An abandoned object detection system based on dual background segmentation

Size: px
Start display at page:

Download "An abandoned object detection system based on dual background segmentation"

Transcription

1 2009 Advaced Video ad Sigal Based Surveillace A abadoed object detectio system based o dual backgroud segmetatio A. Sigh, S. Sawa, M. Hamadlu Departmet of Electrical Egieerig I.I.T. Delhi Delhi, Idia abhiavkumar.sigh@mail2.iitd.ac.i V.K. Madasu, B.C. Lovell School of ITEE NICTA ad The Uiversity of Queeslad Brisbae, Australia v.madasu@uq.edu.au Abstract A abadoed object detectio system is preseted ad evaluated usig bechmark datasets. The detectio is based o a simple mathematical model ad works efficietly at QVGA resolutio at which most CCTV cameras operate. The pre-processig ivolves a dual-time backgroud subtractio algorithm which dyamically updates two sets of backgroud, oe after a very short iterval (less tha half a secod) ad the other after a relatively loger duratio. The framework of the proposed algorithm is based o the Approximate Media model. A algorithm for trackig of abadoed objects eve uder occlusio is also proposed. Results show that the system is robust to variatios i lightig coditios ad the umber of people i the scee. I additio, the system is simple ad computatioally less itesive as it avoids the use of expesive filters while achievig better detectio results. Keywords- video surveillace, left baggage detectio, backgroud segmetatio, trackig I. INTRODUCTION Recet years have see a stark rise i terrorist attacks o crowded public places such as airports, trai statios ad subways, ightclubs, shoppig malls, markets, etc. May surveillace tools have bee employed i the fight agaist terror. Although video surveillace systems have bee i operatio for the past two decades, the aalysis of the CCTV footage has seldom vetured out of the hads of huma operators. Recet studies [1-3] have brought ito fore the limits to huma effectiveess i aalyzig ad processig crowded scees, particularly i video surveillace systems cosistig of multiple cameras. The advet of smart cameras with higher processig capabilities has ow made it possible to desig systems which ca possibly detect suspicious behaviors (i geeral) ad abadoed objects (i particular). A umber of algorithms [5, 7, 8] have bee suggested i the recet past to deal with the problem of abadoed-object-detectio. Due to their depedece o complex probabilistic mathematics, most of these algorithms have failed to perform satisfactorily i real time scearios. I additio, the other difficulty of detectig a abadoed object uder occlusio adds to the overall complexity. Some proposed algorithms [4-5] have dealt with partial occlusio (by movig people) but complete or prologed occlusio (by aother object) has ot yet bee tackled. Furthermore, the backgroud subtractio methods employed i the above methods are either computatioally itesive or lack dyamically updatig features. I this paper, we preset a abadoed object detectio system based o a simplistic ad ituitive mathematical model which works efficietly at QVGA resolutio which is the idustry stadard for most CCTV cameras. The proposed system cosists of a ovel selfadaptive dual backgroud subtractio techique based o the Approximate Media model [6] framework. Algorithms for trackig abadoed objects with or without occlusio are also icluded. A. System Overview The overall system (see Fig. 1) is modular i ature ad cosists of four disparate blocks with each block actig as a discreet processig uit makig it easy to modify ay block, provided the iput ad output data types remai compatible with the coectig blocks. The 4 blocks are: Data extractio ad coversio uit; Backgroud subtractio module; Still object trackig ad occlusio detectio block ad Alarm raisig ad display of result uit A live video stream is iitially segmeted ito idividual images from which a regio of iterest is extracted ad coverted to 3D itesity matrices (height * width * itesity value of each pixel). These matrices are the fed as iput to the Backgroud Subtractio module. II. BACKGROUND SEGMENTATION Numerous backgroud subtractio methods are available i the literature. The most popular beig the oes based o Gaussia mixture models, the first of which was proposed by Friedma ad Russell [12] ad the modified by several authors [13-14] to suit their specific eeds. I this work, a ew backgroud subtractio techique based o the Approximate Media algorithm is developed. This method is adaptive, dyamic, o-probabilistic ad ituitive i ature. Like the majority of other methods (for ex. [6]), we also use pixel color/itesity iformatio for backgroud processig. But istead of havig oe referece frame, we maitai two differet referece frames for self adaptability resultig i less computatio due to o-iclusio of ay complex mathematics. Movig crowd/objects, lightig chages ad uecessary details like shadows, reflectios o floors ad walls are filtered off efficietly with oly statioary objects remaiig i the scee, thus leavig us with the prime motive of detectig abadoed objects. Moreover, havig two backgrouds has a added advatage that the user ca adjust the time iterval betwee the update of referece backgroud frames to suit differet eeds ad eviromets. 1

2 Figure 1: Flowchart of the overall system operatio A. Algorithm The proposed algorithm to separate backgroud ad foregroud i the icomig image is based o the Approximate Media Model [6]. However, our techique requires two referece backgroud images, amely, Curret Backgroud ad Buffered Backgroud. This techique of storig two backgrouds ca be cosidered as a dual backgroud method. Oe of the iterestig features of this techique is that both the backgrouds are updated dyamically. The first oe is updated frequetly while the secod oe has a slower update rate. The first frame of the icomig video is iitialized as Curret Backgroud. Subsequetly, the itesity of each pixel of this curret backgroud is compared with the correspodig pixel of the ext frame (after every 0.4 secods). If it is less, the the itesity of that pixel of curret backgroud is icremeted by oe uit, otherwise it is decremeted by oe uit. I case of equality, the pixel itesities remai uchaged. This way, eve if the foregroud is chagig at a fast pace, it will ot affect the backgroud but if the foregroud is statioary, it gradually merges ito the backgroud. Sice we are iterested i all those objects which are statioary for a log period of time (ad thus have gradually merged ito the backgroud), we maitai aother set of backgroud images called Buffered Backgroud. Here, all those pixels which do ot belog to the prospective abadoed objects set are made equal to that of Curret Backgroud. This is doe at a iterval of every 20 secods. Differece of the two backgrouds is represeted as a biary image with the white portio represetig foregroud (blobs). B. Illustratio The Dual Backgroud techique is illustrated i Fig. 2. Frame 2A shows all the objects that are detected. Frame 2D shows the curret backgroud, which is updated every half a secod. The loger a perso or object stays i A, stroger its impressio is imprited o D. Frame 2E shows the buffered backgroud, which is updated every half a miute, ad does ot cotai abadoed object(s). Hece the differece of 2D ad 2E gives the positio of abadoed objects, which is highlighted i frame 2C, after the object has bee left abadoed for a log eough time. Frame 2B shows the foregroud which comes from differece of 2A ad 2E. Figure 2: Dual Backgroud Segmetatio III. OBJECT DETECTION I this module, we divide the biary image from the previous uit ito a umber of legitimate blobs (rectagular regios eclosig cotiuous regios of foregroud). Oce the blobs ad their various properties like area, cetroid positio etc. have bee geerated, we apply the trackig algorithms. A. Mathematical Model Let us suppose that after blob aalysis we get N umber of blobs, each with its eclosig regio R (t, l, h, w), its area A ad cetroid C (i,j). Figure 3: A typical blob where, t is the top positio value of pixel; l is the left positio value of pixel; h gives the height of the blob; ad w is the width of the blob; ad 1 N Let T be the set of tracked blobs such that, [ B : B = { R ( t, l, h, w), A, C ( i, j), t, m }] T = 1 M 2

3 where, M is the umber of tracked blobs; t is the umber of frames for which the blob has bee tracked ad m is the umber of cosecutive frames for which the blob beig tracked previously has bee ot detected Let us call the preset set of blobs which we get after aalysis of the preset frame as P ad its objects as b, which are N i umber. The the set of blobs is: [ b : b = { r ( t, l, h, w), a, c ( i, j) }] T = 1 N B. Blob detectio The blob aalysis takes as a iput a biary image, applies a algorithm similar to the oe described i [11] ad returs various properties of the detected blobs like boudig box, area, cetroid positio etc. A simplified versio of the algorithm is as follows: 1. Create a regio couter. 2. Sca the image from left to right ad from top to bottom. 3. For every pixel check the orth ad west pixel (4- coectivity) or the ortheast, orth, orthwest, ad west pixel (8-coectivity) for a itesity value of 1 i the biary image (termed as criterio of blob aalysis) 4. If oe of the eighbors fit the criterio the assig to regio value of the regio couter. Icremet regio couter. 5. If oly oe eighbor fits the criterio, assig pixel to that regio. 6. If multiple eighbors match ad are all members of the same regio, assig pixel to their regio. 7. If multiple eighbors match ad are members of differet regios, assig pixel to oe of the regios ad idicate that all of these regios are the equivalet. 8. Sca image agai, assigig all equivalet regios the same regio value. C. Trackig The ext process i object detectio is trackig the differet blobs so as to fid which blobs correspod to abadoed objects. The first step i this process is to create a set, Track, whose elemets have three variables: blob- Properties, hitcout ad misscout. The ext step is to aalyze the icomig image for all the blobs. If the area chage ad the cetroid positio chage, as compared to ay of the elemets of the set Track are below a threshold value, we icremet hitcout ad reiitialize misscout with a zero; otherwise we create a ew elemet i the Track-set, iitializig the blob-properties variable with the properties of icomig blob ad hitcout ad misscout are iitialized to zero. We the ru a loop through all the elemets of the set. If the hitcout goes above a user defied threshold value, a alarm is triggered. If the misscout goes above a threshold, we delete the elemet from the set. These two steps are repeated util there are o icomig images. Pseudo Code for Trackig Take area, cetroid, boudig boxes (bbox) ad total umber of blobs () as iput from Blob Aalysis block. Let Track=empty set of vectors of type t where t=(area, cetroid, bbox, hitcout, misscout,active,occluded) m= Track.Size For i=1 to c=0 For j=1 to m If (percetage backgroud i Track[j].area<50) The Track[j].occluded=true Ed If ( area[i] Track[j].area /area[i] <.05 ad cetroid[i] Track[j].cetroid /cetroid[i]<.05) The Track[j].active =true, c=1, break from loop Ed Ed If c=0 The k=track.size++, Track[k].area = area[i]; Track[k].cetroid = cetroid[i]; Track[k].bbox = bbox[i]; Track[k].hitcout = 1; Track[k]. active = true; Ed Ed m= Track.Size For j=1 to m If (Track[j].active==true) The Track[j].hitcout=Track[j].hitcout+1; Track[j].miscout=0; If (Track[j].hitcout > 4) Do t update pixels of Track[j].bbox i buffered backgroud Ed If (Track[j].hitcout > 40) The raise alarm for Track[j] Ed If (Track[j].active==false ad misscout >3) The delete Track[j] Ed Ed Update the buffered backgroud D. Occlusio Detectio ad Trackig A tracked blob is cosidered to be occluded if its major regio (say 80 %) is covered by foregroud ad it should cotiue to be tracked if either it is occluded or its area ad cetroid is matched with ay of the blobs of set P. A alarm is raised if t > threshold. The blob is removed from T if m >3. This idea is similar to the method used i [7] ad [8] for occlusio detectio, but istead of 3

4 keepig track of two differet foregrouds, we propose the followig modificatio. Let us assume that a particular portio of the frame cotaiig the blob which is beig tracked (i.e. preset i the Track set of blobs) is ow occluded. Due to this occlusio, the blob sigifyig that particular object wo t be icluded i the preset set of Track. Mathematically, t = t + 1 ad m = 0 if R A > 0.8 ( i, j) c ( i, j) C k or A 1 k m else m = m < 0.1ad A a A k < 0.1 Followig are the possibilities i the ew frame of the blob that was beig tracked up to previous frame:- Object is removed from the locatio. I this case, the blob area represetig the object should cotai backgroud pixels. There may be a ew object at the same locatio. There is a ew object which completely or partially occludes the old object. A exceptio to the above cases is whe a tracked object is removed while beig occluded or aother object of similar size is placed i camera s lie of view. To deal with occlusio we have added the followig two steps to the trackig algorithm: Step 1: Calculate the umber of pixels of buffered backgroud which are same as that of curret backgroud for that elemet of set Track which has suddely stopped beig tracked (due to occlusio, or removal from scee). If it s below a threshold value, say 50 percet, ad the hitcout is above a threshold value (makig sure the blob has bee tracked log eough), we label this elemet of the set Track as occluded. Step 2: Go to step 2 of the trackig algorithm. A blob labeled occluded remais i the Track set; i.e. its hitcout is icremeted ad misscout is reiitialized. Rest of the trackig algorithm remais same. E. Alarm ad Display We use the Raise-alarm flag from previous uits ad highlight that part of the video for which the alarm has bee raised. We also display the biary-image (without backgroud) video so that the operator ca fie tue the value of D for shadow ad reflectio subtractio. IV. RESULTS AND ANALYSIS All algorithms described above are applied o stadard bechmark datasets for obtaiig experimetal results. A. Datasets The experimets were computed o Itel Core 2 Duo processor with 1 GB RAM. Every video was scaled dow to QVGA resolutio (320x240) ad 10 fps frame rate before further aalysis. Five differet situatios ivolvig differet crowd desities ad various sizes of objects were selected from the PETS 2006 dataset ad two differet situatios were aalyzed from AVSS 2007 i-lids Abadoed Baggage Traiig dataset, oe with a low crowd desity while the other had a medium crowd desity. Both datasets ivolved surveillace feed from metro statios, sapshots of which are give below. Figure 4: Sapshot of PETS & AVSS datasets The PETS dataset was recorded at a metro statio ad each scee ivolved a perso with a bag who loiters for a while before leavig the bag uatteded. The details of videos which were aalyzed are as follows: Dataset S1 (Take 1-C) : 1 perso, 1 luggage item, difficulty 1/5 Dataset S2 (Take 3-C) : 2 people, 1 luggage item, difficulty 3/5 Dataset S5 (Take 1-G) : 1 perso, 1 luggage item, difficulty 2/5 Dataset S6 (Take 3-H) : 2 people, 1 luggage item, difficulty 3/5 Although groud truth for all the videos was available, it was ot utilized as our model dyamically updates the backgroud ad is therefore ot scee specific. Each scee of PETS dataset was recorded from four differet agles, resultig i 20 differet videos from PETS dataset ad two videos from AVSS dataset. B. Setup The miimum time for which the object remais statioary ad abadoed, before the alarm is raised, ca be varied ad should be ideally 2 to 3 miutes, but sice the total time for which a video i our dataset rus is less tha 3 miutes, we have kept the miimum time as 30 secods or 300 frames fps). Oce the object starts gettig tracked, aythig which occludes it is take care by our algorithm. Hece the trackig time remais costat at aroud 30 secods, i ay situatio for ay statioary object before the alarm is raised. 4

5 Time take for the alarm to be stopped after the object is removed from the site, depeds o how soo the impressio of the object o the curret backgroud disappears ad hece the differece betwee the itesities of buffered backgroud ad curret backgroud pixels becomes isigificat. This time depeds o curretbackgroud-update-rate ad how differet the object is from the thigs which are behid it i the scee. Sice this time depeds o the object ad scee textures, it varies from five to te secods. Figure 5: Abadoed object detectio process False alarm is raised or the object is ot detected i oly three cases. Each case ad the reaso for failure are give as follows: Object gets camouflaged by the backgroud ad fails detectio ( o ): 2 videos Object is correctly detected but a very still perso also gets detected ( p ): 1 video Object is correctly detected, o perso is detected but a uwated blob is also icorrectly detected as a abadoed object ( b ): 3 videos Figure 6: Occluded abadoed object detectio Although, the system performace ca be measured via commo metrics such as the ROC curves, we have defied the success rate of our algorithm usig a score which is equivalet to the ratio of the total umber of videos aalyzed to the umber of successfully aalyzed videos. Mathematically, S = ( ) o p We defie the parameter for measurig successful videos i the above fashio because our algorithm completely fails if o object is detected, it partially (50% failure) succeeds if object is detected but alog with it a still perso is also detected, ad it fails very little (25% failure) if the object is correctly detected, o perso is detected but a uwated blob is icorrectly detected as a abadoed object. The overall results are illustrated i Table 1. A total of 22 videos were aalyzed from both the PETS ad AVSS datasets. There were two complete failures as the system was uable to detect the abadoed objects i the video frames. There was oe partial failure i which a still perso was also detected as a abadoed object. I additio, there were three videos i which uwated blobs were sometimes classified as abadoed objects. By applyig the formula for the performace score as explaied above, we achieved a success rate of 85.2%. The results are comparable to the methods preseted i the literature ad are sigificat because of lesser computatio ad faster processig. C. Discussio of Results Based o the results ad aalysis, we ca coclude that low to medium desity crowd has o effect o processig speed or accuracy of the model. I a high desity sceario, there is a possibility that the object is proe to be hidde from camera view for most of the time or i other words it is camouflaged by the backgroud leadig to a failure i detectio. Aother achievemet of this model was that differece i lightig coditios had almost egligible effect o the operatig performace. This ca be attributed to the use of Dyamic Backgroud techique. The system will thus work perfectly i a ope eviromet (uder sulight) too. Additioally, shadow effects ad reflectio of light from bright objects do ot pose ay problems. The algorithm works i real time at QVGA resolutio ad 10 fps frame rate, ad has a high success rate of 85%. Eve decreasig the frame rate to as low as 3 or 4 fps has isigificat effects o the accuracy of the model. Processig speed is iversely proportioal to the square of resolutio of the video for a give aspect ratio ad also iversely proportioal to the frame rate of the video. The model ca detect ay umber of abadoed objects i a give video sequece. Although speed is compromised with a icrease i the umber of objects to be detected but such cases are rare to ecouter. Some oticeable limitatios of the model are that a completely immovable perso gets mistake for a abadoed object. Also, the object must be i clear view of the camera for at least five secods, otherwise it gets merged ito the backgroud. b 5

6 V. CONCLUSIONS This paper preseted a abadoed object detectio system based o a dual backgroud segmetatio scheme. The backgroud segmetatio is adaptive i ature ad based o the Approximate Media Model. It cosists of two types of referece backgrouds, Curret ad Buffered backgroud, each with a differet time iterval. Blob aalysis is doe o the segmeted backgroud ad a dyamic trackig algorithm is devised for trackig the blobs eve uder occlusio. Detectio results show that the system is robust to variatios i lightig coditios ad the umber of people i the scee. I additio, the system is simple ad computatioally less itesive as it avoids the use of expesive filters while achievig better detectio results. REFERENCES [1] C. Sears ad Z. Pylyshy, Multiple Object Trackig ad Attetioal Processig, Caadia Joural of Experimetal Psychology, vol. 54, 2000, pp [2] P. Cavaaugh ad G. Alvarez, Trackig Multiple Targets with Multifocal Attetio, Treds i Cogitive Scieces, vol. 9(7), 2005, pp [3] M. Bhargava, C-C. Che, M.S. Ryoo, ad J.K. Aggarwal, Detectio of Abadoed Objects i Crowded Eviromets, i Proceedigs of IEEE Coferece o Advaced Video ad Sigal Based Surveillace, 2007, pp [4] G.L. Foresti, L. Marcearo, ad C.S. Regazzoi, Automatic Detectio ad Idexig of Video-Evet Shots for Surveillace Applicatios, vol. 4, 2002, pp [5] R. Mathew, Z. Yu ad J. Zhag, Detectig New Stable Objects i Surveillace Video i Proceedigs of the IEEE 7 th Workshop o Multimedia Sigal Processig, 2005, pp [6] N.J.B. McFarlae ad C.P. Schofield, Segmetatio ad trackig of piglets i images, Machie Visio ad Applicatios, vol. 8, 1995, pp [7] N. Bird, S. Atev, N. Caramelli, R. Marti, O. Masoud ad N. Papaikolopoulos, Real Time, Olie Detectio of Abadoed Objects i Public Areas, i Proceedigs of IEEE Iteratioal Coferece o Robotics ad Automatio, 2006, pp [8] F. Porikli, Y. Ivaov, ad T. Haga, Robust Abadoed Object Detectio Usig Dual Foregrouds, Eurasip Joural o Advaces i Sigal Processig, vol. 2008, [9] J.O. Aguilar, Omidirectioal Visio Trackig with Particle Filter, i Proceedigs of 18 th Iteratioal Coferece o Patter Recogitio, vol. 3, 2006, pp [10] I. Haritaoglu, D. Harwood, L. S. David, W4: Real-time surveillace of people ad their activities, IEEE Tras. Patter Aal. Mach. Itelligece, vol. 22 (8), 2000, pp [11] F. Chag, C-J. Che, ad C-J. Lu, A liear time Compoet- Labelig Algorithm usig Cotour Tracig Techique, Computer Visio ad Image Uderstadig, vol. 93, 2004, pp [12] N. Friedma ad S. Russell, Image segmetatio i video sequeces: a probabilistic approach, i Proceedigs of 13 th Aual Coferece o Ucertaity i Artificial Itelligece, 1997, pp [13] C. Stauffer, ad W. Grimso, Adaptive backgroud models for realtime trackig, i Proceedigs of IEEE Coferece o Computer Visio ad Patter Recogitio, vol. 2, pp , [14] C.R. Wre, A. Azarbayejai, T. Darrell, ad A.P. Petlad, Pfider:Real-time trackig of the huma body, IEEE Tras. Patter Aal. Mach. Itell., vol. 19, o. 7, pp , Jul TABLE I. SUMMARY OF RESULTS Video Nomeclature Time Take for Object to be detected after beig left abadoed (i secods) Time Take for alarm to be removed after the object is removed from the site (i secods) Agle1 Agle2 Agle3 Agle4 Agle1 Agle2 Agle3 Agle4 S1 (Take 1-C) S2 (Take 3-C) S5 (Take 1-G) Failed Failed Failed Failed 9 10 S6 (Take 3-H) S7 (Take 6-B) AVSS (low desity) 28 _ 6 _ AVSS (medium desity) 30 _ 7 _ 6

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo.

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo. Fire Recogitio i Video Walter Phillips III Mubarak Shah Niels da Vitoria Lobo {wrp65547,shah,iels}@cs.ucf.edu Computer Visio Laboratory Departmet of Computer Sciece Uiversity of Cetral Florida Orlado,

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Human Activity Tracking for Wide-Area Surveillance

Human Activity Tracking for Wide-Area Surveillance Huma Activity Trackig for Wide-Area Surveillace Patrick D. O Malley Michael C. Nechyba A. Atoio Arroyo pomalley@mil.ufl.edu echyba@mil.ufl.edu arroyo@mil.ufl.edu Machie Itelligece Laboratory Departmet

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

COMP 558 lecture 6 Sept. 27, 2010

COMP 558 lecture 6 Sept. 27, 2010 Radiometry We have discussed how light travels i straight lies through space. We would like to be able to talk about how bright differet light rays are. Imagie a thi cylidrical tube ad cosider the amout

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Position and Velocity Estimation by Ultrasonic Sensor

Position and Velocity Estimation by Ultrasonic Sensor Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

A New Network-based Algorithm for Human Activity Recognition in Videos

A New Network-based Algorithm for Human Activity Recognition in Videos IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, A New Network-based Algorithm for Huma Activity Recogitio i Videos Weiyao Li, Yuazhe Che, Jiaxi Wu, Hali Wag, Bi Sheg, ad Hogxiag Li Abstract

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

Image based Cats and Possums Identification for Intelligent Trapping Systems

Image based Cats and Possums Identification for Intelligent Trapping Systems Volume 159 No, February 017 Image based Cats ad Possums Idetificatio for Itelliget Trappig Systems T. A. S. Achala Perera School of Egieerig Aucklad Uiversity of Techology New Zealad Joh Collis School

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Object based Pseudo-3D Conversion of 2D Videos

Object based Pseudo-3D Conversion of 2D Videos Object based Pseudo-3D Coversio of 2D Videos J. Jiag 1,2 ad G. Xiao 1 1 Southwest Uiversity; 2 Uiversity of Bradford ABSTRACT: I this paper, we describe a ew algorithm to costruct pseudo-3d videos out

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

Abstract. 1. Introduction

Abstract. 1. Introduction Flame Recogitio i Video Walter Phillips 111 Mubarak Shah Niels da Vitoria Lobo Computer Visio Laboratory Departmet of Computer Sciece Uiversity of Cetral Florida Orlado, Fl32816 {wrp65547,shah, iels) @

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Counting Regions in the Plane and More 1

Counting Regions in the Plane and More 1 Coutig Regios i the Plae ad More 1 by Zvezdelia Stakova Berkeley Math Circle Itermediate I Group September 016 1. Overarchig Problem Problem 1 Regios i a Circle. The vertices of a polygos are arraged o

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Final Report Pedestrian Control Issues at Busy Intersections and Monitoring Large Crowds

Final Report Pedestrian Control Issues at Busy Intersections and Monitoring Large Crowds Fial Report 22-29 Pedestria Cotrol Issues at Busy Itersectios ad Moitorig Large Crowds PEDESTRIAN CONTROL ISSUES AT BUSY INTERSECTIONS AND MONITORING LARGE CROWDS Prepared by: Bejami Mauri, Osama Masoud,

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms.

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms. Chapter 5 Sortig IST311 - CIS65/506 Clevelad State Uiversity Prof. Victor Matos Adapted from: Itroductio to Java Programmig: Comprehesive Versio, Eighth Editio by Y. Daiel Liag why study sortig? Sortig

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

The Nature of Light. Chapter 22. Geometric Optics Using a Ray Approximation. Ray Approximation

The Nature of Light. Chapter 22. Geometric Optics Using a Ray Approximation. Ray Approximation The Nature of Light Chapter Reflectio ad Refractio of Light Sectios: 5, 8 Problems: 6, 7, 4, 30, 34, 38 Particles of light are called photos Each photo has a particular eergy E = h ƒ h is Plack s costat

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE Z.G. Zhou, S. Zhao, ad Z.G. A School of Mechaical Egieerig ad Automatio, Beijig Uiversity of Aeroautics ad Astroautics,

More information

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 8 Strigs ad Vectors Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Copyright 2015 Pearso Educatio, Ltd..

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

INTERSECTION CORDIAL LABELING OF GRAPHS

INTERSECTION CORDIAL LABELING OF GRAPHS INTERSECTION CORDIAL LABELING OF GRAPHS G Meea, K Nagaraja Departmet of Mathematics, PSR Egieerig College, Sivakasi- 66 4, Virudhuagar(Dist) Tamil Nadu, INDIA meeag9@yahoocoi Departmet of Mathematics,

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

A Resource for Free-standing Mathematics Qualifications

A Resource for Free-standing Mathematics Qualifications Ope.ls The first sheet is show elow. It is set up to show graphs with equatios of the form = m + c At preset the values of m ad c are oth zero. You ca chage these values usig the scroll ars. Leave the

More information

Texture Image Segmentation Using Without Re-initialization Geodesic Active Contour Model

Texture Image Segmentation Using Without Re-initialization Geodesic Active Contour Model Texture Image Segmetatio Usig Without Re-iitializatio Geodesic Active Cotour Model Kaibi Wag Biazhag Yu Departmet of Electroic ad Iformatio Egieerig, Northwester Polytechical Uiversity, Xi a 71007, Shaaxi

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Hand Gesture Recognition for Human-Machine Interaction

Hand Gesture Recognition for Human-Machine Interaction Had Gesture Recogitio for Huma-Machie Iteractio Elea Sáchez-Nielse Departmet of Statistic, O.R. ad Computer Sciece, Uiversity of La Lagua Edificio de Física y Matemáticas 38271, La Lagua, Spai eielse@ull.es

More information