A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

Size: px
Start display at page:

Download "A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions"

Transcription

1 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing Functions Jing Li and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dong Chuan Rd., Shanghai , China Emai: {jingee, bu}@sjtu.edu.cn Abstract In this paper, we show that the shape, size and ocation of the receptive fied around each instance are different and decided by the distribution of training data in a min-max moduar network with Gaussian-zero-crossing functions. Based on this property, we propose a new supervised custering agorithm which has the foowing features: First, the incrementa custering abiity, which means the number of custers need not to be predefined, it can grow up automaticay, aso, the training data need not to be processed iterativey; Second, attaching more importance to border instances than non-border instances, which guarantees the good generaization performance and training data reduction ratio; Third, outier remova abiity, which removes noise instances from training data; Last, custer combination abiity, which reduces the number of custers further. Experiments on an artificia probem and severa reaword appications demonstrate these attractive features of our new custering agorithm. I. INTRODUCTION Custer anaysis aims to organize a coection of data items into custers, such that items within a custer are more simiar to each other than they are to items in the other custers [3]. If there is no information avaiabe concerning the membership of data items to predefined casses, the corresponding custer anaysis, such as the we-known k- means [16] or sef-organizing map (SOM) [5], is caed unsupervised custering. But in many cases a sma amount of knowedge is avaiabe concerning either pairwise constraints between data items or cass abes for some items. This information can be used to guide or adjust the custering process. The corresponding approach is caed semi-supervised custering [3], such as semi-supervised custering by seeding [1]. If the cass abes of a the data item are avaiabe, the custer anaysis beongs to supervised custering, such as eaning vector quantization (LVQ) [6] and correation custering [2]. Supervised custering may be very usefu as a preprocessing to reduce training data set for further cassification, since in rea-word appications the training data set are aways too arge for traditiona cassifiers. In many rea-word appications, training data often become avaiabe in sma and separate batches at different times. A custering agorithm must have the incrementa earning abiity to dea with this situation. But soving custering probems through optimization is NP-compete in most cases [14], many custering methods, such as k-means, SOM and LVQ, have to use heuristic agorithms. They need predefine the number of custers and process a the training data set iterativey, which make the incrementa earning abiity unattainabe. A straightforward approach of incrementay custering data points is to group a new instance into an existing custer that is cosest to it or make the new instance as a new custer. However, there exists the probem of how to decide in which circumstance the new instance shoud be grouped into an existing custer and in which circumstance it shoud be treat as a new custer. Li et a. have proposed a supervised custering agorithm caed Custering and Cassification Agorithm- Supervised (CCAS) [7], [8] to sove this probem. CCAS divide input space into some grid ces, ony instances in the same grid ce can be custered. But the probem of choosing the number of grid ces is sti unsoved. On the other hand, Lu et a. have proposed min-max moduar network with Gaussian-zero-crossing functions (M 3 - GZC) [9], [10] which has ocay tuned response characteristic and emergent incrementa earning abiity. In this paper, we anayze the properties of receptive fied around each instance in M 3 -GZC network. We discover that the shape, size and ocation of each receptive fied are determined by the distribution of training data. The receptive fied can be viewed as the grid ces in input space and can be used as a criterion to decide whether the new instance shoud be grouped into an existing custer or shoud be treat as a new custer. Aso, we find the receptive fieds around border instances are smaer than that around non-border instances in M 3 -GZC network, which means the corresponding custering agorithm wi generate more custers near the border and ess custers far from the border. More custers near the border guarantees that the distortion of border instances is smaer whie ess custers far from the border guarantees the higher reduction ratio of training data. We do not discard the non-border instances for further reduction because in the incrementa earning process the non-border instances may become border instances after more training data avaiabe, discarding them may ead to great and unwanted changes to the decision boundaries. Since not a the non-border instance wi become border instance in future, we pay ess attention to them than the instances that are aready border instances. The remainder of the paper is organized as foows. In Section II, M 3 -GZC network is introduced briefy. In Section III, we anayze the properties of receptive fied in M 3 -GZC network. Based on these properties, our supervised custering method is proposed in Section IV, post-processing incuding /06/$20.00/ 2006 IEEE 786

2 outier remova and custer combination are aso presented in this section. Experimenta resuts on an artificia probem and severa rea-word appications are isted in Section V. Finay, concusions are given in Section VI. II. MIN-MAX MODULAR NETWORK WITH GZC FUNCTION A. Min-Max Moduar Network Let T be the training set for a K-cass probem, T = {(X, D )} L =1 (1) where X R n is the input vector, D R K is the desired output, and L is the tota number of training data. According to the min-max moduar network [11], [12], a K-cass probem defined in equation (1) can be divided into K (K 1) two-cass probems that are trained independenty. The decomposition process is described as foowing. First we divide the input vectors into K subsets according to cass reations. { X i = X (i) } Li =1, for i = 1, 2,..., K (2) where L i is the number of data of X i, a of X (i) ɛx i have the same desired outputs, and K i=1 L i = L. Then we combine X i and X j as the training set of a two-cass probem T i,j, {( T ij = X (i), 1 e )} Li =1 {( X (j), e )} Lj =1 for i, j = 1,..., K and j i (3) After these two-cass probems are trained in parae, they are integrated according to a modue combination rue, namey the minimization principe. T i (x) = K min j=1 T ij(x) (4) where T ij (x) denotes the transfer function of the trained network corresponding to the two-cass subprobem T ij, and T i (x) denotes the transfer function of distinguish cass i from other casses. If these two-cass probems are sti in arge-scae or imbaanced, they can be further decomposed into reativey smaer two-cass probems. Suppose the training set X i defined in equation (2) is partitioned into N i (1 N i L i ) subsets in the form X ij = {X (ij) } L(j) i =1, for j = 1,..., N i (5) where L (j) i is the number of data of X ij, and Ni j=1 X ij = X i. The training set of each smaer two-cass probem can be given by T (u,v) ij = {( X (iu) )} (u) L {( )} (v) i L, 1 e X (jv) j, e =1 =1 for u = 1,..., N i, u = 1,..., N j, i, j = 1,..., K and j i (6) where X (iu) X iu and X (jv) X jv are the input vectors beonging to cass C i and C j, respectivey. After these smaer two-cass probems T (u,v) ij have been trained, they wi be integrated according to the minimization principe and maximization principe, respectivey, as foows: T (u) ij B. M 3 -GZC Network (x) = Nj min v=1 T (u,v) ij (x) (7) T ij (x) = max Ni T (u) u=1 ij (x) (8) Suppose the training set of each subprobem has ony two different instances, then they can be separated by a Gaussian zero-crossing discriminate function [9] defined by [ ( ) ] 2 x ci f ij (x) = exp σ [ ( ) ] 2 x cj exp (9) σ where x is the input vector, c i and c j are the given training inputs beonging to cass C i and cass C j (i j), respectivey, σ = λ c i c j, and λ is a user-defined constant. The output of M 3 -GZC network is defined as foows: 1 if y i (x) > θ i g i (x) = Unknown if θ j y i (x) θ i (10) 1 if y i (x) < θ j where θ i and θ j are the threshod imits of cass C i and C j, respectivey, and y i denotes the transfer function of the M 3 network for cass C i, which discriminates the pattern of the M 3 network for cass C i from those of the rest of the casses. From equations (9) and (10), we can see that the interpoation and extrapoation capabiities can be easiy controed by seecting different vaues of threshod imits, as shown in Fig.1. And in the next section, we wi further anayze the reationship between threshod imits and decision boundaries. III. PROPERTIES OF RECEPTIVE FIELD IN M 3 -GZC NETWORK Definition 1) Receptive Fied: the input space that can be cassified to one cass in a M 3 -GZC network. RF = {x xɛr n, i, g i (x) = 1} (11) Lemma 1: Suppose there are ony two instances c i and c j, and we ony concentrate on the receptive fied around c i. Then the reationship between the ongest receptive fied radius r max and the distance between c i and c j can be expressed as r max = k 1 c i c j (12) where k 1 is ony correated with λ and θ i. Proof: According to the axiom of norm, the foowing equation is satisfied. c i c j x c i x c j c i c j + x c i (13) 787

3 Proof: Suppose RF i,j is the receptive fied around instance c i based on c i and c j, according to Lemma 1, the radius r j of RF i,j satisfies the foowing inequaity k 2 c i c j r j k 1 c i c j (18) (c) Fig. 1. Decision boundaries at different threshod imits. θ i = θ j = 0.8; θ i = θ j = 0.4; θ i = θ j = 0.1; (d) θ i = θ j = 0; The red area denotes the Unknown decision regions. So the ongest receptive fied radius r max can be achieved when x c j = c i c j + x c i. From equations (9) and (12), we get [ ( ) ] 2 k1 c i c j θ i = exp λ c i c j [ ( ) ] 2 k1 c i c j + c i c j exp = exp [ ( ) ] 2 k1 exp λ (d) λ c i c j [ ( ) ] 2 k1 + 1 λ (14) which means k 1 is a function of λ and θ i. This competes the proof. Aso, we can prove that the reationship between the shortest receptive fied radius r min and c i c j can be expressed as: r min = k 2 c i c j (15) where k 2 satisfies the foowing equation [ ( ) ] [ 2 ( ) ] 2 k2 1 k2 θ i = exp exp λ λ (16) Theorem 1: Suppose instance c j is the nearest instance to instance c i, c j and c i beong to different casses, RF i is the receptive fied around c i, then the radius r i of RF i is between rmin i and ri max, where r i min = k 2 c i c j r i max = k 1 c i c j (17) Suppose c k1, c k2,... are other instances that beong to different casses from the cass of instance c i, RF i,k1, RF i,k2,... are the receptive fieds around instance c i based on c i and c k1, c k2,..., r k1, r k2,... are the radius of RF i,k1, RF i,k2,..., respectivey. According to Lemma 1, r k1, r k2,... satisfy the foowing inequaities k 2 c i c k1 r k1 k 1 c i c k1 k 2 c i c k2 r k2 k 1 c i c k2... (19) Since c j is the nearest neighbor in different cass to instance c i, c i c k1 and c i c k2 satisfy the foowing inequaities c i c k1 c i c j c i c k2 c i c j... (20) Since the roe of minimization principe is simiar to the ogica AND [11], the fina receptive fied RF i around c i satisfies the foowing equation So and RF i = RF i,j RF i,k1 RF i,k2... (21) r i min (k 2 c i c j, k 2 c i c k1, k 2 c i c k2,...) =k 2 c i c j (22) r i min (k 1 c i c j, k 1 c i c k1, k 1 c i c k2,...) =k 1 c i c j (23) This competes the proof. From the anaysis above, we can concude that the receptive fied around every instance has the foowing attribute: 1) The size, shape and ocation of receptive fied around each instance are ony correated with λ, θ and the neighbors in different casses around this instance. The receptive fied is oca and its size is mainy determined by the nearest neighbor in different casses around it (as depicted in Fig.1). 2) Receptive fieds around border instances are smaer than that around non-border instances since the distance between border instances are smaer than that between non-border instances (as depicted in Fig.1). 3) The radius of receptive fied is decreased with the increase of threshod imits (as depicted in Fig.1). A. C-M 3 -GZC IV. CLUSTERING ALGORITHM BASED ON M 3 -GZC NETWORK Since the receptive fied of every instance is the oca area around it, we can view a new instances that ocates in the area beongs to the same custer as this instance. Since the 788

4 receptive fied of every instance may be overapped, we ony consider the nearest instance to the new instances. When a new instance (x, d) is avaiabe, we can find its nearest neighbor (x, d) in the same cass as (x, d). If the output of the MIN unit around (x, d) is 1 (we say that (x, d) is accepted by the MIN unit around (x, d)), the fina output of the M 3 -GZC network wi be d, which means that (x, d) ocates in the receptive fied around (x, d). So we treat (x, d) and (x, d) beong to a same custer. If the output of the MIN unit around (x, d) is Unknown or 1, the fina output of the M 3 -GZC network wi be Unknown or incorrect, we treat (x, d) as a new custer center. Aso, since the radius of receptive fied is decreased with the increase of threshod imits, if a test sampe is accepted by a M 3 -GZC network with high vaues of threshod imits, it wi be accepted by the same network with ower vaues of threshod imits. The threshod imits can be viewed as a degree of confidence of correct cassification. Since the confidence of correct cassification wi become higher and higher with more and more instances avaiabe, we can adjust the threshod imits during custering process. At the beginning of custering, there are ony few instances avaiabe, they distribute sparsey and it is difficut to cassify new instance correcty according to them. The distance between each instance may be very arge, and the receptive fied of each instance may be arge, too. We can set a arge vaue of θ to decrease the size of receptive fied. With more and more instances avaiabe, the confidence of correct cassification becomes higher and we can set a smaer vaue of θ. The time varying threshod imits can guarantee a more robust incrementa custering agorithm. According to the above anaysis, our custering agorithm based on M 3 -GZC network (C-M 3 -GZC) is presented in Agorithm 1, where S is the custering set, and it can start from scratch or have some members trained before. The items of S can be expressed as (x, d, n), where x is the centroid coordinates of the custer, d is the cass ID of this custer, and n is the tota number of instances in this custer. Agorithm 1 C-M 3 -GZC Input: Training set: S new Previousy trained custer set: S Parameter of M 3 -GZC network: λ Time varying function of threshod imits: f(t) Output: New custer set: S for each data (x, d) in S new do Find its nearest neighbor (x, d, n) in S; if d = d and (x, d) can be accepted by the MIN unit based on (x, d ) then Update the centroid coordinates of (x, d, n): x = (nx + x)/(n + 1); Update the number of points in this custer: n=n+1; ese Treat (x, d) as a new custer center: S = S (x, d, 1); end if Update the threshod imits: θ = f(t); end for A simpe iustration of the proposed custering process is depicted in Fig.2. Here the time varying function of threshod imits is defined by ] θ = (θ max θ min )exp [ t2 2σ 2 + θ min (24) (c) (d) We chose θ max = 1.0, θ min = 0.2, σ = 1/2 2, and t = i/n, where i indicates the ith instances that presented to the M 3 -GZC network, and n indicates the tota number of training data. Fig.2 is the distribution of training data that beong to two casses abeed by pus and circe, respectivey. Fig.2 shows the decision boundaries of M 3 -GZC network after two instances have been presented. The third instance abeed by triange ocates in the Unknown area, so it wi be treated as a new custer center. But the forth instance ocates in the receptive fied of the third instance, and they beong to the (e) Fig. 2. A simpe iustration of the proposed custering process. The red area denotes the Unknown decision regions. Origina training data; -(e) Decision boundaries of M 3 -GZC network after more and more instances are earned, the trianges denote the instances waiting to be processed; (f) The fina custers. (f) 789

5 same cass, so they wi be custered as shown in Fig.2 (d). Fig.2 (f) shows the fina resuts of three custers as we have expected. B. Post-Processing In this subsection, we propose an outier remova agorithm and a custer combination agorithm for post-processing of C-M 3 -GZC. A custer that has few instances may ocate on border or be noise instances. If it is a border instance, it wi have some neighbor custers that beong to the same cass as it. But if it a noise instance, its neighbor custers wi beong to different casses. So our noise remova or outier remova agorithm works as Agorithm 2. Agorithm 2 Outier Remova Input: Custer set: S Limit of instance number: n 1 Number of neighbor custers to be considered: n 2 Output: New custer set: S for each custer (x, d, n) in S do if n n 1 then find its n 2 nearest neighbor custers in S; if a the n 2 neighbors beong to different casses of (x, d, n) then Remove (x, d, n) form S: S = S\(x, d, n); end if end if end for After the outier remova, some custers that are divided by noise can be combined. Aso, since the threshod imits are decreasing with time, some custers that are divided under high threshod imits can be combined under ow threshod imits. And with more training data avaiabe, some custers that are divided under few training data can be combined under more training data. So we need a custer combination agorithm to reduce custer number for further compression. If a custer can be accepted by its nearest neighbor custer, we treat the two custers are simiar and combine them into one custer. Based on this idea, our custer combination agorithm works as Agorithm 3. The custer combination process can be impemented ony once or repeated for many times, unti a certain custer number is reached. C. Compexity Anaysis Let M be the fina number of custers, and N be the number of training data. In the custering process, the time compexity of finding the nearest neighbor for one training instance is O(M), deciding whether it is accepted by the corresponding MIN unit is O(M). So the tota time compexity is O(MN). In the outier remova process, the time compexity of finding the nearest neighbor for one custer is O(M). The tota time compexity is O(M 2 ). In the Agorithm 3 Custer Combination Input: Custer set: S Parameter of M 3 -GZC network: λ Threshod imits of M 3 -GZC network: θ com Output: New custer set: S for each custer (x, d, n) in S do Find its nearest neighbor (x, d, n ) in S\(x, d, n); if d = d and (x, d) can be accepted by the MIN unit based on (x, d ) then Update the centroid coordinates of custer (x, d, n ): x = (n x + nx)/(n + n); Update the number of points in this custer: n = n + n; Remove (x, d, n) from S: S = S\(x, d, n). end if end for custer combination process, the time compexity of finding the nearest neighbor for one training instance is O(M), deciding whether it is accepted by the corresponding MIN unit is O(M). The tota time compexity is O(M 2 ). If we use some searching techniques (such as k-dimensiona trees [15]) the time compexity of finding the nearest neighbor for one instance can be reduced to O(ogM). The tota time compexity of C-M 3 -GZC, outier remova and custer combination agorithms can be reduced to O(N ogm), O(MogM) and O(MogM), respectivey. V. EXPERIMENTAL RESULTS In order to verify our method, we present three experiments. The first is an artificia probem and the other two are rea-word probems. A the experiments were performed on a 2.8GHz Pentium 4 PC with 1GB RAM. The time varying function of threshod imits we used in theses experiments is the same as the simpe iustration we presented in Fig.2. A. Checkerboard Probem A checkerboard probem is depicted in Fig.3. The checkerboard divides a square into four quadrants. The points abeed by dot and pus are positive and negative instances, respectivey. In this experiment, we randomy generate 1000 instances as shown in Fig.3. We use the C-M 3 -GZC agorithm to find custers at different threshod imits on this data set. Since there is no noise in the training data, we just use the custer combination process as the post processing. The custer centers at different threshod imits are shown in Figs.3, and (c). Resuts of LVQ are aso shown in Fig.3 (d) for comparison. We aso randomy generate instances as training data set, and another instances as test data set. We use the C-M 3 -GZC agorithm and the custer combination process on the training data set, and then cassify the test instances to the same cass of their nearest custers. Two ways of using custer combination are isted in Tabe I. One 790

6 TABLE I RESULTS AT DIFFERENT THRESHOLD LIMITS ON CHECKERBOARD PROBLEM. θ min C1-M 3 -GZC LVQ C2-M 3 -GZC LVQ Number Accuracy Time Accuracy Time Number Accuracy Time Accuracy Time % % % % % % % % % % % % % % % % % % % % % % % % % % % % (c) Fig. 3. A checkerboard probem and its custering resut at different threshod imits. The points abeed by dot and pus are positive and negative instances, respectivey. The points abeed by dot with circe and pus with circe are custer centers. A checkerboard probem; θ min = θ com = 0.01, θ max = 1.0; (c) θ min = θ com = 0.5, θ max = 1.0; (d) Resuts of LVQ with same custer number as. is using custer combination ony once, the other is repeating it unti the custer number is stabe. They are indicated as C1-M 3 -GZC and C2-M 3 -GZC in Tabe I, respectivey. The resuts of using LVQ are aso isted for comparison. Since the custer number of LVQ is defined by user, we do the experiments of each data set twice, which have the same custer number as that of C1-M 3 -GZC and the that of C2- M 3 -GZC, respectivey. From Fig.3 and Tabe I, we can draw the foowing concusions. 1) The number of training data can be greaty reduced by C-M 3 -GZC, and it is determined by the threshod imits. The higher the threshod imits are, the more (d) custers are generated. We aso find that if we set θ min = 0 and use the custer combination process unti a stabe custer number is reached, the fina custer number is 4, which is just the same as the minimum custer number as we have expected; 2) Using higher threshod imits can obtain higher cassification accuracy; 3) As shown in Fig.3 and (c), custers near the border are distributed more densey than that far away from border. That is because the receptive fieds around border instances are smaer than that around non-border instances. More custers around border can obtain a better generaization performance, and fewer custers around non-border can obtain a higher data reduction rate. We do not discard the non-border instances for further reduction because in the incrementa earning process the non-border instances may become border instances after more training data avaiabe, discarding them may ead to great and unwanted changes to the decision boundaries. Since not a the non-border instance wi become border instance in future, we pay ess attention to them than the instances that are aready border instances. Attaching more importance to border instances is a baance between data reduction rate and generaization performance. Compared with Fig.3 (d), we can see that custers distribute eveny in LVQ. And if the custer numbers of LVQ and C-M 3 -GZC are same, the generaization performance of the atter is better than the former, as shown in Tabe I. 4) Compared with LVQ, our agorithm spend ess time, ony 0.016% of that of LVQ on average. That is because LVQ wi process a the training data set iterativey to achieve a good resut, whie our method wi ony treat each input once. To test our noise remova program, we randomy generate instances with different ratio of noise instances among them. The parameters of each experiments is θ min = θ com = 0.2, θ max = 1.0, n 1 = 2, and n 2 = 2. The resut are shown in Fig.4. Compared with Tabe I, the number of custers are arger at the same parameters, that is because the noise instances separate some custers into smaer custers. 791

7 Accuracy No Custer C M3 GZC CP M3 GZC Number of Custers Noise Ratio No Custer C M3 GZC CP M3 GZC Noise Ratio Fig. 4. Custering resut of checkerboard probem with noise instances. Accuracy; Number of custers. The resuts show that after noise remova programm, the cassification accuracy can be improved greaty, and is better than the origina training data set. B. UCI Database In this experiment, our agorithm is tested on three benchmark data sets from the Machine Learning Database Repository [13]. The parameters of each experiments are θ max = 1.0, θ min = 0.2, and θ com = 0.2. The resuts are isted in Tabe II, where C-M 3 -GZC denotes our custering method without post-processing and CP-M 3 -GZC denotes our custering method with post-processing. Experiments resuts of using LVQ with the same custer number as that of C-M 3 -GZC and CP-M 3 -GZC are aso isted for comparison. From Tabe II, we can see that the accuracy of our methods is comparative or better than origina data set whie maintaining sma size of instances. The size ratio of each data set are different because each data set has different redundant training data. The accuracy of our method is aso better than LVQ and the training time is much faster than that of LVQ. Fig. 5. Gass-board images in the industry image cassification project. A good gass-board; A faut gass-board. C. Industry Image Cassification We aso use our custering method on an industry image cassification project [4]. The purpose of this project is to distinguish faut gass-boards from good gass-boards in an industria product ine, as shown in Fig.5. The abiity of incrementa custering is urgenty needed in this project since the gass-board images can be obtained everyday and vary with the changes of circumstances. In our experiment, each gass-board image is converted into a 4096 dimension vector, and we divided the gassboard images into eight groups according to the time that they were coected. The number of images in each group is 1133, 1227, 1149, 1160, 1138, 1147, 1088, and 1197, respectivey. We use the first to the seventh groups as the training set and the eighth group as the test set. At first, we use C-M 3 -GZC to obtain the custer C 1 on the first training set. Then we presented the second training set to C 1 and use C-M 3 -GZC to obtain the custer C 2. After a the training set have been presented, we use outier remova and custer combination agorithm on C 7 to get the fina custers. The cassification accuracy and the number of custers are shown in Fig.6. We aso show the resut of not using custering method for comparison. Since LVQ has not the abiity of incrementa earning, experiments of using LVQ are not done for comparison. From Fig.6, we can see that the size of training data can be greaty reduced whie maintaining the generaization performance by using C-M 3 -GZC agorithm. Aso, after the post-processing, the noise can be removed, the generaization performance becomes better, and the number of custers can be decreased further. VI. CONCLUSIONS In this paper we have anayzed the properties of receptive fied in M 3 -GZC network. Based on these properties, we propose a new supervised custering agorithm. It has the foowing attractive features. The incrementa custer abiity. Unike traditiona custering method, it need not retreat training instances. The number of custer need not be predefined, it grows automaticay and is determined by the distribution of training data. 792

8 TABLE II RESULTS ON UCI DATABASE. PARAMETERS OF EACH NET: λ = 0.5; θ max = 1.0; θ min = theta com = 0.2; n 1 = 2; n 2 = 2. THE LEFT COLUMNS IN ACCURACY AND TIME INDICATE THE RESULTS OF C-M 3 -GZC OR CP-M 3 -GZC WHILE THE RIGHT COLUMNS INDICATE THE RESULTS OF LVQ. Data set C-M 3 -GZC / LVQ CP-M 3 -GZC / LVQ No Custer Size Accuracy Time Size Accuracy Time Accuracy baance 92.0% 84.00% 87.20% % 88.00% 86.40% % iris 16.0% 97.33% 90.67% % 97.33% 90.67% % optdigits 77.8% 97.94% 75.63% % 98.11% 75.85% % Accuracy Number of Custers Taining Data Set Taining Data Set Fig. 6. Custering resut of industry image cassification probem. The soid ines and dashdot ines represent the resuts of using our custering method and not using custering method, respectivey. Accuracy; Number of custers. It attach different attention to border and non-border instances. The post processing of outier remova make the agorithm robust and custer combination reduce the size of custer further. Experimenta resuts on the artificia checkerboard probem and severa rea-word appications verify the vaidity of our agorithm. But in our experiments, we simpy set n 1 = 2 and n 2 = 2 for a the data base. How to choose the optimum vaues of n 1 and n 2 for rea-word appications needs to be anayzed in the future work. ACKNOWLEDGMENT This work was supported in part by the Nationa Natura Science Foundation of China via the grants NSFC and NSFC REFERENCES [1] S. Basu, A. Banerjee, and R. J. Mooney, Semi-supervised Custering by Seeding, Proc. 19th Internationa Conference on Machine Learning, pp.19-26, [2] N. Bansa, A. Bum, and S. Chawa, Correation Custering, Machine Learning, vo.56, pp , [3] N. Grira, M Crucianu, and N Boujemaa, Unsupervised and Semisupervised Custering: a Brief Survey, A Review of Machine Learning Techniques for Processing Mutimedia Content, Report of the MUSCLE European Network of Exceence (FP6). [4] B. Huang and B. L. Lu, Faut diagnosis for industria images using a min-max moduar neura network, ICONIP 2004, Lecture Notes in Computer Science, vo.3316, pp , [5] T. Kohonen, The Sef-Organizing Map, Proc. Institute of Eectrica and Eectronics Engineers, vo.78, pp , [6] T. Kohonen, improved versions of earning vector quantization, IEEE Internationa Joint Conference on Neura Networks, vo.1, pp , [7] X. Li and N. Ye, Grid-And Dummy-Custer-Based Learning Of Norma And Intrusive Custers For Computer Intrusion Detection, Quaity and Reiabiity Engineering Internationa, vo.18, pp , [8] X. Li and N. Ye, A Supervised Custering Agorithm for Computer Intrusion Detection, Knowedge and Information Systems, vo.8, pp , [9] B. L. Lu and M. Ichikawa, A Gaussian zero-crossing discriminant function for min-max moduar neura networks, proc. 5th Inte Conf. Knowedge-Based Inteigent Information Engineering Systems & Aied Technoogies, pp , N.Baba et a. Eds., IOS Press, [10] B. L. Lu and M. Ichikawa, Emergent On-Line Learning with a Gaussian Zero-Crossing Discriminant Function, IJCNN 02, vo.2 pp , [11] B. L. Lu and M. Ito, Task decomposition based on cass reations: a moduar neura network architecture for pattern cassification, Lecture Notes in Computer Science, vo.1240 pp , 1997 [12] B. L. Lu and M. Ito, Task Decomposition and Modue Combination Based on Cass Reations: a Moduar Neura Network for Pattern Cassification, IEEE Trans. Neura Networks, Vo.10, pp , [13] P. M. Murphy and D. W. Aha, UCI Repository of Machine Learning Database, Dept. of Information and Computer Science, Univ. of Caif., Irvine, [14] C. M. Procopiuc, Custering probems and their appications (a survey), Department of Computer Science,Duke University.1997 [15] R. Sprou, Refinements to Nearest-Neighbor Searching in k- Dimensiona Trees, Agorithmica, pp , [16] A. R. Webb, Statistica Pattern Recognition, 2nd, Ed. London, U.K.: Wiey,

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points. Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Incremental Discovery of Object Parts in Video Sequences

Incremental Discovery of Object Parts in Video Sequences Incrementa Discovery of Object Parts in Video Sequences Stéphane Drouin, Patrick Hébert and Marc Parizeau Computer Vision and Systems Laboratory, Department of Eectrica and Computer Engineering Lava University,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

An Alternative Approach for Solving Bi-Level Programming Problems

An Alternative Approach for Solving Bi-Level Programming Problems American Journa of Operations Research, 07, 7, 9-7 http://www.scirp.org/ourna/aor ISSN Onine: 60-889 ISSN rint: 60-880 An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa,

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION 6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

A Robust Method for Shape-based 3D Model Retrieval

A Robust Method for Shape-based 3D Model Retrieval A Robust Method for Shape-based 3D Mode Retrieva Yi Liu, Jiantao Pu, Guyu Xin, Hongbin Zha Weibin Liu 1, Yusue Uehara ationa Laboratory on Machine Perception Internet Appication Lab, Fujitsu R&D Center

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Quaternion Support Vector Classifier

Quaternion Support Vector Classifier Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx

More information

Multiple Medoids based Multi-view Relational Fuzzy Clustering with Minimax Optimization

Multiple Medoids based Multi-view Relational Fuzzy Clustering with Minimax Optimization Mutipe Medoids based Muti-view Reationa Fuzzy Custering with Minimax Optimization Yangtao Wang, Lihui Chen 2, Xiaoi Li Institude for Infocomm Research(I2R), A*STAR, Singapore 2 Schoo of Eectrica and Eectronic

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeling

Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeling Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeing Shafik Huq 1, Besma Abidi 1, Ardeshir Goshtasby 2, and Mongi Abidi 1 1 Imaging, Robotics, and Inteigent System (IRIS) Laboratory, Department

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

Constellation Models for Recognition of Generic Objects

Constellation Models for Recognition of Generic Objects 1 Consteation Modes for Recognition of Generic Objects Wei Zhang Schoo of Eectrica Engineering and Computer Science Oregon State University zhangwe@eecs.oregonstate.edu Abstract Recognition of generic

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Automated Segmentation of Whole Cardiac CT Images based on Deep Learning

Automated Segmentation of Whole Cardiac CT Images based on Deep Learning Vo. 9, No., 08 Automated Segmentation of Whoe Cardiac CT Images based on Deep Learning Rajpar Suhai Ahmed, Dr. Jie Liu* Schoo of Computer & Information Technoogy Beijing Jiaotong University, Beijing, China

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information