Lossless Compression of Map Contours by Context Tree Modeling of Chain Codes

Size: px
Start display at page:

Download "Lossless Compression of Map Contours by Context Tree Modeling of Chain Codes"

Transcription

1 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes Alexander Akmo, Alexander Kolesnko, and Pas Fränt Department of Computer Scence, Unersty of Joensuu, P.O. Box 111, Joensuu, Fnland {akmo, koles, Abstract. We consder lossless compresson of dgtal contours n map mages. The problem s attacked by the use of context-based statstcal modelng and entropy codng of chan codes. We propose to generate an optmal context tree by frst constructng a complete tree up to a predefned depth, and then create the optmal tree by prunng out nodes that do not prode mproement n compresson. Experments show that the proposed method ges lower bt rates than the exstng methods for the set of test mages. 1 Introducton Dgtal maps are usually stored as ector graphcs n a database for retreng the data usng spatal locaton as the search key. The sual outlook of maps representng the same regon ares dependng on the type of the map (topographc or road map), and on the desred scale (local or regonal map). Vector representaton s conenent for zoomng as the maps can be dsplayed n any resoluton defned by the user. The maps can be conerted to raster mages for data transmsson, dstrbuton a nternet, or because of ncompatblty of the ector representatons of dfferent systems. In order to ncrease the effcency of raster map compresson, we consder the arant, when some object, nstead of beng rasterzed, wll be descrbed by chan codes and compressed separately from rest of map data. Ths can lead to a more effcent representaton of the map and, consequently, to mproe of compresson. Chan codng s a common approach for representng dfferent rasterzed shapes such as lne-drawngs, planar cures and contours. We consder thn dgtal cures of one pxel wdth, extracted from the ector data before rasterzaton. The preous works consder dfferent schemes of encodng and chan code representaton [3], [10], [11]. For example, the method n [12] uses second order context model based on 8 drectonal chan codes. Further deelopment of the context-based compresson of chan codes was presented n [4]. The authors hae mproed the performance of the chan codes encodng by ncreasng the sze of fnte context models. The problem of encodng of chan codes by predcton by partal matchng (PPM) algorthm [2] has been consdered n [1]. In prncple, context based compresson can be mproed by usng a larger number of neghborng symbols n the context. But the ncrease of the context sze leads to the H. Kalanen et al. (Eds.): SCIA 2005, LCS 3540, pp , Sprnger-Verlag Berln Hedelberg 2005

2 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 313 problem of context dluton, n whch the statstcs are dstrbuted oer too many contexts, and thus, affects the accuracy of the probablty estmates. Context tree prodes a more flexble approach for modelng the contexts so that a larger number of neghbor pxels can be taken nto account wthout the context dluton problem [13]. The context tree algorthm was orgnally ntroduced n [16], and analyzed n [10]. Practcal solutons for the context tree based compresson algorthms for grey-scale and b-leel mages hae been descrbed at [19] and [13] respectely. In ths paper, we use the context tree approach for encodng the chan codes. We prode algorthm for optmal context tree constructon. We compare the compresson performance of the rasterzed map contours when encoded by JBIG [9], and by the optmal context tree chan codes, representng the same contours. The results show that the proposed method prodes 25% lower bt rate than JBIG, and s 40% faster because only the contour pxels need to be processed. The oerall scheme of the proposed compresson method s as follows: Step 1: Extract contours from the ector or raster map and conert them nto chan codes. Store the start ponts and the lengths of the chans. Step 2: Create and store the optmal context tree for the chan codes. Step 3: By usng of context tree modelng and any entropy codng, encode the chan codes. Ths scheme s shown n Fgure 1. For smplcty, we store the sze and the begnnng of each chan (BOC) as such wthout any further compresson. Fg. 1. Oerall system dagram of the proposed method 2 Chan Code Representaton Freeman [5], [6] proposed chan codng of dgtal contours drawngs and descrpton. The chan codes represent the dgtal contour by a sequence of lne segments of specfed length and drecton, see Fgure 2. We consder both 8- and 4-drectonal chan codng schemes; see Fgure 3. The chan code representaton s constructed as follows. Step 1: Select a startng pont of the contour. Represent ths pont by ts absolute coordnates n the mage.

3 314 A. Akmo, A. Kolesnko, and P. Fränt Fg connected and 4-connected chan codes and ther dfferental chan codes Fg. 3. An example of chan code constructon: orgnal cure (left), 8-drectonal (center) and 4-drectonal (rght) Step 2: Represent eery consecute pont by a chan code showng the transton needed to go from the current pont to the next pont on the contour. Step 3: Stop f the next pont s the ntal pont, or the end of the contour. Store the lengths of the contours nto the fle. An alternate way for chan code representaton are dfferental chan codes [5]. Each dfferental chan code k s representng by the dfference of the current chan code c and the precedng chan code c -1 : k = c c -1. The chan codes of contours can be extracted from the map mage n two ways. Frstly, f the map s obtaned drectly from the map database, we can extract contours drectly from the ector data. On the other hand, f the map s proded as a color raster mage, we can use color separaton and followng by ectorzaton (must be used to extract the contours). 3 Context Tree Modelng 3.1 Fnte Context Modelng We compress the chan codes sequentally accordng ther order n the nput data. Consder the current symbol x and the strng of the M preous symbols x,..., x M 1 denoted as x. In the context based modelng the probablty of the next symbol x s condtoned on ts context x. The probabltes of the symbols generated n a gen context, are treated as ndependent [17]. Thus, a model becomes a collecton of ndependent sources of random arables. By the assumpton of ndependence, t s easy to assgn probabltes to each new symbol generated at the current context. Let us denote the cardnalty of the alphabet of the encoded data as. If

4 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 315 n ( x ),..., n ( x ) are the counts of all symbols generated at the gen context 1 = s: then the condtonal probablty of the eent x k, k [ 1,.., ] p ( x = k x ) = n ( x j= 1 k n ( x j ) ) x, We consder the encodng of the gen statstcal model by entropy-based encoder. The probablty for the entropy-based coder s estmated as: p ( x = k x ) = j= 1 n ( x k n ( x j ) + δ ) + δ The parameter δ here depends on dfferent arthmetc coders, but t usually equals to1 [8], [14]. 3.2 Context Algorthm Rested Context tree s appled for the compresson n the same manner as the fxed sze context; only the context selecton s dfferent. It s made by traersng the context tree from the root to a termnal node, each tme selectng the branch accordng to the correspondng preous symbol alue. If the correspondng symbol ponts to a non exstng branch, or the current node s a leaf, then we came to a termnal node, whch ponts to the statstcal model that s to be used. The context tree can be constructed beforehand (statc approach) or optmzed drectly for the encoded data (sem-adapte approach). In the second case, the tree structure must be stored n the compressed fle. The process of optmal tree constructon conssts of two man phases: ntalzaton of the context tree, and prunng of the tree. 3.3 Constructon of Intal Context Tree To construct an ntal context tree, we process the mage to collect statstcs for all potental contexts, leaes and nternal nodes. Each node stores nformaton of counts for all symbols generated at the current context. The algorthm of the context tree constructon s: Step 1: Create a root of the tree. Step2: For all = 1 to n, traerse the tree along the path defned by the past strng x. If some ndces of the symbols n x are less than one, then set these symbols to zero. If some node, sted accordng the correspondent symbol of the strng x, does not hae a consequent branch (for transton to the next symbol of x ), then create the necessary chld node and process t. Each new node has counts, whch are ntally set to zero. In all sted nodes, ncrease the count of x by 1. (1) (2)

5 316 A. Akmo, A. Kolesnko, and P. Fränt Ths completes the constructon of the context tree for all possble contexts. The tme complexty of ths algorthm s O(n). 3.4 Constructon of Optmal Context Tree The ntal context tree needs to be pruned by comparng the parent node and ts chldren nodes for fndng the optmal combnaton of sblngs. Let us denote by c(t ) the number of bts, requred to store the tree structure n the compressed fle. For dfferent strateges of the tree constructon t wll be dfferent: 0, statc approach c ( T ) = K, semadapte approach, complete tree (3) K, semadapte approach, ncomplete tree, where K s the cardnalty of the tree T. We wll denote the set of all termnal nodes as S (T ). Let us denote as n (s), s S(T), the count of the symbol, encoded by the statstcal model, ponted by the termnal node s. By the cost of a termnal node s here we understand the followng expresson [7], [13]: c ( n ( s), n ( s),..., n ( s) ) 1 2 0, f n ( s) = n ( s) =... = n ( S) = n ( s) 1 ( j + δ) = = 1 j= 0 log, otherwse. 2 n0 ( s) + n1 ( s) n ( s) 1 ( + ) j δ j= 0 Ths defnton corresponds algorthmcally to the use of a one pass arthmetc codng wthout the update of the statstcal model [8]. By the cost of the context tree T, we wll denote the followng expresson: L ( T ) = c ( T ) + c ( n ( s ), n ( s ),..., n ( s )) 1 2 (5) s S ( T ) The problem of the tree prunng s to modfy the structure of the full context tree so that the expresson (5) wll be mnmzed. For solng ths problem, we use a bottomup algorthm [15]. The man prncple of ths algorthm s that the optmal tree conssts of optmal sub-trees. For any node t from the tree T, let us denote the ector of counts as n ( t) = ( n ( t), n ( t),..., n ( t) ), the chld nodes as t 1 2, and the node confguraton ector as = ( 1,..., ), {0,1 }. The ector defnes whch of the node branches wll reman: f = 0, then the th branch wll be deleted from the node. Then the prncple of sub optmalty for any gen sub tree Tˆ, startng from the gen node t can be represented as follows: the optmal cost L (Tˆ opt ) for any gen sub tree T ˆ T can be expressed by the followng recurse equaton: (4)

6 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 317 where 0, f Tˆ s null L ( Tˆ) = c ( n ( t) ) + α, f Tˆ hase no chlds opt (6) mn{ L ( Tˆ, ) }, otherwse, ( L ( Tˆ ) + α opt L ( Tˆ, ) = c n ( t)! n ( t ) + (7) The tree Tˆ Tˆ s a sub tree oftˆ, startng from ts chld node t and the constant α s the amount of bts requred for descrbng a sngle node. In general, the cost calculaton of an optmal context tree T can be descrbed as follows: Step 1: If T has no chld nodes, then return the accumulated code length of ts root accordng to (4). Step 2: For all sub trees T T, startng from the chld nodes of T root, calculate ther optmal costs L opt ( T ). Step 3: Accordng to the found L opt ( T ), the ectors of counts n ( t ), and n ( t ),..., n ( t ), fnd the optmal ector = arg mn L ( T, ). 1 Step 4: Prune out the chldren sub trees accordng the ector. Step 5: Return the alue L ( T, ). The algorthm recursely prunes out all unnecessary sub trees, and fnally gets the optmal structure of the context tree, see Fgure 3. Fg. 3. An example of prunng of the context tree 4 Experments We proded two dfferent seres of experments. The frst one llustrates the effcency of the optmal context tree encodng of the chan codes. The second one llustrates the ablty of the ndependent chan encodng to ncrease the compresson

7 318 A. Akmo, A. Kolesnko, and P. Fränt performance of the map mage compresson n general. Images of Fgure 4, whch we use, are ector maps, rasterzed wth the resoluton of pxels. The statstcs for all mages are shown n Table 1. The frst three mages are contours of geographcal objects, and the last mage s a collecton of eleaton lnes. The absolute chan codes were transformed nto dfferental chan codes before compresson. As the entropy coder we used range-coder [14]. Tables 1 and 2 show the results for dfferent depth of the context model n the case of 8-connected and 4-connected chan code representatons. The numbers n Table 1 are the estmated bt rate accordng (6). The numbers n Table 2 are the real bt rate, resulted after the range coder. For comparng the compresson effcency, there are results of chan codes compresson PPMd algorthm wth the maxmum context order 8 [17]. Hgher context order n PPM leads us to the context dluton problem and, consequently, decreasng the compresson performance. For the test mages the effcent range of the context tree depth s from 4 to 10. Fg. 4. The set of test mages Table 1. Test mage propertes and estmated bt rate (bts per symbol) 4-connected chan codes umber of chan Depth codes Image # Image # Image # Image # Aerage connected chan codes umber of chan Depth codes Image # Image # Image # Image # Aerage The second seres of experments were amed to estmate the effcency of chan codes compresson n comparson to an effcent raster mage compresson algorthm, namely the JBIG. Table 3 summarzes compressed fle szes, when compressed by the optmal context tree algorthm (CTC 4 and CTC 8), and for correspondng raster

8 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 319 mages compressed by JBIG. The raster map mages are obtaned by rasterzaton from 4-connected chan codes. The experments show that the runnng tme of the CTC algorthm s than that of the JBIG. Ths s because of much smaller amount of encoded nformaton: JBIG encodes pxels at each mage, when CTC encodes only chan codes. Table 4 represents the structure of the compressed fle: the percentage of all three types of the data n the fle: begnnng of the chans (BOC), structure of the context tree (CT), and the encoded chan codes (Chan Codes). The most used contexts n Image#4 for CTC 4 and for CTC 8 compresson are shown n Tables 5 and 6 consequently. The most used contexts descrbe horzontal, ertcal or dagonal straght lnes. All the experments were proded on computer P3 500MHz, 256 Mb RAM, Wndows T. Table 2. Real bt rate (bts per symbol) 4-connected chan codes PPM CTC 4 Depth Image # Image # Image # Image # Aerage connected chan codes PPM CTC 8 Depth Image # Image # Image # Image # Aerage Table 3. Comparson of the CTC-encoded chans and JBIG encoded raster mages Compressed fle sze (bytes) Compresson tme (sec) JBIG CTC 4 CTC 8 JBIG CTC 4 CTC 8 Image # Image # Image # Image # Aerage Table 4. The proportons of dfferent parts n the compressed fle BOC CT Chan codes Image #1 0.2% 1.5% 98.3% Image #2 0.1% 0.6% 99.3% Image #3 1.8% 0.3% 97.9% Image #4 7.9% 1.0% 91.1%

9 320 A. Akmo, A. Kolesnko, and P. Fränt Table 5. Three most used context for Image #4 n CTC 4 Context n0 n1 n2 n3 total Table 6. Three most used context for Image #4 n CTC 8 Context n0 n1 n2 n3 n4 n5 n6 n7 total Conclusons We hae proposed context tree algorthm for encodng chan codes of contours n map mages. The proposed algorthm ncreased the compresson performance oer the PPM algorthm by 2-3%. The use of chan codes, nstead of the compresson of rasterzed contours, mproes the compresson by 25%, on aerage. The results could be mproed up to the theoretcal lmts by usng a more sutable entropy encoder, nstead of sub-optmal range coder. References [1] Bossen, F., Ebrahm, T.: Regon shape codng, Techncal Report M0318, ISO/IEC JTC1/SC29/WG11, oember 1995 [2] Cleary, J., Wtten, I.: Data compresson usng adapte codng and partal strng matchng, IEEE Trans. on Communcatons, 32(4), Aprl 1984, [3] Eden, M., Kocher, M.: On performance of a contour codng algorthm n the context of mage Codng Part 1: Contour Segment Codng, Sgnal Processng, 1985, 8, [4] Estes, R., Algaz, R.: Effcent error free encodng of bnary documents, In: Proc. of IEEE Data Compresson Conference, March 1995, [5] Freeman, H.: Computer processng of lne drawng mages, ACM Computng Sureys, 6, March 1974, [6] Freeman, H.: Applcaton of the generalzed chan codng scheme to map data processng, In: Proc. of IEEE Pattern Recognton and Image Processng, May 1978, [7] Helfgott, H., Cohn, M.: Lnear-tme constructon of optmal context trees, In: Proc. of the IEEE Data Compresson Conference, Aprl 1998, [8] Howard, P., Vtter, J.: Analyses of arthmetc codng for data compresson, In: Proc. of the IEEE Data Compresson Conference, 1991, 3-12 [9] JBIG: Progresse b-leel mage compresson, ISO/IEC Internatonal Standard 11544, 1993 [10] Kaneko, T., Okudara, M.: Encodng of arbtrary cures based on chan code representaton, IEEE Trans. on Communcatons, July 1985, 33, [11] Lu, Y.K., Zalk, B.: An effcent chan code wth Huffman codng, Pattern Recognton, 38(4), 2005,

10 Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes 321 [12] Lu, C.C., Dunham, G.: Hghly effcent codng schemes for contour lnes based on chan code representatons, IEEE Trans. on Communcatons, 39(10), October 1991, [13] Martns, B., Forchhammer, S.: Tree codng of b-leel mages, IEEE Trans. on Image Processng, 7(4), Aprl 1998, [14] Martn, G.: An algorthm for remong redundancy from a dgtzed message, Presented at: Vdeo and Data Recordng Conference, July 1979 [15] orhe, R.: Topcs n descrpte complexty, PhD Thess, Unersty of Lngköpng, Sweden, 1994 [16] Rssanen, J.: A unersal data compresson system, IEEE Transactons on Informaton Theory, 29(5), September 1983, [17] Shkarn, D.: PPM: one step to practcalty, In: Proc. of the IEEE Data Compresson Conference, Aprl 2002, [18] Wenberger, M., Rssanen J.: A unersal fnte memory source, IEEE Trans on Informaton Theory, 41(3), May 1995, [19] Wenberger, M., Rssanen, J., Arps, R.: Applcaton of unersal context modelng to lossless compresson of grey-scale mages, IEEE Transactons on Image Processng, 5, Aprl 1996,

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

EXTENDED BIC CRITERION FOR MODEL SELECTION

EXTENDED BIC CRITERION FOR MODEL SELECTION IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Storage Binding in RTL synthesis

Storage Binding in RTL synthesis Storage Bndng n RTL synthess Pe Zhang Danel D. Gajsk Techncal Report ICS-0-37 August 0th, 200 Center for Embedded Computer Systems Department of Informaton and Computer Scence Unersty of Calforna, Irne

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Some Tutorial about the Project. Computer Graphics

Some Tutorial about the Project. Computer Graphics Some Tutoral about the Project Lecture 6 Rastersaton, Antalasng, Texture Mappng, I have already covered all the topcs needed to fnsh the 1 st practcal Today, I wll brefly explan how to start workng on

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Efficient Processing of Ordered XML Twig Pattern

Efficient Processing of Ordered XML Twig Pattern Effcent Processng of Ordered XML Twg Pattern Jaheng Lu, Tok Wang Lng, Tan Yu, Changqng L, and We N School of computng, Natonal Unversty of Sngapore {lujahen, lngtw, yutan, lchangq, nwe}@comp.nus.edu.sg

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

RELATIVE ORIENTATION ESTIMATION OF VIDEO STREAMS FROM A SINGLE PAN-TILT-ZOOM CAMERA. Commission I, WG I/5

RELATIVE ORIENTATION ESTIMATION OF VIDEO STREAMS FROM A SINGLE PAN-TILT-ZOOM CAMERA. Commission I, WG I/5 RELATIVE ORIENTATION ESTIMATION OF VIDEO STREAMS FROM A SINGLE PAN-TILT-ZOOM CAMERA Taeyoon Lee a, *, Taeung Km a, Gunho Sohn b, James Elder a a Department of Geonformatc Engneerng, Inha Unersty, 253 Yonghyun-dong,

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Discrete and Continuous Time High-Order Markov Models for Software Reliability Assessment

Discrete and Continuous Time High-Order Markov Models for Software Reliability Assessment Dscrete and Contnuous Tme Hgh-Order Markov Models for Software Relablty Assessment Vtaly Yakovyna and Oksana Nytrebych Software Department, Lvv Polytechnc Natonal Unversty, Lvv, Ukrane vtaly.s.yakovyna@lpnu.ua,

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Linear Hashtable Motion Estimation Algorithm for Distributed Video Processing

Linear Hashtable Motion Estimation Algorithm for Distributed Video Processing Lnear Hashtable Moton Estmaton Algorthm for Dstrbuted Vdeo Processng Yunsong Wu 1,, Graham Megson 1 Jangx Scence & Technology ormal Unversty anchang, Chna School of Systems Engneerng, Readng Unversty Readng,

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING

A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING L Jan a, Wan Youchuan a,, Gao Xanjun a a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty,129

More information

Pattern Based Lossless Data Compression

Pattern Based Lossless Data Compression Pattern Based Lossless Data Compresson ANGEL KURI-MORALES Insttuto Tecnológco Autónomo de Méxco Río Hondo No. 1 Méxco 01000, D.F. MEXICO Abstract. In ths paper we dscuss a method for lossless data compresson

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Visual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007

Visual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007 IEEE onf. on omputer Vson and Pattern Recognton (VPR June 7 Vsual urvature HaRong Lu, Longn Jan Lateck, WenYu Lu, Xang Ba HuaZhong Unversty of Scence and Technology, P.R. hna Temple Unversty, US lhrbss@gmal.com,

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

IMAGE FUSION TECHNIQUES

IMAGE FUSION TECHNIQUES Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

NGPM -- A NSGA-II Program in Matlab

NGPM -- A NSGA-II Program in Matlab Verson 1.4 LIN Song Aerospace Structural Dynamcs Research Laboratory College of Astronautcs, Northwestern Polytechncal Unversty, Chna Emal: lsssswc@163.com 2011-07-26 Contents Contents... 1. Introducton...

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

BFF1303: ELECTRICAL / ELECTRONICS ENGINEERING. Direct Current Circuits : Methods of Analysis

BFF1303: ELECTRICAL / ELECTRONICS ENGINEERING. Direct Current Circuits : Methods of Analysis BFF1303: ELECTRICAL / ELECTRONICS ENGINEERING Drect Current Crcuts : Methods of Analyss Ismal Mohd Kharuddn, Zulkfl Md Yusof Faculty of Manufacturng Engneerng Unerst Malaysa Pahang Drect Current Crcut

More information

Machine Learning. Topic 6: Clustering

Machine Learning. Topic 6: Clustering Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information