WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
|
|
- Harold Cox
- 5 years ago
- Views:
Transcription
1 WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing , China Xu Dehe Institute of resources and environment, North China University of Water Resources and Eectric Power, Zhengzhou , China Li Chengming Chinese Academy of Surveying and Mapping, Beijing , China Sun Jianguo Coege of Computer Science and Technoogy, Harbin Engineering University, Harbin , China Abstract: In recent years, with the rapid deveopment of computer communication and the Internet, it makes easy to dupicate and distribute the GIS data because of its digita forms. So the appication of GIS data faces some issues such as digita copyright protecting, data authenticating, and data source tracing, etc, and these issues coud be the main obstaces restricting the further usage of digita maps. In order to sove these probems, we shoud construct the GIS production copyright protection system. The technique of watermarking provides potentia soutions for copyright protection. Considering the characteristics of digita watermarking for digita maps, the DFT (Discrete Fourier Transform) bind watermarking mode is put forward in this paper. First, the vertex sequence that extracted from vector map is carried on DFT transform. Second, divide the phase of DFT according to the quantization step size. Finay, we introduce a new watermarking scheme to embed the watermark into the phase of DFT through quantification, which provides robustness for watermark attacking. Extensive experiments are conducted to vaidate the avaiabiity, invisibiity and the robustness of our scheme. Keywords: digita map; digita watermarking; DFT; 1 Introduction Digita map is a kind of important and strategic information resource and is widey used in economic and socia appications, it aso cosey reated to nationa defense affairs. The acquisition and maintenance of the data is a high costs and efforts process, there are needed arge amount of manua abor and anaysis in order to acquire origina geospatia data such as and survey, aeria photography, sateite image, etc. Furthermore, it is a hard work for peope obtain the information through digitaization and vectorization from the origina data [1][2]. So as a resut, geospatia data especiay the high precision GIS data normay cannot be used for free. In addition, some high precision data are ony permitted to be used in miitary or government units and extra security requirements are aso needed. But in recent years, with 1
2 the rapid deveopment of computer communication and the Internet, it makes easy to dupicate and distribute the GIS data because of its digita forms. So there is an emergent need for copyright protection and authentication of vector maps. Watermarking is a promising soution to address this issue. In addition to the genera characteristics of digita products, vector data has the foowing features [3] : There is no fixed sequence of data; there is no cear concept of samping rates; data contains not ony the geometric information incudes topoogy information; and vector geospatia data is required high precision, sma redundancy, hierarchica organizations, which are an increase of watermark embedding and extraction more difficut. Vector geospatia data with digita watermark in addition to the digita watermark must be non-perception, and stabiity, deectabiity, but aso to ensure its avaiabiity, the data embedded watermark shoud not affect its avaiabiity. Over the past few years, the research on the digita watermark of raster data is more, but that of vector map in the iterature is very few [4-9], among which the origina vector data is needed in the watermark extraction phase, the detection method is reativey easy to achieve, and the extracted resuts are highy dependent on the quaity of the raw data. In practica appications, raw data can t be obtained easiy on many occasions, so the bind watermarking mode [10-15] which the raw data is not required when the watermark is extracted shoud be paid more attention. In this paper, Considering both the characteristics of digita watermarking for vector maps and the high-accuracy data requirement for vector data, a new DFT-based bind watermarking method for the vector maps is proposed, by transforming the vertex sequence using DFT transformation, dividing the phase of DFT according to the quantization step size, the watermark sequence can be embedded into the phase of DFT, which ensures the avaiabiity, invisibiity and robustness. 2 System mode The main purpose of watermark mode in this paper is to achieve bind detection [16]. And the main idea is that the coordinate axis woud be divided into the A set of intervas and the B set of intervas by the equa-space, interva size is Δ. Here, A set represents 0, B set on behaf of 1. Adjust the coefficient vaue of the watermark to be embedded to causes it to be equa to one recent correspondence set in the intermediate quantity. When the watermark is detected, just to determine the range of the coefficient fas on the A or B set, you can get the corresponding watermark information 0 or 1. Because the transform domain, the moduation of the object data is the range of transform domain or phase, may aso be a rea part or imaginary part. Transform domain coefficient of assumptions, embedded digita watermark for the principe as shown: Figure 1. The phase quantification 2
3 Demarcation interva set: seect the quantization step size wi be divided into axes as shown in Figure1. A and B set interva. Those who beong to set the coordinates of A band represents bit "1", where a range of set B represents the position coordinates of "0". The mathematica operation that seeks the quotient and remainder: seect the quantization step size to quantify the parameters which is phase of DFT coefficients, integer vaues and remainder is operated. Assumptions a for the quotient, b for remainder, there are: 360 a = b= 360 aδ Δ Quantified embedded: The quantification of parameters θ is cosey reated to the watermark bit w i : When w i =1, enabe the quantification resuts θ equivaents to the intermediate coordinates which on a certain range of A set the nearest θ ',When w i =0, enabe the quantification resuts θ equivaents to the intermediate coordinates which on a certain range of B set the nearest θ.the expression are as foows(for k=0,1,2, ): (1) 当 w i =1 时 : θ a = 2k θ ' = θ +Δ a = 2k + 1 (2) 当 w i =0 时 : θ +Δ a = 2k θ ' = θ a = 2k + 1 After quantification ofθ, the contained information of the watermark bit w i is ony determined by the range set in the quantization resuts θ ' :If θ is in A set, θ ' on behaf of the watermark bit information w i =1; the other hand, θ is in the range of B set, θ ' wi represent the digita watermark information w i =0, the above (1) beonging to A range set, (2) beonging to B range set. From where we can see that θ ' θ Δ, the maximum error caused by the quantization operation is quantify step. As can be seen from the above description, the process of embedding the watermark based on the quantification is different from the previous embedding rues of addition or mutipication, it can be seen as appropriate modifications of parameters θ and process which be given the watermark information. In order to reduce interference resuted from the random error in the process of quantify, improve the robustness of embedded watermark, θ wi be quantified to the nearest A or B areas. When the watermark is detected, test data is carried on DFT, the corresponding watermark information w i =0 or w i =1 is get from the ocation of the embedded watermarks, the vaue of θ ' beonging to A or B set: 1 θ ' A wi = 0 θ ' B The extracted watermark sequence is carried an anti-scrambing, if raw watermark is twodimensiona images, one dimensiona sequence is transformed to two dimensiona sequence. 3
4 In this artice, the binary image is get from the mapped text, so the extracted watermark sequence is done with to get the two dimensiona image. 3 The bind watermarking scheme Based on the above system mode, DFT as the transform toos, the watermark is embedded into the phase of DFT coefficients, the phase vaue of DFT coefficients is quantified by Appropriate step size,as we as the watermark is embedded in quantified vaue. The embedded watermark vector geospatia data is obtained after that the embedded phase vaue and the unmodified magnitude carries inverse DFT; when the watermark embedded in the vector data is extracted, first, the embedded vector data is carried on DFT, then the coefficient of DFT is cacuated, the phase is get, the watermark is extracted according to the quantify program. 3.1 The embedded phase The embedded mode of digita watermark of the vector geospatia data is shown in Figure 2. Figure 2. The embedded mode Concrete steps are as foows: Step 1: The origina watermark ength is transformed to meet 2 N (FFT agorithm conditions, a quick agorithm of DFT). In order to increase the security of the watermark, the watermark can be encrypted or scrambed. Step2: Geospatia vector data V is read according to the storage order of coordinates, and then the coordinates of vertex sequence constitute a compex sequence in accordance with formua (1). a k = xk + iyk k [0, N 1] (1) Here N is the Vertices number in V. a is carried on DFT, the DFT coefficients is get by formua (2). Step3: Sequences { } k N / k = 0 ( πin) k A = a e [0, N 1] (2) N k The DFT coefficients of a sequence contain the ampitude A and phaseθ. Step4: The phase of the coefficient is quantified by the seected appropriate step size, the quantified vaue equas to the median of the interva in accordance with the "0" or "1". Step5: The embedded magnitude combined with the unmodified magnitude is carried inverse DFT, the embedded watermark vector geospatia data V is obtained. 3.2 The extracted phase The extracted phase of digita watermark is shown in Figure.3. 4
5 Figure 3. The extracted mode Step1: Vertex coordinates in ' a ' k constructed in accordance with formua (1). a is carried on DFT by formua (2), the coefficient of DFT is Step2: The sequence { ' k} V is read, then a compex sequence is { } cacuated. Step3: The phase of the DFT coefficient is quantified to mean vaues of the ocation of embedded watermark. The phase vaue is cacuated to judge in which interva quantified, the watermark is extracted according to the quantization range where the phase vaues is in. Step4: The extracted watermark bit sequence is carried on anti-scrambing, then and the sefcorreation c, in order to enhance the objectivity of the resut of extracted watermark, the sefcorreation method is used, the sef-correation coefficient obtained sc θ is used to hep determine the effect of watermark extraction, if the raw watermark is two-dimensiona images, the extracted watermark is processed to get the fina two-dimension watermark. 4 Experiments The test data contains 11,080 vertex of river ines of 1:50 miion. The watermark data is bit as Figure 4(a), according to FFT, the data is extend to the 4096 (2 12 ), and the quantization step size is 5,10,15 respectivey. ' (a) the origina watermark (b) =5 (c) =10 (d) =15 The quantization step size is variabe parameters when the range is fixed, the different step size are used in experiment to contrast, the used quantization step size are the =5, =10 and =15. The extracted watermark are shown in Figure 4(b), Figure 4(c) and Figure 4(d). Figure 5, Figure 6 and Figure 7 respectivey show the compared resut of the origina vector geospatia data and the embedded data when step size =5, =10, =15, the dotted ine for the embedded watermark data and the soid ine for the raw data. We can find the embedded mode is we invisibiity, and the embedded data does not affect the dispay quaity of 5
6 graphics, compared to three-step size, the invisibiity of graphics dispayed in figure 5 is best, Figure 6 foows, the Figure 7 is the worst. Figure 5. Comparison of before and after watermark embedded when =5 Figure 6. Comparison of before and after watermark embedded when = Avaiabiity Figure 7. Comparison of before and after watermark embedded when =15 The resuts of the a bit error ratio(ber) anaysis corresponding to =5, =10, =15 are shown in figure8. As can be seen from the statistica resuts, the BER increases with the step ength becomes arge, but the argest BER is smaer that 2.5 percent, which vaidates the avaiabiity of the proposed scheme. 6
7 4.2 Robustness Figure 8. BER anaysis corresponding to =5, =10 and =15 The robustness of the watermark is evauated for different types: format conversion, deeting the vertices, rotate, transation, scae in experiment, and find that the watermark can not be extracted effectivey after that the vertices are deeted randomy and the embedded data is scaed, so the foowing anaysis of ony a few attacks on the remaining cases and the resuts are shown in Tab.1, which exhibit the abiity of resisting attacks, and the vaues of NC (sefcorreation coefficient) cacuated by formua 3. ww. ' NC = (3) ww. w'. w' Tabe 1 the robustness experiments attacks Format conversation Transation (units) Rotation (degree) NC ( Δ =5 0 ) NC ( Δ =10 0 ) NC ( Δ =15 0 ) Experimenta resuts anaysis Through the experiment, we coud anayze and find: (1) The step size (that is ) is greater, the difference of the extracted watermark and origina watermark is smaer, so the robustness is better. (2)If the step size seected is too arge, the graphic quaity dispayed and visibiity are affected. If the step size seected is too sma, avaiabiity and visibiity can be ensured, but the effect of watermark extracted is bad. Therefore step size used to quantify is determined in accordance with the robustness of the watermark and the used condition of vector geospatia data. (3)The error in the extracted watermark of integer data embedded vector geospatia data after transation, rotation, format conversion comes mainy from its own error and rounding error when the FFT computation, the effects of the extracted watermark are the same after the format conversion and transation of the embedded vector geospatia data. After the rotation, the watermark extraction error in the data mainy from the data is cut-off. The mode is fragie after deeted vertices, scaded. 5 Concusions In this paper, a bind watermarking scheme based on DFT is proposed. By transforming the vertex sequence using DFT transformation, dividing the phase of DFT according to the quantization step size, the watermark sequence can be embedded into the phase of DFT. The experimenta resuts show that the embedded vector geospatia data has good avaiabiity, invisibiity, the watermark is robust after transation, rotation and format conversion of the 7
8 embedded watermark vector map, the computationa compexity of the mode is ow and easy to impement. It is confirmed that the proposed mode is effective in protecting the copyright of the vector GIS data. Future work wi incude the robustness against deeting vertices, cipping, scaing to the achievement of the copyright protection of the vector map and appying this mode to the other types of vector data. Acknowedgement This work was supported by Research and Deveopment Program of CASM and Funded by Key Laboratory of State Bureau of Surveying and Mapping (No ) References [1] Anbo Li, Bing-xian Lin, Ying Chen, Study on copyright authentication of GIS vector data based on Zero-watermarking. The Internationa Archives of the Photogrammetry, Remote Sensing and Spatia Information Sciences. Vo. XXXVII. Part B4. Beijing 2008.pp [2] Ohbuchi, Robust watermarking of vector digita maps, Proc. of the IEEE Internationa Conference on Mutimedia and Expo., Lausanne, Switzerand, 2002 vo.1, pp [3] XU De-he, ZHU Chang-qing, WANG Qi-sheng. A Survey of the Research on digita watermarking for the Vector Digita Map, Geometrics Word. Editoria Dept. of Geomatics Word, Harbin, China, 2007, pp [4] Voigt M, Busch C. Watermarking 2D-Vector data for geographica information systems. Proceedings of the SPIE, Security and Watermarking of Mutimedia Content, San Jose, USA, 2002, pp [5] Schuz G, Voigt M. A high capacity watermarking system for digita maps. Proceedings of the 2004 Mutimedia and Security Workshop on Mutimedia and Security, Magdeburg, Germany, 2004, pp [6] Wang Xun, Lin Hai, Bao Hu-Jun. A robust watermarking agorithm for vector digita mapping, Journa of computer-aided design & computer graphics, Editoria Dept.of Journa of computer-aided design & computer graphics, Beijing, China, 2004, pp [7] Nikoaidis N, Pitas I, Soachidis V, Fourier descriptors watermarking of vector graphics images, Proceedings of the Internationa Conference of Image Processing, Vancouver, BC, Canada, 2000, pp [8] Soachidis V, Nikoaidis N, Pitas I. Watermarking poygona ines using Fourier descriptors, Proceedings of the IEEE Internationa Conference on Acoustics, Speech and Signa Processing, Istanbu, Turkey, 2000, pp [9] Nikoaidis N, Pitas I, Giannoua A, Watermarking of sets of poygona ines using fusion techniques, Proceedings of the 2002 IEEE Internationa Conference on Mutimedia and Expo, Lausanne,Switzerand, 2002, pp [10] LI Yan-ping, TANG Zhen-min, QIAN Bo, Audio Watermark Agorithm Robust to Desynchronization Based on Speech Parameter Mode, Computer Engineering, Editoria Dept. of Computer Engineering, Shanghai,China, 2008,pp [11] Suivan K, Bi Z, Madhow U, et a, Steganaysis of Quantization Index Moduation Data hiding, IEEE Internationa Conference on Image Processing, Suntec City, Singapore, Oct.2004, pp [12] Benedens, O. and C. Busch, Towards bind detection of robust watermarks in poygona modes, Eurographics 2000 Proceedings, vo.19,.no.3,2000. pp. C199-C208. 8
9 [13] Brian C, Gregory W, Pre processed and post processed quantization index moduation methods for digita watermarking, Processing of SPIE: Security and Watermarking of Mutimedia Contents II, San Jose, USA,2000, pp [14] Chen B, Worne G, Quantization index moduation: A cass of provaby good methods for digita watermarking and information embedding, IEEE Transactions on Information Theory, IEEE Inc, USA, 2001, pp [15] Ronad N, Bracewe. The Fourier Transform and Its Appications. Xi an Jiaotong University Press, Xi an, China, 2005, pp [16] YANG Yi-xian, NIU Xin-xin. Theory and Appications of Digita Watermarking. Higher Education Press, Beijing, China,2006 9
Digital Image Watermarking Algorithm Based on Fast Curvelet Transform
J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationFuzzy Perceptual Watermarking For Ownership Verification
Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationResearch on UAV Fixed Area Inspection based on Image Reconstruction
Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationDETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM
DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationMultiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform
Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of
More informationQuality Assessment using Tone Mapping Algorithm
Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationSubgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis
499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationMassively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.
assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationDiscrete elastica model for shape design of grid shells
Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationReference trajectory tracking for a multi-dof robot arm
Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the
More informationA Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks
Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationA probabilistic fuzzy method for emitter identification based on genetic algorithm
A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of
More informationComparative Analysis of Relevance for SVM-Based Interactive Document Retrieval
Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra
More informationTechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.
TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationAn Introduction to Design Patterns
An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationApplication of Image Fusion Techniques on Medical Images
Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationArithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University
Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationCollinearity and Coplanarity Constraints for Structure from Motion
Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department
More informationExtracting semistructured data from the Web: An XQuery Based Approach
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,
More informationResearch Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing
Mathematica Probems in Engineering Voume 2013, Artice ID 453278, 11 pages http://dx.doi.org/10.1155/2013/453278 Research Artice Frame Interpoation Based on Visua Correspondence and Coherency Sensitive
More informationA HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM
Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION
More informationA HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS
A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More information1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation
1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation
More information(0,l) (0,0) (l,0) (l,l)
Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationResearch on the overall optimization method of well pattern in water drive reservoirs
J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationTopics 1. Manipulators and robots
Proceedings of the Internationa Symposium of Mechanism and Machine Science, 017 AzCIFToMM Azerbaijan Technica University 11-14 September 017, Baku, Azerbaijan Topics 1. Manipuators and robots Anaysis and
More informationAUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationLossless Authentication Watermarking Based on Adaptive Modular Arithmetic
5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang
More informationImage Processing Technology of FLIR-based Enhanced Vision System
25 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES Image Processing Technoogy of FLIR-based Enhanced Vision System Ding Quan Xin, Zhu Rong Gang,Zhao Zhen Yu Luoyang Institute of Eectro-optica Equipment
More informationJOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM
JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,
More informationA Method for Group Extraction in Complex Social Networks
This is not the fina version of this paper. You can find the fina version on the pubisher web page. A Method for Group Extraction in Compex Socia Networks Piotr Bródka 1, Katarzyna Musia 2, Przemysław
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationA VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION
6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationReadme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT
ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported
More informationA Two-Step Approach for Interactive Pre-Integrated Volume Rendering of Unstructured Grids
A Two-Step Approach for Interactive Pre-Integrated Voume Rendering of Unstructured Grids Stefan Roettger and Thomas Ert Visuaization and Interactive Systems Group University of Stuttgart Abstract In the
More informationThe Classification of Stored Grain Pests based on Convolutional Neural Network
2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationGPU Implementation of Parallel SVM as Applied to Intrusion Detection System
GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com
More informationTelephony Trainers with Discovery Software
Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System
More informationRelative Positioning from Model Indexing
Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine
More informationPAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks
2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating
More informationFREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES
FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent
More informationReal-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing
Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,
More informationMultiple Medoids based Multi-view Relational Fuzzy Clustering with Minimax Optimization
Mutipe Medoids based Muti-view Reationa Fuzzy Custering with Minimax Optimization Yangtao Wang, Lihui Chen 2, Xiaoi Li Institude for Infocomm Research(I2R), A*STAR, Singapore 2 Schoo of Eectrica and Eectronic
More informationInterpreting Individual Classifications of Hierarchical Networks
Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationNon-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled
Tong and Chen EURASIP Journa on Wireess Communications and Networking (2017) 2017:46 DOI 10.1186/s13638-017-0829-z RESEARCH Non-inear adaptive image enhancement in wireess sensor networks based on nonsubsamped
More informationPath-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks
Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationAn Alternative Approach for Solving Bi-Level Programming Problems
American Journa of Operations Research, 07, 7, 9-7 http://www.scirp.org/ourna/aor ISSN Onine: 60-889 ISSN rint: 60-880 An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa,
More informationFACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn
FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,
More informationSTORE SEPARATION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS
STORE SEPARATION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS 1 RADHA KRISHNAN PRASHANTH, 2 MAHESH M SUCHEENDRAN 1,2 Defence Institute of Advanced Technoogy, Defence Institute of Advanced Technoogy Abstract-
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationA Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals
A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation
More informationClassification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems
Cassification of EEG Signa by STFT-CNN Framework: Identification of Right-/eft-hand Motor Imagination in BCI Systems 12 Brain Cognitive Computing Lab, Schoo of Information Engineering, Minzu University
More informationA Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.
A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,
More informationCongestion Avoidance and Control in Sensor Network Based on Fuzzy AQM
ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen
More information