Learning Robust Locality Preserving Projection via p-order Minimization

Size: px
Start display at page:

Download "Learning Robust Locality Preserving Projection via p-order Minimization"

Transcription

1 Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical Engineering and Comuter Science Colorado School of Mines, Golden, Colorado 84, USA Deartment of Comuter Science and Engineering University of Texas at Arlington, Arlington, Texas 769, USA Abstract Locality reserving rojection (LPP) is an effective dimensionality reduction method based on manifold learning, which is defined over the grah weighted squared l -norm distances in the rojected subsace. Since squared l -norm distance is rone to outliers, it is desirable to develo a robust LPP method. In this aer, motivated by existing studies that imrove the robustness of statistical learning models via l -norm or not-squared l -norm formulations, we roose a robust LPP (rlpp) formulation to minimize the -th order of the l -norm distances, which can better tolerate large outlying data samles because it suress the introduced biased more than the l -norm or not squared l -norm minimizations. However, solving the formulated objective is very challenging because it not only non-smooth but also non-convex. As an imortant theoretical contribution of this work, we systematically derive an efficient iterative algorithm to solve the general -th order l -norm minimization roblem, which, to the best of our knowledge, is solved for the first time in literature. Extensive emirical evaluations on the roosed rlpp method have been erformed, in which our new method outerforms the related state-of-the-art methods in a variety of exerimental settings and demonstrate its effectiveness in seeking better subsaces on both noiseless and noisy data. Introduction Dimensionality reduction (DR) algorithms seek to reresent the inut data in their lower-dimensional intrinsic subsace/sub-manifold, in which irrelevant features are runed and inherent data structures are more lucid. In the early ages, DR algorithms assume that the inut data objects are homogeneous but not relational, and thereby are devised to deal with a set of attributes in the format of fixed length vectors. For examle, Princial Comonent Analysis (PCA) (Jolliffe 5) attemts to maximize the covariance among data oints, while Linear Discriminant Analysis (LDA) (Fukunaga 99) aims at maximizing the class searability. In recent years, manifold learning has motivated many DR algorithms using airwise similarities between To whom all corresondence should be addressed. This work was artially suorted by NSF-IIS 7965, NSF-IIS 3675, NSF-IIS 3445, NSF-DBI 35668, NSF-IIS Coyright c 5, Association for the Advancement of Artificial Intelligence ( All rights reserved. data objects, either comuted from data attributes or directly obtained from exerimental observations. These algorithms, such as ISOMAP (Tenenbaum, De Silva, and Langford ), Locally Linear Embedding (LLE) (Roweis and Saul ), Lalacian Eigenma (Belkin and Niyogi ), Locality Preserving Projection (LPP) (Niyogi 4), and discriminant Lalacian embedding (Wang, Huang, and Ding b), etc., generally assume that the observed data are samled from an underlying sub-manifold which is embedded in a high-dimensional observation sace. Due to this reasonable assumtion, manifold based learning methods have achieved great success to solve roblems in a large number of real-world alications. Among these manifold learning based rojection methods, LPP has been widely acceted because it is able to learn a linear rojection from the original data, such that it can be easily alied to not only training data but also out-of-samle data oints. In this aer, we address the issue of robustness of LPP in the resence of outlier samles, which is defined as the data oints that deviates significantly from the rest majority of the data oints. In classical LPP aroach, the learning objective is formulated using the squared distance in the rojected subsace, which, same as other least square based learning objectives in statistical learning, could be significantly influenced by outlying observations. That is, the traditional LPP formulation becomes inaroriate at contaminated data sets, because large errors squared dominate the sum. Many revious works have been done to imrove the robustness of the linear dimensionality reduction methods via using the l -norm minimizations or not-squared l -norm minimizations (Baccini, Besse, and Falguerolles 996; Ding et al. 6; Gao 8; Ke and Kanade 5; Kwak 8; Wright et al. 9; Nie et al. ; ; Wang, Nie, and Huang 4). The key motivation of these rior works lies in that the not-squared l -norm distance or error functions, say x i x j for the two vectors x i and x j, can generally better tolerate the biases caused by the outlying data samles, esecially when the outlier data samles are far away from the normal data distributions. Following the same intuition, we recognize that the distance with lower orders, e.g., x i x j where < <, can achieve the same goal for robustness with otentially better results (Wang et al. 3), because the bias caused by outlying data samles can be further suressed when (< ) is selected 359

2 as a very small number. Based on this recognition, we roose a new LPP objective using the -th order distance, and call the resulted objective as the -order minimization roblem. Because the learned rojection by our new method is robust against outlier data samles, we call it robust locality reserving rojection (rlpp) method, which is interesting from a number of ersectives as following. Our new objective is defined over the -th ( < ) order of the l -norm distance, which is more general and makes the traditional LPP a secial case of our new method when =. Same as other l -norm or not-squared l -norm based learning objectives, our new method is robust against outlier data samles, which is articularly true when <. The smaller the value of is, the better robustness our new method can achieve. Desite its clear intuitions and nice theoretical roerties, the resulted objective of the roosed rlpp method is difficult to solve, because it is not only non-smooth but also non-convex. To solve the roblem, we roose an efficient iterative solution algorithm, whose convergence is rigourously roved. Extensive emirical studies have been erformed to evaluate a variety asects of the roosed rlpp method, which clearly demonstrate the effectiveness of the roosed method on not only noiseless data sets but also noisy data sets with outlier samles, esecially for the latter case. Motivation of the Proosed Problem Suose we have n data oints {x,,x n R d },we construct a grah using the data with the similarity matrix S R n n. The Lalacian matrix L is defined as L = D S, where D is a diagonal matrix with the i-th diagonal element as j S ij. Recently, Locality Preserving Projection (LPP) and its variants have been successfully alied for dimensionality reduction. The rojection matrix W R d m (m<d) in LPP is obtained by solving the following roblem : min S ij W T x i W T x j. () The objective in Eq.() can be written as tr(w T XLX T W ). Thus the otimal solution W to roblem () is the m eigenvectors of (W T XDX T W ) W T XLX T W corresonding to the m smallest eigenvalues. The basic idea of LPP is to reserve the neighborhood relationshi between data oints. Secifically, as shown in Eq.(), LPP tries to find a embedded subsace such that the distances of data airs which are neighbors in the original sace are minimized. In ractice, to ensure the learned rojection W is shiftinvariant, D in Eq.() should be L d = D D T D, or the training data X must be centered (Nie et al. 9; Nie, Cai, and Huang 4) The squared distances used in Eq.() do not tolerate large value of distance, thus makes the distances in the embedded subsace tend to be even, i.e., not too large but also not too small. Therefore, the squared distances used in LPP would makes the method can not find the otimal subsace such that most of the distances of local data airs are minimized but a few of them are large. In this aer, we roose to solve the following roblem to find the otimal subsace: min S ij W T x i W T x j. () where <. Obviously, LPP is a secial case of the roosed new method when =. More imortantly, by setting, the method will focus on minimizing most of the distances of local data airs. Although the motivation of Eq. () is clear, it is a nonsmooth objective and difficult to be solved efficiently. Thus, in the next section, we will introduce an iterative algorithm to solve the roblem (). We will show that the original weight matrix W would be adatively re-weighted to cature clearer cluster structures after each iteration. Otimization Algorithm to the Proosed Method The Lagrangian function of the roblem () is n L(W )= S ij W T x i W T x j Tr(Λ(W T XDX T W I)). Denote a Lalacian matrix L = D S, where S is a reweighted weight matrix defined by S ij = S ij W T x i W T x j, (4) D is a diagonal matrix with the i-th diagonal element as j S ij. Taking the derivative of L(W ) w.r.t W, and setting the derivative to zero, we have: (3) L(W ) W = X LX T W XDX T W Λ=, (5) which indicates that the solution W is the eigenvectors of ( XDX T ) X LX T. Note that ( XDX T ) X LX T is deendent on W, we roose an iterative algorithm to obtain the solution W such that Eq. (5) is satisfied. The algorithm is guaranteed to converge to a local otimum, which will be roved in the next subsection. The algorithm is described in Algorithm. In each iteration, L is calculated with the current solution W, then the solution W is udated according to the current calculated L. The iteration rocedure is reeated until converges. From the algorithm we can see, the original weight matrix S is adatively re-weighted to minimize the objective in Eq. () during the iteration. 36

3 Inut: Training data X R d n. The original weight matrix S R n n. D is a diagonal matrix with the i-th diagonal element as j S ij. Initialize W R d m such that W T XDX T W = I ; while not converge do. Calculate L t = D t S t, where S ij = S ij W T x i W T x j, D is a diagonal matrix with the i-th diagonal element as j ( S) ij ;. Udate Q. The columns of the udated Q are the first m eigenvectors of ( XDX ) T X T LX corresonding to the first m smallest eigenvalues ; end Outut: W R d m. Algorithm : The algorithm to solve the roblem (). Convergence Analysis To rove the convergence of the Algorithm, we need the following lemmas: Lemma For any scalar x, when <, we have x x +. Proof: Denote f(x) =x x +, then we have f (x) =(x ), (6) and f ( ) (x) = x 4. (7) Obviously, when x>and <, then f (x) and x =is the only oint that f (x) =. Note that f() =, thus when x>and <, then f(x). Thus f(x ), which indicates x x +. Lemma For any nonzero vectors v, v, when <, the following inequality holds: v v v v v v. (8) Proof: ) ( ) v v ( v v + v v v ( ) v v v v v v v, where the first inequality is true according to Lemma. Now we have the following theorem: Theorem The Algorithm will monotonically decrease the objective of the roblem () in each iteration, and converge to a local otimum of the roblem. Proof: Suose the udated W is W. According to the ste in the Algorithm, we know that W =arg min Tr(W T X LX T W ) =arg min S ij W T x i W T x j. (9) Note that S ij = S ij W T x i W T x j,sowehave S ij W T x i W T x j W T x i W x j n S ij W T x i W T x j W T x i W T x j. () According to Lemma, we have S ij W T x i W x j S ij W T x i W T x j W T x i W x j n S ij W T x i W T x j S ij W T x i W T x j W T x i W x j. () Summing Eq. () and Eq. () in the two sides, we arrive at S ij W T x i W x j n S ij W T x i W T x j. () Thus the Algorithm will monotonically decrease the objective of the roblem () in each iteration t until the algorithm converges. In the convergence, the equality in Eq. () holds, thus W and L will satisfy Eq. (5), the KKT condition of roblem (). Therefore, the Algorithm will converge to a local otimum of the roblem (). Exerimental Results In this section, we emirically study the roosed robust locality reserving rojection (rlpp) method, where our goal is to examine its robustness under the conditions when data outliers are resent. Data Descritions We evaluate the roosedmethods on five widely used benchmark data sets in machine learning studies. The data descritions are summarized in Table. The first two data sets are obtained from the UCI machine learning data reository. For the CMU PIE (Face Pose, Illumination, and Exression) face data set, all the face images are resized to 3 3 following standard comuter vision exerimental conventions to reduce the misalignment effects. For the two document data sets, following revious studies, for Reuters578 data set, we remove the keywords aearing less than 5 times and end u with 599 features; for TDT corus data set, we remove the keywords aearing less than times, and end u with 357 features, resectively. Study of the Parameter of the Proosed Method The roosed method has only one arameter, i.e., in Eq. (), which controls to which extent we suress the bias introduced by the outlier data samles. Thus, we first evaluate its imacts to the learned rojections. 36

4 Table : Data sets used in our exeriments. Data set Number Dimension Classes Coil 44 4 Vehicle PIE face Reuters TDT corus Figure : Clustering accuracy in the learned rojected saces by the roosed method vs. on the Coil data set. Exerimental setus. We exeriment with the Coil data set. An imortant roerty of the Coil data set is that the ictures in the data set were taken reeatedly for one same object from different viewing angles. As a result, the images for the same object indeed reside on an intrinsical manifold. Our goal is to cluster the object images in the rojected sace learned by the roosed method, by which we examine whether the manifold structures can be discovered such that the clustering erformance can be imroved. We vary of the roosed objective in the range of. to to study its imacts to the clustering erformance. We erform the clustering using the K-means clustering method in the rojected subsaces, where K is set to the true cluster numbers. The clustering erformances with different arameter settings measured by the clustering accuracies are reorted in Figure. To alleviate the randomness due to the initializations for the K-means clustering method, we reeat the exeriment at each arameter setting for 5 times and reort the average clustering accuracy in Figure. Exerimental results. From Figure we can see that, smaller leads to better clustering accuracy, i.e., the rojected subsace learned by our new method with smaller can better find the intrinsic data structures, which clearly confirms the correctness to use -order minimization to learn the locality reserved rojections. We also notice that when is very small, e.g., when =.and =., the clustering erformances is not as good as that when =.3. This can be attributed that, when is too small, the distance measurement will be comromised, i.e., the relative difference between different distances become smaller. In the extreme case, when, the distance between any data airs will turn to be the same. Theoretically, should take a small value to imrove the robustness of the roosed objective against outlier data samles; meanwhile should not be too small to invalidate the distance measurement in the Euclidean sace. Uon the results in Figure, emirically, we set =.3 in all our subsequent exeriments, unless otherwise stated. Convergence Study of the Solution Algorithm Because the roosed rlpp method emloys an iterative solution algorithm, an imortant issue is its convergence roerty. We have theoretically roved the convergence of the algorithm, and now we emirically study the convergence roerty of the roosed iterative algorithm. The objective values of our algorithm on the five data sets in each iteration are lotted in the sub-figures of Figure, which show that the objective values of our algorithm kee to decrease along with iterative rocesses, which is erfectly in accordance with our earlier theoretical analysis. Moreover, the algorithm tyically converges to the asymtotic limit within 7 iterations, which demonstrates that our solution algorithm is very comutationally efficient. As a result, our new algorithm scales well to large-scale data sets and adds its value for ractical use. Uon these exerimental results, emirically, we select a stoing threshold of 5 in all our following exeriments, which is sufficient to achieve satisfactory results in terms of convergence. Exerimental Results on Benchmark Noiseless Data Exerimental setus. When we construct the data grah only using data similarity, the roosed rlpp method is an unsuervised method. Thus we comare it against the following unsuervised dimensionality reduction methods: () rincial comonent analysis (PCA) (Jolliffe 5), () robust rincial comonent analysis (rpca) (Wright et al. 9) (this method is the most recently ublished robust PCA method with better erformance than others (Gao 8; Ke and Kanade 5; Ding et al. 6; Kwak 8)), (3) locality reserving rojections (LPP) (Niyogi 4) which is the non-robust counterart of the roosed method, and (4) the Kernel Lalacian Embedding (KLE) method (Wang, Huang, and Ding a). In addition, as a baseline, we also reort the clustering results by (5) the K- means clustering method in the original feature sace. For PCA, we reduce the dimensionality of the inut data such that 9% of data variance is reserved. For rpca, following (Wright et al. 9), we set λ = d /. We emirically select the reduced dimensionality of LPP method to be c where c is the number of clusters of a data set, and use the codes ublished by the authors (Niyogi 4). The KLE method is one of the most recent unsuervised learning method by integrating attribute data and airwise similarity data, and has demonstrated state-of-the-art dimensionality reduction erformance. We imlement the KLE method following its original work (Wang, Huang, and Ding a). For the roosed method, as well as the KLE method and the LPP method, we construct the nearest-neighbor grah for each data set and set the neighborhood size for grah construction as following (Niyogi 4). Excet for rpca, 36

5 3 4 (a) Yale face. 3 4 (b) Vehicle. 3 4 (c) PIE face. 3 4 (d) Reuters (e) TDT. Figure : vs. the objective value of the roosed rlpp method. once the rojection matrix is obtained by a dimensionality reduction method, K-means clustering method is used to cluster the data oints in the rojected subsace, where we set K as the true class numbers. Because rpca method does not roduce the rojection matrix but the rojected data, we use its immediate outut for clustering. For our method, we exeriment with two different setting, where we set the arameter to be.3 and. Note that, when =, the roosed method is exactly the traditional LPP method roosed in (Niyogi 4); when =or =.3, the roosed method is exected to suress the imacts of the outlier data samles. Because the results of the K-means clustering algorithm deend on the initialization, to reduce the statistical variety, we indeendently reeat the clustering rocedures in the rojected subsaces learned by all comared methods for 5 times with random initializations, and then we reort the results corresonding to the best objective values. The clustering erformance measured by clustering accuracy are reorted in Table. Exerimental results. From the exerimental results in Table we can see that our method consistently outerforms all other comared methods, which demonstrate the effectiveness of our methods in discovering the inherent manifold structures of the inut data and thereby imroving the clustering erformance. Most imortantly, as exected, when is smaller, the clustering erformance of the roosed method is better, which again demonstrate the effectiveness of using -order minimization in learning LPP subsace. Robustness Against Outlier Samles Exerimental setus. Because the main advantage of the roosed rlpp method lies in its robustness against outlier data samles, we further evaluate the it on noisy data with outlier samles. To emulate the outlier samles, given the inut data matrix X, we corrut it by a noise matrix M whose element are i.i.d. standard Gaussian variables. Then we carry out the same rocedures as those in the revious subsection for rojection learning on X + δm, where δ = nf X F M F and nf is a given noise factor. We set nf =.in all our studies. We comare our new rlpp method against the same unsuervised dimensionality reduction methods as before and reort the clustering results in Table 3. Exerimental results. First, the roosed rlpp method is consistently better than all other comared methods on all five exerimental data sets, which demonstrate that our new method is able to effectively learn a subsace to imrove the clustering erformance on noisy data with outlier data samles. Second, although the imrovements by our method over the cometing methods on the original data without noise are mediocre as shown in Table in the last subsection, the imrovements by our new method on the contaminated data with outlier data samles in this subsection are considerably large. For examle, on the Coil data set with outlier samles, our new rlpp method imroves the clustering accuracy over the baseline PCA method by 4.49% = (.7.56)/.56. In contrast, the imrovement of clustering accuracy on the same data set by our method over the PCA method under the noiseless condition is only 3.44% = (.75.66)/.66. The same observations can be seen on all the other exerimental data sets, which show that the roosed method has better caability to learn a more effective subsace for clustering on contaminated data, and confirms its robustness against outlier data 363

6 Table : Clustering accuracy of the comared methods on the four benchmark data sets without noise. Data PCA rpca LPP KLE rlpp ( = ) rlpp ( =.3) Coil Vehicle PIE face Reuters TDT corus Table 3: Clustering accuracy of the comared methods on the four benchmark data sets with outlier data samles. Data PCA rpca LPP KLE rlpp ( = ) rlpp ( =.3) Coil Vehicle PIE face Reuters TDT corus samles. Finally, we also notice that when takes smaller value, the roosed method can achieve better clustering results, which rovide one more concrete evidence to suort the usefulness of the -order minimization when learning a LPP subsaces. In summary, the roosed method is able to achieve better clustering erformance on not only noiseless data but also noisy data with outlier samles, which is articularly true for the latter case. These observations are consistent with our motivations to theoretically formulate our new objective in that the -order minimization can alleviate the negative imacts of outliers data samles. Conclusions We roosed a robust LPP method based on the -th order of l -norm distance, which formulated a non-smooth nonconvex minimization roblem. The new objective imoses the -th order l -norm distance when comuting the airwise data affinities, which makes the resulted objective very robust against outlier data samles. However, the new objective brings the much more challenging otimization roblem than that in traditional LPP. To solve the roblem, we introduced an efficient iterative algorithm and rovided the rigorous theoretical analysis on the convergence of our algorithm. The new algorithm is easy to be imlemented and fast to converge in ractice, because we have closed form solution in each iteration. We erformed extensive exeriments on both noiseless and noisy data, and all results have clearly shown that the roosed method is more effective and robust to outlier samles than traditional methods. References Baccini, A.; Besse, P.; and Falguerolles, A Al -norm ca and a heuristic aroach. In Ordinal and symbolic data analysis. Sringer Belkin, M., and Niyogi, P.. Lalacian eigenmas and sectral techniques for embedding and clustering. In NIPS, volume 4, Ding, C.; Zhou, D.; He, X.; and Zha, H. 6. R -ca: rotational invariant l -norm rincial comonent analysis for robust subsace factorization. In Proceedings of the 3rd international conference on Machine learning, ACM. Fukunaga, K. 99. Introduction to statistical attern recognition. Access Online via Elsevier. Gao, J. 8. Robust l rincial comonent analysis and its bayesian variational inference. Neural comutation (): Jolliffe, I. 5. Princial comonent analysis. Wiley Online Library. Ke, Q., and Kanade, T. 5. Robust l norm factorization in the resence of outliers and missing data by alternative convex rogramming. In Comuter Vision and Pattern Recognition, 5. CVPR 5. IEEE Comuter Society Conference on, volume, IEEE. Kwak, N. 8. Princial comonent analysis based on l-norm maximization. Pattern Analysis and Machine Intelligence, IEEE Transactions on 3(9): Nie, F.; Xiang, S.; Song, Y.; and Zhang, C. 9. Orthogonal locality minimizing globality maximizing rojections for feature extraction. Otical Engineering 48():7 7. Nie, F.; Huang, H.; Cai, X.; and Ding, C. H.. Efficient and robust feature selection via joint l, -norms minimization. In Advances in Neural Information Processing Systems, Nie, F.; Wang, H.; Huang, H.; and Ding, C.. Unsuervised and semi-suervised learning via l -norm grah. In IEEE International Conference on Comuter Vision (ICCV ), IEEE. Nie, F.; Cai, X.; and Huang, H. 4. Flexible shift-invariant locality and globality reserving rojections. In Machine 364

7 Learning and Knowledge Discovery in Databases. Sringer Niyogi, X. 4. Locality reserving rojections. In Neural information rocessing systems, volume 6, 53. Roweis, S. T., and Saul, L. K.. Nonlinear dimensionality reduction by locally linear embedding. Science 9(55): Tenenbaum, J. B.; De Silva, V.; and Langford, J. C.. A global geometric framework for nonlinear dimensionality reduction. Science 9(55): Wang, H.; Nie, F.; Cai, W.; and Huang, H. 3. Semisuervised robust dictionary learning via efficient l, +- norms minimization. In 3 IEEE International Conference on Comuter Vision (ICCV 3), Wang, H.; Huang, H.; and Ding, C. a. Multi-label feature transform for image classifications. In ECCV. Sringer Wang, H.; Huang, H.; and Ding, C. H. b. Discriminant lalacian embedding. In AAAI. Wang, H.; Nie, F.; and Huang, H. 4. Robust distance metric learning via simultaneous l-norm minimization and maximization. In Proceedings of the 3st International Conference on Machine Learning (ICML 4), Wright, J.; Ganesh, A.; Rao, S.; Peng, Y.; and Ma, Y. 9. Robust rincial comonent analysis: Exact recovery of corruted low-rank matrices via convex otimization. In Advances in neural information rocessing systems,

Globally and Locally Consistent Unsupervised Projection

Globally and Locally Consistent Unsupervised Projection Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Globally and Locally Consistent Unsupervised Projection Hua Wang, Feiping Nie, Heng Huang Department of Electrical Engineering

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels CS 229 Final Project: Single Image Deth Estimation From Predicted Semantic Labels Beyang Liu beyangl@cs.stanford.edu Stehen Gould sgould@stanford.edu Prof. Dahne Koller koller@cs.stanford.edu December

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Large-Scale Face Manifold Learning

Large-Scale Face Manifold Learning Large-Scale Face Manifold Learning Sanjiv Kumar Google Research New York, NY * Joint work with A. Talwalkar, H. Rowley and M. Mohri 1 Face Manifold Learning 50 x 50 pixel faces R 2500 50 x 50 pixel random

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification

A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-302, -ISSN: 2278-879, Volume 2, Issue 9 (Setember 202), PP 36-44 A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification A.Kavitha,

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

The Analysis of Parameters t and k of LPP on Several Famous Face Databases

The Analysis of Parameters t and k of LPP on Several Famous Face Databases The Analysis of Parameters t and k of LPP on Several Famous Face Databases Sujing Wang, Na Zhang, Mingfang Sun, and Chunguang Zhou College of Computer Science and Technology, Jilin University, Changchun

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Support Vector Machines for Face Authentication

Support Vector Machines for Face Authentication Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas 1 2 1 CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

A label distance maximum-based classifier for multi-label learning

A label distance maximum-based classifier for multi-label learning Bio-Medical Materials and Engineering 26 (2015) S1969 S1976 DOI 10.3233/BME-151500 IOS ress S1969 A label distance maximum-based classifier for multi-label learning Xiaoli Liu a,b, Hang Bao a, Dazhe Zhao

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Unsupervised and Semi-Supervised Learning vial 1 -Norm Graph

Unsupervised and Semi-Supervised Learning vial 1 -Norm Graph Unsupervised and Semi-Supervised Learning vial -Norm Graph Feiping Nie, Hua Wang, Heng Huang, Chris Ding Department of Computer Science and Engineering University of Texas, Arlington, TX 769, USA {feipingnie,huawangcs}@gmail.com,

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

Adaptive Reciprocal Cell based Sparse Representation for Satellite Image Restoration

Adaptive Reciprocal Cell based Sparse Representation for Satellite Image Restoration Vol.49 (SoftTech 04),.8-85 htt://dx.doi.org/0.457/astl.04.49.50 Adative Recirocal Cell based Sarse Reresentation for Satellite Image Restoration Yanfei He and Shunfeng Wang Deartment of Math and Statistic,

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Vector sigma filters for noise detection and removal in color images

Vector sigma filters for noise detection and removal in color images J. Vis. Commun. Image R. 7 (26) 26 www.elsevier.com/locate/jvci Vector sigma filters for noise detection and removal in color images Rastislav Lukac a, *,, Bogdan Smolka b, Konstantinos N. Plataniotis

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

Facial Expression Recognition using Image Processing and Neural Network

Facial Expression Recognition using Image Processing and Neural Network Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Facial Exression Recognition using Image Processing and eural etwork Keerti Keshav Kanchi PG Student, Deartment

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

An accurate and fast point-to-plane registration technique

An accurate and fast point-to-plane registration technique Pattern Recognition Letters 24 (23) 2967 2976 www.elsevier.com/locate/atrec An accurate and fast oint-to-lane registration technique Soon-Yong Park *, Murali Subbarao Deartment of Electrical and Comuter

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

IEEE ROBOTICS AND AUTOMATION LETTERS, VOL. 3, NO. 4, OCTOBER

IEEE ROBOTICS AND AUTOMATION LETTERS, VOL. 3, NO. 4, OCTOBER IEEE ROBOTICS AND AUTOMATION LETTERS, VOL. 3, NO. 4, OCTOBER 018 3669 Learning of Holism-Landmark Grah Embedding for Place Recognition in Long-Term Autonomy Fei Han, Saad El Beleidy, Hua Wang, Senior Member,

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect A simulated Linear Mixture Model to Imrove Classification Accuracy of Satellite Data Utilizing Degradation of Atmosheric Effect W.M Elmahboub Mathematics Deartment, School of Science, Hamton University

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Ensemble Learning Based on Parametric Triangular Norms

Ensemble Learning Based on Parametric Triangular Norms Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia

More information

Clustered Regression Control of a Biped Robot Model

Clustered Regression Control of a Biped Robot Model 15 Clustered Regression Control of a Bied Robot Model Olli Haavisto and Heikki Hyötyniemi Helsinki University of Technology, Control Engineering Laboratory Finland Oen Access Database www.i-techonline.com

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Selecting Models from Videos for Appearance-Based Face Recognition

Selecting Models from Videos for Appearance-Based Face Recognition Selecting Models from Videos for Appearance-Based Face Recognition Abdenour Hadid and Matti Pietikäinen Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P.O.

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR

METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR METHOD OF LANDSLIDE MEASUREMENT BY GROUND BASED LIDAR Ryo INADA* and Masataka TAKAGI** Kochi University of Technology, Kami-shi, Kochi, 782-8502, Jaan *135082@gs.kochi-tech.ac.j **takagi.masataka@kochi-tech.ac.j

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Research Article Iterative Reweighted Noninteger Norm Regularizing SVM for Gene Expression Data Classification

Research Article Iterative Reweighted Noninteger Norm Regularizing SVM for Gene Expression Data Classification Comutational and Mathematical Methods in Medicine Volume 3, Article ID 76844, ages htt://dx.doi.org/.55/3/76844 Research Article Iterative Reweighted Noninteger Norm Regularizing SVM for Gene Exression

More information

A STUDY ON CALIBRATION OF DIGITAL CAMERA

A STUDY ON CALIBRATION OF DIGITAL CAMERA A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

A Framework for Modeling Positive Class Expansion with Single Snapshot

A Framework for Modeling Positive Class Expansion with Single Snapshot A Framework for Modeling Positive Class Exansion with Single Snashot Yang Yu and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 293, China {yuy,zhouzh}@lamda.nju.edu.cn

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Non-linear dimension reduction

Non-linear dimension reduction Sta306b May 23, 2011 Dimension Reduction: 1 Non-linear dimension reduction ISOMAP: Tenenbaum, de Silva & Langford (2000) Local linear embedding: Roweis & Saul (2000) Local MDS: Chen (2006) all three methods

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information