ata association, IEEE International Conference on Robotics an Automation, -7, 2 [4] D Schulz an W Burgar, Probabilistic state estimation of ynamic obects with a moving mobile robot, Robotics an Autonomous Systems, 2. [5] B. Kluge, C Kohler an E Prassler, Fast an robust tracking of multiple obects through a laser range finer, IEEE International Conference on Robotics an Automation, -7, 2 [] K Mahava Krishna an P K Kalra, Detection tracking an avoiance of multiple ynamic obects, Journal of Intelligent an Robotic Systems, 33(4): 37-48, 22 [7] L Parker, Cooperative robotics for multi-target observation, Intelligent Automation an Soft Computing, 5[]:5-9, 999 [8] B Jung an G.S. Sukhatme, Multi-Target Tracking using a Mobile Sensor Network, Proc., IEEE Intl. Conf. On Robotics an Automation, 22 [9] S Pouri an G S Sukhatme, Constraine Coverage for mobile sensor networks, IEEE ICRA, -7, 24 [] B Horling, R Vincent, R Miller, J Shen, R Becker, K Rawlins, an V Lesser, Distribute Sensor Network for Real Time Tracking, In Proceeings of the 5th International Conference on Autonomous Agents: , 2. [] B Horling, R Miller, M Sims, an V Lesser, Using an Maintaining Organization in a Large-Scale Distribute Sensor Network, In Proceeings of the Workshop on Autonomy, Delegation, an Control, (AAMAS 23). [2] L Parker, Distribute algorithms for multi-robot observation of multiple moving targets, Autonomous Robots, 2, 3 (22) [3] K Mahava Krishna, H Hexmoor, S Pasupuleti an S Chellappa, A Surveillance System Base on Multiple Mobile Sensors, Proceeings of FLAIRS, 24, Special Track in Sensor Fusion. [4] K Mahava Krishna an Henry Hexmoor, Resource Allocation Strategies for a Multi-sensor Surveillance System, Workshop on Collaborative Agents, [] A. J. Briggs, Efficient geometric algorithms for robot sensing an control, Ph.D. thesis, Cornell, 995 [] E H Durfee, V R Lesser an D D Corkill, Coherent cooperation among communicating problem solvers, IEEE Trans. on Computers, C-3:275-29, 987. [7]. K. Azarm an G. Schmit. Conflict-Free Motion of Multiple Mobile Robots Base on Decentralize Motion Planning an Negotiation, Proc. IEEE Int. Conf. on Robotics an Automation, p , 997. [8] M Bennewitz, W Burgar an S Thrun, Fining an optimizing solvable priority schemes for ecouple path planning techniques for teams of mobile robots, Robotics an Autonomous Systems, 4 (2), pp , 22.

`On a Tracking Scheme with Probabilistic Completeness for a Distributed Sensor Network

`On a Tracking Scheme with Probabilistic Completeness for a Distributed Sensor Network `On a Tracing Scheme with Probabilistic Completeness for a Distributed Sensor Networ K Madhava Krishna Henry Hexmoor Dept. of Computer Science and Computer Engineering University of Aransas Fayetteville,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Using the disparity space to compute occupancy grids from stereo-vision

Using the disparity space to compute occupancy grids from stereo-vision The 2010 IEEE/RSJ International Conference on Intelligent Robots an Systems October 18-22, 2010, Taipei, Taiwan Using the isparity space to compute occupancy gris from stereo-vision Mathias Perrollaz,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Module13:Interference-I Lecture 13: Interference-I

Module13:Interference-I Lecture 13: Interference-I Moule3:Interference-I Lecture 3: Interference-I Consier a situation where we superpose two waves. Naively, we woul expect the intensity (energy ensity or flux) of the resultant to be the sum of the iniviual

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Refinement of scene depth from stereo camera ego-motion parameters

Refinement of scene depth from stereo camera ego-motion parameters Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

Design of Controller for Crawling to Sitting Behavior of Infants

Design of Controller for Crawling to Sitting Behavior of Infants Design of Controller for Crawling to Sitting Behavior of Infants A Report submitte for the Semester Project To be accepte on: 29 June 2007 by Neha Priyaarshini Garg Supervisors: Luovic Righetti Prof. Auke

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Multi-camera tracking algorithm study based on information fusion

Multi-camera tracking algorithm study based on information fusion International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

Parts Assembly by Throwing Manipulation with a One-Joint Arm

Parts Assembly by Throwing Manipulation with a One-Joint Arm 21 IEEE/RSJ International Conference on Intelligent Robots an Systems, Taipei, Taiwan, October, 21. Parts Assembly by Throwing Manipulation with a One-Joint Arm Hieyuki Miyashita, Tasuku Yamawaki an Masahito

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1 Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

[2006] IEEE. Reprinted, with permission, from [Damith C. Herath, Sarath Kodagoda and Gamini Dissanayake, Simultaneous Localisation and Mapping: A

[2006] IEEE. Reprinted, with permission, from [Damith C. Herath, Sarath Kodagoda and Gamini Dissanayake, Simultaneous Localisation and Mapping: A [6] IEEE. Reprinte, with permission, from [Damith C. Herath, Sarath Koagoa an Gamini Dissanayake, Simultaneous Localisation an Mapping: A Stereo Vision Base Approach, Intelligent Robots an Systems, 6 IEEE/RSJ

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Real Time On Board Stereo Camera Pose through Image Registration*

Real Time On Board Stereo Camera Pose through Image Registration* 28 IEEE Intelligent Vehicles Symposium Einhoven University of Technology Einhoven, The Netherlans, June 4-6, 28 Real Time On Boar Stereo Camera Pose through Image Registration* Fai Dornaika French National

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target .IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information