Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Size: px
Start display at page:

Download "Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks"

Transcription

1 Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity of North Carolina at Charlotte, Charlotte NC halat@uncc.edu, wartr2@bellouth.net, anaipur@uncc.edu Abtract A robut filter-baed approach i propoed for wirele enor network for detecting contour of a ignal ditribution over a 2-dimenional region. The motivation for contour detection i derived from application where the patial ditribution of a ignal (uch a temperature, oil moiture level, etc.) i to be determined over a large region with minimum communication cot. The propoed cheme applie multi-level quantization to the enor ignal value to artificially create an edge and then applie patial filtering for edge detection. The patial filter i localized and i baed on an adaptation of the Prewitt filter ued in image proceing. Appropriate mechanim are introduced that minimize the cot for communication required for collaboration. Simulation reult are preented to how the error performance of the propoed contour detection cheme and the aociated communication cot (ingle-hop communication with immediate neighborhood in average) in the network. Keyword- wirele enor network; collaborative proceing; contour detection; Prewitt filter. I. INTRODUCTION A key deign objective in wirele enor network i to derive benefit from the collective proceing power of a large number of energy and hardware contrained wirele enor node that are ditributed over a region of interet. The type of information required depend on the application, which include obtaining periodic ignal level uch a in environmental monitoring, generating alarm baed on pecific ignal condition, tracking a mobile target within an area of interet, and more. However, in almot all cae, the combination of information from a group of enor can make the ytem more robut and accurate. The main challenge i to deign ditributed collaborative information proceing cheme under the limited proceing, energy and communication capabilitie of the mall enor node. Thi paper addree the deign of collaborative proceing algorithm for detecting contour of a ignal ditribution in a enor field. Contour detection i ueful in a large number of environmental monitoring application. A typical application cenario i where patial variation of a ignal ditribution need to be detected over a large region uing an array of enor. To minimize the communication cot for obtaining periodic ignal ample from all enor in the region, the patial ditribution can be etimated from a et of contour correponding to pecific ignal level [3]. Our approach for contour detection i to ue the contour level a a threhold to introduce an artificial edge that demarcate two different region within the enor field (on either ide of the contour) and then apply a filter-baed edge detection algorithm. The algorithm ue collaborative proceing among a group of randomly ditributed enor node in the region of interet. Appropriate meaure are incorporated to acertain that the abence of a true edge, i.e. a region characterized by a harp variation of the ignal level, doe not introduce much error in etimating the contour. Primary deign conideration are minimization of error of etimated contour and the communication cot incurred for collaborative proceing. Thi paper i organized a follow. In ection II, we review exiting work on edge detection in enor network that are related to thi work. In ection III, we decribe the ditributed contour detection problem targeted in thi paper. In ection IV, the filter-baed approach for edge detection and iue on robutne and communication cot are decribed. Performance reult of the propoed cheme obtained from computer imulation are preented in ection V. In ection VI, we preent our concluion and decribe ome future work on edge tracking. II. RELATED WORK Edge detection ha been widely reearched for image proceing, where ignal level are available at regularly located ample point, i.e. pixel, and the algorithm aume the availability of information from all data point for proceing [8]. Conequently, adaptation of efficient edge detection algorithm from image proceing for application in enor network have been explored in literature. The primary goal of thee algorithm i to detect edge node, i.e. node that are located within a certain tolerance ditance from the ideal edge of the ignal that i to be determined. Chintalapudi, et al. [1] propoed three general approache for localized edge detection: a) a tatitical approach, b) a filter-baed approach and c) a claifier-baed approach. While the tatitical approach doe not require location information at the enor node, the other two can only function when all node are aware of their geographic location. The author X/7/$ IEEE. 159

2 howed that although the tatitical approach i more robut in the preence of noie, it ha higher error and i more difficult to apply in practice due to difficultie in electing a proper threhold. Liao, et al. [2] propoed an approach that i baed on one and two level deciion baed on the local and global maximum likelihood ratio to enhance the tatitical approach propoed by [1] for edge detection. Their work preented in [4] enhanced the detection of the edge region in tatitical approach uing Neyman-Pearon (NP) criteria. Baed on NP criteria they propoed an idea that addree to olve the threhold election problem. They alo compared the performance of their approach with claifier-baed approach under the aumption of location error and how that their tatitical approach perform better than claifier approach. The work in [5-7] propoe the uage of contour line detection intead of edge detection to not only recognize the region of a certain phenomena, but alo extract other information uch a ignal amplitude and ource location. The propoed method in [5-7] i baed on regional clutering and having communication between cluter-head. It can track change, but i not a localized approach and ome enor node require additional capabilitie to be a cluter-head. In thi work, we generalize the notion of the binary edge decribed in [1] to a contour line that i decribed with multiple level and how that by thi aumption the probabilitie of mied and fale detection of edge node are reduced. We evaluate the error in etimating a contour by meauring the ditance of the detected edge node from the true contour. In addition, we determine the expected aving in communication cot of the propoed ytem. Although our approach ha been evaluated uing both the tatitical and filter-baed algorithm, in thi paper we preent reult that are obtained primarily uing the filter-baed approach due to it uperior performance. A comparion of the performance of the two approache i alo hown. III. PROBLEM STATEMENT AND APPROACH USED FOR CONTOUR DETECTION IN SENSOR NETWORKS We aume a cenario where a large number of wirele enor node are randomly ditributed in a given area of interet. Each enor can obtain periodic obervation of the ignal in the enor field, uch a the temperature ditribution over a given area. A contour in the enor field i defined a the line of demarcation between region that are above and below a S. For the ake of etimating error in etimation, threhold we ue a tolerance ditance r to determine the contour thickne, which i the region near a contour uch that a enor node located in the region i termed a an edge node. Thi i illutrated in Figure 1. There can be two type of deciion error. When a node decide that it i an edge node when it i not within a ditance r from the true contour, we have a fale detection. On the other hand, when a node that i actually an edge node (i.e. located within a ditance r from the true contour) fail to be detected, we have a mied detection. The enor node perform local and collaborative proceing of their oberved ignal ample to determine if they are edge node. Error in detecting edge node can occur due to Figure 1: Illutration of a contour in a enor field and edge enor near it. two reaon. Firt, although the actual edge or boundary demarcate two region having different ignal propertie, the true ditribution of the ignal acro the edge may not have a harp change. In thi ene, a contour detection problem i different from edge detection. Secondly, quantization noie and other environmental noie ource introduce additional cope of detection error. The primary goal of collaborative proceing i to reduce the effect of thee error. In addition, we aim to keep the communication cot for collaboration to a minimum. With thee objective, we propoe a two-tage proce for the detection of edge enor near a contour in the enor field. In the firt tage, all node periodically ue their local obervation to decide if they are probable edge node (which can be obtained by checking if it local obervation lie between two given threhold). In the econd tage, node that tet poitive in the firt tage tranmit query meage to their neighbor and proce the returned information uing a filterbaed algorithm to confirm their deciion (ee Figure 2). IV. Figure 2: Illutration of the collaborative proceing cheme. PROPOSED CONTOUR DETECTION METHOD USING SPATIAL FILTERING The propoed contour detection algorithm i decribed a follow: Initially all node map their oberved ample to a quantized value (QV) uing a multi-level quantizer a depicted in Figure 3. The quantizer produce output value that are integer in the range ( MAX, MAX ) centered around X/7/$ IEEE. 16

3 the contour threhold S. The quantization tep ize i τ = 2.MAX / L, where L i the number of quantization level. A node determine if it i a probable edge enor or not by comparing it obervation ample F() to two threhold a follow: if F( ) S < MAX probable edge enor A probable edge enor broadcat a query packet to obtain quantized value of obervation from it neighbor. When any node receive a query packet, it replie by ending it own quantized obervation value. The querying node procee all replie to obtain a deciion variable DV (). It then decide if it i an edge enor or not by performing a threhold tet a follow: if DV ( ) < γ ele edge enor not edge enor We note that the multi-level quantization of obervation ample a decribed in Figure 3 introduce an artificial edge having value MAX and MAX at either ide of the contour threhold S. Although the edge i expected to be granular, depending on the number of quantization level L, we can apply an edge detection algorithm to the quantized ample at the enor node for detecting edge enor. We how later that uing a value of L > 2 a oppoed to binary quantization actually reduce the error in contour detection. The edge detection problem in enor network i imilar to that in image proceing except for the following factor [1]. One factor i that a oppoed to pixel that are located on a uniform grid, wirele enor node are uually located in a random fahion. Hence, appropriate meaure mut be taken to account for the non-uniform location of the ampled data while applying filtering in enor network. A econd factor i that enor node are typically required to perform on-ite and collaborative proceing of data. Hence, there i ome cot for communication that i aociated with obtaining data from different node in the network, which i not an iue in image proceing. Figure 3: Illutration of multi-level quantization of the enor ignal. In thi figure, MAX=QV Max x number of quantization level. A number of technique may be applied to obtain the deciion variable for performing the threhold tet at the probable edge enor. In the tatitical approach, DV () i obtained a the abolute value of the average of all quantized obervation value received from the neighbor of the querying node [1,3]. Here we decribe an edge detection cheme that i baed on an adaptation of the Prewitt filter for edge detection in image proceing. A. Spatial Filtering uing Prewitt Filter Edge detection in image proceing i commonly accomplihed by performing a patial differentiation of the image field followed by a threhold operation to determine point of teep amplitude change. Horizontal and vertical patial derivative are defined a: F( x, y) dx =, F( x, y) d y = (1) x y where F(x,y) i the value of the ignal at the point (x,y). The gradient magnitude of F(x,y) i then 2 2 F( x, y) = dx + dy (2) An edge i then judged to be preent if the gradient exceed a given threhold. To reduce computational load, the gradient at point (x,y) can be implified to: F ( x, y) = d x + d y (3) In digital image proceing pixel replace coordinate, and an edge detection algorithm perform patial proceing on an image to create a new image with pronounced change in patial amplitude of the original image. The proceed image G( j, k) i uually decribed a the combination of two gradient component: the row gradient G R (j, k), and the column gradient G C (j, k) a follow G( j, k) = GR( j, k) + GC( j, k) (4) where j and k are horizontal and vertical indice of a pixel. The implet method of dicrete gradient generation i to form the running difference of pixel along row and column of the image. In that cae, the row gradient i defined a: G R (j,k) =F(j, k) -- F(j, k-1) (5) and the column gradient i: G C (j,k) =F(j, k) -- F(j+1, k) (6) where F( j, k) repreent the original image. Alternatively, a differential filter may be applied to generate the gradient vector from the original image. For example, in Prewitt filtering, the row and column gradient vector are obtained a: G R (j,k) = F(j,k) H R (j,k) (7) G C (j,k) = F(j,k) H C (j,k) where H R (j,k), H C (j,k) for a filter of ize 3 (i.e. operate on three adjacent pixel to produce one value) are: H R (j,k) = H C (j,k) = (8) We introduced everal modification to the baic Prewitt filter decribed above, to uit the requirement for detecting edge enor from their quantized value according to the propoed cheme. One iue i the poibility of detecting multiple X/7/$ IEEE. 161

4 edge caued by multi-level quantization. We olve thi problem by introducing the notion of Prewitt difference filtering where difference intead of multiplication are ued in the filtering operation. Eentially, thi caue the quantized ignal obtained from different node to be ubtracted from an (patially) odd function at the probing node. In thi way while the pat gradient remain the ame for the real edge node, the gradient of the non-edge node increae. A candidate odd function i the Signum function decribed a ig ( x) = 1 if x, and ig ( x) = 1 otherwie. Accordingly, we adopt H x (.) and H y (.) to be caled Signum function, with their maximum value being the maximum value of QV or QV Max, received from the neighboring node. The problem of random node location can be reolved by utilizing the concept of a continuou Prewitt filter [3]: ( x, y) = 1 H x if x < x, 1 if x > x ( x, y) = 1 H y if y < y, 1 if y > y. Here, we ue a weighted continuou Prewitt filter, to account for the random number of node on different ide (above and below, right and left) of any node where the proceing i to be performed. Thi i implemented uing weighting function W x (.) and W y (.) that are calculated a follow: 1 x > x nright W x( x, y) = 1 x < x nleft (1) 1 y > y nup W y ( x, y ) = 1 y < y ndown where n left, n right, n up, and ndown are the number of node in the neighborhood of the querying node to the left (i.e. x < x ), right (i.e. x > x ), above (i.e. y > y (9) ), and below (i.e. y < y ) the node, repectively. With thee, the deciion variable for the tet for detecting edge enor i decribed a DV( ) = G x_diff () + G y_diff () where G x _ diff () = W x ( x, y )[ H x ( x, y ) QV ] N ( ) (11) G = W x, y [ H ( x, y ) QV ] y _ diff () y ( ) N ( ) B. Conideration for Reducing Communication Cot We now preent two cheme that are propoed to decreae the communication cot for the propoed collaborative edge detection algorithm: y Scheme-1:Decreaing the number the poible edge node: Thi i implemented by introducing a threhold parameter R, R MAX, uch that only thoe node for which F ( ) S < R are conidered to be probable edge node, although quantization i till performed according to the multi-level cheme decribed in Figure 3. Thi reduce the number of query packet and replie generated in the network without affecting the tep-ize (accuracy) of quantization. However, thi reduction in communication cot will be achieved at the poible cot of higher probability of mied detection. Scheme-2: Opportunitic neighbor litening (ONLi): According to thi cheme, each node repond to a query packet only once, auming that neighboring node that already received it QV (ent in repone to an earlier query packet) have aved it for future ue for Prewitt difference filtering. Conequently, for each query packet, only thoe node repond that have not already ent their QV. Thi eliminate multiple tranmiion of the ame information from node in repone to multiple query packet. V. PERFORMANCE EVALUATION In thi ection, we preent reult obtained from computer imulation to illutrate the performance of the propoed contour detection cheme. We aume a network of 261 enor node that are uniformly ditributed on a 1x1 m2 area. Each enor node i equipped with an omni-directional antenna having a tranmiion range of 7 m. The tolerance radiu that i ued to define true edge enor i aumed to be 1 m. It i aumed that the data i gathered in a ingle hop neighborhood of each node. We alo aume that each node know it coordinate and broadcat it poition to it neighbor. For our imulation, we aume that the ignal ditribution ha a Gauian ditribution in the enor field, centered at (5,5) with a peak value of 1. Although a contour at a pecified ignal level with thi ignal ditribution i a cloed circle, it i worth mentioning that the propoed algorithm work equally well for non-cloed contour a well. The noie in the enor obervation i aumed to have a Gauian ditribution. Figure 4 depict the ignal ditribution along with a naphot of detected edge enor from one of our imulation run that were performed to detect a contour at ignal level 5. The true edge enor are marked by blue quare and the enor that are detected by the propoed algorithm are marked in red. The ret of the node are marked by green dot. In Figure 5, we compare the performance of the tatitical and Prewitt filter baed approache for localized edge detection. Here, the variation of the fale detection and mied detection rate are plotted uing 8 quantization level and two different noie level. The reult how that the Prewitt filter baed approach generate lower detection error in comparion to the tatitical approach. Henceforth, we preent all reult obtained from the Prewitt filter baed approach only X/7/$ IEEE. 162

5 Figure 4: A naphot of the outcome of edge detection uing the propoed cheme depicting true edge enor in blue and detected edge enor in red We next evaluate the effect of L (the number of quantization level) and the value of MAX on the error performance of the propoed contour detection cheme by plotting the probability of mied detection againt the deciion threhold γ for different L and MAX value. The reult, hown in Figure 6, indicate that multi-level quantization reult in ignificant improvement in performance. The probability of mied detection drop noticably when the number of quantization level i increaed from 2 to 8, however the relative improvement i le pronounced when it i increaed to 16. The performance alo improve with a higher value of MAX. Hence, we ue L=8 and MAX=1 for mot of our other imulation. Note that our propoed cheme with binary quantization become imilar to that preented in [1] when applied to contour detection. Hence, the reult uing multi-level quantization in Figure 6 alo indicate the comparative performance improvement obtained uing the propoed cheme and that preented in [1], which i mot related to thi work. Fale-Detection Rate We evaluate the effect of noie on the propoed contour Filter-Baed Approach Statitical Approach Filter-baed, Noie Std: Statitical, Noie Std: Filter-baed, Noie Std: 4 Statitical, Noie Std: Mied-Detection Rate Figure 5: Comparion of detection performance uing the tatitical and Prewitt filter baed approache.. detection cheme by determining the variation of the probability of mied detection and the number of falely detected node at a contour level of 5 under different noie level (Figure 7). Thee reult how that a higher amount of noie increae the probability of mied detection but ha negligible effect on the number of fale detection. Note that there are detection error even when there i no noie. Thi i explained from the fact that depending on the lope of the ignal ditribution at the contour threhold S, the et of node within the artificial edge created by our quantization proce may not be exactly the ame a thoe conidered to be true edge enor. The reaon i that while the firt et include only thoe node whoe ignal value are within a certain range of the contour threhold S, true edge enor are defined by the tolerance ditance r. Depite thee apparent inconitencie of detection error with repect to noie, we till conider probability of mied detection and the number of fale alarm to be indicative of the error performance of the propoed contour detection cheme. For intance, if the location of the detected edge enor are ued to predict the location of the contour, higher mied Mied-Detection Rate Q-Level=16 Q-Level=8 Q-Level=4 Q-Level=2 MAX = 4 MAX = 1 Noie Std = 2 (Fale Detection Rate < 1 %) Threhold Figure 6: Probability of mied detection for different number of quantization level and MAX value X/7/$ IEEE. 163

6 Mied-Detection Rate Mied Rate: Noie Std: # of Fale Detection MAX = 1 # of Quantization = 8 Noie Std: Threhold Figure 7: Probabilitie of mied detection and the number of falely detected edge node at a contour level of 5 with varying threhold γ. detection and fale detection both would contribute to a higher amount of error in the prediction. In that repect, our experiment indicate that fale detection affect the prediction of a contour location more than mied detection. Thi i oberved from the fact that average ditance from detected edge enor for MAX=1 and L=8 i found to be.63 when the threhold γ =. 25, where the probability of mied detection =.367 and the number of fale detection = However, the average ditance increae to 1.44 at γ =.85, where the probability of mied detection=.1 and number of fale detection= The above finding provide the main motivation for reducing the number of probable edge enor uing the propoed Scheme-1 decribed in ection 4.2. We note that while a maller value of R will reduce the communication cot, it can alo increae the probability of mied detection. To evaluate thi effect, we obtain the average ditance of the detected edge node from the true contour a well a the communication cot (determined by the number of packet tranmiion) a obtained for pecific et of parameter, a hown in Table 1. The reult how that although a mall value of R generate a high level of mied detection, the mean ditance error i till low for R =.2 MAX. On the other hand, thi value of R reduce the communication cot by a factor of 5. Finally, we evaluate the aving in communication cot obtained by uing the propoed ONLi cheme. Table-II how the average number of tranmiion in the network, normalized to the total number of node in the network that were required for contour detection with and without uing the ONLi cheme. The reult indicate that avoiding TABLE I: Error ditance and communication cot v. R MAX = 1, Number of Quantization level = 8, Threhold =.55, Noie Std = 2 Ditance Error R' MAX Prob. of mi # of Fale # of Fale Detection Comm. Cot Mean Standard Deviation multiple tranmiion in repone to query packet can reduce the communication cot to about 12% of that without uing ONLi. TABLE II: Average Communication Cot (Noie Std:2, Threhold:.55, R = MAX) MAX With ONLi Without ONLi VI. CONCLUSION AND FUTURE WORK A collaborative proceing cheme for enor network i preented for detecting contour of the ignal ditribution of the enor field. The propoed cheme ue a multi-level quantizer for emulating an edge in the ignal ditribution in the enor field and then applie patial filtering. Appropriate deign conideration are preented to apply a patial Prewitt filter to ditributed data proceing in enor network. The propoed cheme ha ufficient robutne to noie in ignal obervation and incur a low cot of communication. Overall, thi cheme can vatly reduce the number of tranmiion that would be required to etimate the patial ditribution of the ignal over a large area uing a wirele enor network by uing contour detection. The filter-baed approach preented in thi paper can alo be ued for tracking the temporal variation of ignal ditribution with low communication cot. A a continuation of contour detection in tatic cae, the author are working on an algorithm for tracking the peed, direction and deformation of contour uing localized computation and collaborative proceing in wirele enor network. REFERENCES [1] K. K. Chintalapudi and R. Govindan, Localized edge detection in enor field, in IEEE International Workhop on Senor Network Protocol and Application, pp. 59-7, 23. [2] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Ditributed Edge Senor Detection With One-And Two-Level Detection, Proceeding IEEE ICASSP, pp , 24. [3] W. R. Armtrong, Localized contour detection in wirele enor network, MSEE Thei, Univerity of North Carolina at Charlotte, 25. [4] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Statitical Edge Detection with Ditributed Senor under the Neyman-Pearon (NP) Optimality, in Proceeding IEEE VTC, 26. [5] Pie-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, Contour line extraction in a multi-modal field with enor network," Proceeding IEEE Global Telecommunication Conference (Globecom), 25. [6] Pei-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, "A ditributed approach to contour line extraction uing enor network," in Proc. IEEE VTC, 25. [7] Pei-Kai Liao, Min-Kuan Chang and C.-C. Jay Kuo, "Contour line extraction with wirele enor network," in Proc. IEEE International Conference on Communication (ICC), 25. [8] Digital Image Proceing, 3rd edition by William K. Pratt, John Wiely & Son, Inc., X/7/$ IEEE. 164

Spatio-Temporal Monitoring using Contours in Large-scale Wireless Sensor Networks

Spatio-Temporal Monitoring using Contours in Large-scale Wireless Sensor Networks Spatio-Temporal Monitoring uing Contour in Large-cale Wirele Senor Network Hadi Alati Electrical and Computer Engineering Univerit of North Carolina at Charlotte 9 Univerit Cit Boulevard, Charlotte, NC

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Design of a Stewart Platform for General Machining Using Magnetic Bearings

Design of a Stewart Platform for General Machining Using Magnetic Bearings eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

Research Article Real-Time Communications in Large-Scale Wireless Networks

Research Article Real-Time Communications in Large-Scale Wireless Networks Hindawi Publihing Corporation International Journal of Digital Multimedia Broadcating Volume 2008, Article ID 586067, 16 page doi:10.1155/2008/586067 eearch Article eal-time Communication in Large-Scale

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function 016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Finite Elements Method in Split Hopkinson Pressure Bar developing process

Finite Elements Method in Split Hopkinson Pressure Bar developing process 6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 1-3, 007 63 Finite Element Method in Split Hopkinon Preure Bar developing proce ROTARIU ADRIAN

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

A reduced reference image quality metric based on feature fusion and neural networks

A reduced reference image quality metric based on feature fusion and neural networks Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Adaptive Beam Director for a Tiled Fiber Array

Adaptive Beam Director for a Tiled Fiber Array Adaptive Beam Director for a Tiled Fiber Array Mikhail A. Vorontov Intelligent Optic Laboratory, Computational and Information Science Directorate, U.S. Army Reearch Laboratory, 2800 Powder Mill Road,

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY (A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY Chri Old, Chri Merchant Univerity of Edinburgh, The Crew Building, Wet Main Road, Edinburgh, EH9 3JN, United Kingdom Email: cold@ed.ac.uk Email:

More information

TAM 212 Worksheet 3. Solutions

TAM 212 Worksheet 3. Solutions Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Quadratic Optimal Control of Wireless Sensor Network Deployment

Quadratic Optimal Control of Wireless Sensor Network Deployment 1 Quadratic Optimal Control of Wirele Senor Network Deployment Ratko R. Selmic 1, Jinko Kanno, Jack Buchart 1, and Nichola Richardon 3 1 Department of Electrical Engineering, Department of Mathematic 3

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information