arxiv: v1 [cs.db] 13 Sep 2017

Size: px
Start display at page:

Download "arxiv: v1 [cs.db] 13 Sep 2017"

Transcription

1 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution and it an guarantee the separation of eah luster entroid as a given parameter,. The worst run time omplexity of this algorithm is approximately O(T N log(n)) where T is the iteration steps and N is the number of features. arxiv: v1 [s.db] 13 Sep 2017 I. INTRODUCTION Clustering algorithms have many appliations 1,2 to the unsupervised anemisupervised learning, whih they help lassify data sets into lusters within few given parameters. Potentially, it an be applied to many different domains suh as image analysis, objet traking, data ompression, physial/hemial struture optimization problems, to name a few. Some luster algorithms (e.g. K-means 3 and Gaussian- Mixture 4 ) require the knowledge of number of lusters as input parameters, anome others (e.g. Dbsan 5, Hdbsan 6 ) require a distane ut-off threshold to separate lusters. Eah lustering algorithm has its own pros and ons and its own domain for different appliations. My goal in this paper is to invent a new lustering algorithm whih has the following properties: Require eah luster to be a Gaussian-like distribution. Free from the luster number parameter. Able to deal with large number of data set effiiently. Over all, this new lustering algorithm is able to automatially searh for luster numbers with a given separation threshold in a fast and robust way, whih was diffiult for K-means and Gaussian-Mixture. While, if all lusters are gaussianlike, it is also more effiient than Hdbsan in finding major lusters automatially. The reason for suh effiient gain is based on the design of the new algorithm whih is using loal data information instead of ompare eah data pair in a global fashion. Nevertheless, this algorithm an be regarded as an effiient improvement between Gaussian-Mixture model and K-means, and an improvement of Hdbsan an be found in here 7. II. THE ALGORITHM This setion will walk through the onepts of this algorithm, and I will analyze more in-depth details in the next setion. Over all, the entire algorithm is going through the following analysis pipeline: a. Indexing all data points by the R-tree struture. b. Seeding entroids aross K-dimensional features.. Converge entroids and delete exessive ones to find the definitive luster entroid. weighted loal data points. e. Re-assign data points to eah luster id via the Gaussian distribution, P(x µ ). Where steps b. and. are designed for finding the definitive entroid of eah luster. One the definitive luster entroid has been found, the next step is to alulate o-variane matrix of the Gaussian distribution via a mean-field iterative alulation in step D. Finally, re-assign all the data points to the orrespond luster id in step e. The following paragraphs desribe more details of the entire algorithm. a. Indexing all data points by the R-tree struture. The very first step is to onstrut the K-dimensional R-tree with all the data points, x i, whih generally gives average O(log N) omplexity of multi-dimensional range searh. Here, the index i indiated the i-th data point. During the onstrution of R-tree, the minimum (x a min ) and maximum (x a max) value of feature, a, an also be found without loosing too muh alulation resoure. b. Seeding entroids aross K-dimensional features. Now, the entroids, µ t=0, are seeded with a given separation distane,, aross all features within [x a min, xa max], where t = 0 means the zeroth iteration of the entroid. Fig. 1.a shows the seeding of entroids, where µ 1 is the first entroid inside the red ube(square) ano on so forth. During the seeding proess, the algorithm also searh for the data points in the K-dimensional ubi of volume, d K s, around eah entroid µ, and thus find out the temporary loal data sets, x i, to the orrespond entroid. Note that, eah µ possess a loal ount of data points, N, inside eah d K s volume. By this nature, several entroids an be exluded if they possess too few ounts of data point by a given ounting threshold, N < L.. Converge entroids and delete exessive ones to find the definitive luster enters. The previous step an be regarded as the zeroth iteration of the onverge proess. In order to find the best luster enters, entroid need to be updated, µ, by alulate the means of x i, µ t+1 = 1 x i. (1) N i

2 2 (a) ~µ 2 ~µ 1 ~µ 3 ~µ 4 (b) 2 generator mn X i2 w i, (x m i µ m )(x n i µ n ), w i, P [ Input ] Pj2 P [ Input ]. () (d) Input = 1 2 ( t + t 1 ) t+1 Chek onvergene max element{ t+1,mn Input,mn } < FIG. 1. The illustration of the iterative onvergene of four entroid seed into two lusters in a K=2 (2 dimensional) data set. In (a), the ubes (squares) indiated the loal searhing d K=2 s volume of eah entroid. In (b), the ubes (squares) indiated the d 2 ollision box of eah entroid. While, the position of entroids are moved a little bit from (b) to (a) to illustrate the iterations of step. in the algorithm. After finding the definitive entroids, the loal data points has been olleted as shown in (), and used for the alulation of o-variant matrixs, Σ, to fit the distribution, P ( x, µ ), as shown in (d). After words, the iterations of eah entroid an be stopped by the riterion, µ t+1 µ t < ɛ, (2) where denotes the Eulidean distane under K- dimension and ɛ is the onvergene threshold. In Fig. 1.a, the dotted lines show the iteration paths of eah entroid, µ. During the iteration of entroids, two or more entroid seeds may ends up in the same luster enter. Aording to this fator, the iteration proess an be further speed up by delete the entroid µ with lower data point ounting, N, within a ollision detetion. The ollision detetion is defined in a K-dimensional ubi box that spanned by the ollision distane, d 2. Fig. 1.b shows µ 1 (red) and µ 3 (orange) to be deleted as they possess less ount (N ) than µ 2 (green) and µ 4 (blue). Note that, it is possible to set a different value of d instead of using d 2. However, it would be effiient and aurate by setting d 2. In prinipal, there ould be several different ways to implement the entroid deletion algorithm. However, I will not dive into too muh details in FIG. 2. The self-onsistent loop alulation for Σ for the proess of ii. and iii. in step d. of the algorithm. here. weighted loal data points. After finding all the definitive luster entroid, µ, the o-variant matrix Σ of eah luster are ready to be alulated via the loal data points, x i. Firstly, the Gaussian distribution is generally written, P ( x µ ) = 1 2π Σ e ( x µ)t Σ 1 ( x µ), (3) where, x and µ are olumn vetors and the T operation is the transpose of them. The following formula is the usual way to alulate the o-variant matrix from a given data set, = 1 (x m i µ m )(x n i µ n ). (4) N Σ mn i While, sine x i is not a omplete data set from eah luster entroid µ, it might indue inauraies. Therefore, Eq. 4 an be modified into the following equations, Σ mn i w i, (x m i µ m )(x n i µ n ), w i, P ( x i µ ) j P ( x j µ ). It means, some data points of x i get more important if they are loser to the luster entroid, µ, aording to the weight fator, w i,. Overall, Eq. 5 meant to keep good quality of the (5)

3 3 o-variant matrix, Σ, that even it is only alulated via the loal data set, x i. However, Eq. 5 also indiated a funtional form, P ( x i µ ) P i [ Σ ], and the following variational ondition an be arried out to yield the optimization of P [Σ ], δ d x P [Σ ] = 0. (6) A mathematial rigorous solution for Eq. 6 might be hard to get. While, Eq. 5 and 6 an be approximately solved by meanfield method, iteratively, (a) (b) i. Calulate Σ 0 from Eq. 4, anet Σ 1 = Σ 0, from Eq. 5 with the input of the o- ], where Σ Input = 1 2 (Σt + ii. Calulate Σ t+1 variant matrix for P [Σ Input Σ t 1 ), iii. Iterate proess ii. until, max element{ Σ t+1,mn Σ Input,mn } < ɛ, (7) where ɛ is the onvergene threshold. In above, the form of the seontep is to ensure a smooth iteration proess for the o-variant matrix. The entire proess of the self-onsistene loop alulation is shown in Fig. 2. e. Re-assign data points to eah luster enter via the Gaussian distribution, P( x µ ). Finally, after all of the ovariant matrix, Σ, for eah entroid are alulated, the assignment of eah data point, x i, beome very easy. x i µ max, where µ max max P-value of {P ( x i µ 0 ),..., P ( x i µ n )}. The entire proess of the lustering algorithm ends here. III. DISCUSSIONS TO THE ALGORITHM This setion is divided into three sub-setions, where I will disuss: A. how to set proper parameters for the lustering algorithm, B. analyze the run time omplexities of the analysis pipeline, and C. establish some post lustering proess to ensure the read out data quality. A. Parameter settings Three parameters was mentioned in ther previous setion that desribe the algorithm: The entroieparation distane,. The loal data ounting threshold, L. The onvergene threshold, ɛ. (8) FIG. 3. Two different settings for the entroieparation distane, (a) larger separation, (b) smaller separation. The red irle presenting the entroieeds, and the blue ube (square) indiated the ollision box. The onvergene threshold, ɛ 0.01, is a small number, and it is not sensitive in general. The loal data ounting threshold, L, is an empirial parameter whih depends on the amount of data points and the separation distane,. L only served the purpose to boost the initialization and iteration of the algorithm during in steps b. and., and the results will not be hanged that even L = 0. A good hoie of L an boost the alulation speed as well as eliminate some small lusters in the beginning. While the entroieparation distane is an important parameter, if it is wrongly set, the finding of lusters ould be hanged. If a larger value of is given, illustrated in Fig. 4 (a), the alulation ould be faster due to fewer ount of entroieeds in the initial stage. But it is possible that only a single luster entroid to be survived due to a large ollision distane, d 2. On the other hand, if a smaller value of is given, illustrated in Fig. 4 (b), the alulation will be slower a bit due to more ount of entroieeds, yet two luster an be found. However, if an extremely small value of has been set, it is possible to found eah luster that only possess a single data point, whih is undesirable. A simple rule of thub an be applied to make a good hoie of, where an be set lose to but smaller than one-half of the smallest distane from the atual luster enters. B. Run time omplexities It is ompliate to establish a preise analysis for the run time omplexity due to three inter-related variables: (a) number of features, (b) number of data points and () number of lusters. Therefore, I will fous on the speial situation for small number of feature with few lusters. Here I list the worst run time omplexity of eah step for this situation, a. Indexing all data points by the R-tree struture: O(N log(n)), b. Seeding entroids aross K-dimensional features: = M =0 N log(n) O(N log(n)),

4 P-value 4 L p L % Sorted data points, ~x i2 Gaussian distribution, the P-value an be easily traed with a good model fit, and Gaussian-Mixture model (GM) was invented to serve this purpose. However, GM is not able to deal with large number of data points due to its time omplexity, O(T N 2 ), and this is one of the reasons for the reation of this paper. Here, I define three ut-off threshold values to ensure the read out of data quality, P-value ut-off threshold, L p : For any luster of entroid-, x i, drop the data if P ( x i µ ) < L p. FIG. 4. Illustration of the definition of L p and L % for a given luster, x i. The red arrow indiated the portion of data to be dropped.. Converge entroids and delete exessive ones to find the definitive luster entroid: O(T µ N log(n)), weighted loal data points: O(T Σ N K 3 ), e. Re-assign data points to eah luster id via the Gaussian distribution, P(x µ ): O(N ), where N is the total number of data points, M is the number of entroieeds, T µ is the entroid iteration steps, N is the number of loal data points that belong to µ, T Σ is the iteration steps in d., and K is the dimension (feature) of the data. Note that, a matrix-inversion operation is required for Eq. 3, and it takes O(K 3 ) run time omplexity. If there are only few features (small number of K) to be onsidered, this operation ould be regarded as onstant run time omplexity. Finally, it is easy to know the bottlenek of the entire algorithm is in either. or d. whih depends on the types of data sets. Therefore, the upper limit run time omplexity ould be roughly estimated, O(T max N log(n)), where the maximum of iterations, T max, is less then 20 in most of the ases. C. Post lustering proess Clustering algorithms serve in many different purpose of usage. For example, in a loth store, the salesman an apply some lustering algorithms to suggest a ustomer to buy whih size of loth based on their hight and weight. In this situation, almost all data points (ustomers) should be onsidered, and thus to be assigned to the orrespond luster entroids (the size labels). However, it is not a good idea to inlude all data points in some other situations, where some falsely lassified data points need to be avoid based on experimental fats. In this situation, it is more prefferable to take data points whih are loser to the luster entroid. If we are dealing with the seonenario, the benefit of the Gaussian distribution beome obvious. Due to the nature of Perentage ut-off threshold, L % : For any luster of entroid-, x i, sort the data points aording to the P-value in asending order, sort{p ( x i µ )}, (9) and drop L % of data from the begin of the sorted data list. Separation ut-off threshold, L s : For any data point, x i, alulate first aneond maximum value of P ( x i µ ) denoted as P ( x i 1 st ) and P ( x i 2 nd ). Finally, drop data x i if the followig riterion mathed, P ( x i 1 st ) P ( x i 1 st ) + P ( x i 2 nd ) < L s. (10) In general, L p itself an ensure the data quality and exlude the false lassified data points. However, the simple definition of L p may ause the imbalane loading of eah luster due to the variane of shapes of eah luster, P ( x µ ). Therefore, L % an better ensure a balaned loading of data points in eah luster. After all, L s an ensure the separations of two lusters. IV. CONCLUSION In this paper, I introdued an effiient multi-dimensional lustering algorithm based on the multivariate Gaussian funtion. The run time omplexity of this new algorithm is muh better then the Gaussian mixture model due to the lusters are alulated with loally weighted data points. On the other hand, similar to Hdbsan algorithms, it automatially find out the loations of eah luster with a better run time omplexity (the run time omplexity for Hdbsan is roughly O(N 2 log N)). It would be worth to mention, sine most of the operations of this new algorithm are just vetor summations, whih means it an be easily aelerated with a multithread parallel sheme. While, one an perform a similar alulation by the mixture of Dbsan/Hdbsan and Gaussian mixture model, 1. run Dbsan/Hdbsan to find out the optimal luster number and approximate loations of entroids,

5 5 2. run Gaussian Mixture model based on the input of luster number and loations of entroids. However, due to the run time omplexity of Dbsan/Hdbsan and Gaussian mixture model and the diffiulties of parallel the algorithm for minimal-spanning-tree, it is not pratiall to take this mixed two step algorithm rather then our new algorithm. I have testeome randomly generated luster data with 150,000 features, over all, the run time is less than 20 seonds under a 2.5GHz single threaded CPU. The ode is written in C++ with boost library for the need of R-tree data struture. 1 C. C. Aggarwal and C. K. Reddy, Data Clustering: Algorithms and Appliations, CRC Press, (2013). 2 A. A. Abbasi and M. Younis, ACM Computer Communiations 30 (1415) , (2007). 3 M. Inaba, N. Katoh and H. Imai, Proeedings of 10th ACM Symposium on Computational Geometry. pp , (1994). 4 R. O. Duda and P. E. Hart, Pattern lassifiation anene analysis, John Wiley & Sons, (1973). 5 M. Ester, H.-P. Kriegel, J. Sander and X. Xu, AAAI Press. pp , (1996). 6 R. J. G. B. Campello, D. MoulavI, J. Sander, Density-based lustering based on hierarhial density estimates., ACM 10 Issue 1, Artile No. 5., (2015), 7 L. MInnes and J. Healy, arxiv: , (2017).

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Adapting K-Medians to Generate Normalized Cluster Centers

Adapting K-Medians to Generate Normalized Cluster Centers Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Chromaticity-matched Superimposition of Foreground Objects in Different Environments

Chromaticity-matched Superimposition of Foreground Objects in Different Environments FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu

PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu 20th European Signal Proessing Conferene EUSIPCO 2012) Buharest, Romania, August 27-31, 2012 PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING Yesheng Gao, Kaizhi Wang,

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Segmentation of brain MR image using fuzzy local Gaussian mixture model with bias field correction

Segmentation of brain MR image using fuzzy local Gaussian mixture model with bias field correction IOSR Journal of VLSI and Signal Proessing (IOSR-JVSP) Volume 2, Issue 2 (Mar. Apr. 2013), PP 35-41 e-issn: 2319 4200, p-issn No. : 2319 4197 Segmentation of brain MR image using fuzzy loal Gaussian mixture

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Weak Dependence on Initialization in Mixture of Linear Regressions

Weak Dependence on Initialization in Mixture of Linear Regressions Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Adaptive Implicit Surface Polygonization using Marching Triangles

Adaptive Implicit Surface Polygonization using Marching Triangles Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

An Improved Brain Mr Image Segmentation using Truncated Skew Gaussian Mixture

An Improved Brain Mr Image Segmentation using Truncated Skew Gaussian Mixture (IJACSA International Journal of Advaned Computer Siene and Appliations, Vol. 6, No. 7, 25 An Improved Brain Mr Image Segmentation using Gaussian Mixture Nagesh Vadaparthi Department of Information Tehnology

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Define - starting approximation for the parameters (p) - observational data (o) - solution criterion (e.g. number of iterations)

Define - starting approximation for the parameters (p) - observational data (o) - solution criterion (e.g. number of iterations) Global Iterative Solution Distributed proessing of the attitude updating L. Lindegren (21 May 2001) SAG LL 37 Abstrat. The attitude updating algorithm given in GAIA LL 24 (v. 2) is modified to allow distributed

More information

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies ACM Symposium on Solid Modeling and Appliations (2004) P. Brunet, N. Patrikalakis (Editors) Plumber: a method for a multi-sale deomposition of 3D shapes into tubular primitives and bodies M. Mortara G.

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Locality-Sensitive Hashing Scheme Based on p-stable Distributions

Locality-Sensitive Hashing Scheme Based on p-stable Distributions Loality-Sensitive Hashing Sheme Based on p-stable Distributions Mayur Datar Department of Computer Siene, Stanford University datar@s.stanford.edu Piotr Indyk Laboratory for Computer Siene, MIT indyk@theory.ls.mit.edu

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

12 Rational Functions

12 Rational Functions Funtions Conepts: The Definition of a Funtion Identifing Funtions Finding the Domain of a Funtion The Big-Little Priniple Vertial and Horizontal Asmptotes The Graphs of Funtions (Setion.) Definition. A

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Rapid, accurate particle tracking by calculation of radial symmetry centers

Rapid, accurate particle tracking by calculation of radial symmetry centers Rapid, aurate partile traing by alulation of radial symmetry enters Raghuveer Parthasarathy Supplementary Text and Figures Supplementary Figures Supplementary Figure 1 Supplementary Figure Supplementary

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Development Length: Compression Bars

Development Length: Compression Bars CHAPTER Reinfored Conrete Design Fifth Edition DEVELOPMENT, SPLICES, AND SIMPLE SPAN BAR CUTOFFS A. J. Clark Shool of Engineering Department of Civil and Environmental Engineering Part I Conrete Design

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Triangles. Learning Objectives. Pre-Activity

Triangles. Learning Objectives. Pre-Activity Setion 3.2 Pre-tivity Preparation Triangles Geena needs to make sure that the dek she is building is perfetly square to the brae holding the dek in plae. How an she use geometry to ensure that the boards

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org

More information

We P9 16 Eigenray Tracing in 3D Heterogeneous Media

We P9 16 Eigenray Tracing in 3D Heterogeneous Media We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

Stable Road Lane Model Based on Clothoids

Stable Road Lane Model Based on Clothoids Stable Road Lane Model Based on Clothoids C Gakstatter*, S Thomas**, Dr P Heinemann*, Prof Gudrun Klinker*** *Audi Eletronis Venture GmbH, **Leibniz Universität Hannover, ***Tehnishe Universität Münhen

More information

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China

More information

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models Fast Rigid Motion Segmentation via Inrementally-Complex Loal Models Fernando Flores-Mangas Allan D. Jepson Department of Computer Siene, University of Toronto {mangas,jepson}@s.toronto.edu Abstrat The

More information

Year 11 GCSE Revision - Re-visit work

Year 11 GCSE Revision - Re-visit work Week beginning 6 th 13 th 20 th HALF TERM 27th Topis for revision Fators, multiples and primes Indies Frations, Perentages, Deimals Rounding 6 th Marh Ratio Year 11 GCSE Revision - Re-visit work Understand

More information

-z c = c T - c T B B-1 A 1 - c T B B-1 b. x B B -1 A 0 B -1 b. (a) (b) Figure 1. Simplex Tableau in Matrix Form

-z c = c T - c T B B-1 A 1 - c T B B-1 b. x B B -1 A 0 B -1 b. (a) (b) Figure 1. Simplex Tableau in Matrix Form 3. he Revised Simple Method he LP min, s.t. A = b ( ),, an be represented by Figure (a) below. At any Simple step, with known and -, the Simple tableau an be represented by Figure (b) below. he minimum

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

AN ANT BASED SIMULATION OPTIMIZATION FOR VEHICLE ROUTING PROBLEM WITH STOCHASTIC DEMANDS. Mukul Tripathi Glenn Kuriger Hung-da Wan

AN ANT BASED SIMULATION OPTIMIZATION FOR VEHICLE ROUTING PROBLEM WITH STOCHASTIC DEMANDS. Mukul Tripathi Glenn Kuriger Hung-da Wan Proeedings of the 29 Winter Simulation Conferene M. D. Rossetti, R. R. Hill, B. Johansson, A. Dunin and R. G. Ingalls, eds. AN ANT BASED SIMULATION OPTIMIZATION FOR VEHICLE ROUTING PROBLEM WITH STOCHASTIC

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

ICCGLU. A Fortran IV subroutine to solve large sparse general systems of linear equations. J.J. Dongarra, G.K. Leaf and M. Minkoff.

ICCGLU. A Fortran IV subroutine to solve large sparse general systems of linear equations. J.J. Dongarra, G.K. Leaf and M. Minkoff. http://www.netlib.org/linalg/ig-do 1 of 8 12/7/2009 11:14 AM ICCGLU A Fortran IV subroutine to solve large sparse general systems of linear equations. J.J. Dongarra, G.K. Leaf and M. Minkoff July, 1982

More information

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs? One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

with respect to the normal in each medium, respectively. The question is: How are θ

with respect to the normal in each medium, respectively. The question is: How are θ Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Adaptation of Rigid Registration Algorithm to the Fingerprints Identification

Adaptation of Rigid Registration Algorithm to the Fingerprints Identification Amerian Journal of Software Engineering and Appliations 205; 4(6): 07-4 Published online Otober 8, 205 (http://www.sienepublishinggroup.om/j/ajsea) doi: 0.648/j.ajsea.2050406.2 ISSN: 2327-2473 (Print);

More information

Relevance for Computer Vision

Relevance for Computer Vision The Geometry of ROC Spae: Understanding Mahine Learning Metris through ROC Isometris, by Peter A. Flah International Conferene on Mahine Learning (ICML-23) http://www.s.bris.a.uk/publiations/papers/74.pdf

More information

1-D and 2-D Elements. 1-D and 2-D Elements

1-D and 2-D Elements. 1-D and 2-D Elements merial Methods in Geophysis -D and -D Elements -D and -D Elements -D elements -D elements - oordinate transformation - linear elements linear basis fntions qadrati basis fntions bi basis fntions - oordinate

More information

Finding the Equation of a Straight Line

Finding the Equation of a Straight Line Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information