Hiding secrete data in compressed images using histogram analysis

Size: px
Start display at page:

Download "Hiding secrete data in compressed images using histogram analysis"

Transcription

1 University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University of Woongong in Dubai, farhadk@uow.edu.au Pubication Detais Keissarian, F. 2, 'iding secrete data in compressed images using histogram anaysis', The 2nd Internationa Conference on Computer and Automation Engineering (ICCAE), 2, IEEE, Piscataway, New Jersey, USA, pp Research Onine is the open access institutiona repository for the University of Woongong. For further information contact the UOW ibrary: research-pubs@uow.edu.au

2 iding Secrete Data in Compressed Images Using istogram Anaysis Farhad Keissarian University of Woongong in Dubai Abstract In this paper, we present a data hiding scheme that embeds the secret data into the compression codes of the host image. The compression codes are associated with the visua patterns appearing in image bocks and are computed through a histogram anaysis of residua bocks of the host image. The hiding capacity for each compressed bock is not fixed and varies with its bock type. Bocks with ow visua activity hide more data than those with high visua activity. Experimenta resuts confirm that the proposed technique can provide high data capacity within the compression fie with acceptabe image quaity of the stego-images. Keywords- data hiding; image compression; bock pattern; bock histogram. I. INTRODUCTION Protection of the transmitted data over the Internet from being intercepted or tampered with has become an increasingy important issue. There are two kinds of protection techniques, cryptography and data hiding. In the former technique, the secret data are encrypted by the sender to be transferred into a set of meaningess data. Ony the ega receiver has the means to decode the meaningess data. The data hiding techniques, on the other hand, embed the secret data into a digita media caed the cover image to become a stego-image. Because the stego-image is often imperceptibe, it arouses ess attention from the maicious attackers than data encryption []. Data hiding techniques have been roughy cassified into three categories: the spatia-domain manner, the frequencydomain manner and the compression-domain manner. For the spatia-domain manner, secret data are mixed directy into the distributed pixes. The east significant bit (SB) [2] is the genera approach to hide the secret information into the SBs of each pixe of a cover image directy owing to their ower distortion in image quaity. For the frequency domain manner, the cover image must first be transformed into frequency coefficients by using a frequency-oriented mechanism such as discrete waveet transformation (DWT) [3]. ater, the secret data are combined with the reative coefficients in the frequency-form image. For the compression-domain manner, the secret data are embedded into the compression codes. In recent years, compression codes generated by we-known image compressions such as vector quantization (VQ), bock truncation coding (BTC) and simiar methods have been used for data hiding to extend the variety of cover images. The method proposed in [4], appies side match vector quantization (SVQ) with the concept of prediction to propose an adaptive data hiding scheme. In addition to the VQ compression domain, Chuang et a [5] proposed a data embedding scheme based on BTC for gray scae images. In their scheme, they predefined a threshod to cassify the type of each BTC-encoded bock as smooth or compex. Subsequenty, they embedded the secret data into the bitmap of the smooth BTC-encoded bocks. In this paper, we deveop an image hiding scheme that can hide the secrete data into compression codes of the host image, generated by the image compression technique that we reported earier in [6]. The compression codes are associated with the visua patterns appearing in image bocks and are computed through a histogram anaysis of residua bocks of the host image. The rest of the paper is organized into four sections. The concept of the proposed compression agorithm is introduced in Section 2. In section 3, the proposed hiding scheme is presented. Experimenta resuts are given in Section 4. II. IAGE COPRESSION AGORIT In the proposed image compression agorithm in [6], an image is bock coded according to the type of individua bocks. A nove cassifier, which is designed based on the histogram anaysis of residua bocks, is empoyed to cassify the bocks according to their eve of visua activity. The cassifier paces each bock into one of the two categories of uniform or edge bock. A uniform bock is coded by the bock mean, whereas an edge bock is coded by a set of parameters associated with the pattern appearing inside the bock. ike the origina BTC agorithm [7], our method encodes an edge bock by initiay computing two gray vaues and constructing a bit-map. owever, in the proposed method the computation of the gray vaues, namey the ow and high representative intensities are carried out through anaysis of the bock residuas histogram. oreover, instead of transmitting the two gray vaues, their average and difference wi be sent to decoder. Finay, instead of transmitting the whoe bit-map for the processed edge bock, an optimum bit-pattern is seected from a set of pre-defined patterns, and its index wi be transmitted. The use of these parameters at the receiver reduces the cost of reconstruction significanty and expoits the efficiency of the proposed technique. A brief description of the bock cassifier and the coding scheme are given in the next two sub-sections. A. Bock Cassifier A nove histogram-based cassification scheme has been deveoped for cassifying the image bocks [6]. The method //$26. C 2 IEEE 492

3 operates based on the distribution of the bock residuas and cassifies bock either as a ow-detai (uniform) or as a highdetai (edge) bock. The cassifier empoys the bock residuas and cassifies the bock according to their histogram. The cassification is carried out through a peak detection method on the histogram. A brief description of the cassifier is as foows: Each bock of 4x4 pixes is converted into a residua bock by subtracting the sampe mean from the origina pixes. The residua sampes are ess correated than the origina sampes within a bock. ere, two of the most important oca characteristics of the image bock are considered: centra tendency, represented by the mean vaue and the dispersion of the bock sampes about the mean, which is represented by the residua vaues. The chaenge here is to anayze the dispersion of the residua vaues about the mean. One way of achieving this is to sort the histogram of the bock residua sampes. As the neighboring pixes in the origina bock are highy correated, the residua sampes wi tend to concentrate around zero. One can then quantize the residua sampes prior to forming the histogram. The histogram of the quantized residuas may then be formed and anayzed by simpy detecting its peaks. Based on the distribution of the residua sampes within the test images, we choose to appy a coarse quantization, in particuar a 5-eve non-uniform quantizer. We now define q j as the output of the quantizer with index j, as shown in Fig.. The histogram of the quantized vaues h ( q j ) may then be formed to provide the occurrence of q j. The quantized residua histogram (QR) is then anayzed by simpy detecting its peaks. According to the number of detected distinct peaks on the histogram, image bocks can be paced into two major categories of uniform and edge bocks. A histogram with a unique peak at its centre (unimoda histogram) identifies a uniform bock. Whereas, the existence of two distinct peaks impies that the processed bock is an edge bock. Fig. 2 and Fig. 3 show exampes of both types of bocks. A peak on the histogram indicates a high score of residua vaues; therefore it is fair to concude that there is a considerabe number of pixes that have the same dispersion about the bock mean. This, in turn wi ead us to concude that the gray eve vaues of these pixes are very cose to one another. ence, this group of pixes can be represented by a singe gray vaue. In this anaysis, a distinct peak on the QR of the processed bock represents a gray vaue j, given as : j = mean + q j () (e) (e) Figure 2. (a) Origina uniform bock; sampe mean = 8, (b) Residuas (c) quantized residuas, (d) quantizer s indexes, (e) bock QR Where mean is the bock mean. For a uniform bock, since the singe peak occurs at the center of the histogram, where q j =, then from Eq. the representative intensity j wi be the same as the bock mean. For an edge bock, the two peaks of the QR, which are positioned on the eft and right hand side of the centre (j=) represent the ow representative intensity and the high representative intensity, respectivey. If the two peaks are positioned at indexes j and j, the two representative intensities are cacuated as: = mean + q j In Fig. 3, using Eq. 2 ; 53. mean = 25, and = mean + q j (2) and = 25 + (-39) = 86 and (a) are computed = = (b) Figure. The quantizer output with index j (c) (d) 493

4 (e) Figure 3. (a) Origina edge bock: sampe mean = 25 (b) Residuas (c) quantized residuas, (d) quantizer s indexes, (e) QR B. Coding of Image Bocks Once the image bocks have been cassified, the coder, switches between a one-eve (uniform bock) and a bieve(edge bock) representation. A uniform bock is encoded by transmitting the bock mean pus an indicator to inform the decoder that the bock is uniform. By forciby custering a pixes in an edge bock into two groups, a bi-eve approximation of the bock is obtained. The custering partitions a bock W into two sets of pixes, W andw, such that W = W W and W W = Φ. The custering is carried out by marking the pixes of set W and W by and, respectivey. Thus the custering can be represented as a bit-pattern, B = { b, b 2,... b 6 bi (,)}. By seecting the bock mean as a threshod, the bit-pattern can be generated as : if x > i mean b = (3) i if x i mean where, xi W are the intensities of the pixes of the edge bock. It is noted that, and are the representative intensities of the set W and W, respectivey. Figure. 4: Set of 32 pre-defined patterns. ike the origina BTC, an edge bock can be coded by transmitting the representative intensities and the bit-pattern. owever, in our method, we transmit the average, and difference, of the representative intensities, defined by : + = 2 = (4) 2 The vaues and represent the ow and high frequency components, respectivey. It is evident fro eq.3 that = + and =. During the reconstruction, the coded bock can be constructed by : + if b W i b = (5) i if b W i It shoud be noted that for a uniform bock, since both representative intensities are the same as the bock mean, therefore, = mean and =. Instead of transmitting the whoe bit-pattern of an edge bock, further bit reduction can be achieved by finding the best match for the bock bit pattern from a set of pre-defined patterns, P k, k =,,2,, N. A set of 32 patterns shown in Fig. 4, which preserve the ocation and poarity of edges in four major directions and their compements making N=64 is used in our method. The pattern matching stage is carried out by performing a ogica excusive NOR operation on the bock bit-pattern and each pattern from the set to cacuate a matching score, ms, given as : = 3 = 3 ms ( P b ) i j ij ij (6) The pattern with the highest ms is seected and its index k wi be transmitted. Since, the proposed method sends k 64 instead of the whoe bock bit-pattern, ony og 2 = 6 bits are transmitted. Each image bock is therefore encoded by generating a tripe (,, k). It shoud be aso noted that, since for a uniform bock, no pattern index is transmitted, therefore the compressed code for such a bock is the pair (, ), where =. The vaue in the tripe (,, k), can be coded by 8 bits, whereas coding requires ony 6 bits, as its standard deviation is smaer than that of and. Therefore, the compression code of an edge bock requires 2=(8+6+6) bits to be transmitted. For a uniform bock, the number of bits required to code the pair (,) is 9=8+. III. PROPOSED DATA IDING SCEE The proposed hiding scheme embeds the secret data into the compression codes of the host image, generated by the proposed compression agorithm, described in the previous 494

5 section. The secret data is a random bit stream of and. For the sake of data security, secrete data shoud be encrypted by a secrete key before being embedded. After embedding secrete data into the compression codes, one can use the decompression procedure to obtain the stego-image. The data embedding and data extraction phases are described in the foowing sub-sections. A. Data Embedding Phase In this phase, the encoder receives the secret bits to hide them in the compression codes of uniform and edge bocks. The hiding capacity for each compressed bock is not fixed and varies with its bock type. For a uniform bock, and the bit-pattern of the bock are used for data embedding. Whereas, an edge bocks uses and for hiding the secrete bits. Since, the pixe intensities in uniform bocks are cose to their neighboring pixes, even though the bits in their bitpatterns are changed, the reconstructed pixe vaue is sti cose to its origina one. ence, a the bits in the bit-pattern can be repaced by secret bits. In the proposed compression agorithm, no bit-pattern or pattern index is transmitted whie coding a uniform bock. This significanty contributes to a high compression ratio. owever, in the proposed data hiding method, the compression code of a uniform bock is enhanced to incude the bock bit-pattern. The enhanced compression code of a uniform bock is then the tripe (,, B), where B is the bitpattern of the bock. This resuts in significanty enarging the hiding capacity at the cost of ower compression ratio. Athough, the bit-pattern is transmitted for a uniform bock, but the reconstruction is sti carried out by repacing a the eements of the bit-pattern by the bock mean. Therefore, the quaity of the reconstructed uniform bock wi be the same, if the bit-pattern is not transmitted. In the proposed method, a uniform bock has the capacity of embedding sixteen bits into its bit-pattern and two bits in its vaue. To further enarge the hiding capacity of the host image whie retaining good image quaity, the proposed scheme aso hides two extra bits in each of and vaues of an edge bock. The modification of and for embedding the secrete bits is as foows. The encoder receives two secrete bits and then transform these two bits into a secret decima digit sd. Next, the encoder uses the and vaues to compute F given as : F = mod 5 F = mod 5 (8) et sd and sd denote the secret digits to be hidden in and, respectivey. The modified vaues and are then computed as : = + ( sd F ) = + ( sd F ) (9) From Eq. 9, it is evident that no modification is needed if a secrete digit is equa to the cacuated vaue F. The embedding phase of the proposed method foows the steps isted beow : Step : Obtain the tripe compression code for the processed bock. If the bock is uniform, go to step3, otherwise go to step 2. Step 2: Embed 2 bits in to get and 2 bits in to get. Transmit the tripe (,, k). Go to step 4 Step 3: Embed 2 bits in to get, and 6 bits in B to get B. Transmit the tripe (,, B ). Go to step 4. Step 4: Repeat step, unti the entire bit stream is embedded. Step5 : Decrypt the extracted information to obtain the origina secrete data B. Extraction Phase The data extraction phase is simiar to the data embedding phase. The decoder receives the tripe code for each bock. If the bock is uniform, 2 bits are retrieved from and 6 bits from the transmitted bit-pattern B. On the other hand, if the received code is for an edge bock, 2 bits are extracted from and another 2 bits are extracted from. The secret digit sd can be extracted by computing sd = mod 5 and sd = mod 5. The data extracting process is repeatedy executed unti a the secret bits are retrieved. The extracting phase of the proposed method foows the steps isted beow : Step : Obtain the tripe compressed code for the bock. Go to step 2. Step 2: If =, the tripe is (,, B ). Extract 2 bits from and 6 bits from B, and go to step 4, otherwise go to step 3. Step 3: The tripe is (,, k) Extract 2 bits from and 2 bits from. Go to step 4 Step 4 : Repeat step, unti a the secret bits are retrieved. IV. SIUATION RESUTS We have evauated the performance of the proposed coding scheme through a computer simuation on two grayeve images ena and Pepper, shown in Fig.5a and Fig. 6a. These images are 8 bits per pixe and 52 x 52 pixes in size. The simuation patform is icrosoft Windows P, Pentium III, and the proposed scheme is impemented using atab. Three performance matrices are used to measure the performance of the proposed compression and hiding schemes : iding capacity (CE), compression ratio (bpp), and image quaity (PSNR). Tabes and 2 show the compression resuts, the hiding capacity, C and the image quaity (PSNR) for the cover images ena and Pepper. TABE I Image P(u) CR (bpp) TC (Kbyte) C (Kbyte) PSNR (db) ena 63% Pepper 72% P(u): Popuation of uniform bocks 495

6 CR : Compression Ratio, TC: Transmitted Code C : iding Capacity From Tabe I, it can be observed that more than haf of the transmitted code is used to embed data, yet keeping a satisfactory image quaity. To further investigate the performance of the proposed scheme, we compare the stegoimage quaity and the hiding capacity of the proposed scheme with Chuang et a. s scheme for a threshod of T=5. The resuts are shown in Tabe II. From Tabe II, we observe that the proposed method outperforms Chuang et a. s scheme in the hiding capacity by 5%, with a very itte distortion in the quaity. TABE II Image ethod PSNR (db) iding Capacity (Kbyte) ena Chuang et a Proposed Pepper Chuang et a Proposed Compression Ratio (bpp) From Tabe II, we observe that the proposed method outperforms Chuang et a. s scheme in the hiding capacity by 5%, with a very itte distortion in the quaity. Since the REFERENCES [] uuu Petitcoas, F.A.P., Anderson, R.J., and Kuhn,.G.: Information hiding a survey, Proc. IEEE, 999, vo. 87, (7), pp [2] J. CK. Chan and. Cheng, iding data in images by simpe SB Substitution, Pattern Recog., vo. 37(3), pp , 24 [3] P. Bao and. a, Image adaptive watermarking using waveet domain singuar vaue decomposition, IEEE Trans. Circuits Syst. Video Techno., 25, vo. 5, (), pp [4] SC. Shie, SD. in and C. Fang, Adaptive data hiding based on SVQ prediction, IEICE Trans Inform Syst., vo. E89-D(), pp [5] JC. Chuang and CC. Chang, Using a simpe and fast image compression agorithm to hide secret information. Internationa Journa of Computes and Appications, vo.28 (4), pp , 26 compression agorithm described in section II, does not transmit the bit-pattern of a uniform bock B, we aso considered hiding data into the compression code of a uniform bock without transmitting the bock bit-pattern, B. As mentioned earier, since a uniform bock is reconstructed by repacing a the bock pixes by the bock mean, the quaity of reconstructed bock wi be the same in either cases. Tabe 3 shows the resuts for this case. TABE III Image P(u) CR TC C PSNR (bpp) (Kbyte) (Kbyte) (db) ena 63% Pepper 72% By comparing the resuts in Tabe I and Tabe II, we note that non-transmission of bit-patterns of uniform bocks resuts in doubing the compression ratio, at the cost of dramatic reduction of hiding capacity by 8%. Depending on the amount of secrete data, one can seect the suitabe method. Fig. 5 and Fig. 6 show the origina test images and the compressed stego-images for both cases. [6] F Keissarian, Nove quad-tree predictive image coding technique using pattern-based cassification, Proc. SPIE, Visua Communications and Image Processing (VCIP-23), vo. 55, pp , June 23, ugano, Switzerand. [7] E.J. Dep and O.R. itche, Image compression using bock truncation coding, IEEE Trans. Commun., vo. 27, pp , 979. (a) (b) (c) (a) (b) (c) Figure 5. The compression and embedding resuts for the Image of ena : a) Origina image, b) Compressed stego-image: C=26.76 Kb, at.46 bpp, c) Compressed stego-image: C=5.5 Kb, at.8 bpp. Figure 6. The compression and embedding resuts for the Image of Pepper : a) Origina image, b) Compressed stego-image: C=28.6 Kb, at.48 bpp, c) Compressed stego-image: C=5. Kb, at.75 bpp. 496

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic 5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

A VLSI Architecture of JPEG2000 Encoder

A VLSI Architecture of JPEG2000 Encoder A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Quality Assessment for Stereoscopic Images by Distortion Separation

Quality Assessment for Stereoscopic Images by Distortion Separation JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 14 37 Quaity Assessment for Stereoscopic Images by Distortion Separation Chaozheng Hu, Feng Shao*, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng Facuty of Information

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Filtering. Yao Wang Polytechnic University, Brooklyn, NY 11201

Filtering. Yao Wang Polytechnic University, Brooklyn, NY 11201 Spatia Domain Linear Fitering Yao Wang Poytechnic University Brookyn NY With contribution rom Zhu Liu Onur Gueryuz and Gonzaez/Woods Digita Image Processing ed Introduction Outine Noise remova using ow-pass

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003 Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

University of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP

University of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP Anantrasirichai, N., & Canagarajah, C. N. (2010). Spatiotempora superresoution for ow bitrate H.264 video. In IEEE Internationa Conference on Image Processing. (pp. 2809-2812). 10.1109/ICIP.2010.5651088

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Absolute three-dimensional shape measurement with two-frequency square binary patterns

Absolute three-dimensional shape measurement with two-frequency square binary patterns 871 Vo. 56, No. 31 / November 1 217 / Appied Optics Research Artice Absoute three-dimensiona shape measurement with two-frequency square binary patterns CHUFAN JIANG AND SONG ZHANG* Schoo of Mechanica

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

People's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China

People's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China This artice was downoaded by: [Nationa Library of China] On: 30 December 2011, t: 18:19 Pubisher: Tayor & Francis Informa Ltd Registered in Engand and Waes Registered Number: 1072954 Registered office:

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

TIME of Flight (ToF) cameras are active range sensors

TIME of Flight (ToF) cameras are active range sensors 140 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 36, NO. 7, JULY 014 Stereo Time-of-Fight with Constructive Interference Victor Castañeda, Diana Mateus, and Nassir Navab Abstract

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

WHILE estimating the depth of a scene from a single image

WHILE estimating the depth of a scene from a single image JOURNAL OF L A T E X CLASS FILES, VOL. 4, NO. 8, AUGUST 05 Monocuar Depth Estimation using Muti-Scae Continuous CRFs as Sequentia Deep Networks Dan Xu, Student Member, IEEE, Eisa Ricci, Member, IEEE, Wani

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Human Action Recognition Using Key Points Displacement

Human Action Recognition Using Key Points Displacement Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

IMAGE DATA COMPRESSION

IMAGE DATA COMPRESSION Report Concerning Space Data System Standards IMAGE DATA COMPRESSION INFORMATIONAL REPORT CCSDS 120.1-G-1 GREEN BOOK June 2007 AUTHORITY Issue: Green Boo, Issue 1 Date: June 2007 Location: Washington,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Deformation-based interactive texture design using energy optimization

Deformation-based interactive texture design using energy optimization Visua Comput (2007) 23: 631 639 DOI 10.1007/s00371-007-0154-3 ORIGINAL ARTICLE Jianbing Shen Xiaogang Jin Xiaoyang Mao Jieqing Feng Deformation-based interactive texture design using energy optimization

More information