A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

Size: px
Start display at page:

Download "A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER"

Transcription

1 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN IJTPE Journa September 014 Issue 0 Voume 6 Number 3 Pages A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER S.L. Omrani 1 P. Bayat 1. Department of Computer Engineering, Payame Noor University, Iran, omrani_comput@gian.pnu.ac.ir. Department of Software Engineering, Gian Science and Research Branch, Isamic Azad University, Iran peymanebayat@gmai.com Abstract- The aim of the recent bock-based steganaysis approaches, is to detect and differentiate cover and stego images. In this research, the discovering capabiity of the steganography agorithm was used for a sampe stego image by designing a muti cassifier. This kind of cassification was used for the steganaysis of smaer bocks of an image. Because norma images mosty have heterogeneous regions, first, the main image was decomposed into smaer bocks which were simiar. Then, these simiar bocks were put in the same cass. Therefore, severa different casses were obtained, for each of which, an appropriate cassifier was identified. This approach ed to making a decision for identifying the situation of the image bocks that were either cover or stego and identifying the steganography agorithm used in stego images. Keywords: Steganaysis, Steganography, Muti Cassifier, Stego, Cover. I. INTRODUCTION Bind steganaysis identifies stego images from cover images without any knowedge about steganography embedding agorithms [1]. Most of previous works in this fied have focused on extracting features from images for the purpose of steganaysis using a binary cassifier, which identifies stego images from cover images [, 3, [4]. In the muti cassifier scenario, first, bind steganaysis tries to make a decision about the kind of cover or stego of a sampe image. If the image is determined as a stego, the muti cassifier can determine the used steganography agorithm. Pevny et a. [4] used 74 merged features for cassification. In their research, bind steganaysis cassified sampe images into 7 different casses, in which stego images were obtained by 6 different steganography agorithms. A muti cassifier was arranged by combining severa binary cassifiers. To cassify the sampe images into 7 different casses, the "max-wins" strategy (reated to binary Support Vector Machine (SVM) cassifiers) was used for each pair of casses. Experimenta resuts expained that their approach was effective in terms of cassifying the sampe images into 7 different obtained casses. Generay, the performance of bind steganaysis is measured by average detection accuracy as foows [4]: Adetect 1 Perror (1) In this formua, P error is average error probabiity. There are two types of errors reated to this area, which incude fase positive (FP) and fase negatives (FN). To have a higher detection accuracy, the proposed approach tried to minimize the mentioned bock detection errors. When the sampe cover image was determined as a stego, it iustrated that a fase positive error occurred. In contrast, when a stego image was not correcty detected, a fase negative error occurred. Performance of bind steganaysis for a muti cassifier can be evauated through comparing FP and FN errors, as shown in Tabe 1. Decision Cover Stego 1... Stego L Tabe 1. Comparing FP and FN errors [4] Cover Correct(TN) Incorrect(FN)... Incorrect(FN) Stego 1... Incorrect(FP)... Correct(TP) Incorrect(FP)... Stego L Incorrect(FP) Incorrect(FP)... Correct(TP) II. MULTI-CLASSIFIER A muti-cassifier was used to identify which steganography agorithm shoud be appied for creating the fina stego images. If I were a dataset of images, then L+1 woud be the number of images in I and this set woud be obtained as foows: I I1 cover, I stego 1,, IL1 stego L () In this formua, there is one sampe cover image and L stego images in the experimenta dataset. Furthermore, the accuracy of fina detection was obtained by the average cacuation of detection accuracy of the whoe existence images in the dataset, consisting of stego and cover images. The foowing formuate iustrates the fina detection accuracy of a muti cassifier: 1 A detect A 1 L 1 1 I A I A L I (3) where A is the detection accuracy of the composed I muti cassifier when rea images are assigned to image type I by 1,,, L 1. 66

2 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE), Iss. 0, Vo. 6, No. 3, Sep. 014 III. METHODOLOGY Instead of using one steganography agorithm, the proposed approach used L different steganography agorithms for creating stego images in testing and training stages. Before appying the major voting rue, for identifying the sampe image, two kinds of weights can infuence the increasing decision accuracy of each bock. A the weights consisted of 1: The weights that depended on different bock casses, and : The weights that depended on different image types. These two weights were used to achieve an appropriate weight for each bock. For decreasing the dimension of vectors of image features and optimizing the performance of steganaysis agorithm in feature extraction stage, optima waveet packet decomposition (WPD) was appied [5]. This stage become after bocking each image, which ed to gathering the simiar regions of image put in a bock. After appying the optima waveet packet decomposition on each bock, the obtained coefficients were more cosed [6]. Figure 1 iustrates the histogram of coefficients after appying the waveet packet decomposition. Figure. (a) From eft to right: Origina image, the image after Haar waveet decomposition [5] Figure. (b) From eft to right: The image after compeete waveet packet decomposition and the image after optima waveet packet decomposition [5] Figure 3. From eft to right: the resuted tree from optima waveet packet decomposition entropy function before bocking, the same tree after bocking [6] Figure 1. histogram of coefficients after appying WPD Therefore, after appying the Shannon Entropy Function (SEF) to the achieved coefficients, some more nodes were eiminated from the tree structure and the obtained optima tree woud have ess optima nodes. Thus, feature dimension was decreased in each bock. This soution caused decreased cacuation compexity and consideraby increased detection accuracy because of choosing the most optima features. Figure (a) and (b) iustrate the stage of WPD according to [5]. Figure 3 iustrates the reduction of feature dimensionaity after bocking as compared to optima waveet packet decomposition [6]. Athough there was a direct reationship between increasing the number of feature dimension and cacuating compexity, the presence of ess optimized features in addition to higher detection accuracy compared with previous approaches, cacuation compexity woud decrease [6]. Consequenty, in the next section, stages of feature extraction about waveet packet decomposition wi be expained in more detais. A. Compete Waveet Packet Decomposition Waveet decomposition decomposes an image into subbands with ow and high frequencies. Frequency areas have different resoutions and the anaysis of these resoutions is one of the most important concepts in waveet transform. From this viewpoint, norma waveet transform with function L R is defined according to the foowing formua [6]: L R J Z W j (4) where W j is waveet space, R and Z are two sets of rea numbers and integers, and L R is the square of integra function in space R. In compete waveet packet decomposition, image coefficients are separated based on various resoutions at different frequencies according to the foowing steps [5]: 1. First, the three-step Haar waveet decomposition is appied to the image; according to Figure 4, this action wi seect 9 detai sub-bands (horizonta H i, vertica V i, and diametrica D i, i=1,,3) and 3 approximation (ow pass) sub bands (L i, i=1,,3). In this stage, these 1 subbands are considered in the first set of features. 67

3 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE), Iss. 0, Vo. 6, No. 3, Sep. 014 Beow, other stages of the proposed steganaysis agorithm wi be expained based on its advantages and improvements in more detais. Figure 4. The sub bands resuted from waveet decomposition [5]. Focus of Haar waveet decomposition is on owfrequency sub bands; but steganographers use higher frequencies of the image to embed their hidden message. Therefore, these frequencies need to anayze in order to obtain more important features. To do so, extra waveetike decomposition is appied to sub band D 1 resuted from Haar waveet decomposition. Sub-band coefficients in Haar waveet decomposition are obtained from the mean difference of the initia image coefficients; but, in waveet-ike decomposition, high frequency sub-band is first decomposed into 4 pixe bocks and the coefficient of each bock is obtained from diametric differences of its pixes. Appying this transformation to D 1 sub-band wi decompose it into 4 equa sub bands [7]. 3. As waveet transform creates strong reationship between the coefficients inter a sub-band and sub-bands, using these reationships in [8], they coud extract PDF (Probabiity Density Function) moments; these features are used in compete waveet packet method. 78 to 34 features are extracted from these three stages atogether [7]. Eventuay, it can be caimed that compete waveet packet decomposition wi create a ibrary of functions as a very good basis for the oca anaysis of high and average frequencies of the image. B. Optima Waveet Packet Decomposition In fact, waveet packet decomposition on image signa I X, Y for 1X M and 1 Y N (which are ength and width of the image, respectivey) is performed to obtain a set of coefficients reated to that signa. Features of image signas are described by these coefficients. Since energy is focused on a set of some specific coefficients and is very sma (cose to zero) for others, these coefficients are not necessary for feature extraction. As a resut, compete waveet packet decomposition is first appied to the image foowing the procedure in Section III. A. Afterwards, Shannon entropy cost function is appied to the obtained coefficients. This function cacuates the vaues of coefficients and creates a tree based on these coefficients. Next, the function focuses on finding the minimum cost and, using a depth-first search on the tree obtained from the coefficients, it seects minimum vaues and ignores maximum ones. The resuted tree has the maximum number of nodes which can deiver the best resut for feature extraction. The number of these features varies from 39 to 55 [9]. C. Training Process In this section, there are a set of cover images and their corresponding stego images. The existing images in the mentioned set incude divided bocks with the same sizes. Because norma images mosty have heterogeneous regions, first, the main image was decomposed into smaer bocks that were simiar [10]. Then, extraction process was appied to the feature of each bock according to the expanations in the previous section. In this stage, because of the arge number of existing bocks and for achieving the same number of samped bocks from L+1 kind of images, some of them were randomy seected. This seection is incuded k L1 k random sampe bocks from the cover images with L1 random sampe bocks from stego images obtained from L different steganography agorithm. In the next step, the extracted feature from K sampe bocks was cassified into C casses. The Tree Structured Vector Quantization (TSVQ) technique was used to cassify image bocks by appying a binary tree structure based on bock simiarity. According to this approach, first, whoe sampe bocks continued to put a the simiar bocks in the same subset. For each stage of cassification, "K-means" custering agorithm was used. This agorithm divided the existent bocks into a cass (S) to two subcasses (S 1, S ) by minimizing the sum of interna energy for each custer. The achieved tree was not necessariy symmetric. If a the bocks existing in a node were the same, the mentioned division woud be stopped [11]. The reated bock diagram is shown in Figure 5. Pre-processing (De-noise) Samping + TSVQ Image Decomposition Bock Cassification Figure 5. Training process [11] Feature Extraction Cassifier Design D. Testing Process For each of the testing images, the image was decomposed into smaer bocks and feature extraction was routiney done as the expained training process. In this stage, average feature vector was obtained for each image bock. Then, the appropriate Bays cassifier identified in training stage was appied to each cass of a bock and used to detect a bock as either cover or stego. The reated bock diagram is demonstrated in Figure 6. 68

4 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE), Iss. 0, Vo. 6, No. 3, Sep. 014 Figure 6. Testing process [11] E. Cacuating Weights by Neura Networks (NN) This stage consider before using to major voting rue. Two types of weights are using to make a decision more accurate for each bock, incuding: 1. The weights that depended on different bock casses, and. The weights that depended on different image types [11]. Both of them were used to determine a bunde of weights to make a decision for each bock in terms of identifying cover or stego status. When the cover or stego status was identified for each bock by its steganography agorithm, a corresponding weight was aocated according to the cass of each bock. An appropriate cassifier was used to cacuate Correct Decision Rate (CDR) for a the C cassifiers. CDR is the weight that wi be aocated after identifying the type of an image bock. For K casses where the mentioned bocks are a type of image by 1,,..., L 1, the CDR was cacuated as foows [14]: CDR ( K) P( actua I1 decide I (5) b I 1 1 In this formua, P ( actua I decide I ) is the probabiity of bocks that are decided to be from image type I and are actuay from image type I I. This measurement was different in terms of detection accuracy and used for correct evauation of each decision with the actua type of image. Furthermore, detection accuracy coud be achieved for images in the training set and in a decision making process. The reated weights were assignabe to the decision for each bock. After achieving C different cassifiers in the training set, it coud be used for the same testing set of images to obtain the resuts of detection accuracy. If the detection accuracy of a specia type of an image was ow, the next aocated weight to the mentioned type shoud be increased. In contrast, if the detection accuracy of a specia type of an image were high, the next aocated weight to the mentioned type shoud be decreased. This routine was performed on a mode of a mutiayer perceptron neura network infrastructure [1]. Aso, in this paper some of approaches which are based on neura network used as cassification optimization. Image features are cassified by an unsupervised neura network [13, 14]. The weights for bock decision of image type I were obtained as foows [11]:, W I [1 A ] [1 P ( decide I actua I )] (6) i I e where Image Decomposition Bock Decision I Feature Extraction Weight Computation by Neura Network A, is the detection accuracy of image type and P ( decide I actua I ), is the error probabiity e Bock Cassification and Cassifier Seection Majority Voting Rue Image Decision making of a decision of image type I when this is not true. The weights reating to the bocks with different casses and image types are shown by [11]: I W ( K) W CDR ( k) (7) bi ii bi where Wb I ( K) I represents weights for bocks from image type in the Kth cass. These weights are used to identify the importance of bock decision using majority voting rue. F. Fina Decision Using Majority Voting Rue Assume a pixe sampe image incuding MN / B M N bocks by B B size. Weight of each decision is, which identifies the importance W presented by bi K of the reated decision. Therefore, the tota number of weighted decision that is made by the mentioned soution is equa to MN / B MN / B. After obtaining the vaue of as the weighted decision for a sampe image, a majority voting rue was adapted to make the fina decision on whether a given sampe image was a cover or a stego image created from one of the L mentioned steganography agorithms. The fina decision can be made by seecting a cover image or a stego image with a specific steganography agorithm that had the argest sum of weights. IV. EXPERIMENTAL RESULT There are some issues about the setting of impementation environment that are mentioned in the previous reated works [11]. UCID [15] and INRIA Hoidays [16] databases were used in the impementation of the proposed method. Three (L=3) different steganography agorithms were used to embed a secret message in the cover images to create the corresponding stego images: OutGuess (OG) [17], [18], and Mode- Based Steganography () [19]. Some differences existed between the newy presented approach and that of Cho et a.'s research [8]. In this paper, the number of sampe bocks was 30000, because this number of experiments showed that the resut went to a steady-state behaviour. On the other hand, in this research, the whoe set of sampe bocks was cassified into 16 casses. Furthermore, at feature extraction stage, instead of the Markov and Discrete Cosine Transform (DCT) features, optima waveet packet decomposition was appied to each bock. Utimatey, the embedding ratio in both of the works was the same. V. RESULTS AND DISCUSSION In this section, the accuracy of steganaysis detection was reported based on bocking for a muti cassifier. Tabe shows a comparison between Pevny et a.'s [4] and Cho et a.'s [11] works and the newy presented approach where used to embedding rate equa to 0.. For exampe in this tabe, the comparison shows that the precision of agorithm in Cho et a. was around 10% ess than that in the method by Pevny et a., whie the detection precision of the new proposed method was much higher than both of the above methods. As iustrated in Tabe, the precision of Pevny's, Cho's and the proposed methods was 67.61, 58.8, and 71.35, respectivey. 69

5 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE), Iss. 0, Vo. 6, No. 3, Sep. 014 This optimization can be expained from different perspectives. The first reason may refer to the advantage of waveet packet transformation and higher precision of this method in seecting more appropriate features for the cassifier, as expained in [8]. The second reason can be reated to error detection. As mentioned in introduction, there are two types of errors in the decision-making process which are statisticay important: The first one is fase-positive (FP) and the second one is fase-negative (FN). FP happens when a secret message is detected in the cover image and FN occurs when a hidden message is not recognized in the stego image. Moreover, truenegative (TN) is the correct detection of the absence of hidden message in the cover image and true-positive (TP) occurs when a hidden message is correcty detected in the stego image. Tabe 1 iustrates the occurrence of these states. Universa steganaysis agorithm attempts to push the occurrence of these two types of errors to have a minimum rate in order to obtain higher accuracy. Accordingy, comparing FP and FN vaues coud be used to justify the increased accuracy of the proposed method. For exampe, as iustrated in Tabe, FP error in Pevny et a.'s [4] method was 18.3 on average; in Cho et a. [11], it was averagey 8.95; and, it was 4.51 on average in the proposed method. The proposed method's detection error rate was decrease in comparison to Pevny's and Cho's ethods in the same condition and same ratios. Aso, as iustrated in Tabe, FN error in Pevny et a.'s [4] method had the average of 9.3; in Cho et a. [11], it was averagey 1.5; and it had the average of 6.78 in the proposed method. The proposed method's detection error rate was increase in comparison to Pevny's and Cho's methods; i.e. accuracy of the proposed method was higher than that of the mentioned above methods by the same proportions. In addition, accuracy of the proposed method for stego images created by OutGuess and agorithms increased by more than 15%. Finay, the overa accuracy increased from 63.63%, 70.93%, and 80.04% in Peveny et a.'s [4], Cho et a.'s [11] and the new proposed method respectivey. Figure 7 iustrates the improvement accuracy detection of proposed method in embedding rate 0. according to Tabe. Tabe 3 compares the proposed method with those of Pevny et a. [4] and Cho et a. [11] with the embedding rate of 0.3. As observed, the accuracy detection for this embedding rate was higher. Cassification of testing images into different casses was easier when the ength of the embedded hidden messages was onger. Recognition accuracy of a stego images was improved by the proposed method. Maximum improvement occurred when embedding rate was 0. and OutGuess steganography agorithm was appied to embed the message. Recognition accuracy of the proposed method was improved atogether, as compared to that of Pevny et a.'s and Cho et a.'s methods. Comparison of the proposed method with that of Cho et a.'s indicated a significant improvement in both 0. and 0.3 embedding rates, which may be because the bocking procedure had the advantage of decomposing reativey simiar bocks in the image into smaer sized bocks. According to the generated casses from the bocks, a variety of cassifiers was designed to extract the features of the bocks in different casses. Furthermore, weights were derived based on the casses of different bocks and, eventuay, a the images used in the majority voting rue improved the overa precision of the proposed method. Tabe. Comparing detection accuracy (embedding rate: 0.) Evauation of Detection Accuracy in Pevny et.a. [4] 's approach :% Evauation of Decision Accuracy in Cho et.a. [11] 's approach :% Evauation of Decision Accuracy in proposed approach :% Accuracy Detection Percentage Figure 7. improvment accuracy detection of proposed method by embedding rate 0. Tabe. Comparing detection accuracy (embedding rate: 0.3) Evauation of Detection Accuracy in Pevny et.a. [4] 's approach: 76.79% Evauation of Decision Accuracy in Cho et.a. [11] 's approach: 86.3% Evauation of Decision Accuracy in proposed approach; 90.40%

6 Internationa Journa on Technica and Physica Probems of Engineering (IJTPE), Iss. 0, Vo. 6, No. 3, Sep. 014 VI. CONCLUSIONS Since the purpose of steganaysis is to distinguish cover images from stego ones and as this is ony a sma part of steganaysis, by designing a muti-objective cassifier after defining a typica image as stego, in this research aso detected the steganography agorithm appied to create the stego image. This type of cassification operates according to the resuts from the steganaysis of smaer bocks. Thus, by using bocking method, images were divided into smaer bocks with reativey simiar areas. In addition, by increasing the accuracy of decisions about each bock, before appying the majority voting rue, two types of weighting were used for the bocks which consisted of: 1) Weights reated to different casses, and ) Weights associated with different steganography methods. Using these two types of weighting can hep in making a more accurate decision on each bock. Overa accuracy of the proposed method, as compared with the previous techniques, increased and reached to 90.40%. REFERENCES [1] I.J. Cox, M. Mier, J. Boom, J. Fridrich, T. Kaker, Digita Watermarking and Steganography, Morgan Kaufmann Pubication, 007. [] J. Fridrich, Feature-Based Steganaysis for JPEG Images and its Impications for Future Design of Steganographic Schemes, Proceeding ACM Internationa Workshop on Information Hiding, Toronto, Canada, May 004. [3] Y.Q. Shi, C. Chen, W. Chen, A Markov Process Based Approach to Effective Attacking JPEG Steganography, ACM Internationa Workshop on Information Hiding, Od Town Aexandria, Virginia, Juy 006. [4] T. Pevny, J. Fridrich, Merging Markov and DCT Features for Muticass JPEG Steganaysis, SPIE Conference Security, Watermarking, and Steganography, Vo. 6505, San Jose, Caifornia, Feb 007. [5] X.Y. Luo, F. Liu, C. Yang, D. WANG, Image Universa Steganaysis Based on Best Waveet Packet Decomposition, Science China Information Sciences, Vo. 53, No. 3, pp , Berin, Germany, March 010. [6] L. Omrani, K. Faez, JPEG Image Steganaysis Using Bock Based Optima Waveet Packet Decomposition", 6'th Internationa Symposium on Teecommunications (IST'01), Tehran, Iran, November, 01. [7] X.Y. Luo, F. Liu, D. Wang, WPD Based Bind Image Steganaysis, Journa on Communications, Issue 9, Vo. 9., No. 10, pp , 008,. [8] Y. Wang, P. Mouin, Optimized Feature Extraction for Learning Based Image Steganaysis, IEEE Transaction Information Forensic Security, Issue 1, Vo., No. 4, pp , 007. [9] H. Farid, Detecting Hidden Messages Using Higher Order Statistica Modes, IEEE Internationa Conference on Image Processing, Vo., pp , New York, USA, 00. [10] S. Cho, B. Cha, J. Wang, C.C. Jay Kuo, Bock- Based Image Steganaysis: Agorithm and Performance Evauation, IEEE Internationa Symposium Circuits and Systems, pp , Paris, France, May 010. [11] S. Cho, J. Wang, C.C. Jay Kuo, B. Cha, Bock Based Image Steganaysis for a Muti-Cassifier, IEEE Internationa Conference on Mutimedia and Expo, pp , Singapore, 011. [1] K.L. Du, Custering: A Neura Network Approach, Esevier Neura Networks, Issue 1, Vo. 3, pp , January 010. [13] I. Kaneopouos, G.G. Wikinson, Strategies and Best Practice for Neura Network Image Cassification, Internationa Journa of Remote Sensing, Issue 4, Vo. 18, pp , 010. [14] W. Hachicha, A. Ghorbe, A Survey of Contro Chart Pattern Recognition Literature ( ) Based on a New Conceptua Cassification Scheme, Esevier Computers & Industria Engineering, Issue 1, Vo. 63, pp. 04-, August 01. [15] G. Schaefer, M. Stich, UCID - An Uncompressed Coour Image Database, SPIE Storage and Retrieva Methods and Appications for Mutimedia, Vo. 5307, pp , 004. [16] H. J egou, M. Douze, C. Schmid, Hamming Embedding and Weak Geometric Consistency for Large Scae Image Search, 10th European Conference on Computer Vision, pp , Marseie, France, October 008. [17] N. Provos, Defending Against Statistica Steganaysis, 10th USENIX Security Symposium, Vo. 10, pp , Citeseer, 001. [18] A. Westfed, - A Steganographic Agorithm: High Capacity Despite Better Steganaysis, ACM Internationa Workshop on Information Hiding, Pittsburgh, PA, Apri 001. [19] P. Saee, Mode Based Steganography, Internationa Workshop on Digita Watermarking, pp , Seou, Korea, October 003. BIOGRAPHIES Seyedeh Leia Omrani received her B.Sc. and M.S.E. degrees in Computer Engineering from IAU of Qazvin in 007 and 01, respectivey. Currenty, she is a Lecturer at Department of Computer Engineering, Payame Noor University, Iran. Her researches are focused on steganography and steganaysis techniques. She has pubished severa papers and performed some projects in the mentioned area since 010. Peyman Bayat received his and B.Sc. and M.Sc. degrees from Isamic Azad University, Iran in 1998 and 003, respectivey, and the Ph.D. degree in Computer Engineering Systems from University Putra Maaysia, Maaysia in

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

OF SCIENTIFIC DATABASES

OF SCIENTIFIC DATABASES CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India Internationa Journa of Advancements in Research & Technoogy, Voume, Issue 6, June-04 ISSN 78-7763 89 Pattern assification for andwritten Marathi haracters using Gradient Descent of Distributed error with

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Contourlet Tranform Based Human Emotion Recognition System

Contourlet Tranform Based Human Emotion Recognition System Internationa Journa of Signa Processing Systems Vo. 2, No. 1 June 2014 Contouret Tranform Based Human Emotion Recognition System R. Suresh and S. Audithan Department of computer science and Engineering,

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

Available online: 04 Dec To link to this article:

Available online: 04 Dec To link to this article: This artice was downoaded by: [Université de Strasbourg, SCD ] On: 19 January 2012, At: 00:54 Pubisher: Tayor & Francis Informa Ltd Registered in Engand and Waes Registered Number: 1072954 Registered office:

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model A Two-Step Approach to aucinating Faces: Goba Parametric Mode and Loca Nonparametric Mode Ce Liu eung-yeung Shum Chang-Shui Zhang State Key Lab of nteigent Technoogy and Systems, Dept. of Automation, Tsinghua

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

A VLSI Architecture of JPEG2000 Encoder

A VLSI Architecture of JPEG2000 Encoder A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Versatile Size-l Object Summaries for Relational Keyword Search

Versatile Size-l Object Summaries for Relational Keyword Search IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. Y, XXXX, YYYY Versatie Size- Object Summaries for Reationa Keyword Search Georgios J. Fakas, Zhi Cai and Nikos Mamouis Abstract The Object

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About

More information

Research on the overall optimization method of well pattern in water drive reservoirs

Research on the overall optimization method of well pattern in water drive reservoirs J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang

More information

InnerSpec: Technical Report

InnerSpec: Technical Report InnerSpec: Technica Report Fabrizio Guerrini, Aessandro Gnutti, Riccardo Leonardi Department of Information Engineering, University of Brescia Via Branze 38, 25123 Brescia, Itay {fabrizio.guerrini, a.gnutti006,

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points. Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles http://asp.eurasipjournas.com/content/22//86 RESEARCH Open Access Muti-task hidden Markov modeing of spectrogram feature from radar high-resoution range profies Mian Pan, Lan Du *, Penghui Wang, Hongwei

More information