Mining Direct and Indirect Fuzzy Sequential Patterns in Large Transaction Databases p. 180

Size: px
Start display at page:

Download "Mining Direct and Indirect Fuzzy Sequential Patterns in Large Transaction Databases p. 180"

Transcription

1 A Study of Constructive Fuzzy Normalized RBF Neural Networks p. 1 An ARM-Based Q-Learning Algorithm p. 11 Locally Asymptotical Behaviors of Delayed BAM Neural Networks With Generalized Saturation Output Functions p. 21 Oil Field Development Using Neural Network Model p. 29 Optimal Support Vector Machine Based Short-Term Load Forecasting Model with Input Variables and Samples Selection p. 39 The Segmentation and Associative Memory Using Hindmarsh-Rose Neuronal Network p. 48 Two Approaches to Extract Rules from Neural Network with Mixed Attributes p. 56 A New Learning Algorithm for Function Approximation by Encoding Additional Constraints into Feedforward Neural Network p. 64 Parallel Processing of Minimization Algorithm for Determination Finite Automata p. 73 The Method of PID Parameter Optimization Based on Modified Linear Quadratic Optimal Control in the Linear DC Motor p. 81 Recommending Expert System of Project Reviewing Based on CBR p. 90 Achieving Self-configuration Capability in Autonomic Systems Using Case-Baaed Reasoning with a New Similarity Measure p. 97 Context Information Model Using Ontologies and Rules Based on Spatial Object p. 107 The Simulation Optimization Algorithm Based on the Ito Process p. 115 A Hierarchical Clustering Algorithm Based on GiST p. 125 Black-Box Extraction of Functional Structures from System Call Traces for Intrusion Detection p. 135 Category Expansion by Clustering in Webpage Classification p. 145 Function Two Direction S-Rough Sets Method in Image Hiding p. 155 Index-Based Load Shedding for Streaming Sliding Window Joins p. 162 Knowledge Discovery for Hepatitis C Virus Diagnosis: A Framework for Mining Interesting Classification Rules p. 171 Mining Direct and Indirect Fuzzy Sequential Patterns in Large Transaction Databases p. 180 Mining Infrequent Itemsets Based on Extended MMS Model p. 190 Web Based Image Retrieval System Using HSI Color Indexes p. 199 An Improved Genetic Algorithm for the Traveling Salesman Problem p. 208 Application of Gene Expression Programming in the Reliability of Consecutive-k-out-of-n: F Systems with Identical Component Reliabilities p. 217 Disruption Management for the Vehicle Routing' Problem with Time Windows p. 225 Novel Algorithm to Calculate Hypervolume Indicator of Pareto Approximation Set p. 235 On the Convergence Properties of Quantum-Inspired Multi-Objective Evolutionary Algorithms p. 245 Representation of Solutions and Genetic Operators for Flexible Job Shop Problem p. 256 Software Risk Prediction Based on the Hybrid Algorithm of Genetic Algorithm and Decision Tree p. 266 The Equilibrium Network Model and Its Genetic Algorithm p. 275 Computing with Words in Data Mining and Pattern Recognition p. 285 Fuzzy Modeling Via On-Line Clustering and Support Vector Machine p. 294 How 'Soft' Soft Computing Is: On the Ordering of Fuzzy Sets p. 304

2 Intelligent Filtering in Telerobotic System p. 313 New Method for the Problem of Fuzzy Group Decision Making p. 322 Research for Reducing Dimension on a T-S Fuzzy Controller p. 329 Study on Self-adaptive Fuzzy Neural Networks p. 335 An Adaptive Particle Swarm Optimization Algorithm with New Random Inertia Weight p. 342 Development of the Practical Particle Filter for Human Gesture Recognition p. 351 Modified Particle Swarm Optimization for Solving Systems of Equations p. 361 Optimized Fuzzy Clustering by Predator Prey Particle Swarm Optimization p. 370 Immune Particle Swarm Optimization with Diversity Monitoring p. 380 Particle Swarm Optimization System Algorithm p. 388 The Particle Swarm: Parameter Selection and Convergence p. 396 A Fast Training Algorithm for SVM Via Clustering Technique and Gabriel Graph p. 403 Dual Forms of SVM and MEB in Terms of Different Norms of Distance p. 413 Support Vector Clustering with Outlier Detection p. 423 Application of Efficient Numerical Methods in Solution of Ordinary Differential Equations for Modeling Electrical Activity in Cardiac Cells p. 432 Fluorescence Model of 3-SAT in DNA Computing p. 442 Molecular Computation: Solving 3-Vertex-Colourability Problem p. 450 Quantum Integration Error on Some Classes of Multivariate Functions p. 459 Agent Grid Collaborative Schema Based on Policy p. 469 Educational Service Web Database Prototype p. 479 The Strategy of Matching User Queries with Web Pages Based on Formal Concept Analysis p. 489 A Packet Distribution Method for Energy Balancing on Node-Disjoint Multipath of MANETs An Intelligent Error Detection-Recovery System for Multimedia CSCW Based on Situation-Awareness: AEDRS p. 499 p. 508 A Probabilistic SDG Approach to Fault Diagnosis of Industrial Systems p. 517 An Approach of Combustion Diagnosis in Boiler Furnace Based on Phase Space Reconstruction p. 528 Application of Grey Relation Degree in Network Security Based on Included Angle Sine p. 536 Genetic Programming with 3[sigma] Rule for Fault Detection p. 543 Pattern Recognition of Reciprocating Engine by Using Hilbert Spectrum and K-S Test p. 552 Rolling Bearing Fault Diagnosis Using Refinement Envelope Analysis Based on the EMD Method An Adaptive Fault-Tolerance QoS for Whiteboard Errors Based on RCSM for Ubiquitous Computing Application of the Stress Waves to Extract Multi-fault Features of the Low-Speed Machinery Based on Blind Source Separation Artificial Potential Field Based Path Planning for Mobile Robots Using Virtual Water-Flow Method p. 562 p. 571 p. 579 p. 588 Autopilot, Design Using Hybrid PSO-SQP Algorithm p. 596 Enhancement of Sliding Mode Controller by Unit Vector Continuous p. 605

3 Evaluation of Dependable Embedded System p. 614 Fuzzy Control for Discrete Passive Affine T-S Fuzzy Systems with Observer Feedback p. 623 Integrated Chassis Controller Design of Active Steering and Active Braking Systems Using CL Method Mobile Robot Velocity Estimation Using a Regular Polygonal Array of Optical Flow Sensors Particle; Swarm Optimization for Dynamic Sectoring Control During Peak Traffic: Pattern The Application of Fractional-Order PI Control Algorithm to the PMSM Speed-Adjusting System p. 632 p. 641 p. 650 p. 660 Weighted CRI Method for Fuzzy Controller p. 670 Further Studies on the Distribution of the Shortest Linear Recurring Sequences for the Stream Cipher over the Ring p. 680 Secure PAP-Based RADIUS Protocol in Wireless Networks p. 689 Analysis of Pi Series and Its Application to Image Encryption p. 695 Sales Forecasting for TFT-LCD Products with a Hybrid Neural Network Model p. 704 Time Series Prediction of Short Circuit Current for Synchronous Control of Synthetic Test Based on Delay Coordinate Embedding p. 714 An Emotion Recognition Conversation System Based on Knowledge Database Automatic p. 722 Architecture Automatic Analysis of Chinese Dialect Tones Based on Self-organizing Map p. 732 Adaptive Image Restoration Based on the Genetic Algorithm and Kahnan Filtering p. 742 Image Retrieval and Classification Through Conceptualization Based on WordNet p. 751 U-Multimedia Retrieval System Using MPEG-7 Visual Descriptor and Hippocampal Neural p. 760 Network An Implementation of the Personal Authentication System for USN p. 771 Analysis of Large Genomic Data in Silica: The EPIC-Norfolk Study of Obesity p. 781 Feature Based Automatic Stitching of Microscopic Images p. 791 A Fast Partial Distortion Elimination Algorithm Using Adaptive Matching Scan and Refining Threshold p. 801 A New Method of Steganalysis Based on Image Entropy p. 810 A New Noise Canceller Scheme Using Parallel Adaptive Volterra Filter p. 816 A Recursive Parametric Spectral Subtraction Algorithm for Speech Enhancement p. 826 An Approach for Image Compression of Algae Cell Using Multiwavelets p. 836 An Image Steganography Scheme by Gray Scale Grid Analysis p. 844 Application of CBR and ANN in Virtual-Environment-Based Instrument Development System Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques p. 849 p. 858 FPGA Implementation of Video Watermark Embedding System p. 868 Gauss - Hermite Spectrogram p. 878 High-Speed Block Matching Algorithms for Multimedia Service p. 886 Multiwavelet Denoising for Common Phytoplankton Cellular Images p. 893 A Neural Network Identifier Design Based on Immunity Computation and Moment Characteristics p. 901

4 A Robust Approach Toward Face Tracking p. 911 Identifying Co-expressed Gene Groups with Significant Functional Categories p. 920 Aging Simulation of Face Images Based on Super-Resolution p. 930 An Efficient Approach for Fish Bone Detection Based on Image Preprocessing and Particle Swarm Clustering p. 940 An Improved General Fuzzy Min-Max Neural Network for Pattern Classification p. 949 Automatic Feature Extraction and Analysis on Breast Ultrasound Images p. 957 Automatic Region-of-Interest Coding in JPEG2000 Based on Morphology Segmentation and LL[subscript n] Sub-band Analysis p. 964 Computer Simulation Research of the Process of Chinese Characters Cognition p. 973 Decomposition Method and Its Automatic Design Algorithm of Station Bottleneck p. 981 Dynamically Personalized Music Recommendation System for PDA p. 991 Iris Classifier Enhanced Algorithm Based on AdaBoost p Microscopic. Image Mosaicing Algorithm Based on Normalized Moment of Inertia p Model Based Tracking p Ringing Artifact Reduction for JPEG2000 Images p Shape Recognition Based on Skeleton and Support Vector Machines p A Novel Verifier-Based Authenticated Key Agreement Protocol p Design of a Fuzzy Based Outer Loop Controller for Improving the Training Performance of p LMS Algorithm Design of Bandwidth Efficient M-l-1 Protocol in Wireless Sensor Networks p Influence of Power Allocation and Relay Location on Cooperative Systems Performance p Optimal Multiuser Detection with Artificial Fish Swarm Algorithm p The Network Optimal Problem Based on Genetic Algorithm p Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation p Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network p Fast 3D Face Synthesis Using AAM p Grid-Based Approach for Detecting Head and Hand Regions p Vehicle Color Classification Based on the Support Vector Machine Method p A Self Calibration System Using Block Interpolation in the Industrial Assembly Line p Determination of Charge Handling Capability of a Deep Depletion Charge Coupled Device p for Astronomic Applications The Mobile Robot Teleoperation to Consider the 'rime-delay of Wireless Network p Population Forecasting Model Based on Wavelet Least Squares Support Vectors Machinesp Minimum Mahalanobis Enclosing Ellipsoid Machine for Pattern Classification p Solving Mahalanobis Ellipsoidal Learning Machine Via Second Order Cone Programming p The Finite Element Analysis Based on ANSYS Pressure-Sensitive Conductive Rubber Three-Dimensional Tactile Sensor p A Novel Method for 2DPCA-ICA in Face Recognition p. 1203

5 Combining Regularization Frameworks for Solving the Electrocardiography Inverse Problem Combining Multi-layer Perceptron and K-Means for Data Clustering with Background Knowledge p p A Novel Neural Network Ensemble System for Economic Forecasting p Finite Element Simulation of Viscoelastic Damping Materials p New Sampling-Based Summary Structures for Sliding Windows over Data Streams p Diagnosis of Breast Tumours and Evaluation of Prognostic Risk by Using Machine Learning Approaches p Table of Contents provided by Blackwell's Book Services and R.R. Bowker. Used with permission.

Fundamentals of Digital Image Processing

Fundamentals of Digital Image Processing \L\.6 Gw.i Fundamentals of Digital Image Processing A Practical Approach with Examples in Matlab Chris Solomon School of Physical Sciences, University of Kent, Canterbury, UK Toby Breckon School of Engineering,

More information

p. 40 p. 52 p. 64 p. 95

p. 40 p. 52 p. 64 p. 95 Hybrid Auditory Masking Models p. 1 A Fast Bit Allocation Algorithm for MPEG Audio Encoder p. 5 Automatic Main Melody Extraction From Midi Files With A Modified Lempel-ZIV Algorithm p. 9 On-Line Music

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Image Processing (IP)

Image Processing (IP) Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The

More information

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended

More information

Unsupervised image segmentation using contourlet domain hidden Markov trees model p. 32

Unsupervised image segmentation using contourlet domain hidden Markov trees model p. 32 Localization scale selection for scale-space segmentation p. 1 Image segmentation for the application of the Neugebauer colour prediction model on inkjet printed ceramic tiles FCM with spatial and multiresolution

More information

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming Kyrre Glette kyrrehg@ifi INF3490 Evolvable Hardware Cartesian Genetic Programming Overview Introduction to Evolvable Hardware (EHW) Cartesian Genetic Programming Applications of EHW 3 Evolvable Hardware

More information

THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM

THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM THREE PHASE FAULT DIAGNOSIS BASED ON RBF NEURAL NETWORK OPTIMIZED BY PSO ALGORITHM M. Sivakumar 1 and R. M. S. Parvathi 2 1 Anna University, Tamilnadu, India 2 Sengunthar College of Engineering, Tamilnadu,

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

CT79 SOFT COMPUTING ALCCS-FEB 2014

CT79 SOFT COMPUTING ALCCS-FEB 2014 Q.1 a. Define Union, Intersection and complement operations of Fuzzy sets. For fuzzy sets A and B Figure Fuzzy sets A & B The union of two fuzzy sets A and B is a fuzzy set C, written as C=AUB or C=A OR

More information

Further Details Contact: A. Vinay , , #301, 303 & 304,3rdFloor, AVR Buildings, Opp to SV Music College, Balaji

Further Details Contact: A. Vinay , , #301, 303 & 304,3rdFloor, AVR Buildings, Opp to SV Music College, Balaji S.No TITLES DOMAIN DIGITAL 1 Image Haze Removal via Reference Retrieval and Scene Prior 2 Segmentation of Optic Disc from Fundus images 3 Active Contour Segmentation of Polyps in Capsule Endoscopic Images

More information

Contents. Preface to the Second Edition

Contents. Preface to the Second Edition Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

2. Lossless compression is called compression a) Temporal b) Reversible c) Permanent d) Irreversible

2. Lossless compression is called compression a) Temporal b) Reversible c) Permanent d) Irreversible Q1: Choose the correct answer: 1. Which of the following statement is true? a) LZW method Easy to implement, Fast compression, Lossless technique and Dictionary based technique b) LZW method Easy to implement,

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

3.5 Filtering with the 2D Fourier Transform Basic Low Pass and High Pass Filtering using 2D DFT Other Low Pass Filters

3.5 Filtering with the 2D Fourier Transform Basic Low Pass and High Pass Filtering using 2D DFT Other Low Pass Filters Contents Part I Decomposition and Recovery. Images 1 Filter Banks... 3 1.1 Introduction... 3 1.2 Filter Banks and Multirate Systems... 4 1.2.1 Discrete Fourier Transforms... 5 1.2.2 Modulated Filter Banks...

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

[Time : 3 Hours] [Max. Marks : 100] SECTION-I. What are their effects? [8]

[Time : 3 Hours] [Max. Marks : 100] SECTION-I. What are their effects? [8] UNIVERSITY OF PUNE [4364]-542 B. E. (Electronics) Examination - 2013 VLSI Design (200 Pattern) Total No. of Questions : 12 [Total No. of Printed Pages :3] [Time : 3 Hours] [Max. Marks : 100] Q1. Q2. Instructions

More information

Climate Precipitation Prediction by Neural Network

Climate Precipitation Prediction by Neural Network Journal of Mathematics and System Science 5 (205) 207-23 doi: 0.7265/259-529/205.05.005 D DAVID PUBLISHING Juliana Aparecida Anochi, Haroldo Fraga de Campos Velho 2. Applied Computing Graduate Program,

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

REAL-TIME DIGITAL SIGNAL PROCESSING

REAL-TIME DIGITAL SIGNAL PROCESSING REAL-TIME DIGITAL SIGNAL PROCESSING FUNDAMENTALS, IMPLEMENTATIONS AND APPLICATIONS Third Edition Sen M. Kuo Northern Illinois University, USA Bob H. Lee Ittiam Systems, Inc., USA Wenshun Tian Sonus Networks,

More information

Particle Swarm Optimization

Particle Swarm Optimization Particle Swarm Optimization Gonçalo Pereira INESC-ID and Instituto Superior Técnico Porto Salvo, Portugal gpereira@gaips.inesc-id.pt April 15, 2011 1 What is it? Particle Swarm Optimization is an algorithm

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

6. NEURAL NETWORK BASED PATH PLANNING ALGORITHM 6.1 INTRODUCTION

6. NEURAL NETWORK BASED PATH PLANNING ALGORITHM 6.1 INTRODUCTION 6 NEURAL NETWORK BASED PATH PLANNING ALGORITHM 61 INTRODUCTION In previous chapters path planning algorithms such as trigonometry based path planning algorithm and direction based path planning algorithm

More information

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi

More information

CP467 Image Processing and Pattern Recognition

CP467 Image Processing and Pattern Recognition CP467 Image Processing and Pattern Recognition Instructor: Hongbing Fan Introduction About DIP & PR About this course Lecture 1: an overview of DIP DIP&PR show What is Digital Image? We use digital image

More information

Machine Learning in WAN Research

Machine Learning in WAN Research Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network

More information

PROBLEM FORMULATION AND RESEARCH METHODOLOGY

PROBLEM FORMULATION AND RESEARCH METHODOLOGY PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter

More information

Rolling element bearings fault diagnosis based on CEEMD and SVM

Rolling element bearings fault diagnosis based on CEEMD and SVM Rolling element bearings fault diagnosis based on CEEMD and SVM Tao-tao Zhou 1, Xian-ming Zhu 2, Yan Liu 3, Wei-cai Peng 4 National Key Laboratory on Ship Vibration and Noise, China Ship Development and

More information

Ph.D. in Computer Science (

Ph.D. in Computer Science ( Computer Science 1 COMPUTER SCIENCE http://www.cs.miami.edu Dept. Code: CSC Introduction The Department of Computer Science offers undergraduate and graduate education in Computer Science, and performs

More information

Research on the New Image De-Noising Methodology Based on Neural Network and HMM-Hidden Markov Models

Research on the New Image De-Noising Methodology Based on Neural Network and HMM-Hidden Markov Models Research on the New Image De-Noising Methodology Based on Neural Network and HMM-Hidden Markov Models Wenzhun Huang 1, a and Xinxin Xie 1, b 1 School of Information Engineering, Xijing University, Xi an

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17 Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8

More information

Machine Learning in WAN Research

Machine Learning in WAN Research Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network

More information

Operation of machine vision system

Operation of machine vision system ROBOT VISION Introduction The process of extracting, characterizing and interpreting information from images. Potential application in many industrial operation. Selection from a bin or conveyer, parts

More information

Indian Silicon Technologies 2013

Indian Silicon Technologies 2013 SI.No Topics IEEE YEAR 1. An RFID Based Solution for Real-Time Patient Surveillance and data Processing Bio- Metric System using FPGA 2. Real-time Binary Shape Matching System Based on FPGA 3. An Optimized

More information

Associative Cellular Learning Automata and its Applications

Associative Cellular Learning Automata and its Applications Associative Cellular Learning Automata and its Applications Meysam Ahangaran and Nasrin Taghizadeh and Hamid Beigy Department of Computer Engineering, Sharif University of Technology, Tehran, Iran ahangaran@iust.ac.ir,

More information

Course Outcome of M.E (ECE)

Course Outcome of M.E (ECE) Course Outcome of M.E (ECE) PEC108/109: EMBEDDED SYSTEMS DESIGN 1. Recognize the Embedded system and its programming, Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits. 2. Identify

More information

Two Dimensional Wavelet and its Application

Two Dimensional Wavelet and its Application RESEARCH CENTRE FOR INTEGRATED MICROSYSTEMS - UNIVERSITY OF WINDSOR Two Dimensional Wavelet and its Application Iman Makaremi 1 2 RESEARCH CENTRE FOR INTEGRATED MICROSYSTEMS - UNIVERSITY OF WINDSOR Outline

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Innovative M-Tech projects list

Innovative M-Tech projects list 1 Technologies: Innovative M-Tech projects list 1. ARM-7 TDMI - LPC-2148 2. Image Processing 3. MATLAB Embedded 4. GPRS Mobile internet 5. Touch screen. IEEE 2012-13 papers 6. Global Positioning System

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

Image Processing, Analysis and Machine Vision

Image Processing, Analysis and Machine Vision Image Processing, Analysis and Machine Vision Milan Sonka PhD University of Iowa Iowa City, USA Vaclav Hlavac PhD Czech Technical University Prague, Czech Republic and Roger Boyle DPhil, MBCS, CEng University

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

2009 E09PS E09PS E09PS E09PS E09PS E09PS38 IEEE 2009 E09PS39 E09PS40 E09PS41 E09PS42 E09PS43 IEEE 2008 E09PS44

2009 E09PS E09PS E09PS E09PS E09PS E09PS38 IEEE 2009 E09PS39 E09PS40 E09PS41 E09PS42 E09PS43 IEEE 2008 E09PS44 1 CODE IEEE TRANSACTION POWER SYSTEM YEAR E09PS32 E09PS01 E09PS02 E09PS03 E09PS04 E09PS05 E09PS06 E09PS07 E09PS08 E09PS09 E09PS10 E09PS11 E09PS12 E09PS13 E09PS14 E09PS15 E09PS16 E09PS17 E09PS18 E09PS19

More information

Technologies for Future Mobile Tactile Internet of Things (IoT)

Technologies for Future Mobile Tactile Internet of Things (IoT) Technologies for Future Mobile Tactile Internet of Things (IoT) Dr. Suresh Borkar Department of ECE Illinois Institute of Technology, Chicago IIT Real-Time Communications Conference Oct 18-20, 2016 1 Technologies

More information

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm International Journal of Engineering Research and Advanced Technology (IJERAT) DOI:http://dx.doi.org/10.31695/IJERAT.2018.3273 E-ISSN : 2454-6135 Volume.4, Issue 6 June -2018 Tumor Detection and classification

More information

The Computational Beauty of Nature

The Computational Beauty of Nature Gary William Flake The Computational Beauty of Nature Computer Explorations of Fractals, Chaos, Complex Systems, and Adaptation A Bradford Book The MIT Press Cambridge, Massachusetts London, England Preface

More information

COMPUTER AND ROBOT VISION

COMPUTER AND ROBOT VISION VOLUME COMPUTER AND ROBOT VISION Robert M. Haralick University of Washington Linda G. Shapiro University of Washington A^ ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts Menlo Park, California

More information

A Short Narrative on the Scope of Work Involved in Data Conditioning and Seismic Reservoir Characterization

A Short Narrative on the Scope of Work Involved in Data Conditioning and Seismic Reservoir Characterization A Short Narrative on the Scope of Work Involved in Data Conditioning and Seismic Reservoir Characterization March 18, 1999 M. Turhan (Tury) Taner, Ph.D. Chief Geophysicist Rock Solid Images 2600 South

More information

Pathobin Product Catalogue 2018

Pathobin Product Catalogue 2018 Pathobin Product Catalogue 2018 Download a purchase order form www.pathobin.com Pathobin 3D System... 3 Pathobin C-mount Camera... 5 Pathobin Mosaic software... 7 PathobinTools software... 9 2 Pathobin

More information

Intelligent Methods in Modelling and Simulation of Complex Systems

Intelligent Methods in Modelling and Simulation of Complex Systems SNE O V E R V I E W N OTE Intelligent Methods in Modelling and Simulation of Complex Systems Esko K. Juuso * Control Engineering Laboratory Department of Process and Environmental Engineering, P.O.Box

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

ELEC Dr Reji Mathew Electrical Engineering UNSW

ELEC Dr Reji Mathew Electrical Engineering UNSW ELEC 4622 Dr Reji Mathew Electrical Engineering UNSW Review of Motion Modelling and Estimation Introduction to Motion Modelling & Estimation Forward Motion Backward Motion Block Motion Estimation Motion

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work on the part

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

1 Audio quality determination based on perceptual measurement techniques 1 John G. Beerends

1 Audio quality determination based on perceptual measurement techniques 1 John G. Beerends Contents List of Figures List of Tables Contributing Authors xiii xxi xxiii Introduction Karlheinz Brandenburg and Mark Kahrs xxix 1 Audio quality determination based on perceptual measurement techniques

More information

Machine Learning for Software Engineering

Machine Learning for Software Engineering Machine Learning for Software Engineering Introduction and Motivation Prof. Dr.-Ing. Norbert Siegmund Intelligent Software Systems 1 2 Organizational Stuff Lectures: Tuesday 11:00 12:30 in room SR015 Cover

More information

Algorithm Collections for Digital Signal Processing Applications Using Matlab

Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab E.S. Gopi National Institute of Technology, Tiruchi,

More information

Video Coding Technique Using 3D Dualtree Discrete Wavelet Transform with Multi Objective Particle Swarm Optimization Approaches

Video Coding Technique Using 3D Dualtree Discrete Wavelet Transform with Multi Objective Particle Swarm Optimization Approaches American Journal of Applied Sciences, 10 (2): 179-184, 2013 ISSN: 1546-9239 2013 Muthusamy and Ramachandran, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

On Optimizing Command and Control Structures

On Optimizing Command and Control Structures On Optimizing Command and Control Structures 16th ICCRTS Gary F. Wheatley Best Paper Presentation Kevin Schultz, David Scheidt, {kevin.schultz, david.scheidt}@jhuapl.edu This work was funded in part by

More information

Contents. Foreword to Second Edition. Acknowledgments About the Authors

Contents. Foreword to Second Edition. Acknowledgments About the Authors Contents Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments About the Authors xxxi xxxv Chapter 1 Introduction 1 1.1 Why Data Mining? 1 1.1.1 Moving toward the Information Age 1

More information

IT Digital Image ProcessingVII Semester - Question Bank

IT Digital Image ProcessingVII Semester - Question Bank UNIT I DIGITAL IMAGE FUNDAMENTALS PART A Elements of Digital Image processing (DIP) systems 1. What is a pixel? 2. Define Digital Image 3. What are the steps involved in DIP? 4. List the categories of

More information

Multiple-View Object Recognition in Band-Limited Distributed Camera Networks

Multiple-View Object Recognition in Band-Limited Distributed Camera Networks in Band-Limited Distributed Camera Networks Allen Y. Yang, Subhransu Maji, Mario Christoudas, Kirak Hong, Posu Yan Trevor Darrell, Jitendra Malik, and Shankar Sastry Fusion, 2009 Classical Object Recognition

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company) Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How

More information

3G Services Present New Challenges For Network Performance Evaluation

3G Services Present New Challenges For Network Performance Evaluation 3G Services Present New Challenges For Network Performance Evaluation 2004-29-09 1 Outline Synopsis of speech, audio, and video quality evaluation metrics Performance evaluation challenges related to 3G

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

( ) ; For N=1: g 1. g n

( ) ; For N=1: g 1. g n L. Yaroslavsky Course 51.7211 Digital Image Processing: Applications Lect. 4. Principles of signal and image coding. General principles General digitization. Epsilon-entropy (rate distortion function).

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

Mobility Data Management & Exploration

Mobility Data Management & Exploration Mobility Data Management & Exploration Ch. 07. Mobility Data Mining and Knowledge Discovery Nikos Pelekis & Yannis Theodoridis InfoLab University of Piraeus Greece infolab.cs.unipi.gr v.2014.05 Chapter

More information

Internet/Intranet Based Remote Condition Monitoring and Fault. Diagnosis Scheme and System for Steam Turboset

Internet/Intranet Based Remote Condition Monitoring and Fault. Diagnosis Scheme and System for Steam Turboset Key Engineering Materials Vols. 293-294 (2005) pp 365-372 online at http://www.scientific.net (2005) Trans Tech Publications, Switzerland Online available since 2005/Sep/15 Internet/Intranet Based Remote

More information

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing BWRC, September 22 nd 2017 joint work with C. Dombrowski, M. Serror, Y. Hu, S. Junges Machine-Type Communications: Origins

More information

An Improved Blind Watermarking Scheme in Wavelet Domain

An Improved Blind Watermarking Scheme in Wavelet Domain An Improved Blind Watermarking Scheme in Wavelet Domain Hai Tao 1, Jasni Mohamad Zain 1, Ahmed N. Abd Alla 2, Wang Jing 1 1 Faculty of Computer Systems and Software Engineering University Malaysia Pahang

More information

Telecommunications Engineering Course Descriptions

Telecommunications Engineering Course Descriptions Telecommunications Engineering Course Descriptions Electrical Engineering Courses EE 5305 Radio Frequency Engineering (3 semester hours) Introduction to generation, transmission, and radiation of electromagnetic

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

1. Dynamic Languages. 1. In-Vehicle Networking. 1. Plastic Memory. 1. Protein Memory. 1. Setting up a LAN using Linux 1. UMTS. 1.

1. Dynamic Languages. 1. In-Vehicle Networking. 1. Plastic Memory. 1. Protein Memory. 1. Setting up a LAN using Linux 1. UMTS. 1. 1. Dynamic Languages 1. In-Vehicle Networking 1. Plastic Memory 1. Protein Memory 1. Setting up a LAN using Linux 1. UMTS 1. Wireless USB 1. Zero Knowledge Protocols and Proof Systems 1. Tempest and Echelon

More information

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects NCCT SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects #109, 2 nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai 600034 Above IOB, Next

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

Data mining fundamentals

Data mining fundamentals Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of

More information

Self-Organization in Sensor and Actor Networks

Self-Organization in Sensor and Actor Networks Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations

More information

Mechanical and Automation Engineering Programme (3-year Curriculum)

Mechanical and Automation Engineering Programme (3-year Curriculum) Course List Mechanical and Automation Engineering Programme (3-year Curriculum) ENGG2014 Advanced Engineering Mathematics (Syllabus D) LINEAR ALGEBRA: vector spaces and subspaces; linear transformations

More information

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING SECOND EDITION IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING ith Algorithms for ENVI/IDL Morton J. Canty с*' Q\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC

More information

Genetic Algorithms and Genetic Programming. Lecture 9: (23/10/09)

Genetic Algorithms and Genetic Programming. Lecture 9: (23/10/09) Genetic Algorithms and Genetic Programming Lecture 9: (23/10/09) Genetic programming II Michael Herrmann michael.herrmann@ed.ac.uk, phone: 0131 6 517177, Informatics Forum 1.42 Overview 1. Introduction:

More information

Chapter 7 UNSUPERVISED LEARNING TECHNIQUES FOR MAMMOGRAM CLASSIFICATION

Chapter 7 UNSUPERVISED LEARNING TECHNIQUES FOR MAMMOGRAM CLASSIFICATION UNSUPERVISED LEARNING TECHNIQUES FOR MAMMOGRAM CLASSIFICATION Supervised and unsupervised learning are the two prominent machine learning algorithms used in pattern recognition and classification. In this

More information

Adaptive Fuzzy Watermarking for 3D Models

Adaptive Fuzzy Watermarking for 3D Models International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick

More information

Path Planning. Marcello Restelli. Dipartimento di Elettronica e Informazione Politecnico di Milano tel:

Path Planning. Marcello Restelli. Dipartimento di Elettronica e Informazione Politecnico di Milano   tel: Marcello Restelli Dipartimento di Elettronica e Informazione Politecnico di Milano email: restelli@elet.polimi.it tel: 02 2399 3470 Path Planning Robotica for Computer Engineering students A.A. 2006/2007

More information

2. Basic Task of Pattern Classification

2. Basic Task of Pattern Classification 2. Basic Task of Pattern Classification Definition of the Task Informal Definition: Telling things apart 3 Definition: http://www.webopedia.com/term/p/pattern_recognition.html pattern recognition Last

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information