Adaptation of Rigid Registration Algorithm to the Fingerprints Identification
|
|
- Annis Barton
- 5 years ago
- Views:
Transcription
1 Amerian Journal of Software Engineering and Appliations 205; 4(6): 07-4 Published online Otober 8, 205 ( doi: 0.648/j.ajsea ISSN: (Print); ISSN: X (Online) Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation Mostafa Boutahri *, Samir Zeriouh, Said El Yamani, Abdenbi Bouzid, Ahmed Roukhe Optroni and Information reatment eam, Atomi, Mehanial, Photoni and Energy Laboratory, Faulty of Siene, Moulay Ismail University, Zitoune, Meknès, Moroo address: (M. Boutahri) o ite this artile: Mostafa Boutahri, Samir Zeriouh, Said El Yamani, Abdenbi Bouzid, Ahmed Roukhe. Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation. Amerian Journal of Software Engineering and Appliations. Vol. 4, No. 6, 205, pp doi: 0.648/j.ajsea Abstrat: In this paper, we present an automated system for the reognition and identifiation of fingerprints based on rigid registration algorithms. Indeed, after preproessing arried on a fingerprint database olleted in the laboratory, we have built maps of minutiae for eah fingerprint. Subsequently, we applied a rigid registration algorithm based on iterative searh for losed points ICP (Iterative Closest Point), whih allowed us to ompare shifted fingerprints serving as test with the fingerprints of the referene database. his omparison gives onvining results and shows high auray. Keywords: Reognition, Identifiation, Fingerprints, Rigid Registration, Minutiae, ICP. Introdution Nowadays, authentiation beomes one of the essential points at the seurity aess ontrols in informatis systems. It is based on the reognition that verifies the presumed user identities []. he identifiation is generally based on several riteria and aording to the extent of the investigation. It may be an identifiation by DNA searh, by using images from surveillane ameras, for removal of odors and sents or most often by use of fingerprints [2]. his proess remains in our day, the most reliable and most ost espeially that the polie have fingerprint database of all itizens holder a national identity ard. he important progress experiened by the fingerprint verifiation area in reent years have required new image proessing tools, espeially for multimodal image (from different soures). he registration algorithms are part of these tools. here are many, both within the rigid or non-rigid registration. However, these algorithms are diffiult to validate in the absene of a referene standard for verifying the fields obtained. In this ontext, our work proposes adapting rigid registration algorithm variants, allowing a more effetive omparison. Indeed, after sanning fingerprints, objet of study, we onduted a binarization and thinning of fingerprints to finally build the maps orresponding to eah minutiae fingerprint. Subsequently, we established a mathematial modeling of the registration problem to fit these data based on iterative method ICP. he simulation results obtained after several tests resulted in the reognition of fingerprint test in a referene database with largely optimized errors. 2. Extration of Fingerprint's Biometri - Signature o build our database, we proeeded to the taking of fingerprints on different people; these fingerprint images were enhaned by a pretreatment proess to extrat the orresponding signature to eah fingerprint. hus, these signatures are stored in a referene database. 2.. Preproessing of Captured Fingerprints In this step, we proeeded the aquisition of fingerprints of different people with a sanner of type Ko-UF dpi, performed in our laboratory. he resulting images are hene stored as graysale with the appropriate format. However these images often present a noise during the aquisition phase that require a adapted filtering, whih the goal is to strengthen the ontrast by eliminating redundant points [3]. hen, these images are binarized by thresholding proess
2 08 Mostafa Boutahri et al.: Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation that assoiates the number 0 to the pixel if its value is below a predetermined threshold value and the number if the pixel value is equal to or greater than this threshold value. his last, varies aording to the quality of the aptured image and was therefore set to a gray level equal to 60. o failitate its exploitation, the image must undergo a thinning treatment that onsist to obtain a shemati image of the fingerprint, in whih all the lines have the thikness of a pixel [4] [5]. he simulation results was arried out using Matlab software-r204a (Figure. ) Extration of Minutiae o extrat the fingerprint minutiae (bifurations and endings), the alulation method used allows to detet them aording to the neighborhood of eah pixel following the ontinuity or disontinuity of the different lines [6] [7]. One this step is ompleted, false minutiae are eliminated from the piture for finally have a two-dimensional minutiae map, ontaining the two values 0 or (where indiates the presene of the minutiae and 0 his absene) [8]. (Figure 2) Figure. Fingerprint pretreatment proess. Figure 2. Proess of minutiae extration Data validation he biometri signatures obtained are stored in a referene database. During the identifiation and authentiation phase, a biometri signature is extrated from the fingerprint, objet of reognition, and is ompared to the signatures of the referene database using the iterative algorithm of fingerprints rigid registration. 3. Registration of Fingerprints Images by ICP he ICP algorithm applied on fingerprints is based on the iterative mathing of minutiae of a test fingerprint with their nearest neighbors on the next referene fingerprint.
3 Amerian Journal of Software Engineering and Appliations 205; 4(6): Meanwhile, a least squares tehnique is used to estimate the transformation from these orrespondenes. Indeed, at the end of eah iteration, the algorithm provides a list of mathed points, and an estimate of the registration transformation, this transformation is used in the next iteration for updating the list of mathed points. hey used their towers to alulate a new estimate of the transformation. hese steps are repeated until onvergene of the algorithm. 3.. Modeling of the Problem he registration problem an be laid more formally by introduing the different notations used throughout this work and desribing the general priniple of the registration proedure (figure 3). Figure 3. he priniple of registration proess. Given two fingerprint images (wo maps of minutiae): { q/ i : N i q} { / j : N } Q= = ; he soure image to register; P= p = ; he referene Image. j p We onsider the rigid registration of a soure image Q: Ω R to a target image P: Ω R S C he domains subsets of 2 R. Ω and S Ω of the two images Q and Pare 3.2. ICP Algorithm Applied to the Fingerprints he proposed registration method is an iterative method ICP, whih takes as input two point louds of two-dimensional, and outputs an optimal estimate of the transformation between the two sets. herefore, the purpose of this algorithm is to find the parameters of the transformation (rotation and translation) whih aligns a test fingerprint Q to another as referenep. he ost funtion used is given by: 2 N C min = + Rt,,j i= q ( Rq t i ) p j ( R) RR. = R. R= I2 det = j= : Np With R and t are the parameters of the transformation (rotation and translation respetively). he ICP algorithm reahes its speed and preision performane by iterating the following two steps:. First, we establish the orrespondenes linking the two sets of points: C () i = arg min ( i ) k k k j= : Np 2 R q + t p i= : N j q 2. hen, we alulate the new rotation and translation minimizing the least square riterion: N 2 = + k R, t i= q ( R, ) arg min k k Rq t p i () i Note that at eah iteration, ICP method uses the results obtained at the last iteration to yield a better result. hat is until the result onverges or that we have exeeded the maximum number of iterations alloated to the algorithm[9] Mathing Step In first step of the algorithm, the mathing is done by a simple algorithm to searh neighborhood, whih onsist to pass on all the points Np of P and to see if it s nearer or not that one of the already seleted lose neighbors, and if so, insert it. We then obtain a linear alulation time in the size of P. his method is alled linear searh or sequential searh. However, this method suffers from a problem of slowness if the set P is too large, then it is extremely expensive to test Np points in spae. Fortunately, in our ase of fingerprints, the number of mathing minutiae points does not exeed a few
4 0 Mostafa Boutahri et al.: Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation dozen. his searh algorithm will be used as referene to ompare other algorithms that use more omplex data storage strutures like Delaunay triangulation Matlab [0][], Kd-tree [2], et Delaunay triangulation invented by the Russian mathematiian Boris Delaunay in 934. his triangulation is applied for eah of the two sets (soure and target), then they are merged afterwards. he Kd-ree introdued in 975, the priniple is to try to plae eah point of the soure image in the tree, and up until one gets to the root of the tree while searhing losest neighbors. Still in the same step, looking for the nearest point is an important part if you want to get a method, whih is robust as well as effiient. his is why the detetion of the existene of aberrant points (outliers) is signifiant. he existene of outliers in point sets to math is very detrimental to our algorithm beause when we seek the transformation between the two sets, we assume that we have the same loud of points at different positions, assumption that's violated in presene of outliers. o solve the problem of outliers, we sort in asending order all pairings by omparing the distanes between paired points. hen we selet the n = r * n first pairings with r is a r parameter alled overlay oeffiient inluding in the interval r, r, and obtained by minimizing the funtion: [ ] min max Suh as ψ () r q e(r) = ; (See figure 4) + r λ nr k+ () ( d i ) e r 2 k =, d + = Rq + t p i k i k () i k+ n r i= λ= 2, and typially ( r min = 0.4 and r = ) max approah of the ICP method without outliers. he other points are dismissed as outliers ransformation Update In the seond step of the algorithm, the used approah is that of the singular value deomposition (SVD) applied in 2D. he idea is this:. Calulate the enter of mass p and q of the two point louds{ p i } and{ q i } : nr P = p and Q i n r i= nr 2. Construt the ovariane matries: = qi ( i=... n) r n r i= { i } { i} { i } { i} ( i =... n r) P = p p = p and Q = q q = q ' ' ' ' 3. Calulate the matrix 2*2 K R suh as ' ' ( 2* nr P, Q R ) ' ' K= PQ. 4. Write the matrix K as K= USV.., this deomposition is done by the SVD funtion predefined in Matlab by writing [ U. S. V ] = SVD ( K ) where U and V are orthogonal matries of orders 2 and S a diagonal matrix of size 2 * 2 whose diagonal ontains the singular values of K. 5. he parameters of the transformation are dedued by: ( ). ( ) R= UV. Rotation = p Rq ranslation Note that if det( R ) < 0 R= V* B* U where 0 B= 0 det( V.U) 3.3. Evaluation of the Method on Real Data of Fingerprints (Golden Setion Method) [3] Figure 4. Golden Setion Method. hese pairings will be those that we will use to estimate the transformation between the two louds following the We tested our approah by taking an inorporated referene database of 20 fingerprints taken from different people and another database for test ontaining 0 fingerprints, whih six are taken from people already on the database with different positions of those arried out beforehand, whereas the remaining four are removed from people not inluded in database. (Figure 5) Preproessing stage: For simpliity, we limit ourselves to suh minutiae endings. After pretreatment and extration of minutiae, we learly observe the presene of outliers, this is where the parameter r is automatially updated with eah iteration. he figure 6 shows two samples of fingerprint images taken from the referene and test database respetively and
5 Amerian Journal of Software Engineering and Appliations 205; 4(6): 07-4 this, before and after the preproessing stage. Figure 5. (a) Referene database; (b) est database. Fig. 7. Extration of the two point louds without outliers. Putative point mathes Fig. 6. wo samples of fingerprints taken from referene and test database respetively. (a) Before pretreatment; (b) After pretreatment. Alignment step of fingerprint images: his stage inludes the mathing based on the naive method of searhing the nearest neighbor ited in (3.2.), then an intermediate step is to rejet false omparison points (outliers) to reah finally the alulation of the new transformation (rotation and translation) minimizing the ost funtion. (Figures 7, 8, 9 and 0) Fig. 8. Appariements between the two point sets of extrated minutiae. 4. Results and Disussions he onfrontation results of the test fingerprints (Fi /i=, 2 0) to those of the referene (FRj 2 /j=,2 20) by the studied method are provided in the following table (able ). Fi: est fingerprint number i where i=(,2,,0); 2 FRj: Referene fingerprint number j where j=(,2,,20).
6 2 Mostafa Boutahri et al.: Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation Before registration Registration by brutefore Fig. 9. Fingerprint images before and after registration by ICP. Fig. 0. Visualization of the two point louds before and after registration by ICP. able. Least squares error between the set of minutiae in the test and referene database. F F2 F3 F4 F5 F6 F7 F8 F9 F0 FR.84e2 2.24e e2 3.50e2 3.00e3 2.0e2 2.43e2.726e e 7.02e2 FR e2 7.27e.235e2 0.27e3 4.23e e 3.25e3 3.5e2 4.2e3 3.20e3 FR3 7.20e 4.378e2 0.70e 5.43e e2.628e e 2.720e e 5.200e FR e2.435e3.804e2.780e e.443e2.376e e e e2 FR5.405e e2.403e e 0.5e2 7.67e 3.450e e2.24e e3
7 Amerian Journal of Software Engineering and Appliations 205; 4(6): F F2 F3 F4 F5 F6 F7 F8 F9 F0 FR e2.023e e-4.073e2 5.0e e e4 8.25e2 7.25e e4 FR7.035e e 9.072e e 3.72e 6.420e 5.2e e 6.034e e2 FR8 2.72e 0.860e e e e0.03e3.750e e3 3.72e e2 FR e3.075e e 0.089e e2.92e 3.79e e e.067e3 FR0.750e e e e2 3.02e e e2 0.60e e3 3.77e2 FR 2.300e2.924e.043e2 2.03e e.204e3.072e2.083e e2 4.50e3 FR2.942e 5.872e e 9.325e.00e4 6.2e2 3.06e 5.642e.642e e2 FR e2.07e e e2 8.4e2 5.7e 7.94e2 3.44e2 9.00e2 3.0e3 FR4.77e e2.487e3.622e 2.80e2.092e2.037e e3.847e e2 FR e2.380e-3.253e3 4.28e2.276e3.380e3.253e e3 8.43e e2 FR e 8.64e e3.322e.097e2 7.3e e e e e2 FR e e 5.30e 4.623e 3.654e-2.045e2 5.30e3 0.5e3 3.0e e2 FR e 0.809e e e e 5.9e e2 3.09e2 7.26e2 7.00e FR e e 4.750e e e2 7.04e2 4.72e2 4.32e 5.327e e2 FR e 4.273e 8.30e 6.2e2 4.60e2.323e e2 0.60e3.972e.40e3 hese results demonstrate that people whose fingerprints F, F6 and F0 are not listed on the referene database beause the value of the Least squares error is in the range of 0 to 0 4. As to persons whose fingerprints F2, F4, F7, F8 and F9, they are identified in the referene database and orrespond to people whose fingerprints are respetively FR5, FR9, FR7, FR9 and FR6. Indeed, the errors stored vary in the range of 0-2 to 0-4. Still based on the table, we note that the fingerprint F3 orresponds well to the referene fingerprints FR6 and FR3 with respetive errors 6, and 2, his demonstrate that the fingerprints FR6 and FR3 are taken from the same person. Similarly for the test fingerprint F5 that mathes the person suffering the two prelevements FR2 and FR7 with respetive errors in the range of 0-2 to Conlusion hus, the work proposed in this paper is based on a purely geometri approah by implementing a system of identifiation or verifiation by rigid registration of fingerprints, with the main objetives proessing speed and eliminating subjetivity based in partiular on mathematial riteria to evaluate the results, this approah inludes a hain of operations ranging from preproessing fingerprints to rigid registration and based on the minutiae extrated. Indeed, we have hosen the minutiae type terminations as information to onsider for guiding the registration. hen, after formalization of the general problem of registration, a registration method by ICP algorithm was proposed. At the rate of its sensitivity to noise and outliers, this algorithm has been improved by the introdution of a parameter, whih ats on the seletion of pairings. he latter are used to estimate the transformation between the two fingerprint images following the approah of the ICP method without outliers. he results thus obtained in our study are ompelling and indiate the effetiveness of the method in the field of identifiation of persons based on their fingerprints. Referenes [] Lorène, La biométrie multimodale: stratégies de fusion de sores et mesures de dépendane virtuelle. hèse de dotorat de Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki, "Detetion of Masses in Digital Mammogram Using Seond Order Statistis and Artifiial Neural Network", International Journal of Computer Siene & Information ehnology (IJCSI), Vol 3, No 3, pp June 20. [2] Morizet, Reonnaissane biométrique par fusion multimodale du visage et de l iris, hèse de dotorat éléom [3] Doublet, Revenu, Olivier, Reonnaissane biométrique sans ontat de la main intégrant des informations de forme et de texture, Frane eleom [4] Salil Prabhakar, Anil K. Jain, Learning Fingerprint Minutiae Loation and ype, International Conferene on Pattern Reognition (ICPR), [5] Chaohong, Advaned feature algorithms for automati fingerprint reognition system, University of New Yorkatbuffalo [6] A. Chaari, S. Lelandais, M. B. Ahmed, Fae lassifiation sheme simplifying identifiation in biometri databases, ransations on Systems, Signals & Devies (SSD), Shaker-Verlag, sous presse, [7] LIU L., JIANG., YANG J., and al., Fingerprint Registration by Maximization of Mutual Information, IEEE ransations on image proessing,5(5), 00-0, [8] M. Boutahri, S. El Yamani, S. Zeriouh, A. Bouzid and A. Roukhe, Fingerprint Identifiation by Artifiial Neural Network, Journal of Physial Siene and Appliation (David publishing), pp Jun 204. [9] D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Reognition Springer, New York, [0] E. M.Gross, D. Wagner, KD trees and Delaunay-based linear interpolation for funtion learning: a omparison to neural networks with error bakpropagation, pp Nov 996.
8 4 Mostafa Boutahri et al.: Adaptation of Rigid Registration Algorithm to the Fingerprints Identifiation [] Barber, C. B., Dobkin, D. P., Huhdanpaa, H., he quikhull algorithm for onvexhulls. ACM rans. Math. Software 22 (4), , 996. [3] D. Chetverikov, D. Stepanov, P. Krsek, Robust Eulidean alignment of 3D point sets: the trimmed iterative losest point algorithm, Vol 23, Number 3, pp , Marh [2] Nuhter, A., Lingemann, K., Hertzberg, J., Cahed k d tree searh for ICP algorithms. In: Pro. Sixth Internat. Conf. on 3-D Digital Imaging and Modeling(3DIM), pp , 2007.
Capturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationSelf-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization
Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationPlot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar
Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationTUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM
TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationASSESSMENT OF TWO CHEAP CLOSE-RANGE FEATURE EXTRACTION SYSTEMS
ASSESSMENT OF TWO CHEAP CLOSE-RANGE FEATURE EXTRACTION SYSTEMS Ahmed Elaksher a, Mohammed Elghazali b, Ashraf Sayed b, and Yasser Elmanadilli b a Shool of Civil Engineering, Purdue University, West Lafayette,
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationRotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors
Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationSimulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects
Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationPARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu
20th European Signal Proessing Conferene EUSIPCO 2012) Buharest, Romania, August 27-31, 2012 PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING Yesheng Gao, Kaizhi Wang,
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationFace and Facial Feature Tracking for Natural Human-Computer Interface
Fae and Faial Feature Traking for Natural Human-Computer Interfae Vladimir Vezhnevets Graphis & Media Laboratory, Dept. of Applied Mathematis and Computer Siene of Mosow State University Mosow, Russia
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationAn Automatic Laser Scanning System for Accurate 3D Reconstruction of Indoor Scenes
An Automati Laser Sanning System for Aurate 3D Reonstrution of Indoor Senes Danrong Li, Honglong Zhang, and Zhan Song Shenzhen Institutes of Advaned Tehnology Chinese Aademy of Sienes Shenzhen, Guangdong
More informationTransition Detection Using Hilbert Transform and Texture Features
Amerian Journal of Signal Proessing 1, (): 35-4 DOI: 1.593/.asp.1.6 Transition Detetion Using Hilbert Transform and Texture Features G. G. Lashmi Priya *, S. Domni Department of Computer Appliations, National
More informationModel Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology
The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationSequential Incremental-Value Auctions
Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationASL Recognition Based on a Coupling Between HMMs and 3D Motion Analysis
An earlier version of this paper appeared in the proeedings of the International Conferene on Computer Vision, pp. 33 3, Mumbai, India, January 4 7, 18 ASL Reognition Based on a Coupling Between HMMs and
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationBiometrics Modalities Introduction (2)
Biometris Modalities Introdution ( Why Fingerprints? Empirial Evidene Established Siene? Used in forensis to establish individual identity for over a entury Sotland Yard 1900; FBI 194 High Universality
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationSpace- and Time-Efficient BDD Construction via Working Set Control
Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.
More informationWeak Dependence on Initialization in Mixture of Linear Regressions
Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationRelevance for Computer Vision
The Geometry of ROC Spae: Understanding Mahine Learning Metris through ROC Isometris, by Peter A. Flah International Conferene on Mahine Learning (ICML-23) http://www.s.bris.a.uk/publiations/papers/74.pdf
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationChromaticity-matched Superimposition of Foreground Objects in Different Environments
FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationDynamic System Identification and Validation of a Quadrotor UAV
Dynami System Identifiation and Validation of a Quadrotor UAV Min Goo Yoo PG Student, Department of Aerospae Engineering, Sejong University, Seoul, Republi of Korea E-mail: mingooyoo@gmailom Sung Kyung
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationThis fact makes it difficult to evaluate the cost function to be minimized
RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationTorpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control
orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial
More informationDubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud
Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationarxiv: v1 [cs.gr] 10 Apr 2015
REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,
More informationPolyhedron Volume-Ratio-based Classification for Image Recognition
Polyhedron Volume-Ratio-based Classifiation for Image Reognition Qingxiang Feng, Jeng-Shyang Pan, Senior Member, IEEE, Jar-Ferr Yang, Fellow, IEEE and Yang-ing Chou Abstrat In this paper, a novel method,
More informationA Dictionary based Efficient Text Compression Technique using Replacement Strategy
A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationA Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction
A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This
More informationSemantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management
Semanti Conept Detetion Using Weighted Disretization Multiple Correspondene Analysis for Disaster Information Management Samira Pouyanfar and Shu-Ching Chen Shool of Computing and Information Sienes Florida
More informationSupplementary Material: Geometric Calibration of Micro-Lens-Based Light-Field Cameras using Line Features
Supplementary Material: Geometri Calibration of Miro-Lens-Based Light-Field Cameras using Line Features Yunsu Bok, Hae-Gon Jeon and In So Kweon KAIST, Korea As the supplementary material, we provide detailed
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationShape Outlier Detection Using Pose Preserving Dynamic Shape Models
Shape Outlier Detetion Using Pose Preserving Dynami Shape Models Chan-Su Lee Ahmed Elgammal Department of Computer Siene, Rutgers University, Pisataway, NJ 8854 USA CHANSU@CS.RUTGERS.EDU ELGAMMAL@CS.RUTGERS.EDU
More informationEvolutionary Feature Synthesis for Image Databases
Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,
More informationDetecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry
Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org
More informationCluster Centric Fuzzy Modeling
10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we
More informationUplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks
62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering
More informationAUTOMATIC ROAD EXTRACTION FROM LIDAR DATA BASED ON CLASSIFIER FUSION IN URBAN AREA
In: Bretar F, Pierrot-Deseilligny M, Vosselman G (Eds) Laser sanning 009, IAPRS, Vol. XXXVIII, Part 3/W8 Paris, Frane, September 1-, 009 AUTOMATIC ROAD EXTRACTIO FROM LIDAR DATA BASED O CLASSIFIER FUSIO
More information