Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
|
|
- Godfrey Marshall
- 5 years ago
- Views:
Transcription
1 Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity of North Carolina at Charlotte, Charlotte NC halat@uncc.edu, wartr2@bellouth.net, anaipur@uncc.edu Abtract A robut filter-baed approach i propoed for wirele enor network for detecting contour of a ignal ditribution over a 2-dimenional region. The motivation for contour detection i derived from application where the patial ditribution of a ignal (uch a temperature, oil moiture level, etc.) i to be determined over a large region with minimum communication cot. The propoed cheme applie multi-level quantization to the enor ignal value to artificially create an edge and then applie patial filtering for edge detection. The patial filter i localized and i baed on an adaptation of the Prewitt filter ued in image proceing. Appropriate mechanim are introduced that minimize the cot for communication required for collaboration. Simulation reult are preented to how the error performance of the propoed contour detection cheme and the aociated communication cot (ingle-hop communication with immediate neighborhood in average) in the network. Keyword- wirele enor network; collaborative proceing; contour detection; Prewitt filter. I. INTRODUCTION A key deign objective in wirele enor network i to derive benefit from the collective proceing power of a large number of energy and hardware contrained wirele enor node that are ditributed over a region of interet. The type of information required depend on the application, which include obtaining periodic ignal level uch a in environmental monitoring, generating alarm baed on pecific ignal condition, tracking a mobile target within an area of interet, and more. However, in almot all cae, the combination of information from a group of enor can make the ytem more robut and accurate. The main challenge i to deign ditributed collaborative information proceing cheme under the limited proceing, energy and communication capabilitie of the mall enor node. Thi paper addree the deign of collaborative proceing algorithm for detecting contour of a ignal ditribution in a enor field. Contour detection i ueful in a large number of environmental monitoring application. A typical application cenario i where patial variation of a ignal ditribution need to be detected over a large region uing an array of enor. To minimize the communication cot for obtaining periodic ignal ample from all enor in the region, the patial ditribution can be etimated from a et of contour correponding to pecific ignal level [3]. Our approach for contour detection i to ue the contour level a a threhold to introduce an artificial edge that demarcate two different region within the enor field (on either ide of the contour) and then apply a filter-baed edge detection algorithm. The algorithm ue collaborative proceing among a group of randomly ditributed enor node in the region of interet. Appropriate meaure are incorporated to acertain that the abence of a true edge, i.e. a region characterized by a harp variation of the ignal level, doe not introduce much error in etimating the contour. Primary deign conideration are minimization of error of etimated contour and the communication cot incurred for collaborative proceing. Thi paper i organized a follow. In ection II, we review exiting work on edge detection in enor network that are related to thi work. In ection III, we decribe the ditributed contour detection problem targeted in thi paper. In ection IV, the filter-baed approach for edge detection and iue on robutne and communication cot are decribed. Performance reult of the propoed cheme obtained from computer imulation are preented in ection V. In ection VI, we preent our concluion and decribe ome future work on edge tracking. II. RELATED WORK Edge detection ha been widely reearched for image proceing, where ignal level are available at regularly located ample point, i.e. pixel, and the algorithm aume the availability of information from all data point for proceing [8]. Conequently, adaptation of efficient edge detection algorithm from image proceing for application in enor network have been explored in literature. The primary goal of thee algorithm i to detect edge node, i.e. node that are located within a certain tolerance ditance from the ideal edge of the ignal that i to be determined. Chintalapudi, et al. [1] propoed three general approache for localized edge detection: a) a tatitical approach, b) a filter-baed approach and c) a claifier-baed approach. While the tatitical approach doe not require location information at the enor node, the other two can only function when all node are aware of their geographic location. The author X/7/$ IEEE. 159
2 howed that although the tatitical approach i more robut in the preence of noie, it ha higher error and i more difficult to apply in practice due to difficultie in electing a proper threhold. Liao, et al. [2] propoed an approach that i baed on one and two level deciion baed on the local and global maximum likelihood ratio to enhance the tatitical approach propoed by [1] for edge detection. Their work preented in [4] enhanced the detection of the edge region in tatitical approach uing Neyman-Pearon (NP) criteria. Baed on NP criteria they propoed an idea that addree to olve the threhold election problem. They alo compared the performance of their approach with claifier-baed approach under the aumption of location error and how that their tatitical approach perform better than claifier approach. The work in [5-7] propoe the uage of contour line detection intead of edge detection to not only recognize the region of a certain phenomena, but alo extract other information uch a ignal amplitude and ource location. The propoed method in [5-7] i baed on regional clutering and having communication between cluter-head. It can track change, but i not a localized approach and ome enor node require additional capabilitie to be a cluter-head. In thi work, we generalize the notion of the binary edge decribed in [1] to a contour line that i decribed with multiple level and how that by thi aumption the probabilitie of mied and fale detection of edge node are reduced. We evaluate the error in etimating a contour by meauring the ditance of the detected edge node from the true contour. In addition, we determine the expected aving in communication cot of the propoed ytem. Although our approach ha been evaluated uing both the tatitical and filter-baed algorithm, in thi paper we preent reult that are obtained primarily uing the filter-baed approach due to it uperior performance. A comparion of the performance of the two approache i alo hown. III. PROBLEM STATEMENT AND APPROACH USED FOR CONTOUR DETECTION IN SENSOR NETWORKS We aume a cenario where a large number of wirele enor node are randomly ditributed in a given area of interet. Each enor can obtain periodic obervation of the ignal in the enor field, uch a the temperature ditribution over a given area. A contour in the enor field i defined a the line of demarcation between region that are above and below a S. For the ake of etimating error in etimation, threhold we ue a tolerance ditance r to determine the contour thickne, which i the region near a contour uch that a enor node located in the region i termed a an edge node. Thi i illutrated in Figure 1. There can be two type of deciion error. When a node decide that it i an edge node when it i not within a ditance r from the true contour, we have a fale detection. On the other hand, when a node that i actually an edge node (i.e. located within a ditance r from the true contour) fail to be detected, we have a mied detection. The enor node perform local and collaborative proceing of their oberved ignal ample to determine if they are edge node. Error in detecting edge node can occur due to Figure 1: Illutration of a contour in a enor field and edge enor near it. two reaon. Firt, although the actual edge or boundary demarcate two region having different ignal propertie, the true ditribution of the ignal acro the edge may not have a harp change. In thi ene, a contour detection problem i different from edge detection. Secondly, quantization noie and other environmental noie ource introduce additional cope of detection error. The primary goal of collaborative proceing i to reduce the effect of thee error. In addition, we aim to keep the communication cot for collaboration to a minimum. With thee objective, we propoe a two-tage proce for the detection of edge enor near a contour in the enor field. In the firt tage, all node periodically ue their local obervation to decide if they are probable edge node (which can be obtained by checking if it local obervation lie between two given threhold). In the econd tage, node that tet poitive in the firt tage tranmit query meage to their neighbor and proce the returned information uing a filterbaed algorithm to confirm their deciion (ee Figure 2). IV. Figure 2: Illutration of the collaborative proceing cheme. PROPOSED CONTOUR DETECTION METHOD USING SPATIAL FILTERING The propoed contour detection algorithm i decribed a follow: Initially all node map their oberved ample to a quantized value (QV) uing a multi-level quantizer a depicted in Figure 3. The quantizer produce output value that are integer in the range ( MAX, MAX ) centered around X/7/$ IEEE. 16
3 the contour threhold S. The quantization tep ize i τ = 2.MAX / L, where L i the number of quantization level. A node determine if it i a probable edge enor or not by comparing it obervation ample F() to two threhold a follow: if F( ) S < MAX probable edge enor A probable edge enor broadcat a query packet to obtain quantized value of obervation from it neighbor. When any node receive a query packet, it replie by ending it own quantized obervation value. The querying node procee all replie to obtain a deciion variable DV (). It then decide if it i an edge enor or not by performing a threhold tet a follow: if DV ( ) < γ ele edge enor not edge enor We note that the multi-level quantization of obervation ample a decribed in Figure 3 introduce an artificial edge having value MAX and MAX at either ide of the contour threhold S. Although the edge i expected to be granular, depending on the number of quantization level L, we can apply an edge detection algorithm to the quantized ample at the enor node for detecting edge enor. We how later that uing a value of L > 2 a oppoed to binary quantization actually reduce the error in contour detection. The edge detection problem in enor network i imilar to that in image proceing except for the following factor [1]. One factor i that a oppoed to pixel that are located on a uniform grid, wirele enor node are uually located in a random fahion. Hence, appropriate meaure mut be taken to account for the non-uniform location of the ampled data while applying filtering in enor network. A econd factor i that enor node are typically required to perform on-ite and collaborative proceing of data. Hence, there i ome cot for communication that i aociated with obtaining data from different node in the network, which i not an iue in image proceing. Figure 3: Illutration of multi-level quantization of the enor ignal. In thi figure, MAX=QV Max x number of quantization level. A number of technique may be applied to obtain the deciion variable for performing the threhold tet at the probable edge enor. In the tatitical approach, DV () i obtained a the abolute value of the average of all quantized obervation value received from the neighbor of the querying node [1,3]. Here we decribe an edge detection cheme that i baed on an adaptation of the Prewitt filter for edge detection in image proceing. A. Spatial Filtering uing Prewitt Filter Edge detection in image proceing i commonly accomplihed by performing a patial differentiation of the image field followed by a threhold operation to determine point of teep amplitude change. Horizontal and vertical patial derivative are defined a: F( x, y) dx =, F( x, y) d y = (1) x y where F(x,y) i the value of the ignal at the point (x,y). The gradient magnitude of F(x,y) i then 2 2 F( x, y) = dx + dy (2) An edge i then judged to be preent if the gradient exceed a given threhold. To reduce computational load, the gradient at point (x,y) can be implified to: F ( x, y) = d x + d y (3) In digital image proceing pixel replace coordinate, and an edge detection algorithm perform patial proceing on an image to create a new image with pronounced change in patial amplitude of the original image. The proceed image G( j, k) i uually decribed a the combination of two gradient component: the row gradient G R (j, k), and the column gradient G C (j, k) a follow G( j, k) = GR( j, k) + GC( j, k) (4) where j and k are horizontal and vertical indice of a pixel. The implet method of dicrete gradient generation i to form the running difference of pixel along row and column of the image. In that cae, the row gradient i defined a: G R (j,k) =F(j, k) -- F(j, k-1) (5) and the column gradient i: G C (j,k) =F(j, k) -- F(j+1, k) (6) where F( j, k) repreent the original image. Alternatively, a differential filter may be applied to generate the gradient vector from the original image. For example, in Prewitt filtering, the row and column gradient vector are obtained a: G R (j,k) = F(j,k) H R (j,k) (7) G C (j,k) = F(j,k) H C (j,k) where H R (j,k), H C (j,k) for a filter of ize 3 (i.e. operate on three adjacent pixel to produce one value) are: H R (j,k) = H C (j,k) = (8) We introduced everal modification to the baic Prewitt filter decribed above, to uit the requirement for detecting edge enor from their quantized value according to the propoed cheme. One iue i the poibility of detecting multiple X/7/$ IEEE. 161
4 edge caued by multi-level quantization. We olve thi problem by introducing the notion of Prewitt difference filtering where difference intead of multiplication are ued in the filtering operation. Eentially, thi caue the quantized ignal obtained from different node to be ubtracted from an (patially) odd function at the probing node. In thi way while the pat gradient remain the ame for the real edge node, the gradient of the non-edge node increae. A candidate odd function i the Signum function decribed a ig ( x) = 1 if x, and ig ( x) = 1 otherwie. Accordingly, we adopt H x (.) and H y (.) to be caled Signum function, with their maximum value being the maximum value of QV or QV Max, received from the neighboring node. The problem of random node location can be reolved by utilizing the concept of a continuou Prewitt filter [3]: ( x, y) = 1 H x if x < x, 1 if x > x ( x, y) = 1 H y if y < y, 1 if y > y. Here, we ue a weighted continuou Prewitt filter, to account for the random number of node on different ide (above and below, right and left) of any node where the proceing i to be performed. Thi i implemented uing weighting function W x (.) and W y (.) that are calculated a follow: 1 x > x nright W x( x, y) = 1 x < x nleft (1) 1 y > y nup W y ( x, y ) = 1 y < y ndown where n left, n right, n up, and ndown are the number of node in the neighborhood of the querying node to the left (i.e. x < x ), right (i.e. x > x ), above (i.e. y > y (9) ), and below (i.e. y < y ) the node, repectively. With thee, the deciion variable for the tet for detecting edge enor i decribed a DV( ) = G x_diff () + G y_diff () where G x _ diff () = W x ( x, y )[ H x ( x, y ) QV ] N ( ) (11) G = W x, y [ H ( x, y ) QV ] y _ diff () y ( ) N ( ) B. Conideration for Reducing Communication Cot We now preent two cheme that are propoed to decreae the communication cot for the propoed collaborative edge detection algorithm: y Scheme-1:Decreaing the number the poible edge node: Thi i implemented by introducing a threhold parameter R, R MAX, uch that only thoe node for which F ( ) S < R are conidered to be probable edge node, although quantization i till performed according to the multi-level cheme decribed in Figure 3. Thi reduce the number of query packet and replie generated in the network without affecting the tep-ize (accuracy) of quantization. However, thi reduction in communication cot will be achieved at the poible cot of higher probability of mied detection. Scheme-2: Opportunitic neighbor litening (ONLi): According to thi cheme, each node repond to a query packet only once, auming that neighboring node that already received it QV (ent in repone to an earlier query packet) have aved it for future ue for Prewitt difference filtering. Conequently, for each query packet, only thoe node repond that have not already ent their QV. Thi eliminate multiple tranmiion of the ame information from node in repone to multiple query packet. V. PERFORMANCE EVALUATION In thi ection, we preent reult obtained from computer imulation to illutrate the performance of the propoed contour detection cheme. We aume a network of 261 enor node that are uniformly ditributed on a 1x1 m2 area. Each enor node i equipped with an omni-directional antenna having a tranmiion range of 7 m. The tolerance radiu that i ued to define true edge enor i aumed to be 1 m. It i aumed that the data i gathered in a ingle hop neighborhood of each node. We alo aume that each node know it coordinate and broadcat it poition to it neighbor. For our imulation, we aume that the ignal ditribution ha a Gauian ditribution in the enor field, centered at (5,5) with a peak value of 1. Although a contour at a pecified ignal level with thi ignal ditribution i a cloed circle, it i worth mentioning that the propoed algorithm work equally well for non-cloed contour a well. The noie in the enor obervation i aumed to have a Gauian ditribution. Figure 4 depict the ignal ditribution along with a naphot of detected edge enor from one of our imulation run that were performed to detect a contour at ignal level 5. The true edge enor are marked by blue quare and the enor that are detected by the propoed algorithm are marked in red. The ret of the node are marked by green dot. In Figure 5, we compare the performance of the tatitical and Prewitt filter baed approache for localized edge detection. Here, the variation of the fale detection and mied detection rate are plotted uing 8 quantization level and two different noie level. The reult how that the Prewitt filter baed approach generate lower detection error in comparion to the tatitical approach. Henceforth, we preent all reult obtained from the Prewitt filter baed approach only X/7/$ IEEE. 162
5 Figure 4: A naphot of the outcome of edge detection uing the propoed cheme depicting true edge enor in blue and detected edge enor in red We next evaluate the effect of L (the number of quantization level) and the value of MAX on the error performance of the propoed contour detection cheme by plotting the probability of mied detection againt the deciion threhold γ for different L and MAX value. The reult, hown in Figure 6, indicate that multi-level quantization reult in ignificant improvement in performance. The probability of mied detection drop noticably when the number of quantization level i increaed from 2 to 8, however the relative improvement i le pronounced when it i increaed to 16. The performance alo improve with a higher value of MAX. Hence, we ue L=8 and MAX=1 for mot of our other imulation. Note that our propoed cheme with binary quantization become imilar to that preented in [1] when applied to contour detection. Hence, the reult uing multi-level quantization in Figure 6 alo indicate the comparative performance improvement obtained uing the propoed cheme and that preented in [1], which i mot related to thi work. Fale-Detection Rate We evaluate the effect of noie on the propoed contour Filter-Baed Approach Statitical Approach Filter-baed, Noie Std: Statitical, Noie Std: Filter-baed, Noie Std: 4 Statitical, Noie Std: Mied-Detection Rate Figure 5: Comparion of detection performance uing the tatitical and Prewitt filter baed approache.. detection cheme by determining the variation of the probability of mied detection and the number of falely detected node at a contour level of 5 under different noie level (Figure 7). Thee reult how that a higher amount of noie increae the probability of mied detection but ha negligible effect on the number of fale detection. Note that there are detection error even when there i no noie. Thi i explained from the fact that depending on the lope of the ignal ditribution at the contour threhold S, the et of node within the artificial edge created by our quantization proce may not be exactly the ame a thoe conidered to be true edge enor. The reaon i that while the firt et include only thoe node whoe ignal value are within a certain range of the contour threhold S, true edge enor are defined by the tolerance ditance r. Depite thee apparent inconitencie of detection error with repect to noie, we till conider probability of mied detection and the number of fale alarm to be indicative of the error performance of the propoed contour detection cheme. For intance, if the location of the detected edge enor are ued to predict the location of the contour, higher mied Mied-Detection Rate Q-Level=16 Q-Level=8 Q-Level=4 Q-Level=2 MAX = 4 MAX = 1 Noie Std = 2 (Fale Detection Rate < 1 %) Threhold Figure 6: Probability of mied detection for different number of quantization level and MAX value X/7/$ IEEE. 163
6 Mied-Detection Rate Mied Rate: Noie Std: # of Fale Detection MAX = 1 # of Quantization = 8 Noie Std: Threhold Figure 7: Probabilitie of mied detection and the number of falely detected edge node at a contour level of 5 with varying threhold γ. detection and fale detection both would contribute to a higher amount of error in the prediction. In that repect, our experiment indicate that fale detection affect the prediction of a contour location more than mied detection. Thi i oberved from the fact that average ditance from detected edge enor for MAX=1 and L=8 i found to be.63 when the threhold γ =. 25, where the probability of mied detection =.367 and the number of fale detection = However, the average ditance increae to 1.44 at γ =.85, where the probability of mied detection=.1 and number of fale detection= The above finding provide the main motivation for reducing the number of probable edge enor uing the propoed Scheme-1 decribed in ection 4.2. We note that while a maller value of R will reduce the communication cot, it can alo increae the probability of mied detection. To evaluate thi effect, we obtain the average ditance of the detected edge node from the true contour a well a the communication cot (determined by the number of packet tranmiion) a obtained for pecific et of parameter, a hown in Table 1. The reult how that although a mall value of R generate a high level of mied detection, the mean ditance error i till low for R =.2 MAX. On the other hand, thi value of R reduce the communication cot by a factor of 5. Finally, we evaluate the aving in communication cot obtained by uing the propoed ONLi cheme. Table-II how the average number of tranmiion in the network, normalized to the total number of node in the network that were required for contour detection with and without uing the ONLi cheme. The reult indicate that avoiding TABLE I: Error ditance and communication cot v. R MAX = 1, Number of Quantization level = 8, Threhold =.55, Noie Std = 2 Ditance Error R' MAX Prob. of mi # of Fale # of Fale Detection Comm. Cot Mean Standard Deviation multiple tranmiion in repone to query packet can reduce the communication cot to about 12% of that without uing ONLi. TABLE II: Average Communication Cot (Noie Std:2, Threhold:.55, R = MAX) MAX With ONLi Without ONLi VI. CONCLUSION AND FUTURE WORK A collaborative proceing cheme for enor network i preented for detecting contour of the ignal ditribution of the enor field. The propoed cheme ue a multi-level quantizer for emulating an edge in the ignal ditribution in the enor field and then applie patial filtering. Appropriate deign conideration are preented to apply a patial Prewitt filter to ditributed data proceing in enor network. The propoed cheme ha ufficient robutne to noie in ignal obervation and incur a low cot of communication. Overall, thi cheme can vatly reduce the number of tranmiion that would be required to etimate the patial ditribution of the ignal over a large area uing a wirele enor network by uing contour detection. The filter-baed approach preented in thi paper can alo be ued for tracking the temporal variation of ignal ditribution with low communication cot. A a continuation of contour detection in tatic cae, the author are working on an algorithm for tracking the peed, direction and deformation of contour uing localized computation and collaborative proceing in wirele enor network. REFERENCES [1] K. K. Chintalapudi and R. Govindan, Localized edge detection in enor field, in IEEE International Workhop on Senor Network Protocol and Application, pp. 59-7, 23. [2] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Ditributed Edge Senor Detection With One-And Two-Level Detection, Proceeding IEEE ICASSP, pp , 24. [3] W. R. Armtrong, Localized contour detection in wirele enor network, MSEE Thei, Univerity of North Carolina at Charlotte, 25. [4] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Statitical Edge Detection with Ditributed Senor under the Neyman-Pearon (NP) Optimality, in Proceeding IEEE VTC, 26. [5] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Contour line extraction in a multi-modal field with enor network," Proceeding IEEE Global Telecommunication Conference (Globecom), 25. [6] Pei-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, "A ditributed approach to contour line extraction uing enor network," in Proc. IEEE VTC, 25. [7] Pei-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, "Contour line extraction with wirele enor network," in Proc. IEEE International Conference on Communication (ICC), 25. [8] Digital Image Proceing, 3rd edition by William K. Pratt, John Wiely & Son, Inc., X/7/$ IEEE. 164
Spatio-Temporal Monitoring using Contours in Large-scale Wireless Sensor Networks
Spatio-Temporal Monitoring uing Contour in Large-cale Wirele Senor Network Hadi Alati Electrical and Computer Engineering Univerit of North Carolina at Charlotte 9 Univerit Cit Boulevard, Charlotte, NC
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationFocused Video Estimation from Defocused Video Sequences
Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization
More informationAnalytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation
Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationDesign of a Stewart Platform for General Machining Using Magnetic Bearings
eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More informationAnisotropic filtering on normal field and curvature tensor field using optimal estimation theory
Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationOn combining Learning Vector Quantization and the Bayesian classifiers for natural textured images
On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationMulticlass Road Sign Detection using Multiplicative Kernel
Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić
More informationResearch Article Real-Time Communications in Large-Scale Wireless Networks
Hindawi Publihing Corporation International Journal of Digital Multimedia Broadcating Volume 2008, Article ID 586067, 16 page doi:10.1155/2008/586067 eearch Article eal-time Communication in Large-Scale
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationResearch on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function
016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationNew DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index
New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationAn Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System
Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced
More informationThrough the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview
I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationFinite Elements Method in Split Hopkinson Pressure Bar developing process
6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 1-3, 007 63 Finite Element Method in Split Hopkinon Preure Bar developing proce ROTARIU ADRIAN
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationA TOPSIS based Method for Gene Selection for Cancer Classification
Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationGrowing Networks Through Random Walks Without Restarts
Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationSECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS
SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department
More informationA reduced reference image quality metric based on feature fusion and neural networks
Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationAdaptive Beam Director for a Tiled Fiber Array
Adaptive Beam Director for a Tiled Fiber Array Mikhail A. Vorontov Intelligent Optic Laboratory, Computational and Information Science Directorate, U.S. Army Reearch Laboratory, 2800 Powder Mill Road,
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationTexture-Constrained Active Shape Models
107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.
More information(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY
(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY Chri Old, Chri Merchant Univerity of Edinburgh, The Crew Building, Wet Main Road, Edinburgh, EH9 3JN, United Kingdom Email: cold@ed.ac.uk Email:
More informationTAM 212 Worksheet 3. Solutions
Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.
More informationThe Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationQuadratic Optimal Control of Wireless Sensor Network Deployment
1 Quadratic Optimal Control of Wirele Senor Network Deployment Ratko R. Selmic 1, Jinko Kanno, Jack Buchart 1, and Nichola Richardon 3 1 Department of Electrical Engineering, Department of Mathematic 3
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More information