A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

Size: px
Start display at page:

Download "A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition"

Transcription

1 ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural network moel base on graph matching an an annealing technique, one-variable stochastic simulate annealing(ossa) which makes it possible to evaluate the spin average value effectively by Markov process in case of many real applications. In orer to emonstrate the capability of our moel we implemente a program that can segment an recognize han-written igits. Input an object igits, memorize objects, are represente by graph, whose eges are labele by geometrical istance, an whose vertices are labele by position in the graph omain. Pattern recognition can be formulate as elastic graph matching, which is performe here by stochastic optimization of a matching cost function. Our approach provies not only the function of recognition but also the segmentation ability such that input characters are correctly recognize an segmente even if they are touching, connecte, an efecte by noise. Some results of computer experiments are reporte to show the feasibility of our approach. Keywors Pattern recognition, Segmentation, Optimization, Annealing neural networks H I. ITRODUCTIO AD-WRITTE character recognition is an important application fiel of neural networks because the conventional algorithms have much ifficulties in this area[][][3]. Especially, it is har to segment characters correctly by conventional, rule-base segmentation algorithms if they are touching, efecte or noisy. In general, most recognition moels use a preprocessor to remove meaningless variations an to capture meaningful features. However, its recognition accuracy has been limite by the accuracy of the segmentation algorithm it has. One of the well known problems in this situation is that one can not properly segment a character until it is recognize an yet one can not properly recognize a character until it is segmente correctly. This means that high ranks of recognition can be achieve by the integration of segmentation an recognition occurring simultaneously in the system. Combinatorial optimization ranks among the first application of moern neural networks an its application to recognition of characters an objects have been numerous in the literatures[4][6]. In this paper, we propose a neural network Manuscript receive May 3, 007; Revise receive December 6, 007. Kyunghee Lee is with the Department of Information an Communications, PyungTaek University,, YoungI-Dong, PyeongTaek Si, KyungKi-Do, Korea (phone: ; fax: ; khlee@ptu.ac.kr). Issue 4, Volume, approach that simultaneously segments an recognizes the han-printe igits by graph matching, which is formulate as one of optimization problems. An it is shown that it is possible to map the graph matching problem onto a one-variable annealing neural network with an appropriate energy function. We reuce the size of graph moel without loss of recognition quality an use a one-variable stochastic simulate annealing(ossa) algorithm as an optimization algorithm, which evaluates effectively the spin average value in the mean fiel annealing(mfa) networks with continuous variables[5]. II. GRAPH MATCHIG FOR SEGMETATIO AD RECOGITIO A. Moel Parameters To characterize each feature three measurements are extracte. Their measurements or moel parameters were chosen for their properties of invariance with respect to size, translation incluing shift of the writing. The important factor to select the moel parameters is that the moel parameters can recreate the shape of a stroke an generally of a igit as well except for size an translation[6]. We choose the following three moel parameters to characterize the graph for segmentation an recognition. The first one is the istance, Eucliean istance, between the noe in the input graph an that of reference graph, object graph. This parameter can be invariant to shift of the input. The secon one is the acute angle between the two noes in the graph. This angle parameter is invariant to rotation of the input by the proper angle measure function. The thir one is the number of cross points between the two noes in the graph. This crossing parameter is invariant to the size of the input. B. Graph Matching Approach Pattern recognition in our system consists of a ynamic assignment proceure, which is performe uner the constraint that vertices(noes) in the input graph shoul have approximately the same topological relationship as the vertices in one of the store object graphs. During recognition, patterns are encoe as graphs (V,E), with vertex set V an ege set E. Vertices refer to noes to be assigne. An neighboring vertices are connecte by eges(links) with each other which encoe information about the local topology. In our graph matching approach each noe has relational properties with

2 neighboring noes an is connecte each other by a link. The relational properties are represente by the moel parameters(istance, acute angle, an the number of cress points between the noes). An not only the relations between the near neighboring noes are use as the compatibility constraints but also relations between all the far neighboring noes are use in orer to increase the robustness of the matching. The graph matching we present in this paper is elastic matching base on an energy of cost function. The minima of which provie the solution of the matching problem. This leas to consiering a neural network system where the state of the system is a set of connectivity rather than a vector of neural activities an computation is a connectivity-ynamics instea of an activity-ynamics[8]. In this approach, matching one graph with another graph consists in fining a connectivity state which satisfies at best many local requirements an minimize the cost C. Cost Function In the graph matching problem for pattern recognition an segmentation we formalize, an actually quantify, with the help of the best possible matching between input an object graph, the egree of matching by a mathematical formulation. To fin out the best-matching we characterize the following energy function to be minimize, which measures the quality of noe-to-noe matching as well as conservation of neighboring relations between noes in the input an object graph. min E = λ E + λ E + λ E () = # ) Vik i= k = j=, j ( i) l=, l k E E = i= k = j=, j ( i) l, l k 3 3 ( V () ( θ) VikVjl, if θ θth, = ( α θ ) V V, if θ θ 0, if min ( i, δ p ma ( i, (4) max + min E3 = β (( δ ( )) i= k = j=, j ( i) l=, l k max min ( ) ), otherwise # = # # (5) ik( i) { θ θ, π ( θ θ )} θ = min (6) ik ( i) ik ( i) δ = δ δ (7) ik ( i) ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO Where V ik is analogous to a state variable of a neuron, an enotes the probability that noe i is place at position k. Therefore, it takes the value of when the noe i in the input graph is place at position k an it is matche perfectly to the noe i in the object graph. λ, λ, λ 3, are weight factors that etermine the relative weightings of the terms. # is the number of cross points between the noe i an noe j when noe i is at position k an noe j is at position l. θ is the acute angle between the interconnecting ege an horizontal line. δ ik jl Issue 4, Volume, jl th (3) is a istance between noe i an noe j when noe i is at position k an noe j is at position l. min max enote minimum an maximum istance between noe i an noe j, that are allowe to move without penalty, respectively an that are neee to assist to prouce a fine-look matching graph. (i), a set of neighboring noes of i, consists of near neighbors an far neighbors. ear neighbors are upper, lower, left, right, upper-left, upper-right, lower-left, an lower-right sie noes aroun the noe i within a unit istance. K(i) an L( are positions, that are ecie when the object graph is constructe, of noe i an noe j in the object graph, respectively. θ th is a threshol value of angle ifference, Upper inices I an O refer to the input an store object graph, respectively.α is a penalty factor to prevent angle ifference between tow noes not to excee the θ th. If we use a small value of α we may get the matching graph consisting of the noes with much egree of isorer ue to the many crossovers. But if too large value of α is use the matching graph looks like rectangular gris of regular shapes. β is another penalty factor to make the noe i an noe j resie in a given range between min an max. The λ term is to be zero if the number of cross points between every two eges in the input graph is same as that in the object graph. The λ an λ 3 terms will have minimum value when all the neighboring noes have the same topology in view of the angle an istance similarity between input an object graph. Graph matching in out moel consists of two types of matching, global an local topology matching. Global topology matching with far neighbor noes are very robust with regar to noise an variance but their performance ecreases in the case of patterns with partially overlapping features. Local topology matching with near neighbor noes is usually istinct an easy to locate an ientify but they coul be occlue by another pattern. III. OE-VARIABLE STOCHASTIC SIMULATED AEALIG In the real worl application, there are many P-har optimizing problems with continuous variables. These inclue quantification analysis, D-optimal esign problem, an fuzzy clustering[5][7]. In the case of neural network with continuous variables of [a,b], the situation is ientical to that of the network with iscrete variables except that the state of each spin has a continues value, real value. An the equilibrium spin average of the continuous network is escribe as the following integral equation[6]. a si exp < si > = b exp b a Hs / T Hs / T Though (8) coul be calculate by the integration metho there are still some weaknesses. For instance, It is time consuming to calculate the integration in case of the large state space. In many cases, a floating point uner-flow error might occur by the harware limitation of the computer when the component of the integral goes s s i i (8)

3 to zero To overcome the above weakness we presents the way how to approximate (8) by the stochastic metho using Markov process. Monte Carlo(MC) techniques are methos of estimating the values of many-imensional integrals by sampling with the help of ranom numbers an regare as the methos appropriate to equilibrium statistical mechanics. We will concern ourselves with estimating the average potential energy of a simple flui system, where the potential energy is epenent on the configuration variables s =(s,,s ) of the particles: < E > = E( s ) p( s ) s (9) where the probability ensity p( s ) is given by E s kbt p s ( ) ( ) = exp (0) Z with Z the configuration integral Z = E ( s ) kbt exp s () In MC estimation of an average like (9), ranom numbers are use to generate approximately istribute configuration(s ) of a system of particles. In practice the computations are fairly expensive to carry out the integral, an it is impossible to calculate the configuration integral, (), because of the unlimite integral space. Importance Sampling(IS) is a promising metho for reucing run-time in MC which has long been recognize as a powerful tool for simulating low probability events. An most of the statistical mechanics applications of MC involve IS rather than inepenent samples. In the MFA neural network with continuous variables, the equilibrium spin average is the same form as the average potential energy with configuration integral except that the system consists of only one variable. An the average of the perturbe spin at a given temperature might be regare as an expecte value of that spin in the mean fiel from the Boltzmann istribution[6]. We propose a new stochastic algorithm, OSSA algorithm, to realize (8) as the following:. Select a spin i in the current state s, an perturb it into a new state s.. Compute the energy E(s ) an compare it with the E(s) of the current state s, an then let the spin i take the perturbe value with probability Pr( s s) =.0, ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO ( E( s ) E( s)) if E( s ) E( s) () = exp T if E( s ) E( s) Where T is a temperature. 3. Repeat an a number of times 4. Calculate the average of the accepte perturb e values an regar it as an equilibrium spin average, <s i >, at a given temperature T. 5. Anneal with an annealing scheule. 6. Repeat step to 5 until the final temperature is Issue 4, Volume, reache In the above algorithm, step to 3 are the same steps as in the original simulate annealing(sa) algorithm except that each single spin is perturbe an evaluate as its own value, which represents as element of the configuration vector. Step 4 is not necessary but recommene to be use because it can prevent a spin from being evaluate as a fluctuate value even though a small number of iteration is use in OSSA algorithm. As a result, OSSA algorithm reuces a multi-boy problem into a single boy problem uner the mean fiel an makes it possible to evaluate the spin average of the network with continuous variables effectively. By the above OSSA algorithm, a goo approximation of (8) can be obtaine an thus spin average with real value can be estimate. IV. SEGMETATIO AD RECOGITIO A. Graph Multi-partitioning The problems with iscrete variables arise often in engineering esign, LSI esign, an also have importance in pattern recognition, speech processing, vision an computing in general. One of the typical problems with iscrete variables is a graph partitioning problem that involves partitioning a graph, which consists of a set of noes an E interconnecting eges, into K equally size sub-graphs, each with /K noes an minimal number of eges. An graph multi-partitioning is a problem with noes that must be resie only on of B bins in the graph. Our graph matching problem is similar to the graph multi-partitioning in that it has exclusivity constraints that in the final solution a given noe n i must resie in only one bin among the B bins. In our case B correspons to the number of possible positions at which a noe can resie. B. Segmentation an Recognition using OSSA When the number of states of a spin is large, we can use OSSA algorithm to approximately calculate the spin values, Our segmentation an recognition algorithm using OSSA an graph matching is as follows:. Select one of the object graphs in sequence an repeat step to step 4 until all the object graphs are selecte.. Initialize every noe in the input graph to be positione aroun the center of its winow area. 3. Determine starting temperature as the following: (a) Perturb the noe i in the current s into a new state s with a starting temperature. (b) Let the noe i take the perturbe value with probability accoring to () an repeat this step a number of times. If the average of the accepte perturbe values has a small value, raise the starting temperature, otherwise lower the starting temperature. (c) Repeat step 3(a) to 3(b) until the average of the accepte perturbe values of every noe has the value of near.0.

4 ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO 4. Apply OSSA algorithm an rank the cost at the final temperature as the cost of the graph matching with the selecte object graph. 5. Output the graph matching result that has the minimum cost. In step an, one of the object graphs is selecte an input graph is constructe from the input pattern with every noe place aroun the center of its winow area as an initialization. In step 3, the temperature at witch noe starts to stop the ranom movement is regare as the starting temperature, This enables that OSSA algorithm fins the proper starting temperature empirically without a complicate estimation of the critical temperature. In step 4, optimization is performe by OSSA algorithm as escribe in section 3, an the final solution of segmentation an recognition is obtaine. V. EXPERIMETAL RESULTS This section escribes some results of a preliminary experiment with computer simulation to investigate the ability of this moel to recognize an segment the han-written igits. In the experiments, the input omain which consists of 0 0 cells is use. Each object graph with 3 noes is mae to have its own characteristics in the object omain having the same size as input omain(see Fig ). segment an recognize characters we use the input stimulus consisting of two igits that are istorte or touching each other. The segmentation of connecte or touching characters is more ifficult problem than recognition of a single character because there are many local topologies similar to that of object graph aroun the touching or connecte area in the input graph. We applie graph matching an OSSA to segment han-written igits with the starting temperature(t)=.5, the final T=.0*0-4, number of bins(b)=*, α=.0, β=.0, θ th =0.8, an ε=.0*0-5. The weight factors use were λ =500.0, λ =50.0 an λ 3 =50.0. Fig 3 shows how the graph matching proceure when input pattern is 5. It is shown that at the initial T isorere graphs are mae(fig. 3(a)) but as the T ecrease refine graphs are outcome(fig 3.(b)). At the final temperature, the ientification an segmentation is complete an cost function efine in () is minimize an best matching graphs are isplaye(fig 3.(c)). Fig. An example of 5 as a given input graph To fin the near global minimum of the cost function, the solution of the matching problem. We implement an optimization algorithm, OSSA, for segmentation an recognition as escribe in the previous section. An we also use a winow mechanism, bounary noes(see Fig ) an a quench mechanism to spee up the computer simulation. (a) (b) (c) Fig 3. Progress in the graph matching process (input is 5 ) Fig. Bounary noes fixe to spee up the simulation To investigate the ability of our moel to simultaneously Fig 4 an Fig 5 shows the left-sie an right-sie proceure when a stimulus consisting of touching characters ( 5, 3 ) is presente. In these figures, same in case of Fig 3, as the T Issue 4, Volume,

5 ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO ecrease refine graphs are outcome(fig 4(b), 5(b)). An at the final temperature, the ientification an segmentation is complete an best matching graphs are isplaye(fig 4(c), 5(c)). Left an right sie graph matching can be accomplishe simultaneously. As a result, we can see that graph matching with object graph 5 an 3 prouces the best matching that look like solutions of segmentation of han-written input 53. (a) (b) (c) Fig 5. Right-sie progress in the graph matching process (input is 53 ) (a) (b) (c) Fig 4. Left-sie progress in the graph matching process (input is 53 ) Fig 6 an Fig 7 shows some examples of han-written igits which have been successfully recognize an segmente by OSSA. It can be seen from the figure that input igits are correctly segmente an recognize without preprocessing such as noise reuction, thinning, an scaling even if they are touching, connecte, an efecte by noise, in which case most conventional systems can not hanle well. However, some problems still remain to be solve. For example, when a local topology in some part of input is similar to that of topology of Issue 4, Volume,

6 ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO the object, or the topology of the input graph can be matche with more than one object graphs there is a possibility of failure in recognition an segmentation. Fig. 8 shows the examples of typical segmentation error. As can be seen from the figure 8(a), our moel faile to segment an recognize the igit. An another typical error occurre as in the figure 8(b). Because 7 inclues the topology of our moel recognize 7 as with some noise - an fails to segment an recognize. To overcome the problems we can use the object graphs with ifferent numbers of noes each other, that make it possible to represent the characteristics of the objects effectively accoring to their shapes. (a) (b) Fig 7. Some examples of igits successfully segmente an recognize (left-sie(a), right-sie(b) output graphs) (to be continue) Fig 6. Some examples of eforme numeric single igit that is recognize correctly Issue 4, Volume,

7 ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO (a) (b) Fig 7. Some examples of igits successfully segmente an recognize (left-sie(a), right-sie(b) output graphs) REFERECES [] Keeler,J.D., Rumelhart,D.E., Keow,W.K., Integrate Segmentation an Recognition of Han-Printe umerals, Avance eural Information Processing System, Vol.3, 99, pp [] Lee,S., Pan,J.C., Hanwritten umeral Recognition base on Hierarchically Self-Organizing Learning etworks, Proceeings of the International Joint Conference on eural etworks, Singapore, II, 99, pp [3] Zhang, B., Fu, M., Yan, H., A on Linear eural etwork Moel of Mixture of Local Principal Component Analysis : Application to Hanwritten Digits Recognition, Pattern Recognition, Vol.34, Issue, 00, pp [4] Tappert,C.C., Cursive Script Recognition by Elastic Matching, IBM Journal of Research an Development, Vol 6(6), 98, pp [5] Lee,K., Cho,K., Lee,W.D., Lee,S., Mean Fiel Annealing with Continuous Variables an Its Application to the Quantification Analysis Problem, Proceeings of the International Joint Conference on eural etworks, 99, pp [6] Von er Malsburg, C., Pattern Recognition by Labele Graph Matching, eural etworks, Vol., 988, pp [7] Kim,M.H., Choi,H.S., Lee,W.D., Fuzzy Clustering Extene MFA for Continuous Value State Space, Proceeings of the International Joint Conference on eural etworks, 99, pp [8] asrabai,.m., Li,W., Object Recognition by Hopfiel eural etwork, IEEE Transactions on Systems, Man, an Cybernetics, (6), 99, pp [9] Izumi, M., Asano,T., Matching of Ege-Line Image Using Relaxation, IEICE Transactions on Information an System, E75-D(6), 99, pp [0] Hopfiel,J.J., Tank,D.,W., eural Computation of Decision in Optimization Problems, Biological Cybernetics, 5, 985, pp []Kirkpatrics,S.,Gelatt,C.,Vecchi,M., Optimization by Simulate Annealing, Science, 0, 983, pp [] Van en Bout, Miller III,T.,K., Graph Partitioning Using Anneale eural etworks, IEEE, Transactions on eural etworks, (), 990, IPUT MATCHIG GRAPH IPUT MATCHIG GRAPH (a) (b) Fig 8. Examples of characters our moel fails to segment an recognize correctly VI. COCLUSIO The system presente here emonstrates that neural networks can, in fact, be use for segmentation as well as recognition. We have by no means emonstrate that this metho is better than conventional segmentation an recognition system in over all performance. However, most conventional system can not eal with touching, broken, or noisy characters very well at all. Whereas our system presente here hanles all of these cases an recognition in a integrate fashion. The major iea is that pattern recognition an segmentation problem often requires invariance that can not be easily obtaine in conventional neural network architecture an relational escriptions provies a powerful theoretical tool for solving this kin of problem which requires invariance with respect to various transformation of the image. In our approach, a constraint such as the angle, cross points an istance between two noes are use. These three types of constraints are simple to compute an aitional constraints an/or high-orer constraints may also be inclue. An we can see that it is promising for complex character, such as Korean an Chinese, recognition. Kyunghee Lee was born in Seoul, Korea, in 96. He receive B.S. egree in electrical engineering from Kyungpook ational University in 983 an the M.S. an Ph.D. egree in computer science from Choongnam ational University, Daejeon, Korea, in 990, in 993, respectively. In 983, he joine Electronics an Telecommunications Research Institute(ETRI). From 983 to 997, he was engage in the research an evelopment of high-spee neteork services an he was a project manager of KIIPD(Korea Information Infrastructure Pilot project in Daeuck science town) supporte by KT(Korea Telecom) in 996. He is now an associate professor at PyongTaek University. His main research interests inclue high spee networking services, neural networks, optimization, an classification in unconventional ways. Issue 4, Volume,

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Multi-camera tracking algorithm study based on information fusion

Multi-camera tracking algorithm study based on information fusion International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Object Recognition Using Colour, Shape and Affine Invariant Ratios

Object Recognition Using Colour, Shape and Affine Invariant Ratios Object Recognition Using Colour, Shape an Affine Invariant Ratios Paul A. Walcott Centre for Information Engineering City University, Lonon EC1V 0HB, Englan P.A.Walcott@city.ac.uk Abstract This paper escribes

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD. Kohei Yatabe and Yasuhiro Oikawa

PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD. Kohei Yatabe and Yasuhiro Oikawa 4 IEEE International Conference on Acoustic, Speech an Signal Processing (ICASSP) PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD Kohei Yatabe an Yasuhiro Oikawa Department of Intermeia

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

SMART IMAGE PROCESSING OF FLOW VISUALIZATION

SMART IMAGE PROCESSING OF FLOW VISUALIZATION SMAR IMAGE PROCESSING OF FLOW VISUALIZAION H Li (A Rinoshika) 1, M akei, M Nakano 1, Y Saito 3 an K Horii 4 1 Department of Mechanical Systems Engineering, Yamagata University, Yamagata 99-851, JAPAN Department

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

Data Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis?

Data Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis? Data Mining: Concepts an Techniques Chapter Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign www.cs.uiuc.eu/~hanj Jiawei Han an Micheline Kamber, All rights reserve

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

A Parameterized Mask Model for Lithography Simulation

A Parameterized Mask Model for Lithography Simulation A Parameterize Mask Moel for Lithography Simulation henhai hu Caence Research Labs, Berkeley, CA 94704 zhzhu@caence.com 1. ABSTRACT e formulate the mask moeling as a parametric moel orer reuction problem

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Optimization of cable-stayed bridges with box-girder decks

Optimization of cable-stayed bridges with box-girder decks Avances in Engineering Software 31 (2000) 417 423 www.elsevier.com/locate/avengsoft Optimization of cable-staye briges with box-girer ecks L.M.C. Simões*, J.H.J.O. Negrão Department of Civil Engineering,

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL Ting Peng a,b, Ian H. Jermyn b, Véronique Prinet a, Josiane Zerubia b a LIAMA & PR, Institute of Automation,

More information

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD Warsaw University of Technology Faculty of Physics Physics Laboratory I P Joanna Konwerska-Hrabowska 6 FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD.

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Detecting Overlapping Communities from Local Spectral Subspaces

Detecting Overlapping Communities from Local Spectral Subspaces Detecting Overlapping Communities from Local Spectral Subspaces Kun He, Yiwei Sun Huazhong University of Science an Technology Wuhan 430074, China Email: {brooklet60, yiweisun}@hust.eu.cn Davi Binel, John

More information

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract

More information

Nearest Neighbor Search using Additive Binary Tree

Nearest Neighbor Search using Additive Binary Tree Nearest Neighbor Search using Aitive Binary Tree Sung-Hyuk Cha an Sargur N. Srihari Center of Excellence for Document Analysis an Recognition State University of New York at Buffalo, U. S. A. E-mail: fscha,sriharig@cear.buffalo.eu

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P.

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P. Journal of Engineering Science an echnology Vol. 13, No. 1 (2018) 141-157 School of Engineering, aylor s University IMPLEMENAION OF REJECION SRAEGIES INSIDE MALAYALAM CHARACER RECOGNIION SYSEM BASED ON

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen Proceeings of ACIVS 2002 (Avance Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002 CONTENT-BASED RETRIEVAL OF DEFECT IMAGES Jukka Iivarinen an Jussi Pakkanen jukka.iivarinen@hut.fi,

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Refinement of scene depth from stereo camera ego-motion parameters

Refinement of scene depth from stereo camera ego-motion parameters Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information