Image Segmentation Using Topological Persistence

Size: px
Start display at page:

Download "Image Segmentation Using Topological Persistence"

Transcription

1 Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, Abstract. This aer resents a new hybrid slit-and-merge image segmentation method based on comutational geometry and toology using ersistent homology. The algorithm uses edge-directed toology to initially slit the image into a set of regions based on the Delaunay triangulations of the oints in the edge ma. Persistent homology is used to generate three tyes of regions: -ersistent regions, -transient regions, and d-triangles.the-ersistent regions corresond to core objects in the image, while -transient regions and d-triangles are smaller regions that may be combined in the merge hase, either with -ersistent regions to refine the core or with other -transient and d-triangles regions to otentially form new core objects. Performing image segmentation based on toology and ersistent homology guarantees several nice roerties, and initial results demonstrate high quality image segmentation. 1 Introduction Image segmentation algorithms classically fall into one of two classes: region-based methods or edge-based methods. Region-based methods tyically emloy clustering, region growing, or slit-and-merge methods to construct regions based on feature characteristics of the region(s). Conversely, edge-based methods use edge detection to find edges within the image, and then use some method to link the edges to form boundaries that define regions. Both classes of segmentation methods have their advantages and disadvantages, so research has also delved into hybrid methods that combine region- and edge-based segmentation [6]. This aer resents a new hybrid aroach to image segmentation based on comutational toology. The method is fundamentally based on the slit-andmerge aradigm, using edge-directed toology to initially slit the image into a set of regions, and then using region-based merging to combine select regions into the final segmentation. The algorithm uses a three-ste aroach: 1) Perform edge detection. 2) Slit the image into regions using edge-directed comutational toology, based on ersistent homology. 3) Merge select regions with similar features in orderoftoological ersistence. W.G. Kroatsch, M. Kamel, and A. Hanbury (Eds.): CAIP 2007, LNCS 4673, , c Sringer-Verlag Berlin Heidelberg 2007

2 588 D. Letscher and J. Fritts More secifically, the algorithm first uses edge-detection to roduce an edge ma, which serves as the guide for toological region slitting. Given this edge ma, edges are linked to form regions based on the theory of ersistent homology. The result of this toological slitting is an initial region segmentation that contains three tyes of regions: -ersistent regions, -transient regions, and d- triangle regions. The -ersistent regions are larger regions corresonding to core objects in the image. The -transient and d-triangle regions are smaller regions of the image, which corresond to either additional sections of the existing core objects or sub-sections of new core objects in the image. The -transient and d-triangle regions are merged, in order of increasing ersistence, either with - ersistent regions to further refine the existing core objects or with each other to otentially define new core objects in the final segmentation. The rimary contribution of this aer is the novel use of ersistent homologybased toology in the second ste, and the corresonding order it imoses on region merging in the third ste. Any edge detection method could be used in ste one, and any feature characteristics could be used for region merging in ste three. The second ste is similar to the algorithm in [11]. However, the third ste adds toological guarantees for the comleted segmentation and incororates region information to imrove the quality of the final result. In the remainder of the aer, we discuss the roosed method in greater detail, with emhasis on the details of the toological region slitting and merge ordering in stes two and three, resectively. Section 2 resents the ertinent background in comutational toology and ersistent homology. Section 3 resents the roosed edge-directed toological segmentation algorithm. Section 4 resents reliminary results for this new algorithm. Section 5 resents related work, and Section 6 concludes the aer and discusses future directions. 2 Background in Toology Since the key asect of the roosed image segmentation algorithm is our aroach to region slitting and merging based on comutational toology, we first resent the necessary background on toology and ersistent homology. We resent these toological concets as they ertain to images and image segmentation, so we assume the existence of an image I with oints in R Alha Comlexes and Delaunay Triangulations Suose we have a set of oints X = {x 1,...,x n } in I that have been identified by some edge detection algorithm. For any ositive radius α, we can consider the set of all disks of radius α with centers in X (see Fig. 1). As α grows, larger regions of the image are covered and disks begin overlaing. The centers of the overlaing disks can be connected to form edges and triangles. The attern in which these disks intersect defines a triangulation, with the vertices of the triangulation corresonding to the oints in X. An edge in the triangulation is formed when two disks meet in a oint that is not in the interior of another disk. Similarly, a triangle is formed when three disks meet in a single

3 Image Segmentation Using Toological Persistence 589 Fig. 1. α-comlexes for α =1.2, 1.6, and 2.0, and the full Delaunay triangulation that is formed at α 4.6 oint that is not in the interior of another disk. The triangulation constructed in this way is called the Delaunay triangulation and has many nice roerties [2]. This triangulations can be found in O(n log n) time in two dimensions [2,5,7]. Figure 1 illustrates the alha comlexes for a set of oints with α =1.2, 1.6, 2.0, and 4.6. As visible in the figure, at α =1.2, the disks are of radius 1.2 and fourteen airs of disks intersect to form 14 edges. Some of these edges are connected with other edges, forming four connected comonents. When the radius α grows to 1.6, more edges are formed, and all of the edges are connected into a single connected comonent. Additionally, three trilets of disks intersect to form three Delaunay triangles. As the radius further grows to α =2.0, 5 additional edges and 2 additional triangles are formed. Finally, when α grows to α =4.6, the full Delaunay triangulation over all the vertices is formed. For a given value of α, the set of vertices, edges, and triangles defines the subcomlex, K α. This comlex accurately reresents the toology generated by the union of disks with radius α centered at each vertex [3]. An imortant characteristic of comlexes is that, for two radii, α and α, such that α<α, the subcomlex of α is a subset of the subcomlex of α, i.e. K α K α.any sequence of comlexes with one a subset of the next is referred to as a filtration. At sufficiently large α, the comlex becomes a full triangulation, in which all regions in the grah over X are covered by Delaunay triangles, as demonstrated in Fig. 1 for α 4.6. This comlex is a suerset of all other subcomlexes in X. The edges and triangles in K α iece the oints in X into a cohesive union. Recalling that we are defining X as the set of edge oints generated from erforming edge detection on I, one roblem that occurs is that small regions may be left in the comlement of the subcomlex. These regions would disaear for slightly larger α. However, increasing α to remove these regions may create new small regions. To counter this roblem and effectively deal with small regions in the comlement of the comlex, we turn to ersistent homology. 2.2 Persistent Homology In algebraic toology, homology rovides a way to measure the comlexity of a sace. In the study of comlexes inside the lane we are concerned with the first homology grou, H 1 (K), and its corresonding Betti number, β 1. Fortunately, in this alication, β 1 can be readily defined without in-deth knowledge of algebraic toology. For a connected grah where V and E are the number of vertices and edges in a grah, resectively, the Betti number is defined as β 1 = E V +1.If

4 590 D. Letscher and J. Fritts we have a triangulated subcomlex in the lane, β 1 = C V + E F,whereC is the number of connected comonents and F the number of faces (or triangles) in the comlex. The full definitions are more comlex (see [9] for a full treatment), but in our situation the theory reduces to the formulae above. As mentioned in the revious section, as α increases, the resulting sequence of subcomlexes is known as a filtration. As the triangulations change, the Betti number, β 1 (K α ), for each subcomlex K α in the filtration will change with α. As α increases, β 1 will decrease when a hole is filled in (i.e. a triangle is created), and may increase when a new edge is created (see Fig. 2). In other words, when a hole is filled, F increases by one. Conversely, when an edge forms, the number of edges E increases by one, and the number of connected comonents C may decrease by one (if the edge connects two reviously searate comonents). Related to this, ersistence refers to how long regions in the comlement of K α last until they are contained in K α+ for some > 0. The -ersistent Betti number of K α, (K α), is β 1 (K α ) minus the number of regions in the comlement of K α that are contained in K α+. In sirit, it is the Betti number of the comlex obtained from K α with small holes filled in. For formal definitions in a more general setting, and algorithms for their calculation, see [4]. Consider two subcomlexes in a filtration, K α and K α+,where>0. Recall that this means that K α K α+,sok α+ contains the same vertices, edges, and triangles as K α, but may also contain new edges and triangles. Holes in K α that are still holes in K α+ are regions that are ersistent in. Weshallrefer to these regions as -ersistent regions. Holes in K α that are filled in between K α and K α+ are regions that are not ersistent in. We shall refer to these as -transient regions. And finally, the individual triangles that were already filled in K α will be referred to as d-triangles. For subcomlexes of the lane, loos that do not ersist bound regions that disaear comletely in K α+. An equivalent definition to the more general one, is (K α)=c V + E F R, wherer is the number of regions in the comlement of K α that are contained in K α+. Note that this is not necessarily true in higher dimensions. 3 Segmentation Algorithm The roosed segmentation algorithm is a hybrid slit-and-merge segmentation algorithm that emloys comutational toology and ersistent homology for image slitting and region feature characteristics for region merging. The algorithm first emloys some edge detection algorithm, such as the Canny algorithm [1] or the wavelet-based detector that we used [8], to determine the set of edge oints, X, in the image. Toological slitting is the erformed over X to generate an initial segmentation with three tyes of regions: -ersistent regions, -transient regions, and d-triangles. The toological slitting is controlled by two arameters, α and, whereα defines the radius of the disks and indicates the ersistence. In the final ste, the algorithm merges the -transient and

5 Image Segmentation Using Toological Persistence 591 β α C =4 E =14 F =0 β 1 =0 E =22 F =0 β 1 =5 E =27 F =5 β 1 =5 E =35 F =10 β 1 =8 E =37 F =13 β 1 =7 E =38 F =18 β 1 =3 Fig. 2. This figure demonstrates various comlexes in a filtration, including their Betti numbers and ersistent Betti numbers for each K α and K α+ d-triangle regions with either the -ersistent regions or each other to generate the final segmentation. As discussed in the revious section, the -ersistent regions reresent larger regions that remain (are not filled in) in K α+. Conversely, -transient are smaller regions that are filled in between K α and K α+, while d-triangles are the smallest regions, which already existed as triangles in K α.thed-triangles are akin to thickened edges searating regions in the initial segmentation. The -ersistent regions are crucial in that they define the core objects in the initial segmentation. There are two reasons to believe these regions are imortant to the segmentation: they are comletely surrounded by edges, and they all contain a disk of radius α + in their interiors. These initial regions can then be exanded uon to create a full segmentation. We erform this rocess in such a way that the ersistent homology is resected. One aroach would be to use the simlification algorithms resented in [4] to exand these regions and reserve this homological information. However, this method uses only the edge information, essentially exanding the regions so that the region boundaries consist of the shortest ossible edges. This aroach has the significant drawback that it does not incororate any region information. An alternative strategy for exanding the ersistent regions to a full segmentation is to merge neighboring regions based on their feature characteristics. In our case, we simly used the average color value for each region, but any desired feature vector could be used. Homological ersistence dictates the merge order of the regions, with regions being ordered according to the disk radius α for which the triangle was formed, starting from the smallest. In order to reserve the toology of the segmentation, regions will only be merged if the ersistent Betti number remains unchanged.

6 592 D. Letscher and J. Fritts Algorithm 1. Algorithm for edge-directed toological image segmentation 1: 2: 3: 4: 5: 6: 7: 8: 4 Identify set of edges, X, in the image. Find the Delaunay triangulation of X. Calculate β1 (Kα ) and identify regions in 2 Kα as -ersistent, -transient, or d-triangle regions. Let F be the set of regions ordered by increasing α values. while (F is not emty) do Let σ be the first face in F. And let F = F {σ}. Merge σ with the most similar adjacent region rovided that β1 (merged regions) = β1 (Kα ) end while Results Figures 3 and 4 demonstrate the results of the algorithm for a samle image, both over multile stages of the rocess, and over multile searate images, resectively. As evident, each of the resulting segmentations effectively distinguishes the critical objects in the image. Figure 5 demonstrates how the choice of α and affects the resulting segmentation. For small values of α large regions are not searated from each other in the initial stages of the algorithm. For fixed α larger values of remove small regions from consideration. Fig. 3. Major stes in the algorithm: (a) original image (b) comlement of the α comlex for α = 4, = 0. (c) the ersistent regions at α = 4, = 3 (d) final segmentation. Fig. 4. Examle segmentations a sto sign, a rose and a baseball layer

7 Image Segmentation Using Toological Persistence =0 23 Regions =2 22 Regions =4 13 Regions 47 Regions 34 Regions 21 Regions 43 Regions 28 Regions 22 Regions 593 α=2 α=4 α=6 Fig. 5. Affect on the choice of arameters of the resulting segmentation The segmentation algorithm has several nice guarantees. In articular, large regions in the comlement of the edges will not be broken into searate regions. Secifically, any ball of radius in the comlement of the edges will not be divided between multile segments. The choice of α will affect how well the oints identified by the edge detection fill out to comlete the boundary of regions. In articular, if the oints identified as edges have neighbors with a distance of α/2 in each direction then boundaries of regions will be correctly reconstructed. 5 Related Work An early image segmentation method using Delaunay triangulations was resented in [6]. Their method is distinct in that they do not use ersistent homology, but instead start with a full Delaunay triangulation and generate the core objects in the final segmentation solely through region merging. A more recent image segmentation method based on Delaunay triangulation is resented in [11]. They use similar criteria for doing their initial segmentation. However, whereas we use Delaunay triangulation for defining different tyes of regions and then erform region merging to generate the final segmentation, they use Delaunay triangulation for defining boundaries, and use thinning to eliminate undesired edges in the final segmentation.

8 594 D. Letscher and J. Fritts Another recent image segmentation method based on Delaunay triangulation is resented in [10]. They generate the full Delaunay triangulation first, followed by region merging. They merge regions by extracting a skeleton of the segmented image from the connected comonents grah of the triangulations. Each searate connected comonent in the skeleton defines one region in the final segmentation. 6 Conclusion and Future Directions We have resented an image segmentation algorithm that uses both edge and region information and uses techniques from comutational toology. The segmentations obtained clearly delineate key objects in the images and are good initial indicators of the effectiveness of the method. There are several directions of followu for this algorithm. These include studying different orderings for merging the d-triangles and -transient regions, and using alternate feature characteristics for region merging (as oosed to just average region color value). Significant imrovement could also otentially be achieved in using machine learning methods to hel identify aroriate arameterizations of α and according to the characteristics of the image and edge features. Another imrovement is to utilize more information from the edge detection algorithms. The current algorithm only uses the magnitude of the estimated gradient. The direction of the gradient can also be incororated in finding an anisotroic Delaunay triangulation. These triangulations can better reresent the regions divided by the edge information. References 1. Canny, J.: A Comutational Aroach To Edge Detection. IEEE Trans. Pattern Analysis and Machine Intelligence 8, (1986) 2. Edelsbrunner, H.: Algorithms in Combinatorial Geometry. Sringer, New York (1987) 3. Edelsbrunner, H.: The Union of Balls and its Dual Shae. In: Proceedings of the Ninth Annual Symosium on Comutational Geometry, (1993) 4. Edelsbrunner, H., Letscher, D., Zomorodian, A.: Toological Persistence and Simlification. Discrete and Comutational Geometry 28, (2002) 5. Fortune, S.: A Sweeline Algorithm for Voronoi Diagrams. Algorithmica 2, (1987) 6. Gevers, T., Smeulders, A.W.M.: Combining Region Slitting and Edge Detection through Guided Delaunay Image Subdivision. In: Proc. of the 1997 International Conference on Comuter Vision and Pattern Recognition, (1997) 7. Guibas, L., Knuth, D., Sharir, M.: Randomized Incremental Construction of Delaunay and Voronoi Diagrams. Algorithmica 7, (1992) 8. Mallat, S., Zhong, S.: Characterization of signals from Multiscale Edges. IEEE Trans. Patt. Anal. and Mach. Intell. 14, (1992) 9. Massey, W.: A Basic Course in Algebraic Toology. Sringer, Heidelberg (1991)

9 Image Segmentation Using Toological Persistence Prasad, L., Skourikhine, A.N.: Vectorized Image Segmentation via Trixel Agglomeration. In: Brun, L., Vento, M. (eds.) GbRPR LNCS, vol. 3434, Sringer, Heidelberg (2005) 11. Stelldinger, P., Ullrich, K., Meine, H.: Toologically Correct Image Segmentation Using Alha Shaes. In: Kuba, A., Nyúl, L.G., Palágyi, K. (eds.) DGCI LNCS, vol. 4245, Sringer, Heidelberg (2006)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, 100083 - awulixin@263.net,

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Efficient Computation of Morse-Smale Complexes for Three-dimensional Scalar Functions.

Efficient Computation of Morse-Smale Complexes for Three-dimensional Scalar Functions. Efficient omutation of Morse-Smale omlexes for Three-dimensional Scalar Functions. ttila Gyulassy Institute for Data nalysis and Visualization Det. of omuter Science University of alifornia, Davis Vijay

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Folded Structures Satisfying Multiple Conditions

Folded Structures Satisfying Multiple Conditions Journal of Information Processing Vol.5 No.4 1 10 (Oct. 017) [DOI: 1197/isjji.5.1] Regular Paer Folded Structures Satisfying Multile Conditions Erik D. Demaine 1,a) Jason S. Ku 1,b) Received: November

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Taut ideal triangulations of 3-manifolds

Taut ideal triangulations of 3-manifolds Abstract Taut ideal triangulations of 3-manifolds Marc Lackenby Mathematical Institute, Oxford University, 24-29 St Giles, Oxford OX1 3LB, UK Email: lackenby@maths.ox.ac.uk A taut ideal triangulation of

More information

Silvania Avelar, Matthias Muller. Swiss Federal Institute of Technology Zurich, Switzerland. Abstract

Silvania Avelar, Matthias Muller. Swiss Federal Institute of Technology Zurich, Switzerland. Abstract Generating Toologically Correct Schematic Mas Silvania Avelar, Matthias Muller Deartment of Comuter Science Swiss Federal Institute of Technology 8092 Zurich, Switzerland favelar,muellermg@inf.ethz.ch

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

A Simple and Robust Approach to Computation of Meshes Intersection

A Simple and Robust Approach to Computation of Meshes Intersection A Simle and Robust Aroach to Comutation of Meshes Intersection Věra Skorkovská 1, Ivana Kolingerová 1 and Bedrich Benes 2 1 Deartment of Comuter Science and Engineering, University of West Bohemia, Univerzitní

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

Efficient Algorithms for Computing Conservative Portal Visibility Information

Efficient Algorithms for Computing Conservative Portal Visibility Information EUROGRAPHICS 2000 / M. Gross and F.R.A. Hogood (Guest Editors) Volum9 (2000), Number 3 Efficient Algorithms for Comuting Conservative Portal Visibility Information W. F. H. Jiménez, C. Eserança and A.

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Curve Reconstruction taken from [1]

Curve Reconstruction taken from [1] Notes by Tamal K. Dey, OSU 47 Curve Reconstruction taken from [1] The simlest class of manifolds that ose nontrivial reconstruction roblems are curves in the lane. We will describe two algorithms for curve

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

A Texture Based Matching Approach for Automated Assembly of Puzzles

A Texture Based Matching Approach for Automated Assembly of Puzzles A Texture Based Matching Aroach for Automated Assembly of Puzzles Mahmut amil Saırolu 1, Aytül Erçil Sabancı University 1 msagiroglu@su.sabanciuniv.edu, aytulercil@sabanciuniv.edu Abstract The uzzle assembly

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

CMSC 754 Computational Geometry 1

CMSC 754 Computational Geometry 1 CMSC 754 Comutational Geometry 1 David M. Mount Deartment of Comuter Science University of Maryland Fall 2002 1 Coyright, David M. Mount, 2002, Det. of Comuter Science, University of Maryland, College

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

An accurate and fast point-to-plane registration technique

An accurate and fast point-to-plane registration technique Pattern Recognition Letters 24 (23) 2967 2976 www.elsevier.com/locate/atrec An accurate and fast oint-to-lane registration technique Soon-Yong Park *, Murali Subbarao Deartment of Electrical and Comuter

More information

arxiv: v5 [cs.cc] 6 Jun 2017

arxiv: v5 [cs.cc] 6 Jun 2017 On the Comlexity of Barrier Resilience for Fat Regions and Bounded Ply arxiv:1302.4707v5 [cs.cc] 6 Jun 2017 Matias Korman Maarten Löffler Rodrigo I. Silveira Darren Strash Abstract In the barrier resilience

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Fast Shape-based Road Sign Detection for a Driver Assistance System

Fast Shape-based Road Sign Detection for a Driver Assistance System Fast Shae-based Road Sign Detection for a Driver Assistance System Gareth Loy Comuter Vision and Active Percetion Laboratory Royal Institute of Technology (KTH) Stockholm, Sweden Email: gareth@nada.kth.se

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Lane Detection and Tracking in Challenging Environments based on a Weighted Graph and Integrated Cues

Lane Detection and Tracking in Challenging Environments based on a Weighted Graph and Integrated Cues The 010 IEEE/RSJ International Conference on Intelligent Robots and Systems October 18-, 010, Taiei, Taiwan ane Detection and Tracking in Challenging Environments based on a Weighted Grah and Integrated

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels CS 229 Final Project: Single Image Deth Estimation From Predicted Semantic Labels Beyang Liu beyangl@cs.stanford.edu Stehen Gould sgould@stanford.edu Prof. Dahne Koller koller@cs.stanford.edu December

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Andreas Nürnberger, Aljoscha Klose, Rudolf Kruse University of Magdeburg, Faculty of Comuter Science 39106 Magdeburg, Germany

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

Simultaneous Tracking of Multiple Objects Using Fast Level Set-Like Algorithm

Simultaneous Tracking of Multiple Objects Using Fast Level Set-Like Algorithm Simultaneous Tracking of Multile Objects Using Fast Level Set-Like Algorithm Martin Maška, Pavel Matula, and Michal Kozubek Centre for Biomedical Image Analysis, Faculty of Informatics Masaryk University,

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Splitting (Complicated) Surfaces Is Hard

Splitting (Complicated) Surfaces Is Hard Slitting (Comlicated) Surfaces Is Hard Erin W. Chambers Det. of Comuter Science University of Illinois erinwolf@uiuc.edu Éric Colin de Verdière CNRS, Laboratoire d informatique École normale suérieure,

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Real Time Compression of Triangle Mesh Connectivity

Real Time Compression of Triangle Mesh Connectivity Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity

More information

Deformable Free Space Tilings for Kinetic Collision Detection

Deformable Free Space Tilings for Kinetic Collision Detection Deformable Free Sace Tilings for Kinetic Collision Detection Pankaj K. Agarwal Julien Basch Leonidas J. Guibas John Hershberger Li Zhang Abstract We resent kinetic data structures for detecting collisions

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

The Edge-flipping Distance of Triangulations

The Edge-flipping Distance of Triangulations The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

level 0 level 1 level 2 level 3

level 0 level 1 level 2 level 3 Communication-Ecient Deterministic Parallel Algorithms for Planar Point Location and 2d Voronoi Diagram? Mohamadou Diallo 1, Afonso Ferreira 2 and Andrew Rau-Chalin 3 1 LIMOS, IFMA, Camus des C zeaux,

More information

Computational Geometry: Proximity and Location

Computational Geometry: Proximity and Location 63 Comutational Geometry: Proximity and Location 63.1 Introduction Proximity and location are fundamental concets in geometric comutation. The term roximity refers informally to the uality of being close

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Development of an automated detection system for microcalcifications on mammograms by using the higher-order autocorrelation features

Development of an automated detection system for microcalcifications on mammograms by using the higher-order autocorrelation features Develoment of an automated detection system for microcalcifications on mammograms by using the higher-order autocorrelation features Y. Ohe, N. Shinohara, T. Hara, H. Fujita, T. Endo *, T. Iwase ** Deartment

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Improved Symmetric Lists

Improved Symmetric Lists Imroved Symmetric Lists Prerint February, 24 Christian Bachmaier and Marcus Raitner University of Passau, 943 Passau, Germany {bachmaier,raitner}@fmi.uni-assau.de Abstract. We introduce a new data structure

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

[9] J. J. Dongarra, R. Hempel, A. J. G. Hey, and D. W. Walker, \A Proposal for a User-Level,

[9] J. J. Dongarra, R. Hempel, A. J. G. Hey, and D. W. Walker, \A Proposal for a User-Level, [9] J. J. Dongarra, R. Hemel, A. J. G. Hey, and D. W. Walker, \A Proosal for a User-Level, Message Passing Interface in a Distributed-Memory Environment," Tech. Re. TM-3, Oak Ridge National Laboratory,

More information