GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

Size: px
Start display at page:

Download "GPU Implementation of Parallel SVM as Applied to Intrusion Detection System"

Transcription

1 GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India Noshir Tarapore Assistant Professor, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India Abstract--Intrusion Detection System (IDS) is an important and necessary component in ensuring network security that invoves separation of attacks and Non-attacks. Support Vector Machine (SVM) is one of the most popuar toos for soving genera cassification probems because of its high prediction accuracy. However, the training phase of noninear kerne based SVM agorithm is a computationay expensive task, especiay for arge datasets. In this paper, we propose an agorithm to sove arge cassification probems based on parae SVM. The system utiizes powerfu GPU device and Mutithreading to improve the speed performance of SVM training phases. Initia experiments done with KDD CUP 1999 dataset show that the training time of SVM is shortened and the detection accuracy obtained by our method is exacty same or more than as that obtained by seria SVM. Keywords--Intrusion Detection System (IDS), Support Vector Machine (SVM), Graphics Processor Unit(GPU), Parae, Cascade, Mutithreading I. INTRODUCTION With the rapidy growing connectivity of the Internet, networked computer systems are increasingy paying vita roes in our modern society. Whie the Internet has brought great benefits to this society, it has aso made critica systems vunerabe to maicious attacks. Since a preventive approach such as firewa is not sufficient to provide sufficient security for a computer system, intrusion detection systems (IDS) are introduced as a second ine of defense. IDS can detect and identify intrusion behavior or intrusion attempts in a computer system by monitoring and anayzing network packet or system audit og, and then send intrusion aerts to system administrators in rea time. This anaysis of network packet is basicay cassification task to separate out attacks and non-attacks. Mosty machine earning tasks are used for this cassification process. The goa of machine earning is discovering, earning, and then adapting to the situations that may change, thus, making improvements in the machine performance. In the intrusion detection fied, the input of the references is appied in the machine earning agorithms so that they can earn the attack patterns. After that, the agorithms are used in the unknown input attacks for performing the actua detection process [1]. Some of the known approaches of machine earning are Artificia Neura Network (ANN), Support Vector Machine (SVM) and Genetic Agorithm (GA) [2]. Out of many avaiabe machine earning approaches SVM is most popuar because of its high prediction accuracy. SVM is based on statistica earning theory, the earning agorithm can sove the sma sampe earning probems. Using characteristics of SVM, we can extract features and cass data, distinguish norma and abnorma data in order to take effective steps to prevent the system from further infringement. When earning sampes set are sma, SVM appears to be best approach avaiabe but when datasets are arger SVM training consumes arge amount of time. This imitation of SVM can affect IDS to great extent [3]. To overcome this imitation use of GPU is proposed which can process SVM training agorithm on different cores simutaneousy. GPUs have become faster and more efficient than traditiona CPUs in certain types of computations because of its abiity to make parae operations [4]. Aso Mutithreading can significanty improve training process by dividing dataset into smaer chunks and processing them individuay. In this paper we propose an agorithm which divides arge datasets into smaer chunks and then processes these smaer chunks in parae. We are trying to minimize time required for SVM training using GPU and mutithreading approach. In this paper we take KDD CUP 1999 dataset which is a arge dataset containing different types of intrusion types and their features. We appy Cascade SVM approach to process it in parae in order to get minimum training time for training SVM. II. RELATED BACKGROUND A. Support Vector Machine Intrusion detection is a cassification probem in essentia. It aims to distinguish norma and abnorma exampes with detection agorithm. Support Vector 1559

2 Machine tries to find an optimization hyper-pane, which can cassify the exampes into two categories in the feature space [4]. Given training exampe: (x 1, y 1),...,(x, y ), x ϵ R d, y ϵ {+,-}, is the number of training exampe, d is the dimension of the exampe feature, X= x 1, x 2,...,x d, y is the cass abe. If y equa to 1, the corresponding exampe is norma, ese if the abe is -1, the corresponding exampe is abnorma. According to the SVM agorithm, for inear separabe probem, there is an optima separating hyper-pane (decision boundary) to cassify two cass exampes. The optima separating hyper-pane can be described as: ω. x + b = 0 Here ω is weight and the norma direction of the hyperpane, b is a bias. The process of soving this hyper-pane, can be considered as, for a given training dataset, seeking weight ω and bias b under some constrains condition to get a minima cost function: min 1 2 ω 2 + C ξ i (1) s.t. y i(ω. x + b) 1 >= 0 Where, C is a penaty coefficient, ξ is a reax variabe, ξ i > 0 [5]. Let a = a 1,a 2,..,a, be the nonnegative Lagrange mutipiers, one for each inequaity constraints in Eq.(1) The soution to Eq.(1) is equa to the soution to the constrained quadratic optimization probem using the Wofe dua theory as: max W(α) = α i s. t. y α i = 0 n 1 2 j=1 α i α j y i y j x i. x j 0 α i C i = 1,2,.. Where α i are the Lagrange mutipiers. If α i > 0, the corresponding exampe is caed support vector (SV). The decision function is: f(x) = sgn{ α y i (x. x i + b ) sgn() is a sign function, if f(x) > 0, the exampe beongs to norma cass, if f(x) < 0, the exampe beongs to abnorma cass and if f(x) = 0, user can cassify it freey. For inear non-separabe probem, the training exampes in input space X can be mapped into a high dimension space H by kerne function: K(x i, x j) = ϕ(x). ϕ(y) then inear cassifier in this high dimension space H can be constructed [5]. A number of CPU-based impementations of the SVM methodoogy are pubicy avaiabe today. LIBSVM, SVM ight, mysvm and TinySVM are ony some exampes. LIBSVM is one of the most compete impementations, providing many options and state-of-theart performance [6]. Therefore, it has become the SVM impementation of choice for a arge part of the research community. Thus, it was chosen as the basis of our work on GPU impementation of parae SVMs. B. Graphics Processor Unit The Graphics Processing Unit (GPU) is a massivey parae device. It is proved to have exceent performance on foating point cacuations, which is even more efficient than muti-core CPUs. The GPU is capabe of processing the arge amounts of data required to perform the cassification and detection tasks very quicky. Many schoars have used GPU to speed up appications. NVIDIA has introduced a programming framework for their GPUs, which is Compute Unified Device Architecture (CUDA) [7]. We can use it to take the advantage of the NVIDIA GPUs architecture. There are some SVM impementations offering many functions incuding different kernes, muticass cassification and cross-vaidation. LIBSVM is one of the famous SVM impementations which provides different SVM types of cassification and regression. It aso contains the most popuar kerne function such as the inear function, the poynomia function and the radia basis function. Many researches are conducted using LIBSVM. It aso provides GPU-acceerated LIBSVM which is a modification of the origina LIBSVM that expoits the CUDA framework to significanty reduce processing time whie producing identica resuts [8]. III. RELATED WORK In this section we provide currenty avaiabe methods to process parae SVM, use of GPU for training SVM to reduce time required. We aso focus on approaches that can be used to modify currenty avaiabe methods to get better resuts. Xueqin Zhang, Yifeng Zhang, Chunhua Gu have worked on GPU impementation of parae SVM [9]. They have proposed agorithm GSVM that makes use of GPU to reduce training time. Sequentia Minima Optimization (SMO) ony aows a subset containing two sampes to be optimized at each step hence training time increases. They have come up with parae SMO agorithm to improve training time. They have used Scatter-Parae-Reduce- Gather (SPRG) parae reduction method to get resuts from different memory bocks of GPU into one fina bock. They have achieved great resuts in terms of speed up and accuracy. Hans Peter Graf, Eric Cosatto, Leon Bottou, Igor Durdanovic, Vadimir Vapnik have proposed an agorithm where Instead of anayzing the whoe training set in one optimization step, the data are spit into subsets and optimized separatey with mutipe SVMs [10]. The partia resuts are combined and fitered again in a next set of SVMs, unti best resuts are achieved. Qi Li, Raied Saman, Vojisav Kecman they propose an inteigent system to sove arge cassification probems based on parae SVM [3]. The system utiizes the atest powerfu GPU device to improve the speed performance of SVM training and predicting phases. A these techniques have great agorithms to paraeize SVM and achieve speed up using GPU. Drawback in these methods is either using ony GPU or ony parae agorithm but not combining these two approaches where combination of these two approaches can ead to even higher speedup. 1560

3 IV. METHODOLOGY Proposed methodoogy uses parae SVM agorithm which divides arge dataset into smaer chunks to be processed in parae. It uses ayered approach towards processing such arge datasets where ony support vectors from previous ayer are passed onto next ayer thus discarding unnecessary data points to get accurate resuts whie buiding SVM mode required for prediction. It uses mutithreading to process data faster on seria machine so even if we don t use GPU it gives us significant speedup. Though we have combined this mutithreading approach with GPU impementation to benefit from both approaches and achieve even higher speedup. Exampe depicted in Figure 1 1. n = 2 therefore D T is divided into 4 subsets namey D T1, D T2, D T3, D T4 and appy it to SVM 1, SVM 2, SVM 3, SVM n subsets of support vectors SVs 1, SVs 2, SVs 3, SVs 4 are generated 3. SVM 1 and SVM 2, SVM 3 and SVM 4 are combined n-1 new resuts and support vector sets are generated SVM 5 and SVM 6 5. Ony one SVs SVs 7 is remaining 6. Continue iterations unti desired resuts are achieved i.e. if ɛ = 50 then SVs ' SVs shoud be greater than 50 to go for another iteration. Figure 1: Schematics of Parae SVM Architecture If we see the Figure 1 there are different eves in SVM training invoved where two SVMs from upper eve pass on their Support Vectors to the next eve and so on up to ast eve where ony support vectors are present and to improve accuracy of SVM we again send these support vectors to first eve and repeat the process unti desired accuracy is obtained. A. Proposed Agorithm of Parae SVM Here, Training Data D T, Support Vector Machine SVM i, Support Vectors Set in current iteration SVs, Support Vector Set in previous iteration SVs ' and Threshod ɛ denotes minimum change in no. of Support Vectors 1. The origina compete training set D T is divided into 2 n subsets where n = 1, 2,.., n 2. Origina SVM training probem is decomposed into 2 n sub-probems. 2 n sub-probems are resoved with parae SVM. 2 n sub-cassifiers and 2 n subsets of support vectors are generated n support vector sets are combined in groups of two for next step 4. New cassifiers are obtained through SVM agorithm with 2 n-1 new training sets. 2 n-1 new resuts and support vector sets are generated. 5. Repeat step 2 unti ony remaining one support vector set SVs. 6. If, SVs ' SVs <= ɛ Terminate Ese Return to step 2 B. To train and test the parae SVM mode generated by the proposed agorithm, a standard data set is required. We have used KDD CUP 99 and (improved version of KDD CUP 99) dataset [12]. Both these datasets are standardized and freey avaiabe on the internet. This dataset contains information about 22 types of network attacks. Each record in this dataset has 41 features and a cass abe depicting type of attack. We have used this dataset since it has a arge number of records, neary haf a miion records, and so we can verify if the proposed agorithm can create an efficient mode and is fast enough for a arge training dataset aso it can fuy utiize potentia of GPU if the dataset is arge enough. V. EXPERIMENT AND RESULTS A. Experiment Environment For Linear SVM we have used LIBSVM version 3.21 which happens to be most widey used SVM ibrary. For making use of GPU to train SVM we have used GPUacceerated LIBSVM which has LIBSVM acceerated with GPU using the CUDA Framework. For parae impementation of Parae agorithm we have taken mutithreading approach where mutipe threads are assigned to different SVMs for training them simutaneousy. In our experiment, the CPU is Inte i3-core E5500 with a frequency of 3.30GHz. The GPU is NVIDIA GeForce GTX 750 ti. The memory capacity is 2 GB, the number of mutiprocessors is 16, the number of cores (stream processors) is 640, mutiprocessors shared memory size is 16KB, and memory bandwidth is 86.4 GB/S. The integrated deveopment environment is Microsoft Visua Studio 2010 with CUDA SDK 6.5. Tabe 1: Training Time (in sec) for different datasets for seria execution CPU Training Time (in sec) KDD CUP KDD CUP 99 10%

4 Tabe 2: Training Time (in sec) for different datasets for varying partitions using parae SVM approach Parae SVM (Mutithreading) (time in sec) Tabe 4: Speed Up for different datasets for varying partitions using parae SVM approach Parae SVM (Mutithreading) (Speed Up) KDD KDD 10% KDD KDD 10% Tabe 3: Training Time (in sec) for different datasets for varying partitions using parae SVM and GPU approach Parae SVM (Mutithreading) + GPU (time in sec) KDD KDD 10% Figure 4: Speed Up for different datasets for varying size of partitions (Parae SVM + GPU) Tabe 5: Speed Up for different datasets for varying partitions using parae SVM and GPU approach Parae SVM (Mutithreading) (Speed Up) KDD Figure 2: Training time (in sec) for different datasets for varying size of partitions (Parae SVM) KDD 10% Figure 5: Speed Up for different datasets for size of partitions (Parae SVM + GPU) varying Figure 3: Training time (in sec) for different datasets for varying size of partitions (Parae SVM + GPU) 1562

5 B. Anaysis of Resuts Figure 2 indicates reationship between No. of Partitions and Time eapsed when we use ony Parae SVM agorithm(mutithreading), we can observe that time required for arger dataset is significanty greater than that of smaer dataset but as the no. of partitions grow time required for training SVM has no significant difference regardess of the size of dataset. Figure 3 is simiar to that of Figure 2 ony itte ess time is required for training because GPU pays important roe in making training faster. Figure 4 and Figure 5 indicate reationship between No. of Partitions and Speed Up, we can easiy see that speed up for two datasets which contains arge amount of records is better as No. of partitions grow but for smaest and argest dataset speedup is esser. Accuracy remains amost same for a of the datasets and aso for a number of partitions. VI. CONCLUSION In this proposed approach we have appied Parae SVM agorithm aong with GPU acceeration for training SVM for Intrusion Detection. Both these approaches provide great resuts. Parae SVM agorithm uses Mutithreading approach which trains different SVMs simutaneousy. Whie training Parae SVM and its GPU impementation we found that for moderatey arger datasets time required for training decreases as No. of partitions are increased. Speed Up achieved in comparison with sequentia SVM can reach to higher eves. In future this technique can be used for various appications where cassification is major task. REFERENCES [1] V. T. Goh, J. Zimmermann, and M. Looi, "Towards intrusion detection for encrypted networks," in Avaiabiity, Reiabiity and Security, ARES'09. Internationa Conference on, 2009, pp [2] S. Mukkamaa, G. Janoski and A.Sung, Intrusion detection: support vector machines and neura networks, In proceedings of the IEEE Internationa Joint Conference on Neura Networks (ANNIE), St. Louis, MO, pp , [3] T. Joachims, Making arge-scae SVM earning practica, In B. Schokopf, C. J. C. B-wges, and A. J. Smoa eds. Advances in Keme Methods Support Vector Leaming, Cambridge, MA: MIT press, [4] S.Theodoridis and K.Koutroumbas, Pattern Recognition (Second Edition), Academic Press, USA, [5] Edgar E. Osuna, Robert Freund and Federico Girosi, Support Vector Machines: Training and Appications, Massachusetts Institute of Technoogy, Artificia Inteigence Laboratory, A.I. Memo No March, C.B.C.L Paper No. 144, [6] C. C. Chang and C. J. Lin, LIBSVM: a ibrary for support vector machines, ACM Transactions on Inteigent Systems and Technoogy (TIST), vo. 2, no. 3, 2011, pp. 27. [7] NVIDIA, CUDA Compute Unified Device Architecture Programming Guide, June [8] Athanasopouos, A. Dimou, V. Mezaris, I. Kompatsiaris, "GPU Acceeration for Support Vector Machines", Proc. 12th Internationa Workshop on Image Anaysis for Mutimedia Interactive Services (WIAMIS 2011), Deft, The Netherands, Apri [9] X. Zhang, Y. Zhang, C. Gu., GPU Impementation of Parae Support Vector Machine Agorithm with Appications to Intruder Detection, JOURNAL OF COMPUTERS, VOL. 9, NO. 5, MAY 2014 [10] Graf H. P., Cosatto E., Bottou L., Durdanovic I., Vapnik V.; "Parae Support Vector Machines: The Cascade SVM" in Advances in Neura Information Processing Systems no. 17, , [11] Q. Li, R. Saman, V. Kecman, An Inteigent System for Acceerating Parae SVM Cassification Probems on Large s Using GPU. [12] KDD Authors Profie: Sudarshan Hiray is student pursuing Master of Technoogy, in Computer Science & Engineering from Department of Computer Engineering at Vishwakarma Institute of Technoogy, Pune. Noshir Tarapore is Assistant Professor at Department of Computer Engineering in Vishwakarma Institute of Technoogy, Pune. 1563

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Fast Methods for Kernel-based Text Analysis

Fast Methods for Kernel-based Text Analysis Proceedings of the 41st Annua Meeting of the Association for Computationa Linguistics, Juy 2003, pp. 24-31. Fast Methods for Kerne-based Text Anaysis Taku Kudo and Yuji Matsumoto Graduate Schoo of Information

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Indexed Block Coordinate Descent for Large-Scale Linear Classification with Limited Memory

Indexed Block Coordinate Descent for Large-Scale Linear Classification with Limited Memory Indexed Bock Coordinate Descent for Large-Scae Linear Cassification with Limited Memory Ian E.H. Yen Chun-Fu Chang Nationa Taiwan University Nationa Taiwan University r0092207@csie.ntu.edu.tw r99725033@ntu.edu.tw

More information

LEARNING causal structures is one of the main problems

LEARNING causal structures is one of the main problems cupc: CUDA-based Parae PC Agorithm for Causa Structure Learning on PU Behrooz Zare, Foad Jafarinejad, Matin Hashemi, and Saber Saehkaeybar arxiv:8.89v [cs.dc] Dec 8 Abstract The main goa in many fieds

More information

Modification of Support Vector Machine for Microarray Data Analysis

Modification of Support Vector Machine for Microarray Data Analysis Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)

More information

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department

More information

Quaternion Support Vector Classifier

Quaternion Support Vector Classifier Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Stereo. CS 510 May 2 nd, 2014

Stereo. CS 510 May 2 nd, 2014 Stereo CS 510 May 2 nd, 2014 Where are we? We are done! (essentiay) We covered image matching Correation & Correation Fiters Fourier Anaysis PCA We covered feature-based matching Bag of Features approach

More information

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers Microsoft Visua Studio 2005 Professiona Toos Advanced deveopment toos designed for professiona deveopers If you re a professiona deveoper, Microsoft has two new ways to fue your deveopment efforts: Microsoft

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles http://asp.eurasipjournas.com/content/22//86 RESEARCH Open Access Muti-task hidden Markov modeing of spectrogram feature from radar high-resoution range profies Mian Pan, Lan Du *, Penghui Wang, Hongwei

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Automatic PD faut cassification High resoution Seectabe UHF fiters and

More information

Dialectical GAN for SAR Image Translation: From Sentinel-1 to TerraSAR-X

Dialectical GAN for SAR Image Translation: From Sentinel-1 to TerraSAR-X Artice Diaectica GAN for SAR Image Transation: From Sentine-1 to TerraSAR-X Dongyang Ao 1,2, Corneiu Octavian Dumitru 1,Gottfried Schwarz 1 and Mihai Datcu 1, * 1 German Aerospace Center (DLR), Münchener

More information

WHILE estimating the depth of a scene from a single image

WHILE estimating the depth of a scene from a single image JOURNAL OF L A T E X CLASS FILES, VOL. 4, NO. 8, AUGUST 05 Monocuar Depth Estimation using Muti-Scae Continuous CRFs as Sequentia Deep Networks Dan Xu, Student Member, IEEE, Eisa Ricci, Member, IEEE, Wani

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

An improved distributed version of Han s method for distributed MPC of canal systems

An improved distributed version of Han s method for distributed MPC of canal systems Deft University of Technoogy Deft Center for Systems and Contro Technica report 10-013 An improved distributed version of Han s method for distributed MPC of cana systems M.D. Doan, T. Keviczky, and B.

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

A Fast Algorithm for Creating a Compact and Discriminative Visual Codebook

A Fast Algorithm for Creating a Compact and Discriminative Visual Codebook A Fast Agorithm for Creating a Compact and Discriminative Visua Codebook Lei Wang 1, Luping Zhou 1, and Chunhua Shen 2 1 RSISE, The Austraian Nationa University, Canberra ACT 0200, Austraia 2 Nationa ICT

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Open Access CS-1-SVM: Improved One-class SVM for Detecting API Abuse on Open Network Service

Open Access CS-1-SVM: Improved One-class SVM for Detecting API Abuse on Open Network Service Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Contro Systems Journa, 2015, 7, 1293-1300 1293 Open Access CS-1-SVM: Improved One-cass SVM for Detecting API Abuse on Open

More information

Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stability Predictions

Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stability Predictions Sensors 2010, 10, 8028-8053; doi:10.3390/s100908028 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors Artice Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stabiity

More information

CNN and RNN Based Neural Networks for Action Recognition

CNN and RNN Based Neural Networks for Action Recognition Journa of Physics: Conference Series PAPER OPEN ACCESS CNN and RNN Based Neura Networks for Action Recognition To cite this artice: Chen Zhao et a 2018 J. Phys.: Conf. Ser. 1087 062013 View the artice

More information

Parallel Flow-Sensitive Pointer Analysis by Graph-Rewriting

Parallel Flow-Sensitive Pointer Analysis by Graph-Rewriting Parae Fow-Sensitive Pointer Anaysis by Grah-Rewriting Vaivaswatha Nagaraj R. Govindarajan Indian Institute of Science, Bangaore PACT 2013 2 Outine Introduction Background Fow-sensitive grah-rewriting formuation

More information

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Neural Networks. Aarti Singh. Machine Learning Nov 3, Slides Courtesy: Tom Mitchell

Neural Networks. Aarti Singh. Machine Learning Nov 3, Slides Courtesy: Tom Mitchell Neura Networks Aarti Singh Machine Learning 10-601 Nov 3, 2011 Sides Courtesy: Tom Mitche 1 Logis0c Regression Assumes the foowing func1ona form for P(Y X): Logis1c func1on appied to a inear func1on of

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

Adaptive 360 VR Video Streaming: Divide and Conquer!

Adaptive 360 VR Video Streaming: Divide and Conquer! Adaptive 360 VR Video Streaming: Divide and Conquer! Mohammad Hosseini *, Viswanathan Swaminathan * University of Iinois at Urbana-Champaign (UIUC) Adobe Research, San Jose, USA Emai: shossen2@iinois.edu,

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

IEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE

IEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE This artice has been accepted for incusion in a future issue of this journa. Content is fina as presented, with the exception of pagination. IEEE TRANSACTIONS ON CYBERNETICS 1 Therma Augmented Expression

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Performance Enhancement of 2D Face Recognition via Mosaicing

Performance Enhancement of 2D Face Recognition via Mosaicing Performance Enhancement of D Face Recognition via Mosaicing Richa Singh, Mayank Vatsa, Arun Ross, Afze Noore West Virginia University, Morgantown, WV 6506 {richas, mayankv, ross, noore}@csee.wvu.edu Abstract

More information

Human Action Recognition Using Key Points Displacement

Human Action Recognition Using Key Points Displacement Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan

More information