Some Handwritten Signature Parameters in Biometric Recognition Process
|
|
- Joella Burns
- 6 years ago
- Views:
Transcription
1 Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland Tomasz Para Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland Abstract. In tis paper tere is te off line type signature analysis profoundly considered. Te analysis consists of tree stages wic allow to define te features (weigts) of te signature. Different influences of suc features are tested and stated. In tis paper personal signature is first pre-processed and ten processed in te tree-stage metod. In proposed approac te Houg transform is introduced, te centre of signature graity is determined, and te orizontal and ertical signature istograms are performed. Proposed approac gies good signature recognition leel, ence described metod can be used in many areas, for instance in biometric autentication, eiter as biometric computer protection or as a metod of te analysis of person s beaiour canges. Keywords. Signature recognition, Houg transform, pre-processing, features extraction 1. Introduction Te signature recognition is te process aiming at writer s erification. During tis process te samples of signatures are compared wit te oter ones gatered in te database records. Te signature recognition is one of many biometric identification tecniques wic are used in practice. In te business world we sign different papers suc as accounts and oter official documents. Personal signature lends itself well to biometric erification in state of te art electronic deices. Numerous metods and approaces are summarised in a number of surey articles [1,,4]. Signature recognition can be realised by means of static or dynamic metods [1]. Static metods, based on bitmap image analysis, do not require specialised deices, for example pressure-sensitie pens and surfaces, ence are willingly used. Dynamic metods, were time, stroke, speed and signature pressure are additionally recorded, are expensie and signature capturing is ery often uncomfortable. It sould be stressed tat dynamic metods are difficult to forge [1,4]. In our approac new signature parameters are also determined were centre of signature s istogram was computed and proportion factor was establised. Proposed metod gies better results of recognition and erification comparing wit metods described in [1,4]. Complete inestigation results could not be included as oer 8 signatures from database were tested. One drawback of signature is tat people do not sign in exactly te same manner. For example, te angle at wic tey sign may be different due to seating position or due to and placement on te writing surface. For tis reason, te original signature sould be appropriately formatted and pre-processed. In our approac, te signature analysis process is composed of tree main stages: pre processing: were image binarization and its size standardization are performed, feature extraction: were te unique set of caracteristics of te analysed signature is gatered, comparison: were personal signature is compared wit te pattern from te signatures database.. Pre-processing A wide ariety of deices capturing signature causes te need to normalize an input image of signature (so called: pre-processing). Te pre processing procedure consists of tree steps: binarization, cutting edges, tinning..1. Binarization It allows us to reduce te amount of image information (remoing colour and background), so te output image is black-wite. Te blackwite type of te image is easier to furter processing. 185 Proceedings of te ITI 7 9 t Int. Conf. on Information Tecnology Interfaces, June 5-8, 7, Catat, Croatia
2 .. Cutting edges Size of te image is reduced. In tis procedure unnecessary signature areas are remoed. In oter words, we find te max/min alue of te X and Y coordinates of te signature (Fig.1) and ten te image is cut to te signature size. It allows to reduce te total number of te pixels in te analysed image (Fig. )..3. Tinning Figure 1. Input image Figure. Reduced image size It allows us to form a region-based sape of te signature. It sould be noticed tat main features of te object are protected. After tinning, te 1-pixel sape of signature is obtained. Good results of image tinning can be acieed from so called Palidis algoritm [3]. 3. Features extraction During tat step a gatering of caracteristic data takes place. Te output result is a set of te unique information about te signature. Actions occurring during tat step supply: proportion factor, ertical and orizontal projection, centre of graity, te Houg transform Proportion factor Proportion factor defines te relation between widt w and eigt of te different personal signatures, wic are signed by te same person. Value of te proportion factor is calculated by te formulas: w γ = if w (1) γ = if w < () w 3.. Vertical and orizontal projection Tis metod describes te ertical and orizontal signature pixels density (istogram). Te istogram is obtained in two-passes algoritm, were te number of signature s pixels in eac row and in eac column is counted. Obtained results are stored in te two one-dimensional auxiliary tables T (for ertical part of te image) and T (for orizontal part of te image). After te data collecting, appropriate image projections are calibrated to resolution of pixels. In te first stage te calibration coefficient is calculated: max{ XY, } δ = (3) 56 In te next stage two normalized projection arrays N i N are prepared: T [ round ( i * δ )] N [ i] = round( ), i =,..., 55 (4) δ T [ round( i * δ)] N [ i] = round ( ), i =,..., 55 (5) δ Applying te size normalized calibration approac allows to compare te image s projections for different size of signatures Centre of graity It supplies information about te layout of pixels density. It is a point G(x g,y g ) were appropriate lines A and B are crossing, wat presents Fig. 3. Tese lines diide te signature image into ertical and orizontal regions so tat te number of pixels was te same in eac region. Te coordinates (x g,y g ) are obtained basing on analysis of te ertical and orizontal projection arrays N and N., respectiely. Te alue of te coordinate x g is equal to suc index k x of te cell of te N array, for wic te next condition is fulfilled: N [] i N [] i (6) kx 1 kx i= i= N [] i < N [] i i= i= 186
3 Figure 3. Signature centre of graity Te alue of te coordinate y g is equal to suc index k y of te cell of te N array, for wic te next condition is fulfilled: N [] i N [] i (7) ky 1 ky i= i= N [] i < N [] i i= i= 3.4. Te Houg Transform In te last stage te Houg Transform (HT) is used [1]. Tis algoritm searces a set of straigt-lines, wic appear in te analyzed signature. Te classical transformation identifies straigt-lines in te signature image but it as also been used to identifying te signature sapes. In te first step te HT is applied, were appropriate straigt-lines are found (Fig.4). Te analyzed signature consists of large number of straigt-lines, wic were found by te HT, ence reduction of te unnecessary lines sould be carried out. For tis reason additional straigt-line selection algoritm is applied [4]. In tis algoritm some lines are remoed and te set of reduced straigt-lines can be performed. It can be obsered (Fig. 4) tat a lot of straigt-lines are related ery close to eac oter and are quite similar (sligtly different at angles and positions). Te straigt-line selection algoritm remoes suc lines. Te range of te lines reduction by experiments is matced, were tresolding procedure is applied [1,4,6]. A result of te straigt-line reduction presents Fig.5. Te Houg Transform is well known in te researc community, terefore teir details will be omitted. In te next step, te set of te reduced straigt lines is excanged for appropriate sections by means of te backpropagation algoritm [5,6]. Te set of te sections (Fig.6) is analyzed again and te sections lying along te same direction are connected (Fig. 7). Suc step allows to reduce number of signature features. Figure 5. Te reduced number of te lines Te result of te canges presents Fig. 6. Figure 6. Te sections extracted from lines Figure 7. Joined sections Additionally, for eery section l i teir (x i,y i ) coordinates are stored in auxiliary table. Finally, te sections image is calibrated to te pixel-size image. It allows to compare signatures, wic originate from different sources and ae different sizes (Fig.8) Figure 4. Straigt-lines extracted from te image (Fig.) by means of te HT Figure 8. Te normalized size of te image from te Fig. 7 Te reduced set of sections is te most unique feature, wic describes te signature. It will be sown in te conclusie inestigations. 187
4 4. Determining of te pattern signature For recognition process, te input and genuine signatures sould be known. In tis process, te unique features (patterns) of eac signature are compared wit analyzed input sign. For tis reason, te patterns of te genuine signature are stored in a database. Tese patterns would contain all caracteristic features of signature. Unfortunately, signatures of te same person ae some differences. So it is needed to build a pattern, wic coers tese differences. In proposed approac, a procedure tat determines similarity between signatures S 1 and S was implemented. As an input data te two sets of unique features of te signatures S 1 and S are analyzed. Te first set Ω S1 includes all straigt-lines, wic were found in te signature S 1 (person signature). Te second set Ω S includes all straigt-lines, wic were found in te signature S (from database). Te result of te comparison is te global signature similarity coefficient s. During te first step te straigtline similarity coefficient is determined. Eac line i-t from te first set Ω S1 is compared wit te adequate j-t line wit te most appropriate coordinates in te second set Ω S. Te basic principle of te lines comparison presents Fig. 9. From tis figure follows, tat te i-t straigtline as coordinates ( B, E ) B 1 1 1( x, y ), E 1 1 1( x, y ). Te b b e1 e1 appropriate j-t straigt-line as coordinates ( B, E ) B ( x, y ), E ( x, y ). Hence, te b b e e partial similarity coefficient i can be calculated from te formula: Δ B+ΔE ε i = 1 (8) Δ B= ( x x ) + ( y y ) (9) b1 b b1 b Δ E = ( x x ) + ( y y ) (1) e1 e e1 e were: Δ B distance between beginning of te i-t and j-t straigt-line coordinates, Δ E distance between end of te i-t and j-t straigt-line coordinates In te next stage te j-t straigt-line is remoed from te second set and te next straigt-line from te first set is analyzed. After tat, te algoritm is repeated in just opposite way (te lines from second set are compared to line from te first set) and we receie j coefficient. Figure 9. Basic principles of te comparison of te two different straigt-lines All partial coefficients are summarized and te mean alue is calculated: ε + ε i j i j s s = (11) were i = card( Ω ) and j = card( Ω ). S1 S Te next stage of our algoritm determines te projection similarity coefficient. Data about orizontal and ertical projection are stored in two one-dimensional 1 56 arrays: N and N. Usually projections of two images are sligtly sifted to eac oter. For tis reason projections are compared to eac oter many times wit some deiation d= ± 1 pixels. Te results are stored in te arrays T and T for te ertical and orizontal projection, respectiely: T [] i = N [] i N [], i i =,...,55, 1, (1) T [] i = N [] i N [], i i =,...,55, 1, were: N1,, N ertical and orizontal projection 1, arrays, for te signature S 1, N,, N ertical and orizontal projection, arrays, for te signature S from te database. and ten te partial similarity coefficients ( and ) are determined for eac table: 55 T [] i σ = 1 i= 56 (13) 55 T [] i σ = 1 i= 56 (14) Te global projection similarity coefficient is calculated by te formula: max{ σ d,,..., σd, } + max{ σ d,,..., σd, } s p = (15) 188
5 In te last stage te proportion similarity coefficient s r is calculated: γ γ 1 s r = 1 (16) and centre of graity similarity coefficient s g : ΔG sg = 1 (17) were G distance between coordinates of centre of graity G 1 (x g1,y g1 ) for signature S 1 and centre of graity G (x g,y g ) for te signature S from te database, respectiely. Finally, te global similarity coefficient is calculated by using te following formula: s = sp + s p + sp + sp (18) s s p p r r g g were : s s sections similarity coefficient, s p projection similarity coefficient, s r proportion similarity coefficient, s g centre of graity similarity coefficient. Aboe mentioned coefficients are formed by comparing eac feature from one set wit corresponding feature from te oter set. Finally, te appropriate similarity coefficients are calculated. For eery similarity coefficient s, appropriate feature weigt p s, p p, p r, p g is selected and additionally, te condition p s +p p +p r +p g =1 as to be fulfilled. Te weigts alues were empirically determined. It was establised, tat weigts, were te best participation of te features were performed, ae alues: p s =.54, p p =.3, p r =. and p g =.1. Wen te similarities procedure is already implemented, it is possible to build a signature patterns. Te patterns are determined on te basis of a few (say tree) signatures of te same person. Suc signatures sould be collected at different day time, during te wole week. At te next stage, features of te tree signatures are compared wit eac oter. As te pattern is cosen tis signature tat as te igest global similarity ratio (i.e. tat is te most similar to oters signature), tat pattern and its caracteristic features, are stored in te database. Using tat pattern can be performed for all future comparisons. About 8 signatures were collected in our own database. All signatures were stored as bitmaps. From database, 8 signatures were randomly cosen. Eac signature was collected four times ( signatures session wit an interal of two weeks). On te basis of 8 4=11 signatures efficiency of te proposed metod were tested. From 4 signatures of te same person global features were extracted and stored in te database. 5. Signature erification and identification Tere are two areas of application for signature recognition systems: Verification were te input signature (and its caracteristic features) is compared wit one pattern from te database and judging if tese signatures are te same or not. Identification were te corresponding pattern in database is searced until te one matces te input signature. Bot metods aboe use global similarity coefficient and global tresold alue [,5]. Te erification and identification are successful if te similarity for a tested signature is greater or equal to global tresold alue. Te global tresold alue bases on te formula: t = (1 ψ )( t p + t p + t p + t p ) (19) were: t s, t p, t r, t g p s, p p, p r, p g ψ s s p p r r g g partial tresolds for te elements of te pattern (set of sections, projection, proportion factor, centre of graity) importance (weigt) for eac feature tolerance coefficient Te global tolerance coefficient decreases (increases) all partial tresolds t s, t p,t r, t g of k %. For example if =k% ten t s = t p =t r = t g =k%. Te tolerance coefficient as some considerable influence on te final result of erification or identification. If condition s t is fulfilled ten signatures identification process is positie, oterwise if s < t identification is negatie compared signatures belong to different persons. 6. Inestigation results In te inestigations, caracteristic features (set of sections, projection, proportion coefficient, centre of graity) ae been tested separately and te influence of te eac feature as been obsered. Te test gies information about canges coefficients (False Accept Rate) and (False Reject Rate). Te typically is stated as te ratio of te number of false acceptances (N ) diided by te number of total identification attempts T. Te is stated as te ratio of te number of false rejections (N )diided by te number of total identification attempts T. 189
6 For identification mode T=11 signatures were analyzed and N =, N =6. For erification mode, for we ae T 1 =4 7 8=34, N =119. For, T =11, N =6. T=T 1 +T =3136. Hence: T ( N + N ) Efficiency = 1% () T Experiments are carried out to estimate te performance of utilizing proposed approac in a combined matcing system. Obtained results ae been sown in Table 1. Retrieing time for one signature is 39ms for identification mode, and 99ms for erification mode (PC AMD Atlon 1.91GHz, RAM 51MB). Table 1. Comparison of te two modes of te signature recognition Identification (%) Verification (%) Efficiency Efficiency 1,79 3,57 94,6 3,94 5,36 96, / (%) / (%) Efficiency (%) Identification Global tresold (%) Verification Global tresold (%) Identification Efficiency Tolerancy (%) Efficiency (%) Conclusions Verification Efficiency Tolerancy (%) A fundamental problem in te field of offline signature erification is te lack of any pertinent sape factors. Te main difficulty in te definition of pertinent features lies in te local ariability of te signature line, wic is closely related to te intrinsic caracteristic of uman beings. In tis paper a new combined metod of signature analysis as been proposed, were extraction of signature sections, its proportion, istograms and te centre of graity are stated. Experimental ealuation of tis sceme as been made using a signature database, wic included 8 genuine signatures. Tis experiment confirmed tat te proposed metod is efficient and its effectieness leel is ery attractie.. References [1] Coetzer J., et al. Offline Signature Verification Using te Discrete Radon Transform and a Hidden Marko Model. EURASIP Journal on Applied Signal Processing 4, 4:, [] Kaewkongka T., et al. Off-line signature recognition using parameterized Houg transform. Proc. of te 5t Int. Symp. on Signal Processing and its Applications. 1999, 1:, [3] Palidis T. A tinning algoritm for discrete binary images. Computer Grapics and Image Processing 198, 13: [4] Sabourin R., Genest G., Preteux F. Pattern Spectrum as a Local Sape Factor for Off- Line Signature Verification. Int. Conf. Pattern Recognition, Austria, Vienna, 1996; 3:
Vector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationPlayer Number Recognition in Soccer Video using Internal Contours and Temporal Redundancy
Player Number Recognition in Soccer Video using Internal Contours and Temporal Redundancy Matko Šarić, Hroje Dujmić, Vladan Papić, Nikola Rožić and Joško Radić Faculty of electrical engineering, Uniersity
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationOn Calibrating a Camera Network Using Parabolic Trajectories of a Bouncing Ball
On Calibrating a Camera Network Using Parabolic rajectories of a ouncing all Kuan-Wen Cen, Yi-Ping Hung,, Yong-Seng Cen 3 Department of Computer Science and Information Engineering, National aiwan Uniersity,
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationOn the use of FHT, its modification for practical applications and the structure of Hough image
On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy
More informationProceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,
Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationClassification of Osteoporosis using Fractal Texture Features
Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,
More informationMemory resources in hardware implementations of BLAKE and BLAKE2 hash algorithms
Journal of Polis Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 8, Number 1, 017 Sugier Jarosław Wrocław Uniersity of Science and Tecnology, Faculty of Electronics, Poland
More informationAn Interactive X-Ray Image Segmentation Technique for Bone Extraction
An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro
More informationUUV DEPTH MEASUREMENT USING CAMERA IMAGES
ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University
More informationTraffic Sign Classification Using Ring Partitioned Method
Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationRECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL
IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More information19.2 Surface Area of Prisms and Cylinders
Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationAn Efficient Four-Parameter Affine Motion Model for Video Coding
SUBMITTED TO IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 1 An Efficient Four-Parameter Affine Motion Model for Video Coding Li Li, Houqiang Li, Senior Member, IEEE, Dong Liu, Member,
More informationVOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm.
OLUME OF A CYLINDER OLUMES Te volume of a cylinder is determined by multiplying te cross sectional area by te eigt. r Were: = volume r = radius = eigt Exercise 1 Complete te table ( =.14) r a) 10 mm 5
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationA signature analysis based method for elliptical shape
A signature analysis based metod for elliptical sape Ivana Guarneri, Mirko Guarnera, Giuseppe Messina and Valeria Tomaselli STMicroelectronics - AST Imaging Lab, Stradale rimosole 50, Catania, Italy ABSTRACT
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationHASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS
HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationPedestrian Detection Algorithm for On-board Cameras of Multi View Angles
Pedestrian Detection Algoritm for On-board Cameras of Multi View Angles S. Kamijo IEEE, K. Fujimura, and Y. Sibayama Abstract In tis paper, a general algoritm for pedestrian detection by on-board monocular
More informationHidden Layer Training via Hessian Matrix Information
Hidden Layer Training ia Hessian atrix Information Cangua Yu, icael T. anry, Jiang Li Department of Electrical Engineering Uniersity of Texas at Arlington, TX 7609 E-mail: cangua_yu@uta.edu; manry@uta.edu;
More informationwrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis
Selective Acquisition of 3-D Information Enoug for Finding Passable Free Spaces Using an Active Stereo Vision System Atsusi Nisikawa, Atsusi Okubo, and Fumio Miyazaki Department of Systems and Human Science
More informationMean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.
Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationProceedings. Seventh ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2013) Palm Spring, CA
Proceedings Of te Sevent ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC ) Palm Spring, CA October 9 November st Parameter-Unaware Autocalibration for Occupancy Mapping David Van
More informationYou should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by
Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationNOTES: A quick overview of 2-D geometry
NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationIMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM
Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, 90 96 IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationThe navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4)
A Multi-Resolution Pyramid for Outdoor Robot Terrain Perception Micael Montemerlo and Sebastian Trun AI Lab, Stanford University 353 Serra Mall Stanford, CA 94305-9010 {mmde,trun}@stanford.edu Abstract
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More informationFault Localization Using Tarantula
Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationThe impact of simplified UNBab mapping function on GPS tropospheric delay
Te impact of simplified UNBab mapping function on GPS troposperic delay Hamza Sakidin, Tay Coo Cuan, and Asmala Amad Citation: AIP Conference Proceedings 1621, 363 (2014); doi: 10.1063/1.4898493 View online:
More informationThe (, D) and (, N) problems in double-step digraphs with unilateral distance
Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationHOUGH TRANSFORM GENERATED STRONG IMAGE HASHING SCHEME FOR COPY DETECTION
How to cite tis article: Srivastava, M. Siddiqui, J., & Ali, M. A. (218). Houg transform generated strong image asing sceme for copy detection. Journal of Information and Communication Tecnology, 17(4),
More information8/6/2010 Assignment Previewer
Week 4 Friday Homework (1321979) Question 1234567891011121314151617181920 1. Question DetailsSCalcET6 2.7.003. [1287988] Consider te parabola y 7x - x 2. (a) Find te slope of te tangent line to te parabola
More informationREVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE
International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationA Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image
Journal of Computer Science 5 (5): 355-362, 2009 ISSN 1549-3636 2009 Science Publications A Practical Approac of Selecting te Edge Detector Parameters to Acieve a Good Edge Map of te Gray Image 1 Akram
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationImplementation of Integral based Digital Curvature Estimators in DGtal
Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,
More informationNon-Interferometric Testing
NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault
More informationAVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic
1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance
More informationSlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization
Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary
More informationIntroduction to Computer Graphics 5. Clipping
Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationWhen the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?
8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and
More informationFeature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu
More informationEconomic design of x control charts considering process shift distributions
J Ind Eng Int (2014) 10:163 171 DOI 10.1007/s40092-014-0086-2 ORIGINAL RESEARCH Economic design of x control carts considering process sift distributions Vijayababu Vommi Rukmini V. Kasarapu Received:
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationCS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants
CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt
More informationMAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION
MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,
More informationDesign of PSO-based Fuzzy Classification Systems
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,
More informationθ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)
LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationAll truths are easy to understand once they are discovered; the point is to discover them. Galileo
Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume
More informationClassify solids. Find volumes of prisms and cylinders.
11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder
More informationResearch Article Applications of PCA and SVM-PSO Based Real-Time Face Recognition System
Hindawi Publising Corporation atematical Problems in Engineering, Article ID 530251, 12 pages ttp://dx.doi.org/10.1155/2014/530251 Researc Article Applications of PCA and SV-PSO Based Real-Time Face Recognition
More informationCommunicator for Mac Quick Start Guide
Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationA Parallel Processing Engine for Motion Estimation in MPEG-4 Multimedia Applications
A Parallel Processing Engine for Motion Estimation in MG-4 Multimedia Alications RUI GAO, DOGLAI XU and JOH P. BETLEY Scool of Science and Tecnology Uniersity of Teesside Boroug Road, Middlesbroug, TS1
More informationFace Recognition using Computer-Generated Database
Face Recognition using Computer-Generated Database Won-Sook LEE Scool of Information Tecnology and Engineering University of Ottawa, 800 King Edward Ave Ottawa, Ontario, K1N 6N5, Canada Tel: (1-613) 562-5800
More informationInference Based on SVARs Identified with Sign and Zero Restrictions: Theory and Applications
FEDERAL RESERVE BANK of ATLANTA WORKING PAPER SERIES Inference Based on SVARs Identified wit Sign and Zero Restrictions: Teory and Applications Jonas E. Arias, Juan F. Rubio-Ramírez, and Daniel F. Waggoner
More informationA Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms
WCCM V Fift World Congress on Computational Mecanics July -1,, Vienna, Austria Eds.: H.A. Mang, F.G. Rammerstorfer, J. Eberardsteiner A Finite Element Sceme for Calculating Inverse Dynamics of Link Mecanisms
More information2016 B. Smeets LTH Electrical and Information Technology - Datasäkerhet EDA625 2
epetition Lect 2 - Cryptograpy New paradigms E-commerce non-repudiation, Law enforcement scenario Mecanisms Block cipers, stream cipers, MDC, MAC, SA, key establisment, Kerberos Certificates CA certificates,
More information