Khoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3
|
|
- Lynne Thompson
- 6 years ago
- Views:
Transcription
1 I J C T A, 9(-A), 016, pp International Science Pre A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed on Graylevel Cluter Similarity for Automatic Multilevel Image Threholding Khoirul Umam 1, Agu Zainal Arifin and Dini Adni Navatara 3 ABSTRACT Automatic multilevel image threholding approach ha wide optimal olution earch pace due to it ability to determine threhold number and poition, imultaneouly Searching it optimal olution uing tandard Differential Evolution (DE) algorithm can decreae it efficiency due to low convergence Therefore, a trategy that can retrict the earch pace i needed in order for optimization being efficient In thi paper we propoe a novel trategy of DE croover operator baed on graylevel cluter imilarity for automatic multilevel image threholding We retrict the earch pace by only recombining graylevel cluter which have mall imilarity Graylevel cluter imilarity i performed by computing the inter-cla and intra-cla variance of adjacent graylevel cluter Experiment on graycale image of Berkeley Segmentation Dataet (BSDS500) how that the propoed croover trategy can generate egmented image with miclaification error of 796% better than thoe of exiting croover trategie which not compute the graylevel cluter imilarity It only require the average of 636 generation to find the optimal olution le than compared croover trategie Keyword: automatic multilevel image threholding, cluter imilarity, croover, Differential Evolution 1 INTRODUCTION Multilevel image threholding i an approach on graylevel threholding technique It can be ued to egment image that ha more than one ditinct object With thi approach, the image hitogram i divided into more than two cluter graylevel by uing a et of threhold [1,, 3, 4] Generally, the number of threhold that ued to egment an image can be determined manually by expert However it can lead the ubjectivity factor in egmentation reult There are alo cae where it difficult to et the threhold number manually [3] Therefore multilevel image threholding evolve into automatic multilevel image threholding On the approach, the number and poition of threhold that are ued to egment an image i determined automatically The number and poition of threhold on multilevel image threholding problem can be found uing optimization method It can be done due to the problem can be conidered a an optimization problem to a certain objective function, generally [5] The method i alo more efficient than the exhautive earch method [3] The algorithm that widely ued to olve optimization problem i metaheuritic algorithm [6] Some tudie have propoed the implementation of metaheuritic algorithm for multilevel image threholding problem Horng and Jiang [7] propoed the implementation of Firefly Algorithm (FA) to locate threhold poition by optimizing maximum entropy function Cueva, et al [] propoed the implementation of 1,,3 Department of Informatic, Faculty of Information Technology, Intitut Teknologi Sepuluh Nopember, Surabaya, Indoneia, 1khoirulumam35@gmailcom, aguza@citacid, 3dini_navatara@ifitacid
2 764 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara Differential Evolution (DE) algorithm to locate threhold poition by optimizing Gauian function parameter Sarkar and Da [8] alo propoed the implementation of DE to locate threhold poition by optimizing maximum Talli entropy function on D hitogram Ali, et al [9] propoed the implementation of Synergetic Differential Evolution (SDE) algorithm, ie a modification of DE to optimize the threhold poition Ayala, et al [10] propoe a Beta Differential Evolution (BDE) algorithm ie alo a modification of DE to optimize threhold poition Djerou, et al [11], Ouadfel and Mehoul [3], Hammouche, et al [1], and Hoeini [6] propoed the implementation of Binary Particle Swarm Optimization (BPSO) algorithm, a hybrid of Particle Swarm Optimization (PSO) with Simulated Annealing (SA) algorithm, Genetic Algorithm (GA), and Intelligent Water Drop (IWD) algorithm for automatic multilevel image threholding problem, repectively Among the optimization algorithm that have been propoed to olve multilevel image threholding problem, DE ha better performance than the other algorithm DE ha ability to maintain convergence to optimal olution better than GA and PSO DE alo can generate better egmentation reult compared with SA, Ant Colony Optimization (ACO), and Tabu Search (TS) [5] Furthermore, DE ha better efficiency level becaue it take le time than PSO and Artificial Bee Colony (ABC) to reach the optimal olution [4] DE ability to reach optimal olution i influenced by the evolution proce of it olution population The proce i performed through erie of operation One of the operation that affect DE evolution proce i croover operation The operation i ued to expand optimal olution earch pace by uing certain trategy In the tandard of DE, the trategy of croover operation involve random value which generated by the ytem and croover rate which determined by expert Comparion of the two value i ued a a benchmark for croover operation [1] DE tandard croover trategy ha proven can be ued to olve the multilevel image threholding problem which only optimizing the combination of threhold poition [, 4, 5,8, 9, 10] But if it i ued in automatic multilevel image threholding problem, then it will affect the change of threhold number and poition combination imultaneouly Thu, the poible combination that will be earched are larger, or in other word the earch pace become wider It can lead to an increae of time or iteration that required for reaching the optimal olution Increaing the population ize in order to cover wider earch pace i alo not an efficient olution becaue it can increae the memory requirement [13] Therefore, a trategy that can retrict the earch pace i needed to find optimal olution more efficient In thi paper we propoe a novel trategy of DE croover operator baed on graylevel cluter imilarity for automatic multilevel image threholding problem The imilarity i calculated baed on the value of adjacent graylevel cluter inter-cla and intra-cla variance [14] which formed in each olution Thu, the earching of optimal olution i only performed on olution that offer combination of threhold number and poition which capable to eparate each graylevel cluter with maximum ditance DIFFERENTIAL EVOLUTION (DE) ALGORITHM DE i an example of evolutionary algorithm that introduced by Storn and Price [1] It earche the optimal olution by applying parallel earching method uing a et of olution in a population Generally, optimization proce uing DE begin by initializing the population The population then evolve through mutation, croover, and election operation The evolutionary proce i repeated until a topping criterion i reached DE population initialization i performed by generating NP olution Each olution i repreented a a vector with D component and called a target vector Each target vector component x,d for = [1,, NP] and d = [1,, D] i randomly initialized by a real-value between pecified lower-bound x min and upperbound x max a formulated in (1):
3 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 765 x,d (0) = x min + (x max x min ) rand,d, (1) where rand,d denote a uniform random value between 0 and 1 which generated for dth component of target vector [1, 15] After the initialization phae, the optimization uing DE proceed to mutation On each generation g, the operation will generate NP donor vector V (g)[15] In DE mutation tandard cheme that known a DE/rand/1, the mutation conducted by adding the weight of a target vector 1 (g) with the weighted difference between two other target vector ( (g) and 3 (g)) The weighted difference i caled by a mutation factor F [1] a hown in equation (): V (g) = 1 (g) + F ( (g) 3 (g)) () Target vector 1 (g), (g), and 3 (g) are three different vector that randomly choen and not equal to the target vector (g) Mutation may caue the value of donor vector component v,d (g) violate the pecified boundarie (ie x min and x max ) In order to normalize the component value, a rule that formulated in equation (3) can be ued [16]: v, d g d x v g, v g x x v g, v g x min, d, min max, d, d max Every pair of target vector (g) and donor vector V (g) then recombined into a trial vector U (g) through croover operation Target vector component x,d (g) and donor vector component v,d (g) are mixed to produce trial vector component u,d (g) uing certain trategy The example of croover trategy that can be ued are binomial croover [1], exponential croover [15], and elf-adaptive croover [16] The trategie ue a random generated value and croover rate (CR) to decide the recombination proce of a vector olution component The lat operation on each DE generation i election operation It elect the olution vector that will be maintained on the next generation The election conducted by comparing a target vector fitne value f( (g)) with a trial vector fitne value f(u (g)) Solution vector with the bet fitne value i choen a target vector on the next generation ( (g + 1)) [15] Selection formulation i hown in equation (4): 3 GRAYLEVEL CLUSTERS SIMILARITY,, U g f U g f g g 1 g f U g f g The imilarity of adjacent graylevel cluter can be known by meauring their ditance The farther ditance between two adjacent graylevel cluter indicate maller imilarity between both of graylevel cluter, and vice vera Let n l denote the occurrence frequency of pixel with graylevel l, N denote the total number of pixel in the image, p l denote the probability of pixel occurrence with graylevel l a formulated in (5): (3) (4) nl pl, (5) N C k denote the kth graylevel cluter, t k denote the kth threhold, along with k and k denote the occurrence probability of pixel belonging to C k and the mean of C k, repectively, a formulated in equation (6) and equation (7):
4 766 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara u (6) tk k lt 1 1 p, k l 1 lp (7) tk k ltk1 1 l k The ditance of two adjacent graylevel cluter C k and C 1 k (Dit C k, C 1 k can be calculated uing inter-cla and intra-cla variance of the adjacent graylevel cluter a formulated in equation (8): Inter-cla variance of Ck and 1 k k k I k k A k k Dit C, C C C C C (8) C I Ck Ck 1 i defined a um of the quare ditance between the mean of the two graylevel cluter and the total mean of both cluter While intra-cla variance of C k 1 and k C A Ck Ck 1 i defined a variance of all pixel graylevel value in the merged cluter [14] Formulation for both of value are hown in equation (9) and equation (10), repectively: where M Ck Ck 1 I Ck C 1 k k 1 k k 1 k k k 1 tk 1 A Ck C 1 k l t l M C k k C k p l k 1 k 1 (10) denote the global mean of Ck and C 1 k which formulated in equation (11): 1): (9) k1 k1 k k k Ck M C 1 k1 k (11) 4 METHOD In thi ection we decribe our propoed croover trategy and DE cheme that implement the trategy Figure 1: Flowchart of propoed croover
5 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed Propoed Croover Strategy A mentioned before, in thi paper we propoe a novel trategy of DE croover operator baed on graylevel cluter imilarity that formed at threholding olution The threholding olution are repreented by target vector and donor vector For the convenience, we denote our propoed croover trategy a Graylevel Cluter Similarity (GCS) trategy Recombination procedure on GCS i conducted by comparing the adjacent graylevel cluter imilarity which repreented by target vector component with the adjacent graylevel cluter imilarity which repreented by donor vector component Solution vector component which repreent graylevel cluter with lower imilarity (ie farther ditance) are choen to recombine into trial vector component The procedure i repeated until all component have been recombined into trial vector a illutrated in Figure 1 Thu, the formed trial vector i expected can repreent a threholding olution that ha low graylevel cluter imilarity Therefore, the earching of optimal threholding olution can be retricted only on threholding olution which able to minimize the graylevel cluter imilarity Aume that K graylevel cluter and K V graylevel cluter are formed at threholding olution which repreented by target vector (g) and donor vector V (g), repectively It indicate that there are K 1 threhold in the threhold et T of threholding olution which repreented by (g) T t1,, t K 1 It alo indicate that there are K v 1 threhold in the threhold et TV of threholding olution which V V repreented by V (g) TV t1,, t K 1 V If the larget graylevel intenity that appear on the image L max i conidered a Kth threhold (ie t k = L max ), then T t1,, tk, L V V 1 max and TV t1,, tk, L 1 max V Let L min denote the mallet graylevel intenity that appear on the image, c denote the cluter firt graylevel, V C m denote graylevel cluter which repreented by (g), C n denote nth graylevel cluter which repreented by V (g), along with D and DV denote the ditance of two adjacent graylevel cluter at (g) and V (g), repectively The algorithm of (g) and V (g) recombination proce to produce trial vector U (g) in GCS i decribed in Algorithm 1 Algorithm 1 Propoed Croover Strategy Algorithm 1 Initialize c c = L min V Chooe threhold in T t m and nth threhold in n TV t where cloet to c and have greater graylevel intenity value than c repectively t m a well a t V n are located 3 Form two adjacent graylevel cluter on threholding olution which repreented by (g) and V (g) repectively: C C,, t and C t 1,, t a m m m1 m m1 C c,, t and C t 1,, t V V V V V b n n n1 n n1 4 Meaure the adjacent graylevel cluter imilarity or ditance uing equation (8): a D Dit Cm Cm 1, V V b DV Dit Cn Cn 1,
6 768 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara 5 Compare D with DV and do one of following condition: a If D > DV, then: i u,d (g) = x,d (g), for d = [(c L min + 1),, ( t L + 1)] m min ii Update c c tm 1 1 b If D DV, then: i u,d (g) = v,d (g), for d = [(c L min + 1),, ( t V n L min + 1)] V ii Update c c tn Repeat tep -5 until c > L max On the lat iteration of each recombination proce uing GCS there i poibility that the lat graylevel cluter C K of (g) or V (g) threholding olution are remain and not recombined yet into U (g) In order for the calculation and comparion of graylevel cluter imilarity can till be made on C K, we aume that there i a dummy cluter C K+1 It act a neighbor of C K on each threholding olution a illutrated on Figure It i aumed ha threhold t K+1 = L max + 1 and probability K+1 = 0 In order for two adjacent graylevel cluter imilarity or ditance value till ha meaning even though one of graylevel cluter ha 0 probability value, the inter-cla variance formulation in equation (9) i modified into equation (1): C C 1 k 1 k k k I k1 k k1 k 1 (1) 4 Optimization Scheme In thi paper, the optimization cheme uing DE to olve the automatic multilevel image threholding problem i illutrated by flowchart on Figure 3 For the convenience, we denote the cheme which implement GCS trategy uing DE cheme naming rule decribed in [1,15] a DE/rand/1/-GCS The optimization ue DE o that DE general phae (ie initialization, mutation, croover, and election) are ued Moreover, we alo add three tage of binarization phae and an evaluation phae Figure : Illutration of dummy cluter poition
7 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 769 where fitne value of each founded threholding olution i computed The brief decription for each phae i decribed in next ubection 41 Initialization In thi phae, target vector (g) are generated, where each (g) i conit of D component Each component x,d (g) i initialized uing equation (1) The value of NP, x min, and x max are manually defined, the value of rand,d i automatically and randomly generated by ytem, wherea the value of D i depending on image L min and L max value a formulated in equation (13): 4 Binarization D = L max L min (13) Binarization i a phae to encode real-value of each olution vector component (ie target vector, donor vector, or trial vector) into binary-value The binary-value are ued to indicate the poition and number of threhold which offered by threholding olution that repreented by the olution vector If the binarization reult of dth component in vector olution x g i aumed a kth threhold (t k ) But if x g, 1, then the graylevel l which aociated to the component d, d 0, then l i not aumed a t k The connectivity between indice of olution vector component d with l i formulated in equation (14): l = L min + d 1 (14) An example of threhold poition that indicated by binary form of a vector olution on Figure 4 Figure 4 illutrate that there are K 1 component of g g i illutrated which have code 1, ie component with index 3, 6, and D Therefore, on the threholding olution that repreented by g, d there are K 1 threhold too, where t 1 = L min +, t = L min + 5,, and t K 1 = L max 3 It will alo lead to the formation of K graylevel cluter ([C 1,, C K ]) In thi paper, L max ha no connectivity with vector olution component and alway conidered to be elected a Kth threhold (t K ) The rule to encode real form of x,d (g) into it binary form x g x, d g Figure 3: Optimization cheme, d 0 rand, d igm x, d g or pl 0 1, rand, d igm x, d g and pl 0 i formulated in equation (15): (15)
8 770 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara where igm(y) denote the igmoid value of Y a formulated in equation (16): igm Y 1 Y (16) 1 e The binarization rule in equation (15) lead to graylevel that can be elected a threhold are only graylevel that occur in input image (ie graylevel with probability value p l > 0) Thu, there i no poibility that graylevel cluter C k which ha probability k = 0 i formed in the range of graylevel L min to L max 43 Evaluation In thi phae, the computation of fitne value for each (g) i performed The objective function that ued to compute (g) fitne value i Automatic Threholding Criterion (ATC) function from [17] It conider the number of formed graylevel cluter (K) and the graylevel cluter diimilarity which denoted by it within-cla variance K Figure 4: Example of threhold encoding poition and graylevel cluter forming on image hitogram baed on binarization reult of vector olution component W It i formulated in equation (17): W 1/ ATC K K log K, (17) where i a poitive weighting contant which manually defined The value of K by integrating the total-cla variance T [18] The formulation of each variance are hown in equation (18) (0): can be computed and between-cla variance of K formed graylevel cluter K B K K, (18) W T B l L1 T l0 pl, (19) K K (0) B k 1 k k, W
9 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 771 where denote the total mean of all image pixel If there are L graylevel in the image, then of image can be computed uing equation (1): (1) L1 l0 lpl The ATC value of a threholding olution can indicate the olution quality The maller ATC value of the olution indicate that the olution ha better quality, and vice vera Therefore, the fitne value of threholding olution that repreented by (g) (f( (g))) i inverely proportional with the olution ATC value a formulated in equation (): f g 1 ATC g () 44 Mutation In thi phae, (g) i mutated uing mutation cheme DE/rand/1 which formulated in equation () until V (g) i produced for = [1,, NP] The value of F which ued on the cheme i manually defined The contraint handling rule for v,d (g) which formulated in equation (3) i alo ued in thi phae 45 Croover In thi phae, NP pair of (g) and V (g) are recombined uing GCS trategy that decribed on Subection 41 Thi phae will produce NP trial vector U (g) 46 Selection In thi phae, the election of olution vector that will be maintained on the next generation i performed Selection rule in thi paper i following the general DE election rule which formulated in equation (4) 47 Segmentation After the iteration or generation of optimal olution earching reache the maximum generation, the earching i topped and the optimal olution i obtained The optimal olution i a threholding olution that repreented by binary form of global bet vector gbet (g) on g max ( gbet (g max )) gbet (g) i defined a a olution vector that ha the bet fitne value compared with the other vector from the firt generation until the lat generation [16] Threholding olution that repreented by gbet (g max ) i ued for egmenting input image into egmented image Segmentation are conducted by changing the graylevel intenity l on each image pixel (pix(l)) into the rounding reult of k*th graylevel cluter mean k * where l i located The formulation of egmentation i hown in equation (3): pix(l) = round( k *) (3) for l C k *, l = [L min,, L max ], and k* = [1,, K*], where K* denote the number of graylevel cluter repreented by optimal olution 5 EPERIMENTS AND RESULTS In thi paper we ue image from Berkeley Segmentation Dataet (BSDS500) 1 a teting image The dataet provide real-cene color image along with it human egmentation a the ground truth We chooe 150 image randomly for teting But before we ue it in teting, we convert each image into graycale image uing rgbgray function on Matlab Figure 5 how the ample image from BSDS500
10 77 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara Figure 5: Sample image from BSDS500 (a)-(d) Image 1 Image 4 (e)-(h) Ground truth which have been converted into graycale image that ued in teting along with it ground truth The ground truth are colored uing labelrgb function in Matlab with jet color map in order to point out different threhold level in a better way Teting i performed uing Matlab R013a oftware It run on M Window 7 operating ytem in computer that ue Intel i3 4 GHz proceor and 3 GB of RAM DE algorithm that implement GCS trategy (DE/rand/1/GCS cheme) ue pecified DE parameter ie NP, g max, F, x min, and x max to find the optimal threholding olution (number and poition of threhold) for each teting image Thee parameter value are et to 50, 500, 05, -5, and 5, repectively While parameter that ued on ATC function i et to 04 Thee value are the optimal value for each parameter that obtained from erie of teting A the compared trategie, we alo implement the exiting croover trategy ie binomial, exponential, and elf-adaptive croover trategie which decribed in [1,15,16] into croover phae in optimization cheme (Figure 3) We called the compared cheme a DE/rand/1/bin, DE/rand/1/exp, and DE/rand/1/ elf-adaptive cheme, repectively Each cheme then ued to find the optimal threholding olution for each teting image uing ame aforementioned parameter etting Specifically for DE/rand/1/bin and DE/rand/1/exp cheme which alo ue CR parameter, thi parameter value i et to 08 a uggeted by [] Figure 6: Segmentation reult uing DE/rand/1/GCS cheme (a)-(d) Segmented image of ample image (e)-(h) Threhold poition for each egmented reult (indicated by red bar)
11 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 773 Figure 7: Segmentation reult uing DE/rand/1/bin cheme (a)-(d) Segmented reult of ample image (e)-(h) Threhold poition for each egmented reult (indicated by red bar) Figure 8: Segmentation reult uing DE/rand/1/exp cheme (a)-(d) Segmented reult of ample image (e)-(h) Threhold poition for each egmented reult (indicated by red bar) Figure 9: Segmentation reult uing DE/rand/1/elf-adaptive cheme (a)-(d) Segmented reult of ample image (e)-(h) Threhold poition for each egmented reult (indicated by red bar)
12 774 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara In order to make the combination of random number occurrence i not affecting the optimization reult, the random generator for each data i reet on the beginning of optimization The reetting i performed by uing rng function, ie a built-in function on Matlab R013a Thu the optimization reult and performance are only affected by the croover trategy that implemented on the cheme The egmentation reult of ample image (Image 1 Image 4) that produced by DE/rand/1/-GCS cheme are hown in Figure 6 While the compared egmentation reult of ample image that produced by compared cheme are hown in Figure 7 Figure 9 We coloring the graycale egmented image uing labelrgb function in Matlab with jet color map to point out different threhold level in a better way The performance of each cheme i evaluated by oberving it convergence ability and quality of it generated egmented image The cheme convergence ability can be oberved from it generation number and CPU time that required by the cheme to find the optimal olution The quality of egmentation reult can be oberved uing uniformity meaure and miclaification error (ME) percentage Formulation to meaure the uniformity of a egmented image I T (U) i hown in equation (4): K j1 ic L j i j max min U 1 K 1, N L L where K denote the number of graylevel cluter that formed on I T hitogram, C j denote the jth graylevel cluter on I T, j denote the mean of graylevel intenity on C j, L i denote the graylevel intenity of pixel i on original image, and N denote the total number of I T pixel The value of U i between 0 and 1, where a higher value of U mean that the quality of I T i better [1, 3, 9] While the percentage of I T ME which ha M N dimenion can be calculated baed on the number of I T pixel which have different label of cluter compared with it related pixel on original image a formulated in equation (5) and equation (6): (4) M N m 1 n 1 I0 m, n IT m, n ME M N (5) 0 I m n I m n T 1, I m, n I m, n 0, T, 0, I0 m, n IT m, n where I 0 (m, n) and I T (m, n) denote the label of cluter in ground truth and egmented image, repectively A lower percentage of ME mean the quality of I T i better Equation (5) and equation (6) are a modification of ME formula for bilevel threholding problem which defined in [19] The comparion of each teted cheme ability to reach the optimal olution i depicted by the graph on Figure 10 The graph how the average of the bet fitne value that found on each cheme generation While the comparion of the average of generation number, CPU time that required to find the optimal olution, and CPU time that required to complete the earching proce until the lat generation by each teted cheme i hown in Table 1 along with it average of uniformity value and ME percentage The bet value for each performance are indicated by bolded text 6 DISCUSSION Serie of experiment ha been performed to evaluate the performance of GCS which implemented on DE (DE/rand/1/GCS cheme) to olve the automatic multilevel image threholding problem Exiting DE croover trategie are ued a compared croover trategie Baed on graph in Figure 10, we know that the average of bet fitne value that found on each generation of DE/rand/1/GCS cheme ha the mot (6)
13 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 775 Figure 10: Comparion of the bet fitne value average that found on each generation for each teted cheme Table 1 Comparion of Each Teted Scheme Performance Average Value Performance Performance Average Value for Each Teted Scheme DE/rand/ DE/rand/ DE/rand/ DE/rand/ 1/GCS 1/bin 1/exp 1/elf adaptive Generation number that required to find the optimal olution Bet fitne value on the lat generation CPU time until optimal olution found (econd) CPU time until the lat generation (econd) Uniformity ME (%) ignificant increment than the average of bet fitne value that found on each generation of compared cheme ince the firt generation It indicate that croover operation baed on graylevel cluter imilarity ha capability to direct the earching proce to olution that able to eparate graylevel cluter with maximum ditance (ie olution with high fitne value) Thu the GCS trategy ha capability to find the optimal olution better than compared croover trategy The number of generation that required by DE/rand/1/GCS cheme to find the optimal olution i alo better than the compared cheme Baed on Table 1, we know that DE/rand/1/GCS cheme require the leat generation number to find the optimal olution It only require average of 636 generation le than compared cheme to find the optimal olution It indicate that croover operation baed on graylevel cluter imilarity able to decreae the generation number that required on finding the optimal olution DE/rand/1/GCS cheme i alo able to reach the average of bet fitne value on the lat generation higher than compared cheme even though it i not ignificant Baed on Table 1 and Figure 10, DE/rand/ 1/GCS cheme only ha ignificant difference of bet fitne value average with DE/rand/-1/elf-adaptive cheme, which i or 1191% higher While compared with DE/rand/1/exp and DE/rand/1/bin cheme, DE/rand/1/GCS cheme only have the average of bet fitne value and (009% and 073%)
14 776 Khoirul Umam, Agu Zainal Arifin and Dini Adni Navatara higher than the cheme, repectively It indicate that GCS trategy ha capability to give threholding olution that have no ignificant difference with binomial and exponential croover trategie, but ignificantly better than elf-adaptive croover trategy The average of uniformity value which obtained by DE/rand/1/GCS cheme i alo indicate that the cheme able to produce the egmentation reult that have le ignificant difference compared with DE/ rand/1/bin and DE/rand/1/exp cheme More ignificant difference of egmentation reult are only hown by DE/rand/1/elf-adaptive cheme Baed on Table 1, DE/rand/1/GCS cheme ha ame average value of uniformity with DE/rand/1/exp cheme and only higher than DE/-rand/1/bin cheme average value of uniformity While comparion with the average value of DE/-rand/1/elf-adaptive cheme uniformity how that the DE/rand/1/GCS cheme ha the average value of uniformity higher than the cheme The average percentage of ME which obtained by DE/rand/1/GCS cheme i alo indicate that the cheme able to produce egmentation reult that have le ignificant difference than DE/rand/1/-bin and DE/rand/1/exp cheme The average percentage of ME which obtained by DE/rand/1/GCS i only 103% higher than the average percentage of ME which obtained by DE/rand/1/exp cheme and only 373% higher than the average percentage of ME which obtained by DE/rand/1/bin cheme Significant difference of ME average percentage i only hown by the comparion with DE/rand/1/elfadaptive cheme DE/ rand/1/gcs cheme ha the average percentage of ME that 1913% better than DE/rand/1/elf-adaptive cheme It mean DE/rand/1/GCS cheme i able to generate egmentation reult with qualitie 796% better than the compared cheme However, when viewed in term of computational time, DE/rand/1/GCS cheme ignificantly require more time than compared cheme Baed on Table 1, we know that DE/rand/1/GCS cheme require the average of CPU time econd (rounded to be econd) or time longer than compared cheme to find the optimal olution While to complete the earching proce until the lat generation, DE/rand/1/GCS require the average of CPU time econd (rounded to be econd) or time longer than compared cheme It indicate that the computation of graylevel cluter imilarity which i the bae of GCS trategy can increae the requirement of computational time Thu, if viewed in term of computational time, then the propoed croover trategy i not more efficient than the exiting DE croover trategie 7 CONCLUSION Thi paper ha propoed and decribed a novel trategy of DE croover operator baed on graylevel cluter imilarity for olving the automatic multilevel image threholding problem The propoed croover trategy trie to retrict the optimal olution earch pace by only recombining vector olution component that repreent combination of graylevel cluter which have maller imilarity Thu, the earching of optimal olution i only performed on olution that offer combination of threhold number and poition which capable to eparate each graylevel cluter with maximum ditance The experimental reult how that the propoed croover trategy i able to provide egmentation reult that have ame quality with egmentation reult that provided by exiting croover trategie, even better In our experiment it egmentation reult qualitie which indicated by it average percentage of ME are 796% better than the compared croover trategie The propoed croover trategy alo require le earching generation than the exiting trategie to provide the egmentation reult It only require 636 generation le than the compared croover trategie NOTES 1
15 A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed 777 REFERENCES [1] K Hammouche, M Diaf, P Siarry, A Multilevel Automatic Threholding Method Baed on A Genetic Algorithm for A Fat Image Segmentation, Computer Viion and Image Undertanding, 109: , 008 [] E Cueva, D Zaldivar, MP Cinero, A Novel Multi-Threhold Segmentation Approach Baed on Differential Evolution Optimization, Expert Sytem with Application, 37: , 010 [3] S Ouadfel, S Mehoul, A Fully Adaptive and Hybrid Method for Image Segmentation Uing Multilevel Threholding, International Journal of Image, Graphic, and Signal Proceing, 1:46-57, 013 [4] VO Encio, E Cueva, H Soa, A Comparion of Nature Inpired Algorithm for Multi- Threhold Image Segmentation, Expert Sytem with Application, 40: , 013 [5] K Hammouche, M Diaf, P Siarry, A Comparative Study of Variou Meta-Heuritic Technique Applied to The Multilevel Threholding Problem, Engineering Application of Artificial Intelligence, 3: , 010 [6] HS Hoeini Intelligent Water Drop Algorithm for Automatic Multilevel Threholding of Grey-Level Image Uing a Modified Otu Criterion, International Journal Modelling, Identification, and Control, 15(4):41-49, 01 [7] MH Horng, TW Jiang, Multilevel Image Threholding Selection Baed on The Firefly Algorithm, Proceeding of Sympoia and Workhop on Ubiquitou, Automatic, and Truted Computing, ian, Shaanxi, 58-63, 010 [8] S Sarkar, S Da, Multilevel Image Threholding Baed on D Hitogram and Maximum Talli Entropy - A Differential Evolution Approach, IEEE Tranaction on Image Proceing, (1): , 013 [9] M Ali, CW Ahn, M Pant, Multi-Level Image Threholding by Synergetic Differential Evolution, Applied Soft Computing, 17:1-11, 014 [10] HVH Ayala, FMd Santo, VC Mariani, LdS Coelho, Image Threholding Segmentation Baed on a Novel Beta Differential Evolution Approach, Expert Sytem with Application, 4:136-14, 015 [11] L Djerou, HE Dehimi, N Khelil, M Batouche, Automatic Multilevel Threholding uing Binary Particle Swarm Optimization for Image Segmentation, Proceeding of International Conference of Soft Computing and Pattern Recognition, Malacca, 66-71, 009 [1] R Storn, K Price, Differential Evolution- A Simple and Efficient Heuritic for Global Optimization over Continou Space, Journal of Global Optimization, 11: , 1997 [13] R Mallipeddi, PN Suganthan, Empirical Study on the Effect of Population Size on Differential Evolution Algorithm, Proceeding of IEEE Congre on Evolutionary Computation, Hong Kong, , 008 [14] AZ Arifin, A Aano, Image Segmentation by Hitogram Threholding Uing Hierarchical Cluter Analyi, Pattern Recognition Letter, 7: , 006 [15] S Da, PN Suganthan, Differential Evolution: A Survey of The State-of-The-Art, IEEE Tranaction on Evolutionary Computation, 15(1):4-31, 011 [16] RM Alguliev, RM Aliguliyev, NR Iazade, Multiple Document Summarization Baed on Evolutionary Optimization Algorithm, Expert Sytem with Application, 40: , 013 [17] JC Yen, FJ Chang, S Chang, A New Criterion for Automatic Multilevel Threholding, IEEE Tranaction on Image Proceing, 4(3): , 1995 [18] N Otu, A Threhold Selection Method from Gray-Level Hitogram, IEEE Tranaction on Sytem, Man, and Cybernetic, 9(1):6-66, 1979 [19] M Sezgin, B Sankur, Survey Over Image Threholding Technique and Quantitative Performance Evaluation, Journal of Electronic Imaging, 13(1): , 004
Markov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationIMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE
Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationw w w. a j e r. o r g Page 98 Montreal, Canada) Corresponding Author: Essa Abrahim Abdulgader Saleem
American Journal of Engineering Reearch (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-6, Iue-10, pp-98-107 www.ajer.org Reearch Paper Open Acce Multi-objective optimization of multi-tate reliability
More informationA TOPSIS based Method for Gene Selection for Cancer Classification
Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationTexture-Constrained Active Shape Models
107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More informationImplementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost
Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult
More informationMulticlass Road Sign Detection using Multiplicative Kernel
Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationEvolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA
Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationOn combining Learning Vector Quantization and the Bayesian classifiers for natural textured images
On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationResearch on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function
016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationIntegrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs
Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationDynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array
Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationInterface Tracking in Eulerian and MMALE Calculations
Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationKS3 Maths Assessment Objectives
KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationAnisotropic filtering on normal field and curvature tensor field using optimal estimation theory
Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu
More informationA DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION
A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION ABSTRACT Najva Izadpanah Department of Computer Engineering, Ilamic Azad Univerity, Qazvin Branch, Qazvin, Iran In mot practical
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More information3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts
3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationIMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES
December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More informationA New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition.
A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition. Andrzej Ruta, Yongmin Li School of Information Sytem, Computing & Mathematic Brunel Univerity Uxbridge, Middleex UB8 3PH, United
More informationOn the Use of Shadows in Stance Recovery
On the Ue of Shadow in Stance Recovery Alfred M. Brucktein, 1 Robert J. Holt, 1 Yve D. Jean, 2 Arun N. Netravali 1 1 Bell Laboratorie, Lucent Technologie, Murray Hill, NJ 094 2 Avaya Communication, Murray
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationData Mining with Linguistic Thresholds
Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.
More informationLearning-Based Quality Control for Cardiac MR Images
1 Learning-Baed Quality Control for Cardiac MR Image Giacomo Tarroni, Ozan Oktay, Wenjia Bai, Andrea Schuh, Hideaki Suzuki, Jonathan Paerat-Palmbach, Antonio de Marvao, Declan P. O Regan, Stuart Cook,
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationRESEARCH ON SAR IMAGE MATCHING TECHNOLOGY BASED ON SIFT
RESEARCH ON SAR IMAGE MATCHING TECHNOLOGY BASED ON SIFT LIU Jing-zheng, YU Xu-chu Zhengzhou Intitute of Surveying and Mapping, 66 Longhai Road, Zhengzhou 45005,China-ljzchxy@63.com Commiion I, WG I/ KEY
More informationMotivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis
Level Set Motivation: Roger Crawfi Slide collected from: Fan Ding, Charle Dyer, Donald Tanguay and Roger Crawfi 4/24/2003 R. Crawfi, Ohio State Univ. 109 Eay Cae Ue Marching Cube Input Data Noiy 4/24/2003
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationLens Conventions From Jenkins & White: Fundamentals of Optics, pg 50 Incident rays travel left to right Object distance s + if left to vertex, - if
Len Convention From Jenkin & White: Fundamental o Optic, pg 50 Incident ray travel let to right Object ditance + i let to vertex, - i right to vertex Image ditance ' + i right to vertex, - i let to vertex
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More information