Research Article Applications of PCA and SVM-PSO Based Real-Time Face Recognition System

Size: px
Start display at page:

Download "Research Article Applications of PCA and SVM-PSO Based Real-Time Face Recognition System"

Transcription

1 Hindawi Publising Corporation atematical Problems in Engineering, Article ID , 12 pages ttp://dx.doi.org/ /2014/ Researc Article Applications of PCA and SV-PSO Based Real-Time Face Recognition System ing-yuan Sie, Juing-Sian Ciou, Yu-Cia Hu, and Kuo-Yang Wang Department of Electrical Engineering, Soutern Taiwan University of Science and Tecnology, Tainan City 710, Taiwan Correspondence sould be addressed to Juing-Sian Ciou; Received 25 February 2014; Accepted 23 April 2014; Publised 13 ay 2014 Academic Editor: Rui u Copyrigt 2014 ing-yuan Sie et al. Tis is an open access article distributed under te Creative Commons Attribution License, wic permits unrestricted use, distribution, and reproduction in any medium, provided te original work is properly cited. Tis paper incorporates principal component analysis (PCA) wit support vector macine-particle swarm optimization (SV- PSO) for developing real-time face recognition systems. Te integrated sceme aims to adopt te SV-PSO metod to improve te validity of PCA based image recognition systems on dynamically visual perception. Te face recognition for most umanrobot interaction applications is accomplised by PCA based metod because of its dimensionality reduction. However, PCA based systems are only suitable for processing te faces wit te same face expressions and/or under te same view directions. Since te facial feature selection process can be considered as a problem of global combinatorial optimization in macine learning, te SV- PSO is usually used as an optimal classifier of te system. In tis paper, te PSO is used to implement a feature selection, and te SVs serve as fitness functions of te PSO for classification problems. Experimental results demonstrate tat te proposed metod simplifies features effectively and obtains iger classification accuracy. 1. Introduction Tere are numerous approaces tat develop useful scemes to detect and recognize te features of uman faces in recent years. Tey are used to filter te background and detect te faces blocks from a digital image firstly, ten to determine teir features and generate caracteristic vectors, to localize te faces continuously, and to recognize te main face finally. In general, te approaces of uman face image processing consist of two fields as face detection and face recognition. For uman-robot interaction, to recognize faces is muc more difficult tan to detect faces. It is because te facial expression and features are cangeable and not easily recognized and predicted. Tere are two standard linear subspace projections of te low-resolution facial images [1],tePCAandtelinear discriminant analysis (LDA) [2], used to distinguis te different styles of images. Te PCA is basically a compression procedure based on linear projection tecniques on a subspace spanned by te principal eigenvectors (tose corresponding to te largest eigenvalues) of te input covariance matrix. Te LDA approac was proposed by Fiser firstly wic identifies directions in space along wic separation of te projections is maximized. Wile te LDA is not always superior to te PCA in terms of recognition accuracy, te PCA + LDA approac as been successfully applied in some face recognition applications. However, te PCA and/or LDA based facial recognition may fail if te facial samples are captured in different directions. Wile te face images are captured from different sigt depts and directions, te accuracy of te PCA based recognition will be reduced eavily. Tere are many face recognition metods provided to overcome suc problems, some focus on te feature extraction. How to use te smallest dimensions to replace te most representation s feature and classificationistemostimportantissueintispaper. Since te facial feature selection process can be considered as a problem of global combinatorial optimization in macine learning, te PSO-SV is usually used as an optimal classifier of te system. In te part of te classification, te PSOisusedtoimplementfeatureselections,andteSVs[3, 4] serve as fitness functions of te PSO for te classification

2 2 atematical Problems in Engineering problem. Te advantage of te SV in te multidimensional spaceistatitcanquicklyandcorrectlyclassifysamplesto findouttebestsupportvector[5]. Te PSO algoritm is a kind of imitation of birds clustering penomenon algoritm [6 9],andintispaper,tePSOwillbeissuedtocorrectte parameters of te SV so tat te image recognition process canbefasterandmorestable. Te rest of tis paper is organized as follows: in Section 2, te image detection sceme is described wic consists of smooting filter, connected position, and ellipse detection. Section 3 describes te face recognition system wic includes te adjustment of te dimensions, te PCA, and te PSO-SV classifier. Section 4, experimental results are presented to demonstrate te feasibility of te proposed sceme. Finally, some conclusions are made in Section Te Face Detection System In order to detect te face from an image, tere are several key steps necessarily processed. Te first is to detect te area of skin color; te second is to reduce te noise; te oters are to distinguis wic one or ones are te face by ellipse detection and to separate te face block from te image background. Figure 1 illustrates te flowcart of te proposed face detection sceme. Te images captured by te webcam in sequence will be sent to te face detection system firstly, and ten te area of te uman face is separated from te complex background by te skin-color detection. ext, te noise is going to be filtered by te noise reduction. Finally, te captured contours will aid in locating te position of te umanface.teblockofteumanfacewillonlyremainin teimageaftertefacedetection Skin-Color Detection. Te RGB image is always wit cromatismbecauseofcangeableilluminationineverycapture. For skin-color detection, a reliable color range defined as te skin-color is principal. Since te color values in RBG are so sensitive to varying illumination, most approaces adopt te color model of YCbCr replacing te RGB because te value Y is relative to luminance and te values of Cb and Cr are relative to croma. YCbCr color space can be regarded as a modified YUV color model. However, YCbCr is not an absolute color space wic is a way of encoding RGB information. In YCbCr color space, Y is te luma component; Cb and Cr represent te blueness and te redness croma components, respectively. Te transform defined in te ITU-R BT.601 standard for digital component video te YCbCr color space can be translated from te RGB color space by Y R 16 [ Cb] = [ ] [ G] + [ 128]. [ Cr] [ ] [ B] [ 128] (1) Te resultant Y is just between 16 and 235 because te values from 0 to 15 are called footroom and te values from 236 to 255 are called eadroom. Besides, in tis paper, te skincolor region of Cb calculated is between 71 and 127; te skincolorregionofcrisbetween130and170fromte150sample images. By te skin-color regions, te uman face block will be easily distinguised from te image according to te values of Cb and Cr. Te low-pass filter (LPF) was used to eliminate te small noises and connect te part of te incomplete image. Te LPFmakesteimageforfilteringbecomemoresmootand uniform. In general, te start of te mask is set to be at te top left pixel of te preprocess image, and it will scan te wole image from left to rigt. It is also referred to te neigboring 8 pixels for processing. Generally te sizes of te masks are 3 3, 5 5,and7 7. Te larger te mask, te larger te filtering effect, but te calculation becomes relatively large. Te 3 3mask was used for low-pass filtering in tis paper. Besides, te opening operation of te morpology is usually used to eliminate noises in an image. Te opening operation included two operands wit erosion and dilation. First, it will use te erosion for te binary image and ten use te dilation for its result. After tis procedure, te noises will be removed from te image. Te opening operation of te morpology can not only remove a part of te noise pixels of te binary image but also make more complete region of te skin-color. After finising te procedure of te noise reduction, te connected component labeling (CCL) was used to find te location of te uman face. Tis metod was mainly used to find te connected pixels of te same object in te image. It marks eac block by different labels and counts size, eigt, and widt of eac independent object in te image. Te 4- connected was used to label pixels in tis paper. It starts to scan te prelabeled binary image from top left. In te coordinates (x, y) of te pixel, determine te presence of 255 on a pixel before cecking te rigt (x + 1, y),left(x 1,y), top (x, y+1),andbottom(x, y 1),foranyoter255values.If yes, it will record its coordinates and te pixel is set to 0. Ten tereisterecursiveprocessofceckingalltepixelsfor presence of 255 valued pixels until none is present. Ten te groupwittemostnumberof255valuedpixelsissearced and labeled. Wile finising te recursive scanning of te image, te group objects for image labeling were calculated. Te biggest areaofteregionwasfoundfromallnumberedregions,tat is, te region of te uman face. Tis region was scanned to find te black background of te facial boundary. Ten te relative coordinates (X min, Y min )and(x max, X max )were employed, to capture te facial region from te original image. Te biggest region for labeling of te binary image is sown in Figure 2. Te Sobel edge detection [10] is used to detect te edge. For face detection, since tere are obvious differences between te background and te region of te skin color in te facial binary image, te edge detection usually employed te first derivative of te image to estimate te regional edge andwasusedtocalculatetesizeoftegradientforimage processing. Te Sobel edge detection employs te gray scale difference at te position of te edge and weigted te top and bottom, or left and rigt, to detect te edge of te object.

3 atematical Problems in Engineering 3 Webcam oise reduction Image binarization Smooting filter Skin-color detection Color space transformation Luminance compensation Skin-color segmentation Face localization Opening operation Connected component labeling Sobel edge detection Yes o Captured te uman face Ellipse detection Figure 1: Face detection system flowcart. Figure 2: Te biggest region for labeling of te binary image. Figure 3: Te result of te Sobel edge detection. Troug te Sobel edge detection processing, te region of tefaceissowninfigure 3. Since te size of a uman face is similar to te elliptical model wit te ratio of te vertical axis and te orizontal axis as approximately 1.2 : 1, tus, an ellipse mask is used to locate te uman face, wic marks a boundary to extract te edge of te image. After te edge detection, te region tat resembles more te sape of an ellipse will provide te position of te face. Te center of te ellipse wit te use of its circumference and te lengt of its axis can elp to determine its position, sape, and size. In order to meet te size of te facial cange, te elliptical model must adjust te ratio of te lengt of te axis to scan te image in real time. Terefore, we designed an elliptical model tat determines te coordinates of te center of te ellipse (x 0,y 0 ) wit x as te radius of te orizontal axis and y fortatofteverticalaxis. Face detection is ten finised after te ellipse detection processing. Te ellipse detection cooperates wit te connected component labeling to find te facial region. Te locations of te detected faces in te original image and te binary image are sown in Figures 3 and 4, respectively. ext, te unnecessary region outside of te elliptical range was

4 4 atematical Problems in Engineering Webcam Figure 4: Face location of te binary image. Image preprocessing Face recognition Face detection Captured face images Image normalization PCA based training Training database Feature extraction Feature weigt vector Database of faces SV classification PSO parameter optimization Recognition results Figure 6: Te sceme of te face recognition system. Figure 5: Te result of te captured facial image. removed. Tis procedure will elp in eliminating te image of te neck and locate te facial region. Te relative coordinate wasusedtocapturetefaceforteoriginalimage.teresult oftecapturedfacialimageissowninfigure Te Face Recognition System 3.1. Description of te Face Recognition System. Te face recognition processing will be executed after finising face detection. However, since te dimensions of te facial images arenottesame,tenormalizationprocessfortefacial image becomes important. Te processed image to be analyzed contains te same information of te environment to make te dimensions of te facial regions te same for eac face. After te image normalization processing, tecapturedimageservesasteinputdataforteface recognition system. And ten, principal component analysis is utilized to calculate te feature. Tis metod could reduce te dimension of te image and save computation time. It could surmount te problems of te canged expression or presence of glasses on te face, because it treats te wole face as a feature. Te weigting vectors of te processed facial image will be calculated by using PCA. All te weigting vectors are collectedtobuildtedatabasefortefacerecognitionsystem. Te user identity could be determined by te support vector macine tat compares te current image wit te image in te database. Tis way is a fast and accurate classifier tat can be applied to classification and comparison applications. It sows tat te velocity and accuracy of te face recognition system can be increased troug te support vector macine processed. At te same time, te particle swarm optimization (PSO) is used to design te parameter of te support vector macine. Tis metod makes te face recognition system complete and quick. Te face recognition system flowcart proposedintispaperisassowninfigure Image ormalization. Acieving ig recognition rate for te face recognition system does not only need a good recognition algoritm but also needs a robust face image for te preprocessing of te image. It could reduce te differenceforeacinputimageandcangedeacimageto te same dimension for te database. Terefore te bilinear interpolation is used to amend te image tat detects te face wit te size of te pixel at Trougtebilinear interpolation processing, feature extraction and recognition are executed for te facial image.

5 atematical Problems in Engineering 5 A E B y P 1 x P 2 vertical distance of P 1 corresponding to te four neigboring pixels. If te distance from pixel to pixel is one unit as assumed in tis paper, it can be represented by 0<xand y< 1, ten te adjusted facial dimension is sown in Figure 8. C F D Figure 7: Te diagram of te bilinear interpolation. Te relation of te pixel coordinate between te original imageandfinalimageisnottesameastegeneralimage processing wen te image is zoomed. A pixel of te original image could project into many pixels for te final image, wen te images are zoomed in. Similarly, many pixels of te original image could project onto a pixel for te final image, wen te images are zoomed out. Terefore, te final image must searc for a pixel to substitute te original image. And wit tis in mind, te interpolation process is needed to calculate te pixel of te final image; oterwise te finalimagewouldproducetremendousdistortion.actually te interpolation used discrete samplings to calculate te continuous function wic passes troug te coordinates of tesesamplesandtenemploytisfunctiontofindtevalue of nonsamplings. Te image zooming could define te signal resamplingbecauseteimagewasasignaltatiscomposed of te two-dimensional discrete sampling. Ten te bilinear interpolation adopted te four neigboring pixels to calculate te new pixel. Te diagram of te bilinear interpolation is sown in Figure 7. In order to obtain te pixel P 2 as a projection of te original image, P 2 is supposed to project onto P 1 ;tuste four neigboring pixels (A, B, C, D) were used to calculate te distances between P 1 and te coordinates of four pixels. If te four pixels are closer to P 1 ten te contribution is large for P 2. Conversely te influence is smaller if te distance is farter. Terefore te effect is inversely proportional to te distance. In fact, te bilinear interpolation calculated te linear interpolation continuously for tree times. Te first interpolation was calculated to be te influence between two points (A, B) and P 2 in order to obtain pixel E. Te equation of te first interpolation is expressed in E = (1 x) A +xb. (2) And ten te second interpolation was calculated using teinfluencebetweentwopoints(c,d)andp 2 to obtain pixel F. Te equation of te second interpolation is expressed in 3.3. Principal Component Analysis. After normalization, if te face recognition is directly implemented it would cost a lotofcomputingtime.tisisduetotefacttatallteinformation of te original image is spread in eac pixel; ence, tere is te need to reduce te dimensions of te image. Andten,tesuitablefeaturesarecapturedtoexpressalot of information in lower dimensions. It could reduce many variations for data wit te use of PCA and applying some mutually independent linear combinations to substitute for te original data. Troug te linear combination computing, te difference of te variation was te large influence of te data. Tis analysis made data to display te biggest individual differences. Below is te process for implementing PCA. If tere were facial images as te training samples te original feature parameters were {X 1,X 2,...,X }.Te objective of PCA was order to find te linear transformation matrix P wit a size of n m. It extracts feature parameter X k of te original n dimension to transform te more representative of te feature parameter Z k tat te dimension was m(m n). Te equation of te transformation expressed in Z k =P T X k,,2,...,. (5) Before te transformation computing, te mean vector was X. After te transformation, te mean vector was Z expressed in Z = 1 k = Z 1 P T X k =P T ( 1 X k ) =P T X. (6) Ten te total scatter matrix was used to indicate te dispersion of all feature parameters tat were opposite to te mean vector X. Before te transformation computation, te total scatter matrix was S tx wic as a size of n n.te equation of te total scatter matrix S tx is expressed in S tx = (X k X) (X k X) T. (7) Troug (18) to(20), te total scatter matrix S tz can be obtainedavinga size ofm mafter te transformation. Te equation of te total scatter matrix S tz is expressed in F = (1 x) C +xd. (3) Finally, te tird interpolation was used to calculate te pixel of P 2 for two points (E, F). Te equation of te tird interpolation is expressed in P 2 = (1 y) E +yf, (4) were x represents te relative orizontal distance of P 1 in relation to te four neigboring pixels; y is te relative S tz = = =P T ( (Z k Z) (Z k Z) T (P T X k P T X) (P T X k P T X) T (X k X) (X k X) T )P=P T S tz P. (8)

6 6 atematical Problems in Engineering (a) Te original image (b) Te image after facial dimension adjusting (80 100) Figure 8: Facial dimension adjusting. In order to increase te dispersion between te mean value and te feature parameters of te transformation, te transformation matrix P opt sould be calculated tat could make te maximization of S tz.teequationofte transformation matrix P opt is expressed in P opt = arg max P (PT S tz P). (9) According to te teory of linear algebra, te trace or te determinant can be used to express te element s distribution. Terefore, (9) couldberewrittenas P opt = arg max P tr (P T S tz P). (10) In (10), in order to limit te value of tr (P T S tz P) and avoid te occurrence of infinity, a limit condition as P T P=Iwas added for te transformation matrix P tat as a size of n m: F (P) =P T S tz P λ(p T P 1). (11) As follows, te value of F(P) is maximum wile te first derivative for P is zero: F (P) P =2S t Z P 2λP = 0. (12) Ten, (12) becomes(13) troug simplification using transposition: (S tz λi)p=0. (13) In (13), it needs to compute te eigenvectors of matrix S tz by composing te matrix for P. Te eigenvalues and te eigenvectorsaretespecialforminmatrixalgebraandits elements could be restructured in te matrix. In addition, te important information would be concentrated in te larger eigenvalue tat would correspond to te eigenvectors. Te advantages of PCA in face recognition can be divided into tree advantages. First, it could quickly and easily calculateteresult.second,pcacouldretaintelargest information of te projection data in te linear projection. Tird, PCA used te wole face to do feature extraction tat could overcome te presence of glasses and te canges of te facial expression. Below is te operational procedure of PCA. After normalization, number of facial images was trained using PCA. Te size of eac sample was matrix. ext, eac sample is rearranged as te augmented vector Γ wic as te size 2 1assownin(14). Γ 1,Γ 2,...,Γ represent te facial images processed. Eac facial sample corresponded to Γ, and te mean vector Ψ was calculated by te amount of Γ as expressed in Ψ= 1 Γ k. (14) Te mean vector Ψ is te mean face wic indicates te mutual parts of all face. And ten te mutual parts for facial images were deleted to igligt te different parts between tem. Terefore te different image vector of eac image was obtained as sown in φ k =Γ k Ψ,2,3,...,, (15) werein matrix A equals [φ 1,φ 2,φ 3,...,φ ] tat ad te size 2 and te covariance matrix C of all faces was defined as C= 1 φ k φ T k =AAT. (16)

7 atematical Problems in Engineering 7 Te eigenvalue λ k and te eigenvector u k of te matrix C are expressed in Cu k =λ k u k,2,3,..., 2, (17) were λ k = (1/) j=1 (ut k φ j) 2 and φ={φ 1,φ 2,...,φ }. Since te size of matrix A was 2,itmakestesize of matrix C be 2 2. For suc a large matrix calculating te eigenvalues and eigenvectors is time consuming. Tus, if te dimensions of te matrix could be reduced, it could effectively save calculation time. Terefore, te matrix A T A must be calculated first and te dimensions of te matrix must be reduced as to obtain te eigenvector V k wic expressed in A T AV k =μ k V k,2,3,..., 2. (18) Equation (18) multipliesby tematrixa to obtain AA T AV k =μ k AV k, (19) in wic AA T as te same eigenvalue and eigenvector wit A T A, because te matrix C equals AA T.Bycomparing(17) and (19), (20) can be obtained as follows: u k =AV k λ k =μ k. (20) By using (18), te matrix of A T A is used to calculate te eigenvector V k wic determines te eigenvalue u k.itis considered as an eigenface as expressed in u k = j=1 φ j V kj,,2,...,. (21) Te vector Γ 1,Γ 2,...,Γ of te individual facial image combined wit te corresponding eigenvector to build te feature space. And we calculate te weigt vector V from te feature space as expressed in Ω k =u T k (Γ Ψ) =ut k φv=[φ 1,φ 2,φ 3,...,φ ],2,3,...,. (22) Finally, eac training sample Γ i of te face is inputted to substitute te Γ of (22)andcalculateteeigenvectorV i in te feature space. Troug te computation, te matrix V will be taken as te database of te facial images after te training SV Based Classification for Face Recognition. Euclidean distance based metods [11] aim to calculate te difference value of te distance measurement, wic are usually used in pattern recognition system. Te resemblance computation directly calculates te difference between two vectors. Te smaller value means tat te two vectors are closer. It also indicates tat te features of two images are also closer, and tere is te presence of similarity in te images. Te equation of te Euclidean distance is expressed in k (a i1 b i1 ) 2 d 1 d 2 k d 3 = (a i2 b i2 ) 2., (23) [ ] [ d ]. k [ (a i b i ) 2 ] [ ] in wic d 1,d 2,d 3,...,d are te Euclidean distances between te eigenvector of eac image and te eigenvector of te target image; a i is te it element of te input eigenvector; b i is te it element of te eigenvector saved in te database; k is te dimension of te eigenvector; and is te t image saved in te database. In general, if te Euclidean distance metod is directly used in face recognition system, it would require a lot of computation time, because te Euclidean distance applies bubble sort for comparison. For example, if tere are one tousand data in te database, it will require te process to be performed one tousand times and te larger te database te longer te comparison time. Terefore, support vector macine is used to assist suc face recognition problems. Te calculated Euclidean distances are inputted te feature space oftesupportvectormacinetoperformtecomparisonand classification. Te most important goal of face recognition system is ow to raise te accuracy and sorten te computing time oftesystem.infact,principalcomponentanalysiscould indeed raise te accuracy as sown in previous experiments. However, te comparison of te Euclidean distance would require a lot of computing time. Terefore, te design of te supportvectormacineclassificationsortensteprogram s computing time for te face recognition system. Te SV is performed troug te following process. First, te yperplane is designed to classify te Euclidean distance as sown in Figure 9. In te figure, d i denotes te Euclidean distance between te target image and it image of te database. Tere are images in te database wit i = 1,2,3,...,. Besides, d mean indicates te mean value of te Euclidean distance between te target image and all images in te database. Te equation of d mean is expressed in d mean = d i. (24) In tis metod, te training data is sown: (d 1,y 1 ),...,(d,y ), d 1 R n (25),2,..., y i d mean. Ten, consider (w d i ) +b d mean y i =d mean,,2,..., (26)

8 8 atematical Problems in Engineering yi < dean w y i = dean Bytemetodofsupportvectormacine,d i found to be located between zero and d mean inteyperplaneare retained. Tese data are used to recalculate te d mean and reexecute te classification by te same way. Tis procedure wouldberepeateduntildataareallplottedbeforeterminating te program. Tis data represents te Euclidean distance closest to te target image. Finally, tis data sows te image wic is te recognition results needed. L 1 : w d i +b=d mean L: w d i +b=0 Figure 9: Hyperplane of te Euclidean distance. in wic w is te normal vector of te yperplane and b is te deviation value. In order to find te division of te yperplane te question of quadratic optimization needs to be resolved. Te constraint is expressed in y i (w d i b) d mean,,2,...,. (27) Te minimum value of d(w) = (1/2) w 2 must be determined because te equation above is quadratic wit a linear constraint. Tis is a typical quadratic optimization problem. So, te Lagrange multiplier is resolved to te question of quadratic optimization wit linear constraint to obtain L (w, b, α) = 1 2 w2 α i [y i (w d i +b) d mean ] α i 0. (28) However, te support vector macine still does not produce te optimal solution. Te metod in wic te problem is dealt wit was to address te dual question. Te dual question is expressed in L w =w α i y i d i =0 w= L b = α i y i =0. α i y i d i. (29) And a new equation was left after performing te substitution as expressed in L D = α i 1 2 i,j α i α j y i y j d i d j. (30) After aving determined te optimal solution to te dual question, eac Lagrange modulus α i is mapped onto eac trained data. If α i 0, tis means tat te data is te supportvectoroftisquestionanditislocatedintemargin separating te yperplane. Te final function is expressed in f (d) = sgn [ α i y i (d i d) + b]. (31) 3.5. PSO-SV Classifier. Te particle swarm optimization (PSO) was proposed by [12 15]. Tis metod is a concept of swarm intelligence wic belongs to te territory of te evolutionary searc. Tis algoritm is an evolutionary optimization implementation similar to te genetic algoritm (GA). First, tey could produce te initial solution and apply evolution to find te optimal solution. Te difference is tat PSO does not ave te procedures of crossover and mutation. Itbelongstotesignal-cannelmessaging,andteprocessof searcing update is canged according to te current optimal solution. Terefore, in te general optimal questions, te PSO converges to te optimal solution more quickly tan te GA. Te origin of te PSO is from te concept of te predation on bird populations. Kennedy used tis concept to researc te solution of te optimal question, and tis question is just like a bird wic flies in space, called particle. Tere is a fitness function of te objective function mapping for all particles tat moved in te space. In addition, eac particle as te velocity to determine te direction and te distance of te movement. Te particles flig in te solution space by te individual successful experience and te trajectory of te best particle in te current population. In addition, eac particle could searc independently in te PSO space. Wen te individual particle found te optimization of te function, te best searc variable will be recorded in te individual memory. Tus, eac particle owns te best memory of te searc variable for itself. It would cange te next searc direction by te individual best memory of te searc variable, and tis procedure is called te cognition-only model. Every searc would compare te optimization extent between te individual best searc variable and te best searc variable of te population. Tis procedure would adjust te variable memory of te best function for te population. At te same time, eac particle could cange te searc velocity of te particle for next time according to te best variable memory of te population, and tis process was called te social-only model. Troug te evolutionary computation, te PSO would calculate te optimal solution according to te best fitness value of te particles [16]. Te flowcart of te PSO is sown in Figure 10. In te space of te SV, it requires te design of an important parameter w. Terefore, PSO is applied to optimize tis parameter. Te particle s position in te PSO space was used to substitute te parameter w of te SV space. Troug te evolutionary computation, eac particle wouldupdatetepositionandteparameterw would be updated continually too. By tis procedure, we could find te optimization value of te parameter w.

9 atematical Problems in Engineering 9 Start Setup te parameters and te quantity of te particles Record te individual best memory and te best memory of te population for te particles (p g x,pg y ); terefore te parameter wg of te SV could be calculated by (p g w g = x )2 +(p g y ) (32) If te set p g wit particles is called te population in te gt generation, it can be expressed in Produce te initial velocity ( o ) and position (s o ) of eac particle randomly Estimate te fitness function of eac particle y o Update te position and velocity for eac particle Satisfy te termination condition? End Figure 10: Te flowcart of te PSO. p g+1 Yes p g =(p g 1,pg 2,...,pg,...,pg ). (33) Te velocity vector and position vector of te t particle ( [1,2,3,...,])integt generation (g [1,2,3,...,G]) are expressed in (34)and(35), respectively, as follows: V g = (Vg 1, Vg 2,...,Vg,...,Vg ), (34) p g = (pg 1,pg 2,...,pg,...,pg ), (35) in wic te position of te t particle in te gt generation is p g. Also, te processes of te PSO could be explained as follows. Step 1. Te initialization of te PSO was set to g=1, F pbest 1 = F pbest 2 = =F pbest =0.Tenumberofteparticles(), te number of te generation (G), and four parameters of C 1, C 2, γ max,andγ min are given. Step 2. Te initial velocity V 1 =(V1 1, V1 2,...,V1,...,V1 ) and te initial position p 1 = (p1 1,p1 2,...,p1,...,p1 ) of particles are created. g g+1 Gbest Step 3. Te fitness value of eac particle in te gt generation is calculated by using (36). fit( ) is te fitness function wic is expressed by te reciprocal computing time of te recognition system: p g Pbest Figure 11: Te PSO searc in te space. Te PSO produces te particles of te initial population randomly and troug te evolutionary computation to find te optimal solution for te function. In eac evolution, te particle would cange te individual searc direction by two searc memories. Te first searc is te optimal individual variable memory Pbest and te oter is te optimal variable memory of te population Gbest. After te computation, te PSO would calculate te optimal solution according to te optimal variable memory. Figure 11 sows te PSO searc in aparticularspace. Having a range of x [0, 20] and y [0, 20], it is supposed tat te coordinate of particle s position was x Step 4. Te F Pbest F(p g )=fit (pg ), =1,2,...,. (36) and p Pbest for eac particle were deter- is expressed in (37), and te is expressed in (38) as follows: mined and te equation of F Pbest equation of p Pbest F Pbest ={ Fg F Pbest p Pbest ={ pg p Pbest, if FPbest, oterwise, F g, if FPbest, oterwise, F g {1,2,...,}, (37) {1,2,...,}, (38) were, p Pbest was te individual optimal fitness value F Pbest form te starting to te current generation. Step 5. Te index q ofteparticlewitteigestfitness function is designed by q=arg max {1,2,...,} FPbest. (39)

10 10 atematical Problems in Engineering And ten, F Gbest and p Gbest are determined by F Gbest =F Pbest q = max {1,2,...,} FPbest, p Gbest =p Pbest q, (40) in wic p Gbest is te position vector of te particle wit te global optimal fitness value F Gbest from te starting to te current generation. Step 6. If g = G,andtengotoStep 10, oterwisegoto Step 7. Step 7. Te velocity vector is updated for eac particle by V g+1 =γ V g +c 1 rand1 () (p Pbest p g ) +c 2 rand2 () (p Gbest p g ), (41) were V g is te current velocity vector of te t particle in te gt generation. V g+1 is te next velocity vector of te t particle in te (g + 1)t generation. rand1() and rand2() are two uniformly distributed random numbers in [0, 1]. C 1 and C 2 are te constant values tat are set to 2. γ was te weigt value wic is defined by γ=γ max γ max γ min g, (42) G were γ min and γ max are, respectively, te minimum value and temaximumvalueofγ,andteγ min is set to 0.4; te γ max is set to 0.9. Step 8. Ten te position vector is updated for eac particle by p g+1 =p g + Vg+1, (43) were p g is te current position vector of te t particle in te gt generation. p g+1 is te next position vector of te t particle in te (g+1)t generation. Step 9. Let g=g+1and go to Step 3. Step 10. Teoptimalpositionvectorofteparticlep Gbest wit te optimal fitness value F Gbest is determined. After te above procedures, te particle moves in te generation tat would create te new parameter w for te SV. Te computing time of te face recognition system is compared for eac parameter w, and te best w in current generation is searced for. It projects te space of te PSO to be te optimal global solution for te next generation. Troug tis metod, te best parameter w of te SV could be found to reduce te computing time of te face recognition system. 4. Experimental Results 4.1. Actual Experiments. In te experiments of te face recognitionsystem,tefacialdatabaseusedcontainedten Table 1: Te comparison wit te experiments wit fifty samples. PCA + ED PCA + SV PCA + SV + PSO Sample numbers Test times Successful numbers Success rate 93% 95% 95% Average training time s s s Average computing time s s s Table 2: Te comparison wit te experiments wit one undred samples. PCA + ED PCA + SV PCA + SV + PSO Sample numbers Test times Successful numbers Success rate 89% 91% 93% Average training time s s s Average computing time s s s people as training samples. Eac person as ten facial images usedasteinputsamples,andtentereareoneundredtest samples in te real-time face recognition system. Troug te real-time detection, te current facial image is captured to be te test face. Te PCA-SV-PSO algoritm is used to execute te face recognition system. Te Euclidean distance between te test face and te samples of te facial database wouldbeclassified,andtenitwouldfindtesampleinte face database in wic te Euclidean distance is closer to te test face to be te result. Te experiments of te real-time face recognition system are sown in Figure Experimental Comparison. Intepartoftecomparison wit te experiments, te main comparisons made are on te training time, computing time, and recognition rate for tree ways. Te first way is using PCA and Euclidean distance wit te bubble sort to te face recognition system. Te second is toapplytepcaandsvbasedclassificationtoteface recognition system. Te tird is to adopt PSO as a parameter adjusted sceme for SV based classification. Tere are fifty samples and one undred samples used in te analyses of experimental results. Table 1 expresses te comparison wit te experiments wit fifty samples. Table 2 summarizes te comparison wit te experiments wit one undred samples, in wic ED denotes te Euclidean distance wit te bubble sort. From te results in Tables 1 and 2, onecanseetat te proposed algoritm as really raised te recognition

11 atematical Problems in Engineering 11 (a) (b) (c) (d) Figure 12: Te experimental results of te real-time face recognition system. rate and reduced te computing time for te real-time face recognition system. For te metod of combining PCA and Euclidean distance wit bubble sort, wen te number of samples is doubled from 50 to 100, te average computing time also increases almost linearly from s to s. It is noted tat te time needed for te way of te PCA combined SV-PSO only increases by 40% correspondingly. Based on suc view, one can say tat te proposed algoritm is clearly superior for large-sample-size cases. It also concludes tat te proposed metod is faster and more efficient tan oter common metods for face recognition. Conflict of Interests 5. Conclusions References A real-time face recognition system is designed by using a combination of PCA and ybrid biology algoritm face recognition system application and tis metod as effectively reduced te computing time. Tere is a time savings of 60% after doubling samples from 50 to 100 samples as compared to oter metods. Furtermore, te SV-PSO sceme is designed to speed up te recognition and also enances te performance of te face recognition. In te future, te result of te face recognition system can be furter developed in a cip of an embedded system. Te autors declare tat tere is no conflict of interests regarding te publication of tis paper. Acknowledgment Tis work is supported by te ational Science Council, Taiwan, under Grant nos. SC E and SC E Y3. [1].. Desibi and A. Bastanfard, A new algoritm for age recognition from facial images, Signal Processing, vol. 90, no. 8, pp , [2] W.-J. Zeng, X.-L. Li, X.-D. Zang, and E. Ceng, Kernel-based nonlinear discriminant analysis using minimum squared errors criterion for multiclass and undersampled problems, Signal Processing, vol. 90, no. 8, pp , [3] J. Zang and L. Ye, Local aggregation function learning based on support vector macines, Signal Processing, vol. 89, no. 11, pp , 2009.

12 12 atematical Problems in Engineering [4]Y.E.Sao,C.-J.Lu,andY.-C.Wang, AybridICA-SV approac for determining te quality variables at fault in a multivariate process, atematical Problems in Engineering, vol.2012,articleid284910,12pages,2012. [5] J.-S. Ciou and K.-Y. Wang, Application of a ybrid controller toamobilerobot, Simulation odelling Practice and Teory, vol.16,no.7,pp ,2008. [6] C.-C. Wong, H.-Y. Wang, and S.-A. Li, PSO-based motion fuzzy controller design for mobile robots, International Journal of Fuzzy Systems,vol.10,no.1,pp ,2008. [7]Y.LiuandB.iu, AnovelPSOmodelbasedonsimulating uman social communication beavior, Discrete Dynamics in ature and Society, vol. 2012, Article ID , 21 pages, [8]W.Zou,Y.Zu,H.Cen,andX.Sui, Aclusteringapproac using cooperative artificial bee colony algoritm, Discrete Dynamics in ature and Society, vol. 2010, Article ID , 16 pages, [9] P. Umapaty, C. Venkatasesaia, and. S. Arumugam, Particle swarm optimization wit various inertia weigt variants for optimal power flow solution, Discrete Dynamics in ature and Society,vol.2010,ArticleID462145,15pages,2010. [10]. Kazakova,. argala, and. G. Durdle, Sobel edge detection processor for a real-time volume rendering system, in Proceedings of te IEEE International Symposium on Cirquits and Systems, vol. 2, pp. II913 II916, ay [11] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, Jon Wiley & Sons, [12] C.-Y. Lee, J.-J. Leou, and H.-H. Hsiao, Saliency-directed color image segmentation using modified particle swarm optimization, Signal Processing,vol.92,no.1,pp.1 18,2012. [13] H.-Y. Cen and J.-J. Leou, Saliency-directed image interpolation using particle swarm optimization, Signal Processing, vol. 90, no. 5, pp , [14] R. Eberart and J. Kennedy, ew optimizer using particle swarm teory, in Proceedings of te 6t International Symposium on icro acine and Human Science,pp.39 43,October [15] J. Kennedy and R. Eberart, Particle swarm optimization, in Proceedings of te IEEE International Conference on eural etworks, pp , December [16] D. Srinivasan, W. H. Loo, and R. L. Ceu, Traffic incident detection using oarticle swarm optimization, in Proceedings of IEEE Swarm Intelligence Symposium, pp , 2003.

13 Advances in Operations Researc Hindawi Publising Corporation ttp:// Advances in Decision Sciences Hindawi Publising Corporation ttp:// Applied atematics Algebra Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp:// Probability and Statistics Te Scientific World Journal Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp:// International Differential Equations Hindawi Publising Corporation ttp:// Submit your manuscripts at ttp:// International Advances in Combinatorics Hindawi Publising Corporation ttp:// atematical Pysics Hindawi Publising Corporation ttp:// Complex Analysis Hindawi Publising Corporation ttp:// International atematics and atematical Sciences atematical Problems in Engineering atematics Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp:// Discrete atematics Hindawi Publising Corporation ttp:// Discrete Dynamics in ature and Society Function Spaces Hindawi Publising Corporation ttp:// Abstract and Applied Analysis Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp:// International Stocastic Analysis Optimization Hindawi Publising Corporation ttp:// Hindawi Publising Corporation ttp://

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Implementation of Integral based Digital Curvature Estimators in DGtal

Implementation of Integral based Digital Curvature Estimators in DGtal Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Some Handwritten Signature Parameters in Biometric Recognition Process

Some Handwritten Signature Parameters in Biometric Recognition Process Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Interference and Diffraction of Light

Interference and Diffraction of Light Interference and Diffraction of Ligt References: [1] A.P. Frenc: Vibrations and Waves, Norton Publ. 1971, Capter 8, p. 280-297 [2] PASCO Interference and Diffraction EX-9918 guide (written by Ann Hanks)

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

A signature analysis based method for elliptical shape

A signature analysis based method for elliptical shape A signature analysis based metod for elliptical sape Ivana Guarneri, Mirko Guarnera, Giuseppe Messina and Valeria Tomaselli STMicroelectronics - AST Imaging Lab, Stradale rimosole 50, Catania, Italy ABSTRACT

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

An Approach to Polygonal Approximation of Digital CurvesBasedonDiscreteParticleSwarmAlgorithm

An Approach to Polygonal Approximation of Digital CurvesBasedonDiscreteParticleSwarmAlgorithm Journal of Universal Computer Science, vol. 13, no. 10 (2007), 1449-1461 submitted: 12/6/06, accepted: 24/10/06, appeared: 28/10/07 J.UCS An Approach to Polygonal Approximation of Digital CurvesBasedonDiscreteParticleSwarmAlgorithm

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change? 8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and

More information

Economic design of x control charts considering process shift distributions

Economic design of x control charts considering process shift distributions J Ind Eng Int (2014) 10:163 171 DOI 10.1007/s40092-014-0086-2 ORIGINAL RESEARCH Economic design of x control carts considering process sift distributions Vijayababu Vommi Rukmini V. Kasarapu Received:

More information

Face Recognition using Computer-Generated Database

Face Recognition using Computer-Generated Database Face Recognition using Computer-Generated Database Won-Sook LEE Scool of Information Tecnology and Engineering University of Ottawa, 800 King Edward Ave Ottawa, Ontario, K1N 6N5, Canada Tel: (1-613) 562-5800

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM

IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, 90 96 IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department

More information

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas International Journal of Computational Intelligence Systems, Vol. 4, No. 6 (December, 20), 00-09 Laser Radar based Veicle Localization in GPS Signal Bloced Areas Ming Yang Department of Automation, Sangai

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

A Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms

A Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms WCCM V Fift World Congress on Computational Mecanics July -1,, Vienna, Austria Eds.: H.A. Mang, F.G. Rammerstorfer, J. Eberardsteiner A Finite Element Sceme for Calculating Inverse Dynamics of Link Mecanisms

More information

Image Registration via Particle Movement

Image Registration via Particle Movement Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Developing an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform

Developing an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform ISSN(Online): 30-980 ISSN (Print): 30-9798 (An ISO 397: 007 Certified Organization) Vol. 3, Issue 4, April 05 Developing an Efficient Algoritm for Image Fusion Using Dual Tree- Complex Wavelet Transform

More information

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT

More information

Pedestrian Detection Algorithm for On-board Cameras of Multi View Angles

Pedestrian Detection Algorithm for On-board Cameras of Multi View Angles Pedestrian Detection Algoritm for On-board Cameras of Multi View Angles S. Kamijo IEEE, K. Fujimura, and Y. Sibayama Abstract In tis paper, a general algoritm for pedestrian detection by on-board monocular

More information

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2) LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.

More information

Design of Map Decomposition and Wiimote-based Localization for Vacuuming Robots

Design of Map Decomposition and Wiimote-based Localization for Vacuuming Robots Design of Map Decomposition and Wiimote-based Localization for Vacuuming Robots Cia-Pin Kuo, Sy-In Hwang Department of Computer Science and Engineering Yuan Ze University s956007@mail.yzu.edu.tw, syin@cs.yzu.edu.tw

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm.

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm. OLUME OF A CYLINDER OLUMES Te volume of a cylinder is determined by multiplying te cross sectional area by te eigt. r Were: = volume r = radius = eigt Exercise 1 Complete te table ( =.14) r a) 10 mm 5

More information

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N). Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

Non-Interferometric Testing

Non-Interferometric Testing NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS C. Candra*, T. Y. Wong* and J. Bayandor** * Te Sir Lawrence Wackett Aerospace Centre

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image

A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image Journal of Computer Science 5 (5): 355-362, 2009 ISSN 1549-3636 2009 Science Publications A Practical Approac of Selecting te Edge Detector Parameters to Acieve a Good Edge Map of te Gray Image 1 Akram

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES 6.1 INTRODUCTION The exploration of applications of ANN for image classification has yielded satisfactory results. But, the scope for improving

More information

On the use of FHT, its modification for practical applications and the structure of Hough image

On the use of FHT, its modification for practical applications and the structure of Hough image On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy

More information

Face Recognition for Mobile Devices

Face Recognition for Mobile Devices Face Recognition for Mobile Devices Aditya Pabbaraju (adisrinu@umich.edu), Srujankumar Puchakayala (psrujan@umich.edu) INTRODUCTION Face recognition is an application used for identifying a person from

More information

An Overview of New Features in

An Overview of New Features in 6. LS-DYNA Anwenderforum, Frankental 2007 Optimierung An Overview of New Features in LS-OPT Version 3.3 Nielen Stander*, Tusar Goel*, David Björkevik** *Livermore Software Tecnology Corporation, Livermore,

More information

Two-Level Iterative Queuing Modeling of Software Contention

Two-Level Iterative Queuing Modeling of Software Contention Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.tml 2002 D. Menascé. All Rigts Reserved. 1

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

A novel hob cutter design for the manufacture of spur-typed cutters

A novel hob cutter design for the manufacture of spur-typed cutters journal of materials processing tecnology 29 (29) 847 855 journal omepage: www.elsevier.com/locate/jmatprotec A novel ob cutter design for te manufacture of spur-typed cutters Jen-Kuei Hsie a, Huang-Ci

More information