Lossless Compression of Map Contours by Context Tree Modeling of Chain Codes
|
|
- Wilfred Alexander
- 6 years ago
- Views:
Transcription
1 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes Alexander Akmo, Alexander Kolesnko, and Pas Fränt Department of Computer Scence, Unersty of Joensuu, P.O. Box 111, Joensuu, Fnland {akmo, koles, Abstract. We consder lossless compresson of dgtal contours n map mages. The problem s attacked by the use of context-based statstcal modelng and entropy codng of chan codes. We propose to generate an optmal context tree by frst constructng a complete tree up to a predefned depth, and then create the optmal tree by prunng out nodes that do not prode mproement n compresson. Experments show that the proposed method ges lower bt rates than the exstng methods for the set of test mages. 1 Introducton Dgtal maps are usually stored as ector graphcs n a database for retreng the data usng spatal locaton as the search key. The sual outlook of maps representng the same regon ares dependng on the type of the map (topographc or road map), and on the desred scale (local or regonal map). Vector representaton s conenent for zoomng as the maps can be dsplayed n any resoluton defned by the user. The maps can be conerted to raster mages for data transmsson, dstrbuton a nternet, or because of ncompatblty of the ector representatons of dfferent systems. In order to ncrease the effcency of raster map compresson, we consder the arant, when some object, nstead of beng rasterzed, wll be descrbed by chan codes and compressed separately from rest of map data. Ths can lead to a more effcent representaton of the map and, consequently, to mproe of compresson. Chan codng s a common approach for representng dfferent rasterzed shapes such as lne-drawngs, planar cures and contours. We consder thn dgtal cures of one pxel wdth, extracted from the ector data before rasterzaton. The preous works consder dfferent schemes of encodng and chan code representaton [3], [10], [11]. For example, the method n [12] uses second order context model based on 8 drectonal chan codes. Further deelopment of the context-based compresson of chan codes was presented n [4]. The authors hae mproed the performance of the chan codes encodng by ncreasng the sze of fnte context models. The problem of encodng of chan codes by predcton by partal matchng (PPM) algorthm [2] has been consdered n [1]. In prncple, context based compresson can be mproed by usng a larger number of neghborng symbols n the context. But the ncrease of the context sze leads to the H. Kalanen et al. (Eds.): SCIA 2005, LCS 3540, pp , Sprnger-Verlag Berln Hedelberg 2005
2 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 313 problem of context dluton, n whch the statstcs are dstrbuted oer too many contexts, and thus, affects the accuracy of the probablty estmates. Context tree prodes a more flexble approach for modelng the contexts so that a larger number of neghbor pxels can be taken nto account wthout the context dluton problem [13]. The context tree algorthm was orgnally ntroduced n [16], and analyzed n [10]. Practcal solutons for the context tree based compresson algorthms for grey-scale and b-leel mages hae been descrbed at [19] and [13] respectely. In ths paper, we use the context tree approach for encodng the chan codes. We prode algorthm for optmal context tree constructon. We compare the compresson performance of the rasterzed map contours when encoded by JBIG [9], and by the optmal context tree chan codes, representng the same contours. The results show that the proposed method prodes 25% lower bt rate than JBIG, and s 40% faster because only the contour pxels need to be processed. The oerall scheme of the proposed compresson method s as follows: Step 1: Extract contours from the ector or raster map and conert them nto chan codes. Store the start ponts and the lengths of the chans. Step 2: Create and store the optmal context tree for the chan codes. Step 3: By usng of context tree modelng and any entropy codng, encode the chan codes. Ths scheme s shown n Fgure 1. For smplcty, we store the sze and the begnnng of each chan (BOC) as such wthout any further compresson. Fg. 1. Oerall system dagram of the proposed method 2 Chan Code Representaton Freeman [5], [6] proposed chan codng of dgtal contours drawngs and descrpton. The chan codes represent the dgtal contour by a sequence of lne segments of specfed length and drecton, see Fgure 2. We consder both 8- and 4-drectonal chan codng schemes; see Fgure 3. The chan code representaton s constructed as follows. Step 1: Select a startng pont of the contour. Represent ths pont by ts absolute coordnates n the mage.
3 314 A. Akmo, A. Kolesnko, and P. Fränt Fg connected and 4-connected chan codes and ther dfferental chan codes Fg. 3. An example of chan code constructon: orgnal cure (left), 8-drectonal (center) and 4-drectonal (rght) Step 2: Represent eery consecute pont by a chan code showng the transton needed to go from the current pont to the next pont on the contour. Step 3: Stop f the next pont s the ntal pont, or the end of the contour. Store the lengths of the contours nto the fle. An alternate way for chan code representaton are dfferental chan codes [5]. Each dfferental chan code k s representng by the dfference of the current chan code c and the precedng chan code c -1 : k = c c -1. The chan codes of contours can be extracted from the map mage n two ways. Frstly, f the map s obtaned drectly from the map database, we can extract contours drectly from the ector data. On the other hand, f the map s proded as a color raster mage, we can use color separaton and followng by ectorzaton (must be used to extract the contours). 3 Context Tree Modelng 3.1 Fnte Context Modelng We compress the chan codes sequentally accordng ther order n the nput data. Consder the current symbol x and the strng of the M preous symbols x,..., x M 1 denoted as x. In the context based modelng the probablty of the next symbol x s condtoned on ts context x. The probabltes of the symbols generated n a gen context, are treated as ndependent [17]. Thus, a model becomes a collecton of ndependent sources of random arables. By the assumpton of ndependence, t s easy to assgn probabltes to each new symbol generated at the current context. Let us denote the cardnalty of the alphabet of the encoded data as. If
4 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 315 n ( x ),..., n ( x ) are the counts of all symbols generated at the gen context 1 = s: then the condtonal probablty of the eent x k, k [ 1,.., ] p ( x = k x ) = n ( x j= 1 k n ( x j ) ) x, We consder the encodng of the gen statstcal model by entropy-based encoder. The probablty for the entropy-based coder s estmated as: p ( x = k x ) = j= 1 n ( x k n ( x j ) + δ ) + δ The parameter δ here depends on dfferent arthmetc coders, but t usually equals to1 [8], [14]. 3.2 Context Algorthm Rested Context tree s appled for the compresson n the same manner as the fxed sze context; only the context selecton s dfferent. It s made by traersng the context tree from the root to a termnal node, each tme selectng the branch accordng to the correspondng preous symbol alue. If the correspondng symbol ponts to a non exstng branch, or the current node s a leaf, then we came to a termnal node, whch ponts to the statstcal model that s to be used. The context tree can be constructed beforehand (statc approach) or optmzed drectly for the encoded data (sem-adapte approach). In the second case, the tree structure must be stored n the compressed fle. The process of optmal tree constructon conssts of two man phases: ntalzaton of the context tree, and prunng of the tree. 3.3 Constructon of Intal Context Tree To construct an ntal context tree, we process the mage to collect statstcs for all potental contexts, leaes and nternal nodes. Each node stores nformaton of counts for all symbols generated at the current context. The algorthm of the context tree constructon s: Step 1: Create a root of the tree. Step2: For all = 1 to n, traerse the tree along the path defned by the past strng x. If some ndces of the symbols n x are less than one, then set these symbols to zero. If some node, sted accordng the correspondent symbol of the strng x, does not hae a consequent branch (for transton to the next symbol of x ), then create the necessary chld node and process t. Each new node has counts, whch are ntally set to zero. In all sted nodes, ncrease the count of x by 1. (1) (2)
5 316 A. Akmo, A. Kolesnko, and P. Fränt Ths completes the constructon of the context tree for all possble contexts. The tme complexty of ths algorthm s O(n). 3.4 Constructon of Optmal Context Tree The ntal context tree needs to be pruned by comparng the parent node and ts chldren nodes for fndng the optmal combnaton of sblngs. Let us denote by c(t ) the number of bts, requred to store the tree structure n the compressed fle. For dfferent strateges of the tree constructon t wll be dfferent: 0, statc approach c ( T ) = K, semadapte approach, complete tree (3) K, semadapte approach, ncomplete tree, where K s the cardnalty of the tree T. We wll denote the set of all termnal nodes as S (T ). Let us denote as n (s), s S(T), the count of the symbol, encoded by the statstcal model, ponted by the termnal node s. By the cost of a termnal node s here we understand the followng expresson [7], [13]: c ( n ( s), n ( s),..., n ( s) ) 1 2 0, f n ( s) = n ( s) =... = n ( S) = n ( s) 1 ( j + δ) = = 1 j= 0 log, otherwse. 2 n0 ( s) + n1 ( s) n ( s) 1 ( + ) j δ j= 0 Ths defnton corresponds algorthmcally to the use of a one pass arthmetc codng wthout the update of the statstcal model [8]. By the cost of the context tree T, we wll denote the followng expresson: L ( T ) = c ( T ) + c ( n ( s ), n ( s ),..., n ( s )) 1 2 (5) s S ( T ) The problem of the tree prunng s to modfy the structure of the full context tree so that the expresson (5) wll be mnmzed. For solng ths problem, we use a bottomup algorthm [15]. The man prncple of ths algorthm s that the optmal tree conssts of optmal sub-trees. For any node t from the tree T, let us denote the ector of counts as n ( t) = ( n ( t), n ( t),..., n ( t) ), the chld nodes as t 1 2, and the node confguraton ector as = ( 1,..., ), {0,1 }. The ector defnes whch of the node branches wll reman: f = 0, then the th branch wll be deleted from the node. Then the prncple of sub optmalty for any gen sub tree Tˆ, startng from the gen node t can be represented as follows: the optmal cost L (Tˆ opt ) for any gen sub tree T ˆ T can be expressed by the followng recurse equaton: (4)
6 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 317 where 0, f Tˆ s null L ( Tˆ) = c ( n ( t) ) + α, f Tˆ hase no chlds opt (6) mn{ L ( Tˆ, ) }, otherwse, ( L ( Tˆ ) + α opt L ( Tˆ, ) = c n ( t)! n ( t ) + (7) The tree Tˆ Tˆ s a sub tree oftˆ, startng from ts chld node t and the constant α s the amount of bts requred for descrbng a sngle node. In general, the cost calculaton of an optmal context tree T can be descrbed as follows: Step 1: If T has no chld nodes, then return the accumulated code length of ts root accordng to (4). Step 2: For all sub trees T T, startng from the chld nodes of T root, calculate ther optmal costs L opt ( T ). Step 3: Accordng to the found L opt ( T ), the ectors of counts n ( t ), and n ( t ),..., n ( t ), fnd the optmal ector = arg mn L ( T, ). 1 Step 4: Prune out the chldren sub trees accordng the ector. Step 5: Return the alue L ( T, ). The algorthm recursely prunes out all unnecessary sub trees, and fnally gets the optmal structure of the context tree, see Fgure 3. Fg. 3. An example of prunng of the context tree 4 Experments We proded two dfferent seres of experments. The frst one llustrates the effcency of the optmal context tree encodng of the chan codes. The second one llustrates the ablty of the ndependent chan encodng to ncrease the compresson
7 318 A. Akmo, A. Kolesnko, and P. Fränt performance of the map mage compresson n general. Images of Fgure 4, whch we use, are ector maps, rasterzed wth the resoluton of pxels. The statstcs for all mages are shown n Table 1. The frst three mages are contours of geographcal objects, and the last mage s a collecton of eleaton lnes. The absolute chan codes were transformed nto dfferental chan codes before compresson. As the entropy coder we used range-coder [14]. Tables 1 and 2 show the results for dfferent depth of the context model n the case of 8-connected and 4-connected chan code representatons. The numbers n Table 1 are the estmated bt rate accordng (6). The numbers n Table 2 are the real bt rate, resulted after the range coder. For comparng the compresson effcency, there are results of chan codes compresson PPMd algorthm wth the maxmum context order 8 [17]. Hgher context order n PPM leads us to the context dluton problem and, consequently, decreasng the compresson performance. For the test mages the effcent range of the context tree depth s from 4 to 10. Fg. 4. The set of test mages Table 1. Test mage propertes and estmated bt rate (bts per symbol) 4-connected chan codes umber of chan Depth codes Image # Image # Image # Image # Aerage connected chan codes umber of chan Depth codes Image # Image # Image # Image # Aerage The second seres of experments were amed to estmate the effcency of chan codes compresson n comparson to an effcent raster mage compresson algorthm, namely the JBIG. Table 3 summarzes compressed fle szes, when compressed by the optmal context tree algorthm (CTC 4 and CTC 8), and for correspondng raster
8 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 319 mages compressed by JBIG. The raster map mages are obtaned by rasterzaton from 4-connected chan codes. The experments show that the runnng tme of the CTC algorthm s than that of the JBIG. Ths s because of much smaller amount of encoded nformaton: JBIG encodes pxels at each mage, when CTC encodes only chan codes. Table 4 represents the structure of the compressed fle: the percentage of all three types of the data n the fle: begnnng of the chans (BOC), structure of the context tree (CT), and the encoded chan codes (Chan Codes). The most used contexts n Image#4 for CTC 4 and for CTC 8 compresson are shown n Tables 5 and 6 consequently. The most used contexts descrbe horzontal, ertcal or dagonal straght lnes. All the experments were proded on computer P3 500MHz, 256 Mb RAM, Wndows T. Table 2. Real bt rate (bts per symbol) 4-connected chan codes PPM CTC 4 Depth Image # Image # Image # Image # Aerage connected chan codes PPM CTC 8 Depth Image # Image # Image # Image # Aerage Table 3. Comparson of the CTC-encoded chans and JBIG encoded raster mages Compressed fle sze (bytes) Compresson tme (sec) JBIG CTC 4 CTC 8 JBIG CTC 4 CTC 8 Image # Image # Image # Image # Aerage Table 4. The proportons of dfferent parts n the compressed fle BOC CT Chan codes Image #1 0.2% 1.5% 98.3% Image #2 0.1% 0.6% 99.3% Image #3 1.8% 0.3% 97.9% Image #4 7.9% 1.0% 91.1%
9 320 A. Akmo, A. Kolesnko, and P. Fränt Table 5. Three most used context for Image #4 n CTC 4 Context n0 n1 n2 n3 total Table 6. Three most used context for Image #4 n CTC 8 Context n0 n1 n2 n3 n4 n5 n6 n7 total Conclusons We hae proposed context tree algorthm for encodng chan codes of contours n map mages. The proposed algorthm ncreased the compresson performance oer the PPM algorthm by 2-3%. The use of chan codes, nstead of the compresson of rasterzed contours, mproes the compresson by 25%, on aerage. The results could be mproed up to the theoretcal lmts by usng a more sutable entropy encoder, nstead of sub-optmal range coder. References [1] Bossen, F., Ebrahm, T.: Regon shape codng, Techncal Report M0318, ISO/IEC JTC1/SC29/WG11, oember 1995 [2] Cleary, J., Wtten, I.: Data compresson usng adapte codng and partal strng matchng, IEEE Trans. on Communcatons, 32(4), Aprl 1984, [3] Eden, M., Kocher, M.: On performance of a contour codng algorthm n the context of mage Codng Part 1: Contour Segment Codng, Sgnal Processng, 1985, 8, [4] Estes, R., Algaz, R.: Effcent error free encodng of bnary documents, In: Proc. of IEEE Data Compresson Conference, March 1995, [5] Freeman, H.: Computer processng of lne drawng mages, ACM Computng Sureys, 6, March 1974, [6] Freeman, H.: Applcaton of the generalzed chan codng scheme to map data processng, In: Proc. of IEEE Pattern Recognton and Image Processng, May 1978, [7] Helfgott, H., Cohn, M.: Lnear-tme constructon of optmal context trees, In: Proc. of the IEEE Data Compresson Conference, Aprl 1998, [8] Howard, P., Vtter, J.: Analyses of arthmetc codng for data compresson, In: Proc. of the IEEE Data Compresson Conference, 1991, 3-12 [9] JBIG: Progresse b-leel mage compresson, ISO/IEC Internatonal Standard 11544, 1993 [10] Kaneko, T., Okudara, M.: Encodng of arbtrary cures based on chan code representaton, IEEE Trans. on Communcatons, July 1985, 33, [11] Lu, Y.K., Zalk, B.: An effcent chan code wth Huffman codng, Pattern Recognton, 38(4), 2005,
10 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 321 [12] Lu, C.C., Dunham, G.: Hghly effcent codng schemes for contour lnes based on chan code representatons, IEEE Trans. on Communcatons, 39(10), October 1991, [13] Martns, B., Forchhammer, S.: Tree codng of b-leel mages, IEEE Trans. on Image Processng, 7(4), Aprl 1998, [14] Martn, G.: An algorthm for remong redundancy from a dgtzed message, Presented at: Vdeo and Data Recordng Conference, July 1979 [15] orhe, R.: Topcs n descrpte complexty, PhD Thess, Unersty of Lngköpng, Sweden, 1994 [16] Rssanen, J.: A unersal data compresson system, IEEE Transactons on Informaton Theory, 29(5), September 1983, [17] Shkarn, D.: PPM: one step to practcalty, In: Proc. of the IEEE Data Compresson Conference, Aprl 2002, [18] Wenberger, M., Rssanen J.: A unersal fnte memory source, IEEE Trans on Informaton Theory, 41(3), May 1995, [19] Wenberger, M., Rssanen, J., Arps, R.: Applcaton of unersal context modelng to lossless compresson of grey-scale mages, IEEE Transactons on Image Processng, 5, Aprl 1996,
An Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationEXTENDED BIC CRITERION FOR MODEL SELECTION
IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationSURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB
SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal
More informationFitting: Deformable contours April 26 th, 2018
4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationStorage Binding in RTL synthesis
Storage Bndng n RTL synthess Pe Zhang Danel D. Gajsk Techncal Report ICS-0-37 August 0th, 200 Center for Embedded Computer Systems Department of Informaton and Computer Scence Unersty of Calforna, Irne
More informationShape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationSome Tutorial about the Project. Computer Graphics
Some Tutoral about the Project Lecture 6 Rastersaton, Antalasng, Texture Mappng, I have already covered all the topcs needed to fnsh the 1 st practcal Today, I wll brefly explan how to start workng on
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationCHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly
65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationEfficient Processing of Ordered XML Twig Pattern
Effcent Processng of Ordered XML Twg Pattern Jaheng Lu, Tok Wang Lng, Tan Yu, Changqng L, and We N School of computng, Natonal Unversty of Sngapore {lujahen, lngtw, yutan, lchangq, nwe}@comp.nus.edu.sg
More informationQuerying by sketch geographical databases. Yu Han 1, a *
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationRELATIVE ORIENTATION ESTIMATION OF VIDEO STREAMS FROM A SINGLE PAN-TILT-ZOOM CAMERA. Commission I, WG I/5
RELATIVE ORIENTATION ESTIMATION OF VIDEO STREAMS FROM A SINGLE PAN-TILT-ZOOM CAMERA Taeyoon Lee a, *, Taeung Km a, Gunho Sohn b, James Elder a a Department of Geonformatc Engneerng, Inha Unersty, 253 Yonghyun-dong,
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationDiscrete and Continuous Time High-Order Markov Models for Software Reliability Assessment
Dscrete and Contnuous Tme Hgh-Order Markov Models for Software Relablty Assessment Vtaly Yakovyna and Oksana Nytrebych Software Department, Lvv Polytechnc Natonal Unversty, Lvv, Ukrane vtaly.s.yakovyna@lpnu.ua,
More informationActive Contours/Snakes
Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationLinear Hashtable Motion Estimation Algorithm for Distributed Video Processing
Lnear Hashtable Moton Estmaton Algorthm for Dstrbuted Vdeo Processng Yunsong Wu 1,, Graham Megson 1 Jangx Scence & Technology ormal Unversty anchang, Chna School of Systems Engneerng, Readng Unversty Readng,
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationMOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN
MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationA NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING
A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING L Jan a, Wan Youchuan a,, Gao Xanjun a a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty,129
More informationPattern Based Lossless Data Compression
Pattern Based Lossless Data Compresson ANGEL KURI-MORALES Insttuto Tecnológco Autónomo de Méxco Río Hondo No. 1 Méxco 01000, D.F. MEXICO Abstract. In ths paper we dscuss a method for lossless data compresson
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationVisual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007
IEEE onf. on omputer Vson and Pattern Recognton (VPR June 7 Vsual urvature HaRong Lu, Longn Jan Lateck, WenYu Lu, Xang Ba HuaZhong Unversty of Scence and Technology, P.R. hna Temple Unversty, US lhrbss@gmal.com,
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationIMAGE FUSION TECHNIQUES
Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationCHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar
CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want
More informationNGPM -- A NSGA-II Program in Matlab
Verson 1.4 LIN Song Aerospace Structural Dynamcs Research Laboratory College of Astronautcs, Northwestern Polytechncal Unversty, Chna Emal: lsssswc@163.com 2011-07-26 Contents Contents... 1. Introducton...
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationBFF1303: ELECTRICAL / ELECTRONICS ENGINEERING. Direct Current Circuits : Methods of Analysis
BFF1303: ELECTRICAL / ELECTRONICS ENGINEERING Drect Current Crcuts : Methods of Analyss Ismal Mohd Kharuddn, Zulkfl Md Yusof Faculty of Manufacturng Engneerng Unerst Malaysa Pahang Drect Current Crcut
More informationMachine Learning. Topic 6: Clustering
Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationEfficient Video Coding with R-D Constrained Quadtree Segmentation
Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,
More informationGreedy Technique - Definition
Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More information