Nearest Neighbor Search using Additive Binary Tree

Size: px
Start display at page:

Download "Nearest Neighbor Search using Additive Binary Tree"

Transcription

1 Nearest Neighbor Search using Aitive Binary Tree Sung-Hyuk Cha an Sargur N. Srihari Center of Excellence for Document Analysis an Recognition State University of New York at Buffalo, U. S. A. Abstract Classifying an unknown input is a funamental problem in Pattern Recognition. One stanar metho is fining its nearest neighbors in a reference set. It woul be very time consuming if compute feature by feature for all templates in the reference set; this naïve metho is O(n) where n is the number of templates in the reference set an is the number of features or imension. For this reason, we present a technique for quickly eliminating most templates from consieration as possible neighbors. The remaining caniate templates are then evaluate feature by feature against the query vector. We utilize frequencies of features as a pre-processing to reuce query processing time buren. The most notable avantage of the new metho over other existing techniques occurs where the number of features is large an the type of each feature is binary although it works for other type features. We improve our OCR system at least twice (without a threshol) or faster (with higher threshol value). Keywors Nearest Neighbor searching, Filtration, Aitive Binary Tree, OCR, GSC Classifier 1. Introuction One common metho for classifying an input vector of unknown class involves fining the most or top k similar templates in the reference set. Not surprisingly, this problem, so-calle k-nearest neighbor or simply KNN problem has receive a great eal of attention because of its significant an practical value in pattern recognition (see [, 3] for extensive surveys). One straight-forwar metho is computing feature by feature for all templates in the reference set an it takes O(n) where n is the number of templates in the reference set an is the number of features. This is very time consuming for users to wait for the output. Hence, there is a wealth of literature regaring computational expenses of the KNN problem ating as far back as 197. Papaimitiou an Bentley showe O(n 1= ) worst-case algorithm [13] an Frieman et al suggeste possible O(log n) expecte time algorithm [6]. There are three general algorithmic techniques for reucing the computational buren: computing partial istance, prestructuring, an eiting the store prototypes [4]. First, the partial istance technique is often calle a sequential ecision technique; ecision for match between two vectors can be mae before all features in the vector are examine. It requires a preetermine threshol value to reuce computation time. Next, the pre-structuring metho focuses on preprocessing the prototype set into certain well-organize structures for the fast classification processing. Many approaches utilizing multiimensional search trees that partition the space appear in the literature [7, 11, 1, 1]. In these approaches, the range of each feature must be large. Otherwise, if features are binary, we achieve little speeup. Furthermore, the imension of feature space must be low. Quite often in image pattern recognition, each feature is threshole for binarization an the imension is high. Finally, the prototype eiting or reuction metho reuces the size of prototype set to improve spee with sacrifice of accuracy. The conense nearest neighbor rule [9] an the reuce nearest neighbor rule [8] are use to select a subset of training samples to be the prototype set. In this approach, we must sacrifice accuracy for spee. Hong et al [1] successfully implemente a fast nearest neighbor classifier for the use of Japanese Character Recognition. They combine a non-iterative metho for CNN an RNN an a hierarchical prototype organization metho to achieve a great spee-up with a little accuracy rop. The new algorithm utilizes both partial istance an prestructuring techniques. We reuce computation time by using an Aitive Binary Tree (ABT) ata structure that contains aitive information which is frequency information in binary features. The iea behin the ABT approach in fining the nearest neighbor is filtration by which the unnecessary computation can be eliminate. It makes this approach unique from the others such as reunancy reuction or metric metho. First, take a quick glance at the reference set an select caniates for match. Next, take a harer look only at those caniates selecte from previous filtration to select a fewer caniates, an so on. After several filtration, take a complete thorough look only at the final caniates to verify them. All matches whose istance is less than or equal to a threshol are guarantee to be in all caniate sets. In this paper, we will escribe the aitive binary tree (ABT) an the new nearest neighbor search algorithm base on several famous similarity measures. We will give the simulate experimental results. Finally, we report the experimental results on our OCR system using the graient, structural an concavity or simply GSC classifier [5].. Preliminary The performance of pattern classification epens significantly on its efinition of similarity or issimilarity measure between pattern vectors. Several efinitions have been propose an encountere in various fiels such as information retrieval an biological taxonomy [4]. Among many

2 efinitions, Eucliean istance, absolute ifferences, an Minkowski istance are the most famous ones. Section 3 iscusses the algorithm where the istance measure function is the absolute ifference. We chose this efinition as it is the most simple measure to explain the new algorithm. Eucliean an Minkowski s istances are almost ientical when features are binary. The absolute ifference, well known as the city block or Manhattan metric,isefineasfollows: D[x y] = X i=1 jx i ; y i j (1) where is the imension of the vector. A normalize inner prouct appears often as a non-metric similarity function: x t y S[x y] = where p kxkkyk kxk = x t x () It is the cosine of the angle between two vectors. Another similarity efinition use in OCR system using GSC classifier evelope in CEDAR is: S[x y] = x t y + xt y (3) where x is the negation of the vector x an is the contribution factor ( > 1). This efinition has the highest accuracy in our OCR system among known efinitions an it performs best when = 1:9. The ifference among these efinitions can be explaine by its weight where features are binary. The Minkowski family efinition incluing Manhattan istance gives the same weight for the case where both patterns have the feature an the case where both patterns o not have the feature. The normalize inner prouct computes the creit for the case where both patterns have the feature but also reflects the other case as it is normalize. The efinition 3 gives a full creit for the case where both patterns have features an also allows to control the creit for the other case. Section 4 iscusses the thir efinition of similarity an OCR. We consier the case where a threshol value, t, is known. The KNN with threshol problem is that we reject a query vector if the nearest neighbor is not close enough, meaning that the istance excees t. LetM be a set of matches whose issimilarity value is less than or equal to t or whose similarity value is greater than or equal to t. Let C(x) enote the class of the vector x an n is the number of template vectors in the reference set, R. Definition 1 k-nearest neighbor with threshol Input: A query vector q, a reference set, R = fr 1 r r n g an a threshol value, t. ( on the votes of k -NN : jm jk Output: C(q) = on the votes of jm j -NN : < jm j <k Rejecte : M = In this moel, the classification ecision is mae by up to k nearest neighbors because not enough matches may be in the set M. This moel is frequently use in many applications consiering the fact that the higher reject rate usually lessens the error rate. We introuce an aitive binary tree ata structure, ABT in short. It is a binary tree whose noes are sums of their irect P chilren. Consier the example in Fig. P 1. The root is i=1 xi. Noes at the secon level are = i=1 x i an P i==+1 x i from left to right. Leaves are x 1 x x. Let B(x) be a list of noes, fb 1 (x) B (x) B ;1 (x)g in breath first orer. Property 1 Aitive Binary Tree 1. There are l;1 number of noes at level, l.. Total number of noes = ; The epth of ABT = log. 4. B i = B i + B i+1 The structure is name aitive because aitive informations prouce by property 4. are appene in every vector. Each element in a vector lies in the leaf level from left to right corresponingly. If vectors are binary, the root is the frequency of 1 s an each noe is the frequency of 1 s in subpart of the vector. 3. k-nn using ABT in City block istance There are three phases: the pre-processing, caniate selection an verification, an voting for classification phases. During the pre-processing phase, the ABT s for all templates are built by aing a pair of elements an storing it in their parent noe. Builing an ABT for one template takes O() an thus, total pre-processing takes O(n) to buil ABTs for all templates. The space require is also O(n) which is at most twice bigger than the size of the reference set. In the secon phase, we search for matches before choosing top k similar templates for votes. The objective of the caniate selection an verification proceure is quickly to fin the smallest subset M of the reference set which contains top or up to k templates. Consier the following pseuo coe for fining matches. Algorithm 1 Caniate Selection an Verification 1 Buil ABT(q) for every template x i 3 for every level l=1tolog 4 if P l ;1 j= l;1 jb j (x i ) ; B j (q)j >t 5 break 6 else if l = leaf 7 Verify the Match 8 ifverifie, upate t The inner loop computes the sum of absolute ifferences of every noe in level, l. The sequential ecision technique may be applie to this step; we may not have to compare all noes in the level because the value may excee the threshol before all noes in a specific noe are examine. We use the parent level operations as filtration functions. Those caniate templates survive from the parent level are only consiere in the next level. After fining all matches, search for top or k-nearest neighbors only in the set, M. In the line 8, we woul like to upate the threshol if k number of matches are foun an maximum istance is less

3 than t. This is critical because the lower the t is, the more filtration occurs. Also, if a threshol value is not given at the start, then it is assigne at the point right after k templates are examine an upate if a less value is foun later on Example Consier a following set with n =3 =8an t =, q = 1 R = 8< : r 1 = r = 111 r 3 = 111 When a brute force metho is performe, 4 number of comparisons take place. The unerline parts of each reference vectors are those contributing the comparisons when the sequential ecision technique is use; there are 19 number of comparisons. Fig. 1 shows ABTs for the query vector an all templates. First, the root level is compare. r an r 3 are r q r Figure 1. Sample ABTs 1 r consiere as caniates. r 1 is iscare because (jb 1 (r 1 ) ; B 1 (q)j =4)> (t =). Next, the secon level of trees are compare. For r, jb (r ) ; B (q)j + jb 3 (r ) ; B 3 (q)j = while that of r 3 is 4. But only the B (r ) is compute because jb (r ) ; B (q)j alreay excees the threshol. Hence, only r is consiere as a caniate. At the level 3, r still is a caniate an at the leaf level, it is verifie as the nearest neighbor to q. jrj =3 jl 1 j = jl j =1 jl 3 j =1 jm j =1The number of comparisons occurre is 18, the number of circle noes as shown in the example in Fig Correctness Let f M an f l be functions for matching an for selecting caniates at P P the level, l: f M (x q) = i=1 jx i ; q i j an f l (x q) = l ;1 i= jb i(x) ; B l;1 i (q)j. LetL l be a set of templates, x s chosen by the function f l (x q) t. Theorem 1 A set of matches is always a subset of all caniate sets. M = L log L l L l;1 L 1 R. Proof: f L1 f Llog = f M. Prove by the wellknown fact ja + b + cj jaj + jbj + jcj. For example, x = (x 1 x x 3 x 4 ) an q = (q 1 q q 3 q 4 ). Then, f M (x q) = jx 1 ; q 1 j + jx ; q j + jx 3 ; q 3 j + jx 4 ; q 4 j an f l=1 (x q) = jx 1 + x + x 3 + x 4 ; q 1 ; q ; q 3 ; q 4 j.anf l= (x q) = jx 1 +x ;q 1 ;q j+jx 3 +x 4 ;q 3 ;q 4 j. Clearly, f 1 f f M. Now, if there exists x M meaning that f M t,thenf l t an x L l. Thus, M L l+1 L l L l;1 L 1 R. The theorem means that all patterns whose istance is within the threshol are guarantee in all caniate sets. Hence, this metho is a sort of ynamic prototype reuction metho but there is no loss of accuracy at all. It is as accurate as the brute force search metho but much faster. The extra space require for ABT is ;1 per vector which is the number of inner noes by efinition. Therefore, the total space is O(n). Selecting Caniate process is mae in the fewer computational time than that of the verification process. Number of comparisons neee at the level, l, is the number of noes at the level which is l;1. That of the top root level, for example, is 1 while that of the leave level is m. The number of operations is multiplie by in every filtration process. The number of caniates is, on the other han, reuce in every filtration process Simulate experiment We present simulation results which emonstrate the performance of the new algorithm on 4 ifferent reference sets with ifferent feature numbers, = f g. The size of the reference set, jrj = 1 for each reference set. Each feature in vectors is generate by a ranom function which returns a number between an 99. Possible min(d(x q)) = which is an exact match an possible max(d(x q)) = 6336 when = 64. Corresponing test sets, Q s with = f g, are prepare as well. The size of each query set is jqj = 1. The experiment is performe on machine with a 3MHz UltraSparc CPU, SunOS 5.6, 588 MIPS, an56 Memory. Fig.shows the performance of a naïve metho an methos using ABT structure with several ifferent threshol values. "8" t=the threshol 6 "3" t=the threshol "16" t=the threshol 1 "64" t=the threshol Figure. Cumulate elapse time for 1, queries over 1, templates Observation 1 The smaller threshol value, t, the faster ABT algorithm runs but the reject rate increases. A smaller threshol means fewer caniates an the algorithm runs faster. As the threshol increases, on the contrary, caniates aboun. Too small threshol, on the other han, might reject most of inputs. Observation The larger imension is, the better performance the ABT algorithm achieves the better execution time performance. 3

4 It is necessary to compare the results of s with the same ratio of t. Consier the case that =64 t = 3, then the ABT runs 13:8 times faster than the naive metho. On the other hans, when =3 t= 15, it is only 9:6 times faster. Filtering from top to all the way own to the level, l ; 1 may not give always the most expeitious running time. It woul be wise to stop filtering an jump to the verification stage if the number of caniates is small. Table 1 inicates this behavior. Table 1. Comparisons for methos. Metho time in millisec. Naïve 13.3 Sequential Decision 4.1 Filtration l = Filtration l = 1.4 Filtration l =3 7. Filtration l =4 9.5 Observation 3 There exists a level, ^l which results the minimum elapse time. The eeper the level is, the more computations which is the number of noes at the level, are require. ^l is the starting point that jl^l j^l j^l+1 jl^l+1 which means that we gain no avantage of filtration from this level. Therefore, fining ^l is important because it gives not only the minimum elapse time, but also less require space for ABT ata structure. Observation 4 The ABT technique is superior to the sequential ecision technique experimentally. In the worst case when every reference is a match, both sequential ecision an ABT woul not give any spee up. Technique using ABT woul be even twice slower than the naive metho in case of a full ABT Auxiliary Lookup Table: Suppose =51an all features are binary, then a vector is store as an array of 16 unsigne integer values. We buil a lookup-table for counts of 1 s for all 16 bit combination. The size of lookup-table is 6K bytes. This look-up table for unsigne integers is built at preprocessing stage. To fin D[x y], we perform table look-ups for high an low 16 bits of each unsigne integer (= x y). There are total 3 table look-ups to etermine the istance. Where vectors are store as unsigne integers, we consier counts of 1 s of each unsigne integer value as leaves of ABT. Lookup table enables significant speeup over the metho counting the number of bits without the table. Orere List: The simulate experiment tells that the smaller threshol is, the faster algorithm runs (see Observation 1). The threshol value is ynamically change as more templates are examine. It woul be esirable if the smaller threshol value is assigne early. Therefore, we woul like to orer the templates so that the less threshol value is set early in the search. Fact 1 The closer in frequency two vectors are, the smaller in absolute ifference istance they ten to be. If we orer templates by its frequency an search from a template whose ifference of frequency is smallest, then the low threshol value might be set in the earlier search stage resulting in a great spee up. First, orer the reference set by B 1. For each bin, the average number of templates is n=m. Next, orer each bin by B. During the search stage, start searching from the template, x whose min(jb 1 (x) ; B 1 (q)j) an then min(jb (x) ; B (q)j). As a result of orering, not only we fin the low threshol value quickly, but also, our search space is reuce own to the size of L. Selection: We have seen that ABT facilitates filtrating some reference templates from consieration by using the lower bouns at each level. In aition to the lower bouns, ABT also provies upper bouns. If an upper boun is less than or equal to the threshol, the match is verifie without further calculation. This selection technique is useful in a query such that we woul like to fin all matches to the query vector within a threshol. Consier w-ary vectors x an y where each element can have a value between an w ; 1. Lemma 1 D[x y] has upper an lower bouns at the root level: jb 1 (x) ; B 1 (y)j D[x y] min(b 1 (x) + B 1 (y) (w ; B 1 (x)) + (w ; B 1 (y))). P i=1 jx i ; y i j P i=1 x i + P Proof: The lower boun is given in Theorem 1. Similarly, P i=1 y i because P ja + bj jaj + jbj. Now, D[x y] = i=1 jx i ; y i j = i=1 j(w ; x i ) ; (w ; y i )j. This is the absolute P ifference of two inverse vectors an it is the same as the absolute ifference of the original vectors. Clearly, i=1 j(w ; x i) ; (w ; y i )j P i=1 (w ; x i)+ P i=1 (w ; y i) Thus, D[x y] min( P i=1 x i + P i=1 y i P i=1 (w ; x i)+ P i=1 (w ; y i)) Consier two vectors, x y where they are binary, w = x = : B1 (x) =5 1. Accoring to the y = 1111 : B 1 (y) =4 lemma 1, we achieve 1 D[x y] 8 immeiately. Theorem P l ;1 i= l;1 (Bi(x) ; Bi(y)) D[x y] P min( l ;1 (Bi(x) + Bi(y)) P l ;1 (( w i= l;1 i= l;1 l ( w l ; Bi(y)))) ; Bi(x)) + Proof: Again, the lower bouns are prove in Theorem 1. For the upper bouns, ivie vectors into l;1 number of subvectors. For each sub-vectors, Lemma 1 hols. For the above example, we have the upper an lower bouns at the secon level of ABT: 1 D[x y] Using ABT for GSC classifier Among many classifiers in OCR,theGraient, Structural, an Concavity classifier, simply known as GSC classifier,has 98% accuracy on 4 hanwritten igits taken from various atabases [5]. It is base on the philosophy that feature sets can be esigne to extract certain types of information from the image. These types are graient, structural, an concavity informations. Graient features use the stroke shapes on a small scale. Next, structural features are base on the 4

5 stroke trajectories on the intermeiate scale. Finally, concavity features use stroke relationship at long istances. Graient, Structural, an Concavity has 19, 19, an18 feature vectors corresponingly. In all, there are 51 number of features in a vector. The K-NN approach is often use in the GSC classification. It selects the top k similar templates in the training set an returnsits class base on the vote of thesek template vectors. The efinition of this similarity, S[x y], currently use in the GSC classifier follows: S[x y] = nx i= S[xi yy] where S[xi yi] =( 1 : xi = yi =1 1= : xi = yi = : otherwise When both x i an y i are 1 s, it is the case that the esire feature exists. It is enote as S 11 [x y] = x t y. When both x i an y i are s, it is the case that the feature oes not exist. It is enote as S [x y] = x t y. It woul be reasonable to rely more upon S 11 than S. The efinition of the similarity measure becomes : S[x y] =S 11 [x y] + S [x y] is the contribution factor an usually 1. The recent experiment shows that = 1:9 gives the best performance. Note that when =1, it is the inverse of the city block istance between two vectors k-nn for GSC classier There is a slight ifference in line 4 of the previous algorithm 1 as its efinition of similarity iffers. Let B i (x) an W i (x) be the number of 1 s an s at the i s noe of vector x respectively. P The line 4 is replace by: if l ;1 i= (min(b i(x) B l;1 i (q)) + min (W i(x) W i(q)) ) t. Fact B i (x) = l;1 ;W i (x) where l is the level of i s noe. Lemma If min(w i (x) W i (y)) = W i (x), then min(b i (x) B i (y)) = B i (y) an vice versa. Proof: B i (x) = ; W i (x) an B i (y) = ; W l;1 i (y). l;1 Now if B i (x) B i (y),then ; W i (x) ; W l;1 i (y). l;1 By rearranging the formula, we get W i (x) W i (y). Lemma 3 S[x y] min(b 1(x) B 1(y)) + min(w 1(x) W 1 (y)). Proof: When only frequency values are available, the maximum value S 11 (x y) is when 1 s in B 1 (x) an B 1 (y) are aligne together. S 11 (x y) cannot excee min(b 1 (x) B 1 (y)). ThesameforS (x y). The maximum similarity value that two vectors x an y can have at the root level of ABT is min(b 1 (x) B 1 (y)) + min (W 1(x) W 1(y)). Suppose =. In the examples in Fig. 1, f 1 (q r 1 ) = min (7 3) min(1 5) + which is :5. Similarly, f 1 (q r ) = 3:5 f 1 (q r 3 ) =3:5. These values are always larger than or equal to S[x y] s efine in GSC classifier. When there is an exact match meaning that x = y, S[x y] =B 1 (x) + W 1(x). Therefore, the maximum similarity value varies from vector to vector by their frequencies. Let f l be P a function for selecting caniates at the level, l: f l (x q) = l ;1 i= (min(b i(x) B l;1 i (q)) + min(w i(x) W i(q)) ). Let L l be a set of templates, x s chosen by the function f l (x q) t. Corollary 1 All members in M are guarantee to be in all caniate sets. M = L log L l L l;1 L 1 R Proof: Let B(x) an W (x) be the frequency of 1 s an s of one internal noe. Let B l (x) W l (x) an B r (x) W r (x) be those of the left an right chilren of the noe. By the efinition, B(x) = B l (x) + B r (x) an W (x) = W l (x) + W r (x). Consier two vectors x an y. Suppose B(x) = min(b(x) B(y)), then the maximum possible value at the internal noe can have becomes B(x) + W (y) = B l (x) + W l(y) + B r (x) + W r(y). Now at its chilren s noes, there are three possible cases an one impossible case. First, if B l (x) = min(b l (x) B l (y)) an B r (x) = min(b r (x) B r (y)), then the maximum value at the both chilren noes can have is the same as that of their parent s noe by efinition : B l (x)+b r (x) B l (y)+b r (y) an W l (x) +W r (x) W l (y) +W r (y). Next, if B l (x) = min(b l (x) B l (y)) but B r (y) =min(b r (x) B r (y)), thenit is smaller than or equal to that of their parent s noe. Bl(x) + W l(y) + Br(y) + W r(x) Bl(x) + W l(y) + Br(x) + W r(y). When B l (y) = min(b l (x) B l (y)) but B r (x) = min(b r (x) B r (y)), it is also smaller than or equal to that of their parent s noe. It is impossible by efinition if B l (y) = min(b l (x) B l (y)) but B r (y) =min(b r (x) B r (y)). Therefore, the upper boun of a parent level is always greater than or equal to that of its chilren s noes. This is true for all internal noes. The upper boun at a certain level is the sum of all upper bouns at all noes in that level. Let f l be the upper boun function at a level, l, thenf L1 f Llog = f M. Thus, M = L log L 1 R: This corollary is the sine qua non which guarantees the correctness an speeup of Algorithm for GSC classifier. The following lemma further accelerates the search process, which we state it without a proof. Lemma 4 S (x y) = ; B 1 (x) ; B 1 (y) +S 11 (x y). This means that once we compute the similarity for S 11 (x y), S (x y) is compute in constant time. 4.. Experiment Before embarking on the results, it is important to iscuss the relationship between error an reject rates of a recognizer. As shown in Fig. 3, the error versus reject percentages of recognition graph is a great way to evaluate the performance of OCR systems. A goo recognizer must be as close to the axes as possible. Typically, the higher reject rate, the lower error rate. The threshol value must be mae epening on the costs of rejects an errors. As the threshol value increases, the reject rate also increases an the error rate ecreases. We use two sets of isolate mixe han-printe/cursive character images. The first set is the reference set whose 5

6 Reject Rate "GSC" Error Rate Error rate = Number of Errors Number of Accepte Queries 1 Number of Rejections Reject rate = Number of Total Queries 1 Figure 3. Error vs. Reject graph for GSC classifier Running time in Milli sec Threshol "tvsr." Figure 4. Threshol vs. running time size is 18 an approximately 8 per character (A-Z). The other set is a test set whose size is While the average running time of the brute force metho is millisecon, one using ABT is millisecon where the epth of tree is an t =. The higher threshol value the classifier has, the faster it runs. as shown in Fig. 4 The higher threshol value means the more rejects which save running time. Hence, the importance of a threshol is twofol; it not only enables to control the error an reject rates, but also gives spee up. 5. Finale Nearest Neighbor searching is an extremely well stuie area an a couple of techniques to spee up the OCR system were previously evelope. They are prototype thinning an clustering techniques which cause a little egraation in performance. Because even a slight egraation in performance is often too costly in real OCR applications, we stuie it an a new fast nearest neighbor search algorithm with no egraation is propose. Filtration with a threshol is the key iea for expeition. To perform this, we introuce ABT structure. The aitive information of pattern feature vectors ensures that the query processing time reuces significantly. Furthermore, the iea is effective even in combination with other techniques like prototype thinning or clustering. There are two parameters that can affect the spee of search : i) epth of ABT an ii) the number of branches. As state in Observation 3, the epth of ABT influences the spee significantly. We introuce the aitive binary tree, however, the tree can be an arbitrary branch tree. Aitive N-ary Tree might perform better than the binary tree. Moreover, the iea of filtration using ABT can exten to other efinitions with a little embellishment. Consier the normalize inner prouct efine in equation. The maximum value for this efinition is 1 when there is an exact match. We exclue the exceptional case where all features are as it P makes the enominatorbe. A filtration occurs in case that l ;1 min (B i(x) B i(q)) i= t Again, consier the l;1 kxkkqk example in Fig. 1 with a threshol = :5. At the root level filtration, r 1 is filtrate because the upper boun is :447. References [1] A. J. Broer. Strategies for efficient incremental nearest neighbor search. Pattern Recognition, 3(1): , 199. [] B. V. Dasarathy. Visiting nearest neighbors- a survery of nearest neighbor pattern classification techniques. In Proceeings of the International Conference on Cybernetics an Society, p IEEE, [3] B. V. Dasarathy. Nearest Neighbor Pattern Classification Techniques. IEEE Computer Society Press, [4] R.O.Dua,D.G.Stork,anP.E.Hart. Pattern Classification an Scene Analysis. John Wiley & Sons, Inc., n eition,. [5] J. T. Favata, G. Srikantan, an S. N. Srihari. Hanprinte character/igit recognition using a multiple feature/resolution philosophy. In IWFHR-IV, p 57 66, [6] J. Frieman, J. Bentley, an R. Finkel. An algorithm for fining best matches in logarithmic expecte time. ACM Tran. on Mathematical Software, 3:9 6, [7] K. Fukunaga an P. Narenra. A branch an boun algorithm for computing k-nearest neighbors. IEEE Tran. on Computers, 4:75 743, [8] G.W. Gates. The reuce nearest neighbor rule. IEEE Tran. on Information Theory, IT-18(3): , 197. [9] P.E. Hart. The conense nearest neighbor rule. IEEE Tran. on Information Theory, IT-14(3): , 197. [1] T. Hong, S. W. Lam, J. J. Hull, an S. N. Srihari. The esign of a nearest-neighbor classifier an its use for japanese character recognition. In Proceeings of IC- DAR, p IEEE, [11] B. S. Kim an S. B. Park. A fast k-nearest neighbor fining algorithm base on the orere partition. IEEE Tran. on PAMI, 8(6): , [1] H. Niemann an R. Goppert. An efficient branch-anboun nearest neighbour classifier. Pattern Recognition Letters, 7:67 7, [13] C. Papaimitriou an J. Bentley. A worst-case analysis of nearest neighbor searching by projection. In In Automata, Languages an Programming LNCS,v.85,p Springer-Verlag,

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

A Fast Algorithm for Finding k-nearest Neighbors with Non-metric Dissimilarity

A Fast Algorithm for Finding k-nearest Neighbors with Non-metric Dissimilarity A Fast Algorithm for Finding k-nearest Neighbors with Non-metric Dissimilarity Bin Zhang and Sargur N. Srihari CEDAR, Department of Computer Science and Engineering State University of New York at Buffalo

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Principles of B-trees

Principles of B-trees CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). http://waikato.researchgateway.ac.nz/ Research Commons at the University of Waikato Copyright Statement: The igital copy of this thesis is protecte by the Copyright Act 99 (New Zealan). The thesis may

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Just-In-Time Software Pipelining

Just-In-Time Software Pipelining Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

A fast embedded selection approach for color texture classification using degraded LBP

A fast embedded selection approach for color texture classification using degraded LBP A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

k-nn Graph Construction: a Generic Online Approach

k-nn Graph Construction: a Generic Online Approach k-nn Graph Construction: a Generic Online Approach Wan-Lei Zhao arxiv:80.00v [cs.ir] Sep 08 Abstract Nearest neighbor search an k-nearest neighbor graph construction are two funamental issues arise from

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8 Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by

More information

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Linear First-Order PDEs

Linear First-Order PDEs MODULE 2: FIRST-ORDER PARTIAL DIFFERENTIAL EQUATIONS 9 Lecture 2 Linear First-Orer PDEs The most general first-orer linear PDE has the form a(x, y)z x + b(x, y)z y + c(x, y)z = (x, y), (1) where a, b,

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information