A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System
|
|
- Derrick Eric Snow
- 5 years ago
- Views:
Transcription
1 A T-Step Ahea Constraine Optimal Target Detection Algorithm for a Multi Sensor Surveillance System K Mahava Krishna Henry Hexmoor an Shravan Sogani International Institute of Information Technology CSCE Department, University of Arkansas Hyeraba 5 9, INDIA Fayetteville, AR 727 mkrishna@iiit.ac.in hexmoor@uark.eu Abstract We present a methoology for optimal target etection in a multi sensor surveillance system. The system consists of mobile sensors that guar a rectangular surveillance zone crisscrosse by moving targets. Targets penetrate the surveillance zone with poisson rates at uniform velocities. Uner these conitions we present a motion strategy computation for each sensor such that it maximizes target etection for the next T time-steps. A coorination mechanism among sensors ensures that overlapping an overlooke regions of observation among sensors are minimize. This coorination mechanism is interleave with the motion strategy computation to reuce etections of the same target by more than one sensor for the same time-step. To avoi an exhaustive search in the oint space of all the sensors the coorination mechanism constrains the search by assigning priorities to the sensors an thereby arbitrating among sensory tasks. A comparison of this methoology with other multi target tracking schemes verifies its efficacy in maximizing etections. Sample an time-step are use equivalently an interchangeably in this paper. Inex Terms- multi sensor system, optimal target etection, sensor network, sensor surveillance, multi-agent system I INTRODUCTION We present a framework for maximizing target etections in a surveillance system consisting of multiple mobile sensors (i.e., robots). The sensors collectively guar a rectangular surveillance zone crisscrosse by moving targets. A-priori information about targets is the knowlege of their poisson rates of entry. Current knowlege about all targets within the sensing range of a sensor is available to the sensor in the form of the target velocity information an motion irection. While current information is use in eterministically computing the best places to be at in the subsequent time steps, it oes not take into account the changes in the environment that occur ue to consistent flow of target traffic into an out of the surveillance zone. Knowlege of the statistics of target entry an exit on the other han are use to compute the statistically optimal places to be at in the future from a given location, but oes not consier the current information gleane through sensor observations. Hence a combination of both current target information an target statistics is use to compute a motion strategy of a sensor that maximizes the number of etections for the next T time steps. Computing the best strategy from its iniviual perspective can result in motions for each sensor with overlapping regions of observation. A priority base coorination mechanism is interleave with the motion strategy computation to reuce etections of the same target by more than one sensor. To avoi an exhaustive search in the oint space of all the sensors the coorination mechanism constrains the search by assigning priorities to the sensors. Hence while optimal from a single sensor s perspective the algorithm is not optimal across all sensors a choice that one is reasonable to assume in light of prevailing real time emans. The etails of this metho are presente in section 3 of this paper. Extensive simulation results confirm the efficacy of this strategy in the form of tabular comparisons presente in section 4. Multi-sensor surveillance fins applications such as in borer patrol, guaring of secure areas, search an rescue an warehouse surveillance [, 2]. It involves etection of multiple intrusions an/or tracking through coorination between the sensors. Detection an target tracking has been researche from multiple viewpoints. Some efforts have focuse on the problem of ientifying targets from a given set of ata through particle filters [3], an probabilistic methos [4]. The problem of ata association or assigning sensor measurements to the corresponing targets were tackle by Joint Probabilistic Data Association Filters by the same researchers such as in [3]. Kluge an others [5] use ynamic timestamps for tracking multiple targets. Krishna an Kalra [] presente clustering base approaches for target etection an further extene it to tracking an avoiance. The focus of these approaches has been on builing reliable estimators for preicting target traectories that is ifferent from the obective of this effort to maximize target etections. In the context of istribute task allocation an sensor coorination Parker propose a scheme for elegating an withrawing robots to an from targets through the ALLIANCE architecture [7]. The protocol for allocation was one base on impatience of the robot towars a target while the withrawal was base on acquiescence. Jung an Sukhatme [8] present a strategy for tracking multiple intruers through a istribute mobile sensor network an a strategy for maximizing sensor coverage[8, 9]. Lesser s group have mae significant avances to the area of istribute sensor networks [] an sensor management []. In [2] Parker presents a scheme calle A-CMOMMT where the goal is to maximize the number of targets observe over a time interval of length T base on the same philosophy of behavior-base control as in [7]. The authors of this paper present their scheme for resource allocation an coorination in a istribute sensor
2 system through a set of fuzzy rules in [3] an further compare various resource allocation strategies in terms of their etection performance in [4]. The author of [] has looke at the problem of static placement of sensors in known polygonal environments an [] escribes a istribute sensor approach to target tracking using fixe sensor locations. The current approach is isparate from those of [,] in that in the current scheme the sensors are mobile. Among the approaches that we have encountere the closest to this are [2] an [8]. In [2] a behavior-base approach, A-CMOMMT, is compare with three other heuristic approaches where the sensor s motion strategy is arbitrary or ranom in the first, stationary (the sensor oes not move) in the secon an base on local force control in the thir. In [8] a motion strategy for tracking multiple targets base on ensity estimates is presente. The robot attempts to maximize target etections by maintaining itself at a particular istance from the center of gravity of currently observe targets. In these approaches since no assumption is mae regaring target arrival statistics the motion strategy oes not guarantee sensors move to best possible locations to optimize their etections. In contrast, our approach presents a constraine optimal scheme that moves the sensor to regions in the surveillance region to maximize etections over the next T samples. The optimality of this approach comes with the traeoff of apriori knowlege regaring target statistics. Nonetheless this situation is not new in robotic an multi-robotic literature where optimal path planning an scheuling algorithms require prior knowlege of the workspace in which they operate in terms of their static an ynamic contents vis-à-vis behavior base approaches that o not guarantee optimality or completeness but require no prior knowlege. III. THE METHODOLOGY A. Description of Surveillance Zone, Sensors an Targets: We consier the surveillance system epicte in figure. The sies of the outer rectangle or the biggest rectangle in figure form the bounary of the surveillance zone the area enclose by it is the area of interest where sensors attempt to optimize their rates of etection. The shae circles are effective sensor ranges in their starting positions. The fiel of vision (FOV) of a sensor is 3 egrees. The squares with thick bounaries in figure with the sensors at their center are the inscribe squares of the circular FOV of a sensor. In other wors, the iameter of the FOV of a sensor is the iagonal of one such inscribe square. Purely from the point of view of facilitating easier computations the sensor consiers only those targets that lie within its inscribe square as targets within its FOV. It nees to be emphasize that this simplification oes not have any bearing on the overall philosophy of this approach. In the results section the efficacy of this metho is verifie by uniformly applying this same conition across all other approaches that are compare an the extension to a case of circular FOV is merely one of more involve but computable computations. The entire surveillance region is iscretize into a lattice of cells. The cells are represente as the small squares insie the FOV of the leftmost an topmost sensor. The ashe lines along the length an breath inicate that the cells procee to fill the entire surveillance zone. At each of the cell locations various aspects of target statistics are compute that are escribe later. The crosses outsie the surveillance zone are the source points from where targets emanate as per Poisson statistics. Targets percolate from each of those sources into that horizontal or vertical half-plane that contains the surveillance zone. Therefore, all targets coming from a particular source will be containe with an angular span of π raians. Furthermore, the following assumptions are mae for sensors an targets A sensor can etect all targets within its FOV or occlusion relations are not consiere. The takeoff angle of a target from its source point is uniformly istribute in [,π ] All targets move with the same uniform velocity within the surveillance zone along linear traectories, which can be ascertaine by the sensor. The last assumption allows that the statistical values of various parameters compute at every cell in the lattice to take a unique value rather than a probability istribution. In case of a istribution the expecte values of the parameters nee to be mae use of. B Problem Statement an Approach The problem attacke in this paper is state as follows. Given: N S : The set of all sensors in the system, N S = { s, s,..., sn s }, where si enotes the sensor with label i, orere in a sequence. Hence n s the label of the last enumerate sensor is also the number of sensors in the system, which is a constant. N, : The set of all targets in the system at time t, where, I t { i, i in } N I, t =,..., I, t, an n I, t is the number of targets in the system at time step t that varies at every time step an hence ynamic. gm,t : A binary variable that takes the value if a target im is observe by any one of the ns sensors at t. Obective: To evelop an algorithm such that the T ni, t following cost function J = gm, t is maximize. In t= m= other wors, the number of etections of the targets present in the system at every time step is maximize over T time steps. Approach: ) At each cell, Pi, in the lattice the following are compute. a). λˆ Pi : The expecte rate of target entry into the FOV of a sensor centere at Pi. If there are Q target sources each
3 Q θ emanating targets at rate λ then ˆ λ Pi = λ, where the π = θ ratio enotes the expecte fraction of the total number of π targets that woul enter the FOV of the sensor at Pi from the th of the Q target sources. In figure Q=8. We also enote by θ λpi, = λ the rate at which the sensor at Pi sees targets π from source. In other wors, among the targets taking off at any angle within [,π ], from source only those that takeoff within the angular span [ δ, δ + θ ] woul enter the FOV of the sensor, where δ is the smallest angle forme by the segment connecting a vertex of the FOV square an source an δ + θ is the largest angle. b) Tˆ epi : The expecte escape time for a target through the fiel of vision of the sensor centere at Pi. The escape time is essentially the time for which a target woul be in the FOV before it escapes from a sensor. c) ˆ Pi = ˆ λpitˆ epi : The number of targets expecte to be etecte by a sensor at Pi for any time step. η ) Pi, : The normalization constant at cell Pi ue to target source. This constant reners the summation of the probability istribution function (pf) of the escape time of a target through the FOV of a sensor at Pi ue to source to go to unity. In other wors if te Pi, is the ranom variable that measures the escape time of a target for a sensor at cell Pi ue to source an f ( te Pi, ) be its pf then η Pi, sees to that tb f ( te Pi, ) =, where the lower an uppe bouns of the ta integral are the minimum an maximum possible escape times. It is to be note that in general f ( te Pi, ) is not the same in [ t a, t b ] an nees to be broken into sub functions for respective time intervals for which it has the same close form representation. 2) For every sensor s in the system locate at a particular cell location P the path it takes for the next T time steps is compute such that the number of target etections is maximize base on steps 3 an 4. 3) For s currently at P compute for all cells, Pk, that are at level n, n = {,,2,..., T} from P, the expecte number of etections, n ˆ,, where the first inex, k, in the superscript refers to the cell Pk an the secon inex t enotes the time step for which it was compute. The computation is base on what s currently observes at P an the target arrival statistics, elements of which are compute in step. This computation is carrie out at the current cell P an those cells one time-step away for the next T time steps. For cells at epth two this computation is carrie T- times, corresponing to time steps starting from 2 an ening at T with T inclusive. For a cell at epth T the computation is one once for time step T alone. This results in a tree where each cell at time step t is connecte to its eight nearest cells as well as itself at t +. Thus every noe in the tree except the leaf noe is connecte to nine noes an the epth of the tree is T. Figure : The surveillance zone is represente by the outer rectangle. The sensors by shae circles, the crosses outsie are the target sources an the small squares within the FOV of top an left sensor are the iscretize cells. The ashe lines along the length an breath inicate that the cells procee to fill the entire surveillance zone. 4) On this nine connecte space-time tree perform a epthlimite search to maximize the etections with n ˆ, as the obective value of a linhat connects a current cell noe P at t- to another noe Pk for the next time step t. 5) The paths of the sensors are orere base on the number of etections. The sensor path that has the highest number of etections has the highest priority. Ties are broken ranomly. ) For overlapping FOV between sensors at certain locations in the paths the number of etections is reuce at the corresponing cell for the corresponing time-step for the sensor with lower priority. The reuction is compute as k, t k, t k, t nˆ = nˆ f nˆ. The fraction f is proportional to the area of overlaps given by the area of overlapping FOV ivie by the area of the FOV. 7) The optimal path for the sensor with the lower priority is recompute base on the upate n ˆ, values through epth limite search. For a sensor with priority p, we check for overlaps with all those sensor traectories with priorities, 2,, p-. 8) The steps two to seven are repeate until the en of simulation.
4 Step of the algorithm is performe only once at the start of the simulation across all the cells an is essentially an offline step unless the target statistics changes ynamically. B Computing n ˆ, Computation of n ˆ, varies if it is being carrie out for the same cell location for a future time or for a ifferent cell location. For the case of computing at the same cell the proceure is as follows: Given that the sensor at cell Pi currently or at t= observes n Pi number of targets then the number of targets it is likely to see T time-steps into the future is given by: Q T i, T nˆ = npi k + ˆ λpit ˆ λpi, P( tepi, < T t) = t= () Here ˆ λ Pi, te Pi,, λpi, have the same connotations as iscusse in step an Q is the number of target sources as before. The first term on the right han sie or RHS of equation () is the eterministic part that is compute purely base on what the sensor senses now. It merely states that out of n Pi particle seen currently k of them woul isappear by T time steps. The secon term onwars on the RHS enote the statistical counterpart. It says that λˆ PiT are likely to enter the FOV in T time steps an of which the number in the thir term are likely to leave the FOV by T. The thir term containing the summation is explaine as follows. P( tepi, < T t) enotes the probability that a target from source that entere the FOV at t woul have escape the FOV by T. Hence ˆλ Pi, P( tepi, < T t) is the estimate of the number of particles that entere at t an escape by T, since ˆλ P i, is the estimate of number of particles entering for every t from into the FOV of the sensor at Pi. The summation over t signifies that estimate of the number of particles that woul have left by T nees to be one in corresponence with the time at which they entere between now an T. The summation over Q signifies that the pf of te Pi, is not the same for every source at that cell location. The P( te < T t) Pi, is given below by its pf with notations from step. ; T t < ta T P( tepi, < T t) = f ( tepi, ); ta T t tb. η Pi, ta ; T t > tb The number of caniates likely to be seen for a ifferent cell Pk at T given that n Pi number of targets then the number of targets are currently seen at Pi is given by: nˆ k + κ ˆ λ PiT Q T k, T = n ˆ Pi λpi, = t= ( κ ) ˆ Pk ( < T t) P te Pi, + (2). Equation (2) has similar connotations as () except for the appearance of κ that represents the fraction of area common to FOV erecte at Pi an Pk an ˆ Pk is as iscusse in step. For that fraction of the FOV at Phat is not visible from Pi, ˆ Pk, which is the expecte number of etections at cell Pk at any instant is mae use of. An since ( κ ) is the fraction of FOV at Phat is not visible ˆ Pk is multiplie by that fraction. This makes use of the assumption that the istribution of targets is uniform across an area. In our plots of ˆ Pk one for the surveillance zone variations between cells are steep only towars the eges of the zone. A more rigorous computation involves evaluating the pf for the overlappe an non-overlappe areas separately. This is being avoie since (2) is compute uring the online phase of the algorithm. This assumption is also invoke in step while reucing the number of etections ue to overlapping FOV. C The Coorination Phase: The coorination phase prevents paths of sensors to come close to one another to avoi overlapping FOV. This is one by imposing penalties an reucing values of n ˆ, an recomputing paths for sensors with lower priorities as escribe in steps 5, an 7. The path of the sensor with highest etections is fixe. The path with the secon highest recompute if there are overlapping areas of observation with the first. The recompute path constitutes a motion strategy that is optimal in terms of etections uner the constraint that the path of highest sensor is fixe. Similarly the path of the sensor with the least priority sensor when recompute is optimal uner the constraint that the paths of the sensors with higher priority are fixe. Hence at the coorination phase the optimality of the algorithm is not complete. A fully complete algorithm woul involve a search in the oint space of all sensors that is combinatorially har.. IV SIMULATION RESULTS This section reports results obtaine through simulations on our environment evelope using Borlan s JBuiler IDE. The value of the number of time steps, T, use for these simulations is 3, carrie out on a P4 workstation with clock spee of.8 GHz. Figure 3 shows a snapshot of the environment with sensors. The current position of the sensor is shown through the bigger shae circle, while the targets through smaller ones. The traces of sensor movements are also shown. Target traces are not shown to avoi cluttering.
5 Table compares the performance of the system in the presence an absence of coorination. The experiments one with sensor coorination are labele as a, 2a,, while those without coorination are labele as b, 2b,. Each experiment laste for time steps in total. The first column of the table enotes the inex of the experiment; the secon enotes the number of sensors in the system, the thir the average etections or the number of targets etecte by atleast one sensor per sample. The fourth signifies the average fraction of targets etecte per sample, which is the number of targets etecte per sample by one or more sensors ivie by the number of targets in the surveillance zone per sample. Columns 5, an 7 represent the number of targets etecte exactly by one, two an three sensors per sample. The last column enotes the target velocity. Detections by more than three sensors are not tabulate for they generally assume insignificant values. Of particular interest in comparing the two schemes are the average fraction of target etections as well as the number of targets etecte by exactly one, two an three sensors. It is expecte that the average fraction of etections as well as the number of targets etecte by exactly one sensor to be more for the metho with coorination incorporate. Simultaneously the number of targets etecte by two or more sensors is anticipate to be higher for the metho that oes not use the coorination phase. As the overlapping areas of FOV are higher in the absence of coorination the number of targets etecte by two or more sensors is also higher. This in turn allows more targets to go unetecte an the average fraction of etections to be lesser. The abbreviations use in the column heaings are explaine in the table caption. Figure 3: A simulation system with ten sensors an several targets. The robots are shown through larger circles an targets through smaller ones. The traces of sensors are also shown. EN NS AD ZD AF DS D2S D3S TV a b a 2b a 3b a 4b a 5b Table : Comparison between motion strategies with an without sensor coorination. Experiments with labels ening in a or the first line in every row have coorination incorporate while those ening in b or the secon line in each row are uncoorinate. Abreviations are as follows: EN = experiment number, NS = number of sensors, AD = Average Detections per sample, ZD = Zero Detections per sample, AF = Average Fraction per sample, DS = Detections by exactly sensor, D2S = Detections by exactly 2 sensors, D3S = Detections by exactly 3 sensors, TV = Targets Velocity As seen from table the performance of the coorinate scheme with ecouple optimization is better for all experiments with iffering NS an TV values than the metho sans coorination. For example the number of targets etecte by exactly one sensor per sample, the DS column, is significantly higher in a number of experiments for the coorinate vis-à-vis the uncoorinate scheme. It is higher by, 4 an etections per sample in experiments, 2 an 3. Also the number of targets etecte by two sensors is significantly lesser across all experiments for the coorinate metho. In experiments an 5 the number of targets etecte by three sensors is almost one per sample for the metho lacking coorination. Corresponingly average fraction of targets etecte per sample for the coorinate metho is higher in all the experiments. The results of the table tally with the expectations an the unerlying reasons for these expectations mentione earlier. In table 2 we compare the current strategy with four of our previous methos of target etection an pursuit [4]. The first column signifies the experiments. Inexes a, 2a, etcetera correspon to the current metho. Those with inices b, c, an e correspon to coorinate-istracte, coorinate - eicate, local-istracte an local-eicate methos of resource allocation of sensors to targets for target etection [4]. Table 2 shows that across all experiments the current scheme surpasses all others in terms of average fraction of targets etecte as well as other criteria such as DS, D2S, AD an AF. It is to be note that a ifference of. in average fraction per sample between two methos correspons to a ifference of 4 or 5 target etections per sample (there are 7 to 8 targets in the zone per time-step on an average), which in turn correspons to a ifference of etections in time-steps of simulation. The value of λ was.3 an Q=8 in these simulations. V DISCUSSIONS an COMMENTS Sub-Optimality: The algorithm is mae suboptimal merely to reuce the search space involve in making it
6 globally optimal. A straightforwar implementation woul involve a irect search in the space of all sensors by extening this approach. The metho of assigning priorities to constrain the search has its counterpart in ecouple priority base approaches to multi robot path planning [7,8]. Generality an Assumptions Involve: The current approach retains its utility of optimality for any given arrival profile or arrival statistics an in that sense generalize in principle. The etails vary with respect to how equations () an (2) are compute for ifferent target statistics but the overall approach remains the same. It is not bining the algorithm that the velocities of the targets be constant an uniform. The algorithm shall continue to be optimal in a statistical sense as long as the velocity profile an irection profile is known or can be moele. Varying the velocity of the targets leas to istributions of various parameters at each gri point rather than unique values that in turn makes the optimality of algorithm less eterministic an more statistical. EN NS AD ZD AF DS D2S D3S TV a b c e a 2b 2c 2 2e 3a 3b 3c 3 3e 4a 4b 4c 4 4e 5a 5b 5c 5 5e V CONCLUSIONS Table 2: Comparison of current metho (label a) with four previous methos calle coorinate-istracte (b), coorinate-eicate (c), local-istracte () an local-eicate (e). The abreviations are same as in table. A metho for motion strategy computation of a sensor that maximizes the number of target etections for the next T-time steps is presente. The metho makes use of a-priori known statistics of target arrivals along with etections reporte for the current sample to estimate the number of etections on a lattice of cells. To reuce overlaps a coorination mechanism is specifie that performs a constraine search, where the constraints are in the form of priorities assigne to sensors. The absence of an exhaustive search in the oint space ue to the constraints reners the algorithm sub-optimal from a multi sensor perspective although optimal with respect to a single sensor in presence of those constraints. The tabulations presente in the results section vinicate the performance of the current approach in comparison to previous approaches for target etection an pursuit. The performance enhancement ue to the coorination phase that reuces overlaps in FOV between sensors is also tabulate in section IV. REFERENCES: [] S. A. Stoerer, P. E. Rybski, M. D. Erickson, M. Wyman, M. Gini, D. F. Hougen, N. Papanikolopoulos, A Robot Team for Exploration an Surveillance: Design an Architecture, Proceeings of the International Conference on Intelligent Autonomous Systems, pp , Venice, Italy, July 2. [2] H R Everett, G A Gilbraeth an R T Lair, Coorinate control of multiple security robots, Proceeings of SPIE Mobile Robots, , 993 [3] D Schulz; W Burgar, D Fox an A Cremers, Tracking multiple moving targets with a mobile robot using particle filters an statistical ata association, IEEE International Conference on Robotics an Automation, -7, 2 [4] D Schulz an W Burgar, Probabilistic state estimation of ynamic obects with a moving mobile robot, Robotics an Autonomous Systems, 2. [5] B. Kluge, C Kohler an E Prassler, Fast an robust tracking of multiple obects through a laser range finer, IEEE International Conference on Robotics an Automation, -7, 2 [] K Mahava Krishna an P K Kalra, Detection tracking an avoiance of multiple ynamic obects, Journal of Intelligent an Robotic Systems, 33(4): 37-48, 22 [7] L Parker, Cooperative robotics for multi-target observation, Intelligent Automation an Soft Computing, 5[]:5-9, 999 [8] B Jung an G.S. Sukhatme, Multi-Target Tracking using a Mobile Sensor Network, Proc., IEEE Intl. Conf. On Robotics an Automation, 22 [9] S Pouri an G S Sukhatme, Constraine Coverage for mobile sensor networks, IEEE ICRA, -7, 24 [] B Horling, R Vincent, R Miller, J Shen, R Becker, K Rawlins, an V Lesser, Distribute Sensor Network for Real Time Tracking, In Proceeings of the 5th International Conference on Autonomous Agents: , 2. [] B Horling, R Miller, M Sims, an V Lesser, Using an Maintaining Organization in a Large-Scale Distribute Sensor Network, In Proceeings of the Workshop on Autonomy, Delegation, an Control, (AAMAS 23). [2] L Parker, Distribute algorithms for multi-robot observation of multiple moving targets, Autonomous Robots, 2, 3 (22) [3] K Mahava Krishna, H Hexmoor, S Pasupuleti an S Chellappa, A Surveillance System Base on Multiple Mobile Sensors, Proceeings of FLAIRS, 24, Special Track in Sensor Fusion. [4] K Mahava Krishna an Henry Hexmoor, Resource Allocation Strategies for a Multi-sensor Surveillance System, Workshop on Collaborative Agents, [] A. J. Briggs, Efficient geometric algorithms for robot sensing an control, Ph.D. thesis, Cornell, 995 [] E H Durfee, V R Lesser an D D Corkill, Coherent cooperation among communicating problem solvers, IEEE Trans. on Computers, C-3:275-29, 987. [7]. K. Azarm an G. Schmit. Conflict-Free Motion of Multiple Mobile Robots Base on Decentralize Motion Planning an Negotiation, Proc. IEEE Int. Conf. on Robotics an Automation, p , 997. [8] M Bennewitz, W Burgar an S Thrun, Fining an optimizing solvable priority schemes for ecouple path planning techniques for teams of mobile robots, Robotics an Autonomous Systems, 4 (2), pp , 22.
`On a Tracking Scheme with Probabilistic Completeness for a Distributed Sensor Network
`On a Tracing Scheme with Probabilistic Completeness for a Distributed Sensor Networ K Madhava Krishna Henry Hexmoor Dept. of Computer Science and Computer Engineering University of Aransas Fayetteville,
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationUsing the disparity space to compute occupancy grids from stereo-vision
The 2010 IEEE/RSJ International Conference on Intelligent Robots an Systems October 18-22, 2010, Taipei, Taiwan Using the isparity space to compute occupancy gris from stereo-vision Mathias Perrollaz,
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationModule13:Interference-I Lecture 13: Interference-I
Moule3:Interference-I Lecture 3: Interference-I Consier a situation where we superpose two waves. Naively, we woul expect the intensity (energy ensity or flux) of the resultant to be the sum of the iniviual
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationRefinement of scene depth from stereo camera ego-motion parameters
Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationClassical Mechanics Examples (Lagrange Multipliers)
Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationParallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm
NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationA Versatile Model-Based Visibility Measure for Geometric Primitives
A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty
More informationAN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY
AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationFast Window Based Stereo Matching for 3D Scene Reconstruction
The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationRobust Camera Calibration for an Autonomous Underwater Vehicle
obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of
More informationComparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography
Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In
More informationDesign of Controller for Crawling to Sitting Behavior of Infants
Design of Controller for Crawling to Sitting Behavior of Infants A Report submitte for the Semester Project To be accepte on: 29 June 2007 by Neha Priyaarshini Garg Supervisors: Luovic Righetti Prof. Auke
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationCalculation on diffraction aperture of cube corner retroreflector
November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationPolygon Simplification by Minimizing Convex Corners
Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationCoordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks
Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationMulti-camera tracking algorithm study based on information fusion
International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationComputer Graphics Chapter 7 Three-Dimensional Viewing Viewing
Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationEXACT SIMULATION OF A BOOLEAN MODEL
Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationParts Assembly by Throwing Manipulation with a One-Joint Arm
21 IEEE/RSJ International Conference on Intelligent Robots an Systems, Taipei, Taiwan, October, 21. Parts Assembly by Throwing Manipulation with a One-Joint Arm Hieyuki Miyashita, Tasuku Yamawaki an Masahito
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationUsing Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1
Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationPerformance Modelling of Necklace Hypercubes
erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationData Mining: Clustering
Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity
More informationNavigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More information[2006] IEEE. Reprinted, with permission, from [Damith C. Herath, Sarath Kodagoda and Gamini Dissanayake, Simultaneous Localisation and Mapping: A
[6] IEEE. Reprinte, with permission, from [Damith C. Herath, Sarath Koagoa an Gamini Dissanayake, Simultaneous Localisation an Mapping: A Stereo Vision Base Approach, Intelligent Robots an Systems, 6 IEEE/RSJ
More informationImproving Performance of Sparse Matrix-Vector Multiplication
Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign
More informationReal Time On Board Stereo Camera Pose through Image Registration*
28 IEEE Intelligent Vehicles Symposium Einhoven University of Technology Einhoven, The Netherlans, June 4-6, 28 Real Time On Boar Stereo Camera Pose through Image Registration* Fai Dornaika French National
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationTechnical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationGenetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target
.IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationDepth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique
17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi
More information