Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform

Size: px
Start display at page:

Download "Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform"

Transcription

1 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June Image Steganography Sheme using Chaos and Fratals with the Wavelet Transform Yue Wu and Joseph P. oonan bstrat This paper introdues a novel image steganographi method for embedding seret image information into digital images. The proposed algorithm uses a fratal image as the over image, takes a random-like sequene generated by a haoti map as the referene for embedded position and employs a wavelet transform to realize the embedding proedure. The fratal over image that an be parametrially generated implies a over image ould be unique in the world. The haoti logisti map guarantees that the sequene of embedding positions is ompletely unknown for an adversary and the embedding proedure is almost random-like. The wavelet transform ensures the seret information is only embedded within edges with the least visual distortion. The proposed sheme is tested over different over images and seret images and simulations results demonstrate its effetiveness and robustness. Index Terms Steganography, hao fratal, logisti map, wavelet transform. I. ITRODUCTIO The term steganography [] originates from the Greek word steganos meaning overed or proteted and graphein meaning to write. owaday it often refers to the siene of invisible ommuniation. Generally speaking, steganography an be lassified into two ategories: image watermarking and image data hiding. Image watermarking tehniques are aimed to provide opyright protetion [-5] and authentiation [6, 7]. Image data hiding tehniques is aim to amouflage a seret message within a arrier message suh that the seret message an be sent without making any notie. This study fouses on data hiding. There are two kinds of image steganography for image data hiding: spatial-domain based and transform-domain based methods. Spatial-domain based methods embed messages in the intensity of pixels of images diretly [8, 9]. mong them, the least signifiant bit (LSB) method is the most well-known [-]. This method embeds the fixed-length seret bits in the same fixed-length LSBs of pixels. This tehnique is simple and fast but it may ause notieable distortion when the number of embedded bits for eah pixel exeeds three []. While transform-domain based methods first transform a over image into a new domain and then messages are embedded in as the transform oeffiients Manusript reeived pril, ; revised May 9,. Y. Wu is with the Department of Eletrial and Computer Engineering, Tufts University, M 55, US ( ywu3@ee.tufts.edu). J. P. oonan is with the the Department of Eletrial and Computer Engineering, Tufts University, M 55, ( jnoonan@ees. tufts.edu). [3, 4]. The proposed method is one of the transform-domain based steganographi tehniques. Unlike those related works [5, 6] fousing on hiding the seret message with oding sheme we diretly used the wavelet oeffiients to embed the message. In addition, we onstrut a series of over images via fratal iterative funtion whih guarantee that ) a over image an easily regenerated with a given set of parameters; ) a over image is almost unique and novel; and 3) a over image is inaessible for an adversary without knowing the orret set of parameters. Moreover, based on the fat of the image has different wavelet oeffiients when using different wavelets. We use the wavelet funtion as a part of our shared key to further enhane the seurity level. The remainder of the paper is organized as follows: in Setion II, bakgrounds related to the proposed method are reviewed; in Setion III, the proposed steganographi tehnique is disussed in details; in Setion IV, omputer simulation results and related analysis are presented; In Setion V, we onlude this paper and make disussions on the future work. II. BCKGROUDS Simply speaking, the proposed algorithm uses a fratal image as the over image, takes a random-like sequene generated by a haoti map as the referene for embedded position and employs a wavelet transform to realize the embedding proedure. More details about the proposed algorithm are disussed in Setion III. In the rest of the setion, we will briefly review the wavelet transform, the haoti map and the fratal image.. Wavelet Transforms wavelet transform is used to divide a ontinuous-time/ disrete time funtion into wavelets. Unlike the Fourier transform, whih only onstrut a frequeny representation of a signal, the wavelet transform is able to onstrut a time-frequeny representation of a signal. Therefore, the wavelet transform offers very good time and frequeny loalization. Mathematially, the Continuous Wavelet Transform (CWT) of a ontinuou square-integrable funtion f ( x ) at a ertain sale s > and a translation value R an be defined as Eq. (), where ( x) is defined in Eq. () [7]. Here ( x) is alled the mother wavelet and ( x) is alled a daughter wavelet at sale s and translation of ( x). To reover the original funtion f ( x ), inverse wavelet transform is defined in Eq. (3), where C is defined in Eq. (4) 85

2 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June and Ψ ( μ) is the Fourier transform of ( x). Eqs. () to (4) define a reversible transformation as long as the so-allled admissibility riterion C < is satisfied [8]. In 989 Fast Wavelet Transform (FWT) is developed and provided a good way of alulating wavelet transforms of a given signal. W (, s ) = f() x () x dx () x ( x) = ( ) s s () ( x) f ( x) = W ( ) d ds C s (3) Ψ( μ) C d = μ (4) μ One dimensional wavelet transforms an be easily extended to two dimensional ases like images. In two dimension a two-dimensional saling funtion φ ( x, y) and H V three two-dimensional wavelet ( x, y), ( x, y) and D ( x, y) are required for the horizontal, vertial and diagonal diretions respetively. Eah of above four funtions is the produt of two one-dimensional funtions as Eqs. (5) (8) show, where φ ( d) is the one dimensional saling funtion along diretion d ; ( d) is the one dimensional wavelet mother funtion along diretion d. In this paper, various two dimensional wavelet funtions are used to deompose images. φ( x, y) = φ( x) φ( y) (5) H ( x, y) = ( x) φ( y) (6) V ( x, y) = φ( x) ( y) (7) D ( x, y) = ( x) ( y) (8) B. Chaoti Maps Generally speaking, the haoti map refers to any map that exhibits some sort of haoti behavior: any slight hange in the initial onditions yields widely diverged outomes whih makes impossible for long-term predition. lthough haoti behavior an be observed in many dynami system we fous on the one dimensional logisti map in this paper. Mathematially, a logisti map an be defined as an iterative funtion in Eq. (9), where r is the parameter and x is used as the initial value. x = rx ( x ) n+ n n (9) Fig.. The haoti logisti map. ormally, parameter r is set to (3.58, 4) and x is set to (,) for keeping the haoti behavior. In Fig., the x oordinate value represents the parameter value r and the y oordinate value represents the generated x sequenes. It is lear to see that for r (3.6, 4), the map generates random-like x sequenes. It is worthwhile to note that sequenes with initial value falling in the region around r = 3.83 are periodi. In order to avoid trapping the sequene into osillation, we simply use r (3.9, 4) in this paper. The purpose of using the logisti map in the paper is to generate a random-like but deterministi sequene for embedded positions. Therefore, the logisti map an be substituted by any haoti map. C. Fratal Images The term fratal was oined by Benoit Mandelbrot in 975 and was derived from the Latin fratus meaning broken or fratured. Mathematially, a fratal is based on an equation undergoing iteration whih is a form of reursive feedbaks. fratal usually has the following harateristis as desribed in [9]: ) It has a fine struture at any arbitrarily small sale. ) It is too irregular to be easily desribed in traditional Eulidean geometri language. 3) It is self-similar or at least approximately similar. 4) It has a simple and reursive definition. 5) Its Hausdorff dimension is higher than its topologial dimension. In this paper, we use the fratal images generated by Ultra Fratal [] as over image eah of whih is uniquely defined by a set of fratal parameters suh as type, formula, sale, loation, olor spae et. In other word the fratal image an be perfetly restored as long as this set of parameters is known. In Ultra Fratal this set of parameters an be saved as a partiular file, whih an be transported very easily. Therefore, the over image an be perfetly restored. III. THE STEGOGRPHIC LGORITHM The proposed steganographi algorithm relies on the wavelet transform and embeds seret data as the wavelet oeffiients in a over image. Here, we assume a over image is a RGB olor image. The flowhart of the proposed steganographi algorithm is skethed in Fig. The details of eah stage will be disussed in the rest of this setion.. Stage I: Transforming Image in Wavelet Domain This stage is the start of the steganography. The olor over image C is deomposed in the YCr olor spae and only the omponent C is used for future proessing. This hoie of omponent is heuristi and is seleted based on our experiment results. This hoie is supposed to ahieve a higher ovariane between the stego image S and the over image C than using Cr or Y omponent. Later both the C and the seret image I are transformed using wavelet W and W respetively, and beome W ( C ) 86

3 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June and W ( I ). Here W and W are determined by the key and they may or may not be neessarily the same. One benefit of this design is to ahieve a larger key spae. Unless the orret wavelet mother funtion W is used, one annot extrat the exat embedded seret information from a over image; unless the orret wavelet mother funtion W is used, one annot restore the seret information from extrated seret information in the spatial domain. Stage I Stage II Seret Image Ι W(Ι) DWT W(S) Logisti Map Seleting Positions Energy Equalization Embedding Data IDWT Stage III W(C) S DWT IYCr C Cover Image C YCr CCr CY Stego Image S Fig.. The flowhart of the proposed steganographi sheme. B. Stage II: Seret Data Embedding This stage is the ore of the steganography. It embeds the transformed seret image W ( I ) in the transformed over image W ( C ). First, the initial value x and the parameter value r of the logisti map in Eq. (9) are determined by the key. Based on the number of oeffiients in W ( I ), the logisti map generates an equal length haoti sequene Seq. However, this sequene Seq has to be quantized before used for extrating wavelet oeffiients in W ( C ). The number of quantization sales is alulated via Eq. (), where #(.) omputes the number of elements and dt. rounds the number towards to zero. Then Seq is quantized with respet to the bin numbers of the equal-length bins in (,), namely k k B =,,, B,,, B, k = = Consequently, Seq is translated to a random-like sequene Seq omposed of only numbers from to. However Seq is still not the sequene whih an be used to extrat wavelet oeffiient in W ( C ). Seq is alulated for partial sum and the Seq is obtained aording to Eq. (). Seq is used to extrat wavelet oeffiients in W ( C ). It is worthwhile to note that W ( C ) is omposed of four regions (see Fig. ), namely approximation region (passed by the low-pass filter along y and followed by the low-pass filter along x ), horizontal-details region (passed by the low-pass filter along y and followed by the high-pass filter along x ), vertial-details region VH(passed by the high-pass filter along y and followed by the low-pass filter along x ), and diagonal-details (passed by the high-pass filter along y and followed by the high-pass filter along x ). We keep region but hoose to substitute oeffiients in, and by the wavelet oeffiients of W ( I ). This is the reason why Eq. () ontains a fator of 3/4. In fat, the region an be onsidered as the DC omponent of the image C. ny hange in this DC omponent may lead to big hanges in the future. However,, and are more or less about the edge strength of C. Fratal over images normally have a large number of edges and rely on the DC omponent of the image to have the fratal-like patterns. 3 #( C ) = () 4 #( W ( I)) k Seq ( k) = Seq ( k) () i= The seleted oeffiients in W ( C ) are uniquely determined by Seq and we named the set of the hosen oeffiients as P. Eq. () is used as the ratio of energy in set X to that in set Y, where E(.) represents the energy funtion. EX ( ) x RXY (, ) = EY ( ) = () y We then ompute L = R( P, W ( I)) and lift wavelet oeffiients orrespondingly, Consequently, the lifted energy LE( W ( I )) approximately math the energy of the original EP ( ). Finally, we all these modified wavelet oeffiients W ( S ). C. Stage III: Transforming Image Bak to Spatial Domain Parallel to the Stage I, the main task of the Stage III is to inverse transform everything in the wavelet domain to the spatial domain. W ( S ) is inverse wavelet transformed to the spatial domain and beomes the image S. The S is used to replae the original omponent C for the olor over image C. Eventually, the omponent set { C, S, C } is onverted Y Cr from the YCr olor spae to the RGB olor spae. IV. SIMULTIO RESULTS D DISCUSSIO Our omputer simulation is run in the MTLB R9a environment under Window XP operation system with 3GB memory and Core Quad.6GHz CPU. The key we used in the simulation has the format of { x, r, width, height, db #, db #}, where x and r are used in C I the logisti map for generating the embedding/ extrating positions; width and height are used to reform the rebuilt 87

4 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June seret image; db # and db # C I refer the used Daubehies wavelets for the over/stego image C/ S and the seret image I respetively. Fig. 3 shows the used over images for simulation. They are all generated from Ultra Fratal []. The image an be saved as a parameter file and thus an be easily transported and perfetly restored in other omputers installed Ultra Fratal. Here all over images are at size of (a) Leaf (b) Feather () Fragment (d) Storm Fig. 3. The over image generated by Ultral Fratal. Fig. 4 shows the test seret images in the simulation. The image of Tufts Logo is of size of 8 8 while the image of ameraman is at size of (PSR) and the root-mean-square error (RMSE) of the embedding results are two ommon measurements for evaluating the quality of reonstruted signal. RMSE is defined by the Eq. (3), where C and S represents the over image and the stego image respetively; m and n refer to the width and height of the image. PSR an be defined based on RMSE as Eq. (4) shows. TBLE I: PSR D RMSE OF STEGO IMGES Tufts Logo Cameraman Cover Image PSR RMSE PSR RMSE Leaf Feather Fragment Storm The PSR and the RMSE test on the stego image using the proposed method are shown in Table I. It is worthwhile to note that what we exatly alulated is RMSE ( C, S ). From Table I, it is easy to see that the over image with a larger portion of homogenous regions produes a lower RMSE and thus a higher PSR. This is beause no wavelet oeffiient has been replaed in the approximation region, whih an be onsidered as the DC omponent the image. Component Color Image Cover Image (a) Tufts Logo (b) Cameraman Fig. 4. The test images used in the simulation. We test all four over images and they produe more or less the similar results. nd thus only the results of fratal over Leaf are shown in Fig. 5 as an example. Here, we use Haar wavelet for both the over image and the seret image. From the point view of human visual inspetion, the seret image and the over image are very lose to eah other. The differenes of two images onentrate on the edge pixel whih are very hard to be notie without omparisons. strong benefit of using this type of fratal images is to largely redue the risk of known over image, beause all used over images are synthesized by a set of fratal parameters. If a over image is not aessible by any unauthorized user, it is then very diffiult to differentiate a true fratal image and a fratal image with seret information. Consequently, the seurity of seret information in the stego image is largely enhaned. m n RMSE( C, S) = ( C( i, j) S( I, j) ) (3) mn i = j = MX PSR log = RMSE (4) In signal proessing, the peaks of the signal-to-noise ratio Stego Image bsolute Differene Fig. 5. The omparison of the over image and the seret image. We also investigated the influene of using different types of wavelet funtions for both the over image and the seret image. These results are shown in Fig. 6, axis indiates the used wavelet funtion and db refers to the Daubehies wavelet family. We tested the Daubehies wavelets (built-in funtions in MTLB) on both the over image C and the seret image I. x Reall we used W for the image C and W for the image I. Here tree image is used as the over image and tufts logo is used as the seret image. The red solid urve is obtained by fixing W = db while keep hanging W ; the 88

5 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June blue dotted urve is obtained by fixing W = db while keep hanging W. We used the ovariane of the over image C and the stego image S to measure the quality, namely a high ovariane value implies a better quality. Generally speaking, the proposed method works well regardless to the seleted wavelet. However, different wavelets do produe different performanes and a periodi-like urve is observed when hanging the wavelet funtion for W. The reason behind this phenomenon is still unknown. Fig. 6. The influene of using different wavelet funtion. V. COCLUSIOS new steganographi method based on wavelet transforms and fratal images are proposed. This new method is able to embed the seret image into a fratal over image without produing notieable hanges. s long as the user has the orret key, the seret image an be extrated from the stego image without knowing the over image. lthough theoretially the attaker is able to sense the positions of the seret image information by omparing the stego image and the over image, it is very safe for the proposed method. Beause the over image itself is onsidered to be seure for it is synthesized and an be uniquely expressed as a set of fratal parameters. In other word the only way for an attaker to obtain the over image is to use the exatly set of fratal parameters and generate the over image. Moreover, the wavelets used to transform the over image and the seret image provide another level of seurity. Even in the worst ase, the attaker raked the over image and knew the seret image position but the seret image annot be derypted without knowing the used wavelets. Furthermore, sine wavelet is a big family of funtion ustomized wavelets an also be used. One an easily build up a look up table of wavelets and share this table with his/her ommuniator. If that so, even the brute fore attak may fail in finding the orret wavelet funtion. In future, we will investigate the periodi-like urve in Fig. 6 and try to find out a best wavelet for our sheme if it is possible. REFERECES [] D. Kahn, The Codebreakers: the Story of Seret Writing: Sribner Book Company, 996. [] L. Zhe-Ming, X. Dian-Guo, and S. Sheng-He, "Multipurpose image watermarking algorithm based on multistage vetor quantization," Image Proessing, IEEE Transations on, vol. 4, pp. 8-83, 5. [3] L. Ghouti,. Bouridane, M. K. Ibrahim, and S. Boussakta, "Digital image watermarking using balaned multiwavelet" Signal Proessing, IEEE Transations on, vol. 54, pp , 6. [4] C. C. Lai and C. C. Tsai, "Digital image watermarking using disrete wavelet transform and singular value deomposition," Instrumentation and Measurement, IEEE Transations on, vol. PP, pp. -3. [5] C. Bo and S. Hong, " new robust-fragile double image watermarking algorithm," in Multimedia and Ubiquitous Engineering, 9. MUE '9. Third International Conferene on, 9, pp [6] L. Chun-Shien and H. Y. M. Liao, "Multipurpose watermarking for image authentiation and protetion," Image Proessing, IEEE Transations on, vol., pp ,. [7] L. Yao-Chung, D. Varodayan, and B. Girod, "Image authentiation based on distributed soure oding," in Image Proessing, 7. ICIP 7. IEEE International Conferene on, 7, pp. III - 5-III - 8. [8] W. Hong, T.-S. Chen, and C.-W. Shiu, "Lossless steganography for ambt-ompressed image" in Image and Signal Proessing, 8. CISP '8. Congress on, 8, pp [9] D.-C. Wu and W.-H. Tsai, " steganographi method for images by pixel-value differening," Pattern Reognition Letter vol. 4, pp , 3. [] L. Shao-Hui, C. Tian-Hang, Y. Hong-Xun, and G. Wen, " variable depth LSB data hiding tehnique in image" in Mahine Learning and Cyberneti 4. Proeedings of 4 International Conferene on, 4, pp vol.7. [] W. Bender, D. Gruhl,. Morimoto, and. Lu, "Tehniques for data hiding," IBM Systems Journal, vol. 35, pp , 996. [] C.-C. Chang, C.-Y. Lin, and Y.-Z. Wang, "ew image steganographi methods using run-length approah," Information Siene vol. 76, pp , 6. [3]. Kafri and H. Y. Suleiman, "Bit-4 of frequeny domain-dct steganography tehnique," in etworked Digital Tehnologie 9. DT '9. First International Conferene on, 9, pp [4] V. K. Munirajan, E. Cole, and S. Ring, "Transform domain steganography detetion using fuzzy inferene system" in Multimedia Software Engineering, 4. Proeedings. IEEE Sixth International Symposium on, 4, pp [5] L. Zhang, "Wavelet domain steganography for JPEG," in Communiation Ciruits and Systems Proeeding 6 International Conferene on, 6, pp [6] J. Spaulding, H. oda, M.. Shirazi, and E. Kawaguhi, "BPCS steganography using EZW lossy ompressed image" Pattern Reognition Letter vol. 3, pp ,. [7] R. González and R. Wood "Digital image proessing. 8," Prentie Hall. [8]. Grossmann and J. Morlet, "Deomposition of hardy funtions into square integrable wavelets of onstant shape," SIM Journal on Mathematial nalysi vol. 5, pp , 984. [9] H. Peitgen, H. Jürgen and D. Saupe, Chaos and Fratals: ew Frontiers of Siene: Springer Verlag, 4. [] F. Slijkerman, Ultra Fratal 5,. 89

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Preliminary investigation of multi-wavelet denoising in partial discharge detection

Preliminary investigation of multi-wavelet denoising in partial discharge detection Preliminary investigation of multi-wavelet denoising in partial disharge detetion QIAN YONG Department of Eletrial Engineering Shanghai Jiaotong University 8#, Donghuan Road, Minhang distrit, Shanghai

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

A Unified Subdivision Scheme for Polygonal Modeling

A Unified Subdivision Scheme for Polygonal Modeling EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Introduction to Seismology Spring 2008

Introduction to Seismology Spring 2008 MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

DATA ACQUISITION AND PROCESSING OF PARALLEL FREQUENCY SAR BASED ON COMPRESSIVE SENSING

DATA ACQUISITION AND PROCESSING OF PARALLEL FREQUENCY SAR BASED ON COMPRESSIVE SENSING Progress In Eletromagnetis Researh, Vol. 133, 199 215, 2013 DATA ACQUISITION AND PROCESSING OF PARALLEL FREQUENCY SAR BASED ON COMPRESSIVE SENSING Y. N. You, H. P. Xu *, C. S. Li, and L. Q. Zhang Shool

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Transition Detection Using Hilbert Transform and Texture Features

Transition Detection Using Hilbert Transform and Texture Features Amerian Journal of Signal Proessing 1, (): 35-4 DOI: 1.593/.asp.1.6 Transition Detetion Using Hilbert Transform and Texture Features G. G. Lashmi Priya *, S. Domni Department of Computer Appliations, National

More information

PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu

PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu 20th European Signal Proessing Conferene EUSIPCO 2012) Buharest, Romania, August 27-31, 2012 PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING Yesheng Gao, Kaizhi Wang,

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Chromaticity-matched Superimposition of Foreground Objects in Different Environments

Chromaticity-matched Superimposition of Foreground Objects in Different Environments FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Color Image Fusion for Concealed Weapon Detection

Color Image Fusion for Concealed Weapon Detection In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging 0-708: Probabilisti Graphial Models 0-708, Spring 204 Disrete sequential models and CRFs Leturer: Eri P. Xing Sribes: Pankesh Bamotra, Xuanhong Li Case Study: Supervised Part-of-Speeh Tagging The supervised

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

A radiometric analysis of projected sinusoidal illumination for opaque surfaces

A radiometric analysis of projected sinusoidal illumination for opaque surfaces University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination

More information

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing The Mathematis of Simple Ultrasoni -Dimensional Sensing President, Bitstream Tehnology The Mathematis of Simple Ultrasoni -Dimensional Sensing Introdution Our ompany, Bitstream Tehnology, has been developing

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

8 : Learning Fully Observed Undirected Graphical Models

8 : Learning Fully Observed Undirected Graphical Models 10-708: Probabilisti Graphial Models 10-708, Spring 2018 8 : Learning Fully Observed Undireted Graphial Models Leturer: Kayhan Batmanghelih Sribes: Chenghui Zhou, Cheng Ran (Harvey) Zhang When learning

More information

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Divide-and-conquer algorithms 1

Divide-and-conquer algorithms 1 * 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Comparing Images Under Variable Illumination

Comparing Images Under Variable Illumination ( This paper appeared in CVPR 8. IEEE ) Comparing Images Under Variable Illumination David W. Jaobs Peter N. Belhumeur Ronen Basri NEC Researh Institute Center for Computational Vision and Control The

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian

More information

Diffusion Kernels on Graphs and Other Discrete Structures

Diffusion Kernels on Graphs and Other Discrete Structures Diffusion Kernels on Graphs and Other Disrete Strutures Risi Imre Kondor ohn Lafferty Shool of Computer Siene Carnegie Mellon University Pittsburgh P 523 US KONDOR@CMUEDU LFFERTY@CSCMUEDU bstrat The appliation

More information

Z Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths

Z Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths Z Combinatorial Filters: Sensor Beams, Obstales, and Possible Paths BENJAMIN TOVAR, Northwestern University FRED COHEN, University of Rohester LEONARDO BOBADILLA, University of Illinois JUSTIN CZARNOWSKI,

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information