WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

Size: px
Start display at page:

Download "WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION"

Transcription

1 WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing , China Xu Dehe Institute of resources and environment, North China University of Water Resources and Eectric Power, Zhengzhou , China Li Chengming Chinese Academy of Surveying and Mapping, Beijing , China Sun Jianguo Coege of Computer Science and Technoogy, Harbin Engineering University, Harbin , China Abstract: In recent years, with the rapid deveopment of computer communication and the Internet, it makes easy to dupicate and distribute the GIS data because of its digita forms. So the appication of GIS data faces some issues such as digita copyright protecting, data authenticating, and data source tracing, etc, and these issues coud be the main obstaces restricting the further usage of digita maps. In order to sove these probems, we shoud construct the GIS production copyright protection system. The technique of watermarking provides potentia soutions for copyright protection. Considering the characteristics of digita watermarking for digita maps, the DFT (Discrete Fourier Transform) bind watermarking mode is put forward in this paper. First, the vertex sequence that extracted from vector map is carried on DFT transform. Second, divide the phase of DFT according to the quantization step size. Finay, we introduce a new watermarking scheme to embed the watermark into the phase of DFT through quantification, which provides robustness for watermark attacking. Extensive experiments are conducted to vaidate the avaiabiity, invisibiity and the robustness of our scheme. Keywords: digita map; digita watermarking; DFT; 1 Introduction Digita map is a kind of important and strategic information resource and is widey used in economic and socia appications, it aso cosey reated to nationa defense affairs. The acquisition and maintenance of the data is a high costs and efforts process, there are needed arge amount of manua abor and anaysis in order to acquire origina geospatia data such as and survey, aeria photography, sateite image, etc. Furthermore, it is a hard work for peope obtain the information through digitaization and vectorization from the origina data [1][2]. So as a resut, geospatia data especiay the high precision GIS data normay cannot be used for free. In addition, some high precision data are ony permitted to be used in miitary or government units and extra security requirements are aso needed. But in recent years, with 1

2 the rapid deveopment of computer communication and the Internet, it makes easy to dupicate and distribute the GIS data because of its digita forms. So there is an emergent need for copyright protection and authentication of vector maps. Watermarking is a promising soution to address this issue. In addition to the genera characteristics of digita products, vector data has the foowing features [3] : There is no fixed sequence of data; there is no cear concept of samping rates; data contains not ony the geometric information incudes topoogy information; and vector geospatia data is required high precision, sma redundancy, hierarchica organizations, which are an increase of watermark embedding and extraction more difficut. Vector geospatia data with digita watermark in addition to the digita watermark must be non-perception, and stabiity, deectabiity, but aso to ensure its avaiabiity, the data embedded watermark shoud not affect its avaiabiity. Over the past few years, the research on the digita watermark of raster data is more, but that of vector map in the iterature is very few [4-9], among which the origina vector data is needed in the watermark extraction phase, the detection method is reativey easy to achieve, and the extracted resuts are highy dependent on the quaity of the raw data. In practica appications, raw data can t be obtained easiy on many occasions, so the bind watermarking mode [10-15] which the raw data is not required when the watermark is extracted shoud be paid more attention. In this paper, Considering both the characteristics of digita watermarking for vector maps and the high-accuracy data requirement for vector data, a new DFT-based bind watermarking method for the vector maps is proposed, by transforming the vertex sequence using DFT transformation, dividing the phase of DFT according to the quantization step size, the watermark sequence can be embedded into the phase of DFT, which ensures the avaiabiity, invisibiity and robustness. 2 System mode The main purpose of watermark mode in this paper is to achieve bind detection [16]. And the main idea is that the coordinate axis woud be divided into the A set of intervas and the B set of intervas by the equa-space, interva size is Δ. Here, A set represents 0, B set on behaf of 1. Adjust the coefficient vaue of the watermark to be embedded to causes it to be equa to one recent correspondence set in the intermediate quantity. When the watermark is detected, just to determine the range of the coefficient fas on the A or B set, you can get the corresponding watermark information 0 or 1. Because the transform domain, the moduation of the object data is the range of transform domain or phase, may aso be a rea part or imaginary part. Transform domain coefficient of assumptions, embedded digita watermark for the principe as shown: Figure 1. The phase quantification 2

3 Demarcation interva set: seect the quantization step size wi be divided into axes as shown in Figure1. A and B set interva. Those who beong to set the coordinates of A band represents bit "1", where a range of set B represents the position coordinates of "0". The mathematica operation that seeks the quotient and remainder: seect the quantization step size to quantify the parameters which is phase of DFT coefficients, integer vaues and remainder is operated. Assumptions a for the quotient, b for remainder, there are: 360 a = b= 360 aδ Δ Quantified embedded: The quantification of parameters θ is cosey reated to the watermark bit w i : When w i =1, enabe the quantification resuts θ equivaents to the intermediate coordinates which on a certain range of A set the nearest θ ',When w i =0, enabe the quantification resuts θ equivaents to the intermediate coordinates which on a certain range of B set the nearest θ.the expression are as foows(for k=0,1,2, ): (1) 当 w i =1 时 : θ a = 2k θ ' = θ +Δ a = 2k + 1 (2) 当 w i =0 时 : θ +Δ a = 2k θ ' = θ a = 2k + 1 After quantification ofθ, the contained information of the watermark bit w i is ony determined by the range set in the quantization resuts θ ' :If θ is in A set, θ ' on behaf of the watermark bit information w i =1; the other hand, θ is in the range of B set, θ ' wi represent the digita watermark information w i =0, the above (1) beonging to A range set, (2) beonging to B range set. From where we can see that θ ' θ Δ, the maximum error caused by the quantization operation is quantify step. As can be seen from the above description, the process of embedding the watermark based on the quantification is different from the previous embedding rues of addition or mutipication, it can be seen as appropriate modifications of parameters θ and process which be given the watermark information. In order to reduce interference resuted from the random error in the process of quantify, improve the robustness of embedded watermark, θ wi be quantified to the nearest A or B areas. When the watermark is detected, test data is carried on DFT, the corresponding watermark information w i =0 or w i =1 is get from the ocation of the embedded watermarks, the vaue of θ ' beonging to A or B set: 1 θ ' A wi = 0 θ ' B The extracted watermark sequence is carried an anti-scrambing, if raw watermark is twodimensiona images, one dimensiona sequence is transformed to two dimensiona sequence. 3

4 In this artice, the binary image is get from the mapped text, so the extracted watermark sequence is done with to get the two dimensiona image. 3 The bind watermarking scheme Based on the above system mode, DFT as the transform toos, the watermark is embedded into the phase of DFT coefficients, the phase vaue of DFT coefficients is quantified by Appropriate step size,as we as the watermark is embedded in quantified vaue. The embedded watermark vector geospatia data is obtained after that the embedded phase vaue and the unmodified magnitude carries inverse DFT; when the watermark embedded in the vector data is extracted, first, the embedded vector data is carried on DFT, then the coefficient of DFT is cacuated, the phase is get, the watermark is extracted according to the quantify program. 3.1 The embedded phase The embedded mode of digita watermark of the vector geospatia data is shown in Figure 2. Figure 2. The embedded mode Concrete steps are as foows: Step 1: The origina watermark ength is transformed to meet 2 N (FFT agorithm conditions, a quick agorithm of DFT). In order to increase the security of the watermark, the watermark can be encrypted or scrambed. Step2: Geospatia vector data V is read according to the storage order of coordinates, and then the coordinates of vertex sequence constitute a compex sequence in accordance with formua (1). a k = xk + iyk k [0, N 1] (1) Here N is the Vertices number in V. a is carried on DFT, the DFT coefficients is get by formua (2). Step3: Sequences { } k N / k = 0 ( πin) k A = a e [0, N 1] (2) N k The DFT coefficients of a sequence contain the ampitude A and phaseθ. Step4: The phase of the coefficient is quantified by the seected appropriate step size, the quantified vaue equas to the median of the interva in accordance with the "0" or "1". Step5: The embedded magnitude combined with the unmodified magnitude is carried inverse DFT, the embedded watermark vector geospatia data V is obtained. 3.2 The extracted phase The extracted phase of digita watermark is shown in Figure.3. 4

5 Figure 3. The extracted mode Step1: Vertex coordinates in ' a ' k constructed in accordance with formua (1). a is carried on DFT by formua (2), the coefficient of DFT is Step2: The sequence { ' k} V is read, then a compex sequence is { } cacuated. Step3: The phase of the DFT coefficient is quantified to mean vaues of the ocation of embedded watermark. The phase vaue is cacuated to judge in which interva quantified, the watermark is extracted according to the quantization range where the phase vaues is in. Step4: The extracted watermark bit sequence is carried on anti-scrambing, then and the sefcorreation c, in order to enhance the objectivity of the resut of extracted watermark, the sefcorreation method is used, the sef-correation coefficient obtained sc θ is used to hep determine the effect of watermark extraction, if the raw watermark is two-dimensiona images, the extracted watermark is processed to get the fina two-dimension watermark. 4 Experiments The test data contains 11,080 vertex of river ines of 1:50 miion. The watermark data is bit as Figure 4(a), according to FFT, the data is extend to the 4096 (2 12 ), and the quantization step size is 5,10,15 respectivey. ' (a) the origina watermark (b) =5 (c) =10 (d) =15 The quantization step size is variabe parameters when the range is fixed, the different step size are used in experiment to contrast, the used quantization step size are the =5, =10 and =15. The extracted watermark are shown in Figure 4(b), Figure 4(c) and Figure 4(d). Figure 5, Figure 6 and Figure 7 respectivey show the compared resut of the origina vector geospatia data and the embedded data when step size =5, =10, =15, the dotted ine for the embedded watermark data and the soid ine for the raw data. We can find the embedded mode is we invisibiity, and the embedded data does not affect the dispay quaity of 5

6 graphics, compared to three-step size, the invisibiity of graphics dispayed in figure 5 is best, Figure 6 foows, the Figure 7 is the worst. Figure 5. Comparison of before and after watermark embedded when =5 Figure 6. Comparison of before and after watermark embedded when = Avaiabiity Figure 7. Comparison of before and after watermark embedded when =15 The resuts of the a bit error ratio(ber) anaysis corresponding to =5, =10, =15 are shown in figure8. As can be seen from the statistica resuts, the BER increases with the step ength becomes arge, but the argest BER is smaer that 2.5 percent, which vaidates the avaiabiity of the proposed scheme. 6

7 4.2 Robustness Figure 8. BER anaysis corresponding to =5, =10 and =15 The robustness of the watermark is evauated for different types: format conversion, deeting the vertices, rotate, transation, scae in experiment, and find that the watermark can not be extracted effectivey after that the vertices are deeted randomy and the embedded data is scaed, so the foowing anaysis of ony a few attacks on the remaining cases and the resuts are shown in Tab.1, which exhibit the abiity of resisting attacks, and the vaues of NC (sefcorreation coefficient) cacuated by formua 3. ww. ' NC = (3) ww. w'. w' Tabe 1 the robustness experiments attacks Format conversation Transation (units) Rotation (degree) NC ( Δ =5 0 ) NC ( Δ =10 0 ) NC ( Δ =15 0 ) Experimenta resuts anaysis Through the experiment, we coud anayze and find: (1) The step size (that is ) is greater, the difference of the extracted watermark and origina watermark is smaer, so the robustness is better. (2)If the step size seected is too arge, the graphic quaity dispayed and visibiity are affected. If the step size seected is too sma, avaiabiity and visibiity can be ensured, but the effect of watermark extracted is bad. Therefore step size used to quantify is determined in accordance with the robustness of the watermark and the used condition of vector geospatia data. (3)The error in the extracted watermark of integer data embedded vector geospatia data after transation, rotation, format conversion comes mainy from its own error and rounding error when the FFT computation, the effects of the extracted watermark are the same after the format conversion and transation of the embedded vector geospatia data. After the rotation, the watermark extraction error in the data mainy from the data is cut-off. The mode is fragie after deeted vertices, scaded. 5 Concusions In this paper, a bind watermarking scheme based on DFT is proposed. By transforming the vertex sequence using DFT transformation, dividing the phase of DFT according to the quantization step size, the watermark sequence can be embedded into the phase of DFT. The experimenta resuts show that the embedded vector geospatia data has good avaiabiity, invisibiity, the watermark is robust after transation, rotation and format conversion of the 7

8 embedded watermark vector map, the computationa compexity of the mode is ow and easy to impement. It is confirmed that the proposed mode is effective in protecting the copyright of the vector GIS data. Future work wi incude the robustness against deeting vertices, cipping, scaing to the achievement of the copyright protection of the vector map and appying this mode to the other types of vector data. Acknowedgement This work was supported by Research and Deveopment Program of CASM and Funded by Key Laboratory of State Bureau of Surveying and Mapping (No ) References [1] Anbo Li, Bing-xian Lin, Ying Chen, Study on copyright authentication of GIS vector data based on Zero-watermarking. The Internationa Archives of the Photogrammetry, Remote Sensing and Spatia Information Sciences. Vo. XXXVII. Part B4. Beijing 2008.pp [2] Ohbuchi, Robust watermarking of vector digita maps, Proc. of the IEEE Internationa Conference on Mutimedia and Expo., Lausanne, Switzerand, 2002 vo.1, pp [3] XU De-he, ZHU Chang-qing, WANG Qi-sheng. A Survey of the Research on digita watermarking for the Vector Digita Map, Geometrics Word. Editoria Dept. of Geomatics Word, Harbin, China, 2007, pp [4] Voigt M, Busch C. Watermarking 2D-Vector data for geographica information systems. Proceedings of the SPIE, Security and Watermarking of Mutimedia Content, San Jose, USA, 2002, pp [5] Schuz G, Voigt M. A high capacity watermarking system for digita maps. Proceedings of the 2004 Mutimedia and Security Workshop on Mutimedia and Security, Magdeburg, Germany, 2004, pp [6] Wang Xun, Lin Hai, Bao Hu-Jun. A robust watermarking agorithm for vector digita mapping, Journa of computer-aided design & computer graphics, Editoria Dept.of Journa of computer-aided design & computer graphics, Beijing, China, 2004, pp [7] Nikoaidis N, Pitas I, Soachidis V, Fourier descriptors watermarking of vector graphics images, Proceedings of the Internationa Conference of Image Processing, Vancouver, BC, Canada, 2000, pp [8] Soachidis V, Nikoaidis N, Pitas I. Watermarking poygona ines using Fourier descriptors, Proceedings of the IEEE Internationa Conference on Acoustics, Speech and Signa Processing, Istanbu, Turkey, 2000, pp [9] Nikoaidis N, Pitas I, Giannoua A, Watermarking of sets of poygona ines using fusion techniques, Proceedings of the 2002 IEEE Internationa Conference on Mutimedia and Expo, Lausanne,Switzerand, 2002, pp [10] LI Yan-ping, TANG Zhen-min, QIAN Bo, Audio Watermark Agorithm Robust to Desynchronization Based on Speech Parameter Mode, Computer Engineering, Editoria Dept. of Computer Engineering, Shanghai,China, 2008,pp [11] Suivan K, Bi Z, Madhow U, et a, Steganaysis of Quantization Index Moduation Data hiding, IEEE Internationa Conference on Image Processing, Suntec City, Singapore, Oct.2004, pp [12] Benedens, O. and C. Busch, Towards bind detection of robust watermarks in poygona modes, Eurographics 2000 Proceedings, vo.19,.no.3,2000. pp. C199-C208. 8

9 [13] Brian C, Gregory W, Pre processed and post processed quantization index moduation methods for digita watermarking, Processing of SPIE: Security and Watermarking of Mutimedia Contents II, San Jose, USA,2000, pp [14] Chen B, Worne G, Quantization index moduation: A cass of provaby good methods for digita watermarking and information embedding, IEEE Transactions on Information Theory, IEEE Inc, USA, 2001, pp [15] Ronad N, Bracewe. The Fourier Transform and Its Appications. Xi an Jiaotong University Press, Xi an, China, 2005, pp [16] YANG Yi-xian, NIU Xin-xin. Theory and Appications of Digita Watermarking. Higher Education Press, Beijing, China,2006 9

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

Research Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing

Research Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing Mathematica Probems in Engineering Voume 2013, Artice ID 453278, 11 pages http://dx.doi.org/10.1155/2013/453278 Research Artice Frame Interpoation Based on Visua Correspondence and Coherency Sensitive

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Research on the overall optimization method of well pattern in water drive reservoirs

Research on the overall optimization method of well pattern in water drive reservoirs J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang

More information

Human Action Recognition Using Key Points Displacement

Human Action Recognition Using Key Points Displacement Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan

More information

Topics 1. Manipulators and robots

Topics 1. Manipulators and robots Proceedings of the Internationa Symposium of Mechanism and Machine Science, 017 AzCIFToMM Azerbaijan Technica University 11-14 September 017, Baku, Azerbaijan Topics 1. Manipuators and robots Anaysis and

More information

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic 5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang

More information

Image Processing Technology of FLIR-based Enhanced Vision System

Image Processing Technology of FLIR-based Enhanced Vision System 25 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES Image Processing Technoogy of FLIR-based Enhanced Vision System Ding Quan Xin, Zhu Rong Gang,Zhao Zhen Yu Luoyang Institute of Eectro-optica Equipment

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

A Method for Group Extraction in Complex Social Networks

A Method for Group Extraction in Complex Social Networks This is not the fina version of this paper. You can find the fina version on the pubisher web page. A Method for Group Extraction in Compex Socia Networks Piotr Bródka 1, Katarzyna Musia 2, Przemysław

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION 6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

A Two-Step Approach for Interactive Pre-Integrated Volume Rendering of Unstructured Grids

A Two-Step Approach for Interactive Pre-Integrated Volume Rendering of Unstructured Grids A Two-Step Approach for Interactive Pre-Integrated Voume Rendering of Unstructured Grids Stefan Roettger and Thomas Ert Visuaization and Interactive Systems Group University of Stuttgart Abstract In the

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Multiple Medoids based Multi-view Relational Fuzzy Clustering with Minimax Optimization

Multiple Medoids based Multi-view Relational Fuzzy Clustering with Minimax Optimization Mutipe Medoids based Muti-view Reationa Fuzzy Custering with Minimax Optimization Yangtao Wang, Lihui Chen 2, Xiaoi Li Institude for Infocomm Research(I2R), A*STAR, Singapore 2 Schoo of Eectrica and Eectronic

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Non-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled

Non-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled Tong and Chen EURASIP Journa on Wireess Communications and Networking (2017) 2017:46 DOI 10.1186/s13638-017-0829-z RESEARCH Non-inear adaptive image enhancement in wireess sensor networks based on nonsubsamped

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

An Alternative Approach for Solving Bi-Level Programming Problems

An Alternative Approach for Solving Bi-Level Programming Problems American Journa of Operations Research, 07, 7, 9-7 http://www.scirp.org/ourna/aor ISSN Onine: 60-889 ISSN rint: 60-880 An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa,

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

STORE SEPARATION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS

STORE SEPARATION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS STORE SEPARATION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS 1 RADHA KRISHNAN PRASHANTH, 2 MAHESH M SUCHEENDRAN 1,2 Defence Institute of Advanced Technoogy, Defence Institute of Advanced Technoogy Abstract-

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Classification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems

Classification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems Cassification of EEG Signa by STFT-CNN Framework: Identification of Right-/eft-hand Motor Imagination in BCI Systems 12 Brain Cognitive Computing Lab, Schoo of Information Engineering, Minzu University

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information