Hiding secrete data in compressed images using histogram analysis
|
|
- Samantha Morgan
- 6 years ago
- Views:
Transcription
1 University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University of Woongong in Dubai, farhadk@uow.edu.au Pubication Detais Keissarian, F. 2, 'iding secrete data in compressed images using histogram anaysis', The 2nd Internationa Conference on Computer and Automation Engineering (ICCAE), 2, IEEE, Piscataway, New Jersey, USA, pp Research Onine is the open access institutiona repository for the University of Woongong. For further information contact the UOW ibrary: research-pubs@uow.edu.au
2 iding Secrete Data in Compressed Images Using istogram Anaysis Farhad Keissarian University of Woongong in Dubai Abstract In this paper, we present a data hiding scheme that embeds the secret data into the compression codes of the host image. The compression codes are associated with the visua patterns appearing in image bocks and are computed through a histogram anaysis of residua bocks of the host image. The hiding capacity for each compressed bock is not fixed and varies with its bock type. Bocks with ow visua activity hide more data than those with high visua activity. Experimenta resuts confirm that the proposed technique can provide high data capacity within the compression fie with acceptabe image quaity of the stego-images. Keywords- data hiding; image compression; bock pattern; bock histogram. I. INTRODUCTION Protection of the transmitted data over the Internet from being intercepted or tampered with has become an increasingy important issue. There are two kinds of protection techniques, cryptography and data hiding. In the former technique, the secret data are encrypted by the sender to be transferred into a set of meaningess data. Ony the ega receiver has the means to decode the meaningess data. The data hiding techniques, on the other hand, embed the secret data into a digita media caed the cover image to become a stego-image. Because the stego-image is often imperceptibe, it arouses ess attention from the maicious attackers than data encryption []. Data hiding techniques have been roughy cassified into three categories: the spatia-domain manner, the frequencydomain manner and the compression-domain manner. For the spatia-domain manner, secret data are mixed directy into the distributed pixes. The east significant bit (SB) [2] is the genera approach to hide the secret information into the SBs of each pixe of a cover image directy owing to their ower distortion in image quaity. For the frequency domain manner, the cover image must first be transformed into frequency coefficients by using a frequency-oriented mechanism such as discrete waveet transformation (DWT) [3]. ater, the secret data are combined with the reative coefficients in the frequency-form image. For the compression-domain manner, the secret data are embedded into the compression codes. In recent years, compression codes generated by we-known image compressions such as vector quantization (VQ), bock truncation coding (BTC) and simiar methods have been used for data hiding to extend the variety of cover images. The method proposed in [4], appies side match vector quantization (SVQ) with the concept of prediction to propose an adaptive data hiding scheme. In addition to the VQ compression domain, Chuang et a [5] proposed a data embedding scheme based on BTC for gray scae images. In their scheme, they predefined a threshod to cassify the type of each BTC-encoded bock as smooth or compex. Subsequenty, they embedded the secret data into the bitmap of the smooth BTC-encoded bocks. In this paper, we deveop an image hiding scheme that can hide the secrete data into compression codes of the host image, generated by the image compression technique that we reported earier in [6]. The compression codes are associated with the visua patterns appearing in image bocks and are computed through a histogram anaysis of residua bocks of the host image. The rest of the paper is organized into four sections. The concept of the proposed compression agorithm is introduced in Section 2. In section 3, the proposed hiding scheme is presented. Experimenta resuts are given in Section 4. II. IAGE COPRESSION AGORIT In the proposed image compression agorithm in [6], an image is bock coded according to the type of individua bocks. A nove cassifier, which is designed based on the histogram anaysis of residua bocks, is empoyed to cassify the bocks according to their eve of visua activity. The cassifier paces each bock into one of the two categories of uniform or edge bock. A uniform bock is coded by the bock mean, whereas an edge bock is coded by a set of parameters associated with the pattern appearing inside the bock. ike the origina BTC agorithm [7], our method encodes an edge bock by initiay computing two gray vaues and constructing a bit-map. owever, in the proposed method the computation of the gray vaues, namey the ow and high representative intensities are carried out through anaysis of the bock residuas histogram. oreover, instead of transmitting the two gray vaues, their average and difference wi be sent to decoder. Finay, instead of transmitting the whoe bit-map for the processed edge bock, an optimum bit-pattern is seected from a set of pre-defined patterns, and its index wi be transmitted. The use of these parameters at the receiver reduces the cost of reconstruction significanty and expoits the efficiency of the proposed technique. A brief description of the bock cassifier and the coding scheme are given in the next two sub-sections. A. Bock Cassifier A nove histogram-based cassification scheme has been deveoped for cassifying the image bocks [6]. The method //$26. C 2 IEEE 492
3 operates based on the distribution of the bock residuas and cassifies bock either as a ow-detai (uniform) or as a highdetai (edge) bock. The cassifier empoys the bock residuas and cassifies the bock according to their histogram. The cassification is carried out through a peak detection method on the histogram. A brief description of the cassifier is as foows: Each bock of 4x4 pixes is converted into a residua bock by subtracting the sampe mean from the origina pixes. The residua sampes are ess correated than the origina sampes within a bock. ere, two of the most important oca characteristics of the image bock are considered: centra tendency, represented by the mean vaue and the dispersion of the bock sampes about the mean, which is represented by the residua vaues. The chaenge here is to anayze the dispersion of the residua vaues about the mean. One way of achieving this is to sort the histogram of the bock residua sampes. As the neighboring pixes in the origina bock are highy correated, the residua sampes wi tend to concentrate around zero. One can then quantize the residua sampes prior to forming the histogram. The histogram of the quantized residuas may then be formed and anayzed by simpy detecting its peaks. Based on the distribution of the residua sampes within the test images, we choose to appy a coarse quantization, in particuar a 5-eve non-uniform quantizer. We now define q j as the output of the quantizer with index j, as shown in Fig.. The histogram of the quantized vaues h ( q j ) may then be formed to provide the occurrence of q j. The quantized residua histogram (QR) is then anayzed by simpy detecting its peaks. According to the number of detected distinct peaks on the histogram, image bocks can be paced into two major categories of uniform and edge bocks. A histogram with a unique peak at its centre (unimoda histogram) identifies a uniform bock. Whereas, the existence of two distinct peaks impies that the processed bock is an edge bock. Fig. 2 and Fig. 3 show exampes of both types of bocks. A peak on the histogram indicates a high score of residua vaues; therefore it is fair to concude that there is a considerabe number of pixes that have the same dispersion about the bock mean. This, in turn wi ead us to concude that the gray eve vaues of these pixes are very cose to one another. ence, this group of pixes can be represented by a singe gray vaue. In this anaysis, a distinct peak on the QR of the processed bock represents a gray vaue j, given as : j = mean + q j () (e) (e) Figure 2. (a) Origina uniform bock; sampe mean = 8, (b) Residuas (c) quantized residuas, (d) quantizer s indexes, (e) bock QR Where mean is the bock mean. For a uniform bock, since the singe peak occurs at the center of the histogram, where q j =, then from Eq. the representative intensity j wi be the same as the bock mean. For an edge bock, the two peaks of the QR, which are positioned on the eft and right hand side of the centre (j=) represent the ow representative intensity and the high representative intensity, respectivey. If the two peaks are positioned at indexes j and j, the two representative intensities are cacuated as: = mean + q j In Fig. 3, using Eq. 2 ; 53. mean = 25, and = mean + q j (2) and = 25 + (-39) = 86 and (a) are computed = = (b) Figure. The quantizer output with index j (c) (d) 493
4 (e) Figure 3. (a) Origina edge bock: sampe mean = 25 (b) Residuas (c) quantized residuas, (d) quantizer s indexes, (e) QR B. Coding of Image Bocks Once the image bocks have been cassified, the coder, switches between a one-eve (uniform bock) and a bieve(edge bock) representation. A uniform bock is encoded by transmitting the bock mean pus an indicator to inform the decoder that the bock is uniform. By forciby custering a pixes in an edge bock into two groups, a bi-eve approximation of the bock is obtained. The custering partitions a bock W into two sets of pixes, W andw, such that W = W W and W W = Φ. The custering is carried out by marking the pixes of set W and W by and, respectivey. Thus the custering can be represented as a bit-pattern, B = { b, b 2,... b 6 bi (,)}. By seecting the bock mean as a threshod, the bit-pattern can be generated as : if x > i mean b = (3) i if x i mean where, xi W are the intensities of the pixes of the edge bock. It is noted that, and are the representative intensities of the set W and W, respectivey. Figure. 4: Set of 32 pre-defined patterns. ike the origina BTC, an edge bock can be coded by transmitting the representative intensities and the bit-pattern. owever, in our method, we transmit the average, and difference, of the representative intensities, defined by : + = 2 = (4) 2 The vaues and represent the ow and high frequency components, respectivey. It is evident fro eq.3 that = + and =. During the reconstruction, the coded bock can be constructed by : + if b W i b = (5) i if b W i It shoud be noted that for a uniform bock, since both representative intensities are the same as the bock mean, therefore, = mean and =. Instead of transmitting the whoe bit-pattern of an edge bock, further bit reduction can be achieved by finding the best match for the bock bit pattern from a set of pre-defined patterns, P k, k =,,2,, N. A set of 32 patterns shown in Fig. 4, which preserve the ocation and poarity of edges in four major directions and their compements making N=64 is used in our method. The pattern matching stage is carried out by performing a ogica excusive NOR operation on the bock bit-pattern and each pattern from the set to cacuate a matching score, ms, given as : = 3 = 3 ms ( P b ) i j ij ij (6) The pattern with the highest ms is seected and its index k wi be transmitted. Since, the proposed method sends k 64 instead of the whoe bock bit-pattern, ony og 2 = 6 bits are transmitted. Each image bock is therefore encoded by generating a tripe (,, k). It shoud be aso noted that, since for a uniform bock, no pattern index is transmitted, therefore the compressed code for such a bock is the pair (, ), where =. The vaue in the tripe (,, k), can be coded by 8 bits, whereas coding requires ony 6 bits, as its standard deviation is smaer than that of and. Therefore, the compression code of an edge bock requires 2=(8+6+6) bits to be transmitted. For a uniform bock, the number of bits required to code the pair (,) is 9=8+. III. PROPOSED DATA IDING SCEE The proposed hiding scheme embeds the secret data into the compression codes of the host image, generated by the proposed compression agorithm, described in the previous 494
5 section. The secret data is a random bit stream of and. For the sake of data security, secrete data shoud be encrypted by a secrete key before being embedded. After embedding secrete data into the compression codes, one can use the decompression procedure to obtain the stego-image. The data embedding and data extraction phases are described in the foowing sub-sections. A. Data Embedding Phase In this phase, the encoder receives the secret bits to hide them in the compression codes of uniform and edge bocks. The hiding capacity for each compressed bock is not fixed and varies with its bock type. For a uniform bock, and the bit-pattern of the bock are used for data embedding. Whereas, an edge bocks uses and for hiding the secrete bits. Since, the pixe intensities in uniform bocks are cose to their neighboring pixes, even though the bits in their bitpatterns are changed, the reconstructed pixe vaue is sti cose to its origina one. ence, a the bits in the bit-pattern can be repaced by secret bits. In the proposed compression agorithm, no bit-pattern or pattern index is transmitted whie coding a uniform bock. This significanty contributes to a high compression ratio. owever, in the proposed data hiding method, the compression code of a uniform bock is enhanced to incude the bock bit-pattern. The enhanced compression code of a uniform bock is then the tripe (,, B), where B is the bitpattern of the bock. This resuts in significanty enarging the hiding capacity at the cost of ower compression ratio. Athough, the bit-pattern is transmitted for a uniform bock, but the reconstruction is sti carried out by repacing a the eements of the bit-pattern by the bock mean. Therefore, the quaity of the reconstructed uniform bock wi be the same, if the bit-pattern is not transmitted. In the proposed method, a uniform bock has the capacity of embedding sixteen bits into its bit-pattern and two bits in its vaue. To further enarge the hiding capacity of the host image whie retaining good image quaity, the proposed scheme aso hides two extra bits in each of and vaues of an edge bock. The modification of and for embedding the secrete bits is as foows. The encoder receives two secrete bits and then transform these two bits into a secret decima digit sd. Next, the encoder uses the and vaues to compute F given as : F = mod 5 F = mod 5 (8) et sd and sd denote the secret digits to be hidden in and, respectivey. The modified vaues and are then computed as : = + ( sd F ) = + ( sd F ) (9) From Eq. 9, it is evident that no modification is needed if a secrete digit is equa to the cacuated vaue F. The embedding phase of the proposed method foows the steps isted beow : Step : Obtain the tripe compression code for the processed bock. If the bock is uniform, go to step3, otherwise go to step 2. Step 2: Embed 2 bits in to get and 2 bits in to get. Transmit the tripe (,, k). Go to step 4 Step 3: Embed 2 bits in to get, and 6 bits in B to get B. Transmit the tripe (,, B ). Go to step 4. Step 4: Repeat step, unti the entire bit stream is embedded. Step5 : Decrypt the extracted information to obtain the origina secrete data B. Extraction Phase The data extraction phase is simiar to the data embedding phase. The decoder receives the tripe code for each bock. If the bock is uniform, 2 bits are retrieved from and 6 bits from the transmitted bit-pattern B. On the other hand, if the received code is for an edge bock, 2 bits are extracted from and another 2 bits are extracted from. The secret digit sd can be extracted by computing sd = mod 5 and sd = mod 5. The data extracting process is repeatedy executed unti a the secret bits are retrieved. The extracting phase of the proposed method foows the steps isted beow : Step : Obtain the tripe compressed code for the bock. Go to step 2. Step 2: If =, the tripe is (,, B ). Extract 2 bits from and 6 bits from B, and go to step 4, otherwise go to step 3. Step 3: The tripe is (,, k) Extract 2 bits from and 2 bits from. Go to step 4 Step 4 : Repeat step, unti a the secret bits are retrieved. IV. SIUATION RESUTS We have evauated the performance of the proposed coding scheme through a computer simuation on two grayeve images ena and Pepper, shown in Fig.5a and Fig. 6a. These images are 8 bits per pixe and 52 x 52 pixes in size. The simuation patform is icrosoft Windows P, Pentium III, and the proposed scheme is impemented using atab. Three performance matrices are used to measure the performance of the proposed compression and hiding schemes : iding capacity (CE), compression ratio (bpp), and image quaity (PSNR). Tabes and 2 show the compression resuts, the hiding capacity, C and the image quaity (PSNR) for the cover images ena and Pepper. TABE I Image P(u) CR (bpp) TC (Kbyte) C (Kbyte) PSNR (db) ena 63% Pepper 72% P(u): Popuation of uniform bocks 495
6 CR : Compression Ratio, TC: Transmitted Code C : iding Capacity From Tabe I, it can be observed that more than haf of the transmitted code is used to embed data, yet keeping a satisfactory image quaity. To further investigate the performance of the proposed scheme, we compare the stegoimage quaity and the hiding capacity of the proposed scheme with Chuang et a. s scheme for a threshod of T=5. The resuts are shown in Tabe II. From Tabe II, we observe that the proposed method outperforms Chuang et a. s scheme in the hiding capacity by 5%, with a very itte distortion in the quaity. TABE II Image ethod PSNR (db) iding Capacity (Kbyte) ena Chuang et a Proposed Pepper Chuang et a Proposed Compression Ratio (bpp) From Tabe II, we observe that the proposed method outperforms Chuang et a. s scheme in the hiding capacity by 5%, with a very itte distortion in the quaity. Since the REFERENCES [] uuu Petitcoas, F.A.P., Anderson, R.J., and Kuhn,.G.: Information hiding a survey, Proc. IEEE, 999, vo. 87, (7), pp [2] J. CK. Chan and. Cheng, iding data in images by simpe SB Substitution, Pattern Recog., vo. 37(3), pp , 24 [3] P. Bao and. a, Image adaptive watermarking using waveet domain singuar vaue decomposition, IEEE Trans. Circuits Syst. Video Techno., 25, vo. 5, (), pp [4] SC. Shie, SD. in and C. Fang, Adaptive data hiding based on SVQ prediction, IEICE Trans Inform Syst., vo. E89-D(), pp [5] JC. Chuang and CC. Chang, Using a simpe and fast image compression agorithm to hide secret information. Internationa Journa of Computes and Appications, vo.28 (4), pp , 26 compression agorithm described in section II, does not transmit the bit-pattern of a uniform bock B, we aso considered hiding data into the compression code of a uniform bock without transmitting the bock bit-pattern, B. As mentioned earier, since a uniform bock is reconstructed by repacing a the bock pixes by the bock mean, the quaity of reconstructed bock wi be the same in either cases. Tabe 3 shows the resuts for this case. TABE III Image P(u) CR TC C PSNR (bpp) (Kbyte) (Kbyte) (db) ena 63% Pepper 72% By comparing the resuts in Tabe I and Tabe II, we note that non-transmission of bit-patterns of uniform bocks resuts in doubing the compression ratio, at the cost of dramatic reduction of hiding capacity by 8%. Depending on the amount of secrete data, one can seect the suitabe method. Fig. 5 and Fig. 6 show the origina test images and the compressed stego-images for both cases. [6] F Keissarian, Nove quad-tree predictive image coding technique using pattern-based cassification, Proc. SPIE, Visua Communications and Image Processing (VCIP-23), vo. 55, pp , June 23, ugano, Switzerand. [7] E.J. Dep and O.R. itche, Image compression using bock truncation coding, IEEE Trans. Commun., vo. 27, pp , 979. (a) (b) (c) (a) (b) (c) Figure 5. The compression and embedding resuts for the Image of ena : a) Origina image, b) Compressed stego-image: C=26.76 Kb, at.46 bpp, c) Compressed stego-image: C=5.5 Kb, at.8 bpp. Figure 6. The compression and embedding resuts for the Image of Pepper : a) Origina image, b) Compressed stego-image: C=28.6 Kb, at.48 bpp, c) Compressed stego-image: C=5. Kb, at.75 bpp. 496
A new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationDigital Image Watermarking Algorithm Based on Fast Curvelet Transform
J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet
More informationFuzzy Perceptual Watermarking For Ownership Verification
Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationTHE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM
17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationResearch on UAV Fixed Area Inspection based on Image Reconstruction
Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,
More informationEndoscopic Motion Compensation of High Speed Videoendoscopy
Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationApplication of Image Fusion Techniques on Medical Images
Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion
More informationJOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM
JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationLossless Authentication Watermarking Based on Adaptive Modular Arithmetic
5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationA Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.
A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationSearching, Sorting & Analysis
Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationQuality Assessment using Tone Mapping Algorithm
Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,
More informationA VLSI Architecture of JPEG2000 Encoder
A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationArithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University
Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationCLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING
CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationQuality Assessment for Stereoscopic Images by Distortion Separation
JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 14 37 Quaity Assessment for Stereoscopic Images by Distortion Separation Chaozheng Hu, Feng Shao*, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng Facuty of Information
More informationAUTOMATIC gender classification based on facial images
SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationFiltering. Yao Wang Polytechnic University, Brooklyn, NY 11201
Spatia Domain Linear Fitering Yao Wang Poytechnic University Brookyn NY With contribution rom Zhu Liu Onur Gueryuz and Gonzaez/Woods Digita Image Processing ed Introduction Outine Noise remova using ow-pass
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationFREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES
FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent
More informationCollaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks
Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam
More informationA HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM
Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION
More informationPublished in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003
Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More informationA Top-to-Bottom View: Energy Analysis for Mobile Application Source Code
A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationRelative Positioning from Model Indexing
Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationUniversity of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP
Anantrasirichai, N., & Canagarajah, C. N. (2010). Spatiotempora superresoution for ow bitrate H.264 video. In IEEE Internationa Conference on Image Processing. (pp. 2809-2812). 10.1109/ICIP.2010.5651088
More informationBEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0
BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationComplex Human Activity Searching in a Video Employing Negative Space Analysis
Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationMultiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform
Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of
More informationRegister Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x
Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega
ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern
More informationAbsolute three-dimensional shape measurement with two-frequency square binary patterns
871 Vo. 56, No. 31 / November 1 217 / Appied Optics Research Artice Absoute three-dimensiona shape measurement with two-frequency square binary patterns CHUFAN JIANG AND SONG ZHANG* Schoo of Mechanica
More informationFACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn
FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,
More informationSubgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis
499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association
More informationPeople's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China
This artice was downoaded by: [Nationa Library of China] On: 30 December 2011, t: 18:19 Pubisher: Tayor & Francis Informa Ltd Registered in Engand and Waes Registered Number: 1072954 Registered office:
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationCrossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters
Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:
More informationSample of a training manual for a software tool
Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.
More informationTIME of Flight (ToF) cameras are active range sensors
140 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 36, NO. 7, JULY 014 Stereo Time-of-Fight with Constructive Interference Victor Castañeda, Diana Mateus, and Nassir Navab Abstract
More informationModelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationWHILE estimating the depth of a scene from a single image
JOURNAL OF L A T E X CLASS FILES, VOL. 4, NO. 8, AUGUST 05 Monocuar Depth Estimation using Muti-Scae Continuous CRFs as Sequentia Deep Networks Dan Xu, Student Member, IEEE, Eisa Ricci, Member, IEEE, Wani
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationThe Classification of Stored Grain Pests based on Convolutional Neural Network
2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo
More informationDevelopment of a hybrid K-means-expectation maximization clustering algorithm
Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,
More informationCollinearity and Coplanarity Constraints for Structure from Motion
Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department
More informationIMAGE DATA COMPRESSION
Report Concerning Space Data System Standards IMAGE DATA COMPRESSION INFORMATIONAL REPORT CCSDS 120.1-G-1 GREEN BOOK June 2007 AUTHORITY Issue: Green Boo, Issue 1 Date: June 2007 Location: Washington,
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More information1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation
1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation
More informationDeformation-based interactive texture design using energy optimization
Visua Comput (2007) 23: 631 639 DOI 10.1007/s00371-007-0154-3 ORIGINAL ARTICLE Jianbing Shen Xiaogang Jin Xiaoyang Mao Jieqing Feng Deformation-based interactive texture design using energy optimization
More information