An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

Size: px
Start display at page:

Download "An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2"

Transcription

1 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China (* Corresonding Author) 2 Research Deartment of Hisilicon Semiconductor and Comonent Business Deartment, Huawei Technologies, China Abstract Region-of-Interest () location in videos has many ractical usages in video coding field, such as video content analysis and user exerience imrovement. Although -based coding has been studied widely by many researchers to imrove coding efficiency for video contents, the location itself is seldom coded in video. In this aer, we will introduce our roosed location coding tool which has been adoted in surveillance rofile of AVS2 video coding standard (surveillance rofile). Our tool includes three schemes: direct-coding scheme, differential- coding scheme, and reconstructed-coding scheme. We will illustrate the details of these schemes, and erform analysis of their advantages and disadvantages, resectively. I. Introduction and Related Work Region-of-Interest () location for video sequence is of increasing imortance in many alications. For examle, location can hel decide quantization arameters to enhance the resolution of the interest regions. Secifically, in video conference alications, identified s can be used to guarantee the video qualities of the interested region in order to imroving the user exeriences. Various -based coding methods have been develoed. Chai. D et al. [1] extract face region using skin-color ma to obtain location. Chen et al. [2] use robust skin-color detection to obtain osition for the coding. Menser et al. [3] analyze the video contents by face detection and tracking technology, and then aly them to the alication of coding. Hu et al. [4] categories macroblocks inside one into three different region tyes and then erform rate control by allocating more bits to those region tyes that more interesting. However, these methods all treat location as a reference to decide coding arameters, e.g. quantization arameter, for macroblocks, rather than a art of video contents which can be encoded into the. In our analysis, location contains lots of contents relevant to the corresonding video. It can be used as a efficient way that describes the video contents characteristic. Moreover, location records trajectory of the target objects, which is esecially usefully in surveillance videos. Therefore, it is reasonable to encode location into the video. In the following arts of this aer, we will describe our roosed location coding tool which has been adoted in surveillance rofile of AVS2 video coding standard. We will illustrate three coding schemes, which are direct-coding scheme, temoral differential-coding scheme, and reconstructed- coding scheme. Besides, the analysis and comarison of these schemes will also be resented. The rest of the aer is organized as follows: Section II describes the details of the three schemes in our coding method. Section III shows the exeriment results and analyzes the coding erformances of these schemes. The conclusions are drawn in Section IV. II. Details of Our Coding Tool A. Definitions In our design, we assume s in videos can be bounded by rectangles and the locations of s can be described and coded by the corner oints of these bounding rectangles. According to this assumtion, we define location as: R i = { label i, xi, yi, wi, hi } (1) where R i indicates the i-th in one, label i is the index of R i indicating the s with the same roerties, e.g. the same object: a erson, a car, etc., in the whole video sequences, x i and y i are the horizontal and vertical coordinates of the to-left corner ixel of R i, and w i and h i are the width and height of the R i, resectively. With these five arameters, we can uniquely determine the location and the roerty of one in a. Fig. 1 illustrates the arameters in Eqn. (1). Fig. 1 An examle of s and their arameters in one Then, we define the differentiation of two corresonding s as: D = R R' = { x x', y y', w w', h h'} (2) where R and R are two corresonding s in adjacent encoded s. It will be alied in differential-coding scheme and extension scheme. Before describing the schemes in detail, three imortant oints need to be mentioned: 1) s in videos can either be selected manually or be detected by some state-of-art detection techniques [5]. 2) The order of s in a is ordered by their labels indices. In the roosed method, we allocate label indices according to the order of their aearing time. 3) The location will be added to head of each 's. In the following, we will describe the three roosed schemes, resectively.

2 B. Direct-Coding Scheme In the direct-coding scheme, we encode the raw location directly without any comression. During the rocedure, we rocess the in each indeently, i.e. we can recover the location in one without any additional of other s. More secifically, we first encode the label index difference between the current and the revious one in a (if it is the first in the sequence in one, the difference will be the same as the label number -1). Then, we encode the four arameters of an (Eqn. (1)) directly into the. We encode the s by the above method until the of the sequence in one. And the above rocess will be reeated for each. The detailed rocess of the direct-coding scheme is shown by Algorithm 1 and Fig. 2 shows an examle of using the direct-coding scheme to encode s in a. Algorithm 1: Direct-coding scheme Inut: location in one (assume that there are totally n s) Outut: Bitstream containing encode n into the ; for i = 1 to n R i = the i-th in the sequence, with arameters {label i, x i, y i, w i, h i }; if (i == 1) d i = label i 1; /*label index difference between the current */ /*and the revious in the current */ d i = label i label i-1 1; encode d i, x i, y i, w i, h i into the sequentially; We can see that this scheme is simle and easy to oerate. It is suitable to encode the location when a few of s need to be encoded in the sequence er. 3 0 (,,,) 1 (199,399,200,) 0 (152,149,150,150) Fig. 2 An coding examle of using the direct-coding scheme: assume that the label of R i is Label i=i. C. Differential-Coding Scheme Although direct-coding scheme can encode location into the, when large quantities of s are required to be encoded, the of the location will become huge and non-negligible, and will add a burden to the video. Therefore, we develoed another scheme, named as differential-coding scheme, to further imrove the coding efficiency. In this scheme, we encode the location with the temoral differential coding idea to reduce the coding redundancy. Since temorally neighboring s has high correlation, by encoding the temoral difference of the corresonding location arameters of one, redundancies can be reduced. The detailed rocess of the differential-coding scheme is shown in Algorithm 2. Algorithm 2: Differential-coding Scheme Inut: location in one (assume n s totally) and the in the revious encoded (assume totally m s) Outut: Bitstream containing if (current is intra-coded ) aly direct-coding scheme /* aly differential-coding scheme */ /* encode old s (normal + disaear) */ j = 1; ski = 0; set flag buffer to null; /* Store flags */ encode n into the ; for i = 1 to m R i = the i-th in the sequence in the revious encoded, with arameters {label i, x i, y i, w i, h i}; R j = the j-th in the sequence in the current, with arameters {label j, x j, y j, w j, h j }; if (label j > label i) /* R j disaears */ ush back flag(0) into flag buffer; /* label j ==label i */ D = (x j, y j, w j, h j ) (x j, y j, w j, h j) if (D == (0,0,0,0)) /* R j has same location */ ush back flag(1) into flag buffer; j = j+1; encode ski, flag buffer, D into the sequentially; j = j+1; ski = 0; /* initialize the arameter */ set flag buffer to null; /* initialize the arameter */ /* Before old s, write remains in the flag buffer */ encode ski, flag buffer into the sequentially; /* encode aeared s */ for i = j to n R i = the i-th in the sequence in the current ; if (i == j) encode x i, y i, w i, h i into the sequentially; d i = label i label i-1 1; encode d i, x i, y i, w i, h i into the sequentially; Several things need to be mentioned about the differential-coding scheme: 1) Since there is no reference for the first in a GOP, we aly direct-coding scheme for the first. 2) We define three tyes of s: the which exists in both the revious encoded and the current (normal ); the which exists in the revious encoded but disaear in the current (disaeared ); and the which newly aear in the current (aeared ). Some examles are shown in Fig. 3. 3) We aly different strategies on different tyes. For a normal which has the same location arameters as its corresonding one in the revious (i.e. D in Eqn. (2) is {0, 0, 0, 0}), we allocate a ski flag to indicate such condition instead of encoding four zeros. For other normal s, we encode the four differential numbers in Eqn. (2). Furthermore, for a disaearing, we allocate a disaear

3 flag to indicate such condition. Similarly, for an aeared, we directly encode the four arameters of the s (i.e. x, y, w, h), since no corresonding in the revious encoded can be used as a reference. 4) In our scheme, aearing s are always allocated with a new label and coded at the of the. Fig. 3 shows an examle of using the differential- coding scheme to encode s in a. Previous encoded (,) 3 Total number of s in the current R 1 (200,400) (200,200) R R 3 R2* disaears in the next Ski: the number of skied s (R 1 and R 2) before the next differential coded (R 3) (-1,-1,0,0) Flag buffer: 1: R 1 has the same location with R 1 ; 0: R 2 disaear Current encoded (,) (152,149) R 1 (199,399) R 3 location arameters (osition difference between R 3 and R 3 ) R Ski 200 R 3 R4 aears newly in the current (152,149,150,150) R 4 location arameters (absolute osition of R 4) Fig. 3 An coding examle of using the differential-coding scheme: assume that the label of R i is Label i=i. the reconstructed (i.e., the reconstructed from the current encoded ). Then, the actual locations will be differentiated with these redicted locations and the location difference will be encoded and transmitted. At the decoder side, after reconstruction of the current, the same object detection algorithms are used to derive redicted regions. These redicted locations will be combined with the decoded location differences to recover the actual locations. Since the number of redicted s may not be the same as the actual ones, in order to recisely recover regions, we assign actual with its closest redicted and encode their differences. Furthermore, considering that multile actual s may corresond to one redicted, we also encode the number of the actual s in the. That is, we will encode in the of each redicted art the number of actual s associated with it, followed by the label number and location differences of each actual. A coding examle of reconstructed-coding scheme is shown in Fig. 5, and the above oint will be illustrated visually in the meantime. Algorithm 3 shows the detailed rocess of the reconstructed-coding scheme. D. An Exted Scheme: Reconstructed-Coding Scheme In the differential-coding scheme, we only use the temoral correlation among s for reducing coding redundancy. In ractice, since many s in a can be estimated by object detection and recognition algorithms [5], the location can be further comressed by utilizing the rediction of these algorithms. Therefore, we also roose an exted reconstructedcoding scheme to further reduce coding redundancy. Please notice that this scheme has not been included in coding method in AVS2 standard. The work of the reconstructed-coding scheme is described by Fig. 4. More secifically, at the side, after then encoding of the current, we aly object detection algorithms to derive redicted regions from (52,49,50, 50) (-1,-1,0,0) Fig. 5 An coding examle of using the reconstructed-coding scheme: assume that the label of Label i=i. Inut video of video contents of video constents reconstructed s in current encoded location s in reconstructed reconstructed of outut of location decoder s in current encoded s in reconstructed Fig. 4 The work of Reconstructed-Coding Scheme decoder

4 Algorithm 3: Reconstructed-coding scheme Inut: location in one (assume n s totally) and the in the reconstructed (assume m s totally) Outut: Bitstream containing encode m into the ; ski = 0; for i = 1 to m (the number of redicted s) R r i = the i-th redicted in the reconstructed, with arameters {label r i, x r i, y r i, w r i, h r i}; k = the number of actual s in the current associated with R r i; encode k and all the labels of the actual s associated with R r i into the sequentially; foreach actual s associated with R r i (R l, l=1,2,,k, with arameters {label r i, x r i, y r i, w r i, h r i}) D = (x l, y l, w l, h l ) (x r i, y r i, w r i, h r i); if (D == (0,0,0,0)) /* R l and R r i have the same location */ encode ski, D into the (in order); ski = 0; /* initialize the arameter */ E. Syntax in the Bitstream In our tool, we use binary (0 and 1) to encode flags, use universal variable length coding (UVLC) [6] to encode difference, and use fixed length coding (FLC) label values and absolute osition of s. The coded is added in front of the s of a. Fig. 6 shows an examle of the created by our differential-coding scheme. We test the coding erformance on AVS2 surveillance rofile s common test sequences where s are re-defined for each sequence. Besides, the object detection algorithm in [5] is utilized to achieve redicted regions in the reconstructed-coding scheme. Some tested video s and the s are illustrated in Fig. 7. In the first exeriment, we erform tests of the direct-coding scheme and the differential-coding scheme with different video sequences under various quantization arameters (QPs). The exeriment results are shown in Table 1. Since fix quantization arameter is used in each exeriment, the PSNR values are the same for different methods and thus only bit rates are listed in Table 1. From Table 1, we can see that if we use the direct-coding scheme, the bit rate is high due to the large number of bits in coding locations. The overhead becomes obvious when the number of s is large. Considering that large number may exist frequently in many alications such as surveillance and video conference, it is desirable to reduce location signaling bits. Comaratively, the bit rates by the differential method are substantially reduced by utilizing the temoral correlation among s. Comared to the direct coding method, the differential method can achieve 2.5% bitrate reduction on average, and u to 6% bitrate reduction. Fig. 8 Some examle video s and the s in the second exeriment (-1,-1,0,0) 0 (152,149,150,150) Fig. 6 An examle of the for differential-coding scheme III. Exerimental Results In this section, we show exeriments results of the three coding schemes described in Section II. In the exeriments, we use AVS2 RD6.1 as the test latform [7]. The icture coding structure is Hierarchical-B (one P with seven B). The details of test conditions can be found at [9]. In the second exeriment, we further erform exeriments of the exted reconstructed-coding scheme. The number of encoded s for each video sequence is s. Table 2 shows the results of the reconstructed-coding scheme on some video sequences as in Fig. 8. In order to ease comarison, we also include the corresonding results of the direct-coding and the differential-coding schemes in Table 2. From Table 2, we can see that the reconstructedcoding scheme can also reduce bit rate by utilizing the redicted regions. Moreover, comaring the reconstructed-coding and differential-coding schemes, we can see that both schemes have their own advantages. If the object detection algorithm is accurate and the redicted s are close to their corresonding actual s, the reconstructed-coding scheme can achieve better results than the differential-coding scheme. Otherwise, the differential-coding scheme creates better erformance. Furthermore, we can also see that when the QP value increases, the erformance of the reconstructed-coding schemes will be decreased since the qualities of the reconstructed s decrease with larger QPs. However, we believe that the effect from QP arameters can be further reduced by utilizing more sohisticated detection techniques [8]. IV. Conclusion Fig. 7 Some examle video s and the s of our exerimental videos (standard AVS video) In this aer, we introduce a coding tool for encoding locations in AVS2 standard. The coding tool has three

5 Table 1 Exeriments on the schemes in the coding tool seq. encoded Bit Rate 30Hz resolution / QP s Original Direct-coding Differential-coding (+1.18%) (+0.25%) BQquare x240 2~ (+2.46%) (+0.52%) (+4.96%) (+1.05%) (+10.11%) (+2.14%) (+0.05%) (+0.01%) Traffic x ~ (+0.08%) (+0.01%) (+0.15%) (+0.02%) (+0.35%) (+0.06%) (+1.62%) (+0.30%) Crossroad x576 30~ (+3.47%) (+0.65%) (+7.93%) (+1.49%) (+17.47%) (+3.28%) (+0.90%) (+0.22%) Office x576 7~ (+1.77%) (+0.43%) (+3.49%) (+0.85%) (+6.92%) (+1.69%) (+0.59%) (+0.15%) Intersection x ~ (+1.12%) (+0.28%) (+2.19%) (+0.56%) (+4.52%) (+1.15%) Table 2 Exeriments on three otional schemes (We encode s for each video sequence) seq. QP resolution / Bit Rate 30Hz Original Direct-coding Differential-coding Reconstructed-coding I ~ (+0.65%) (+0.29%) (+0.25%) I ~ (+4.61%) (+1.93%) (+1.85%) I ~ (+12.82%) 38.16(+6.63%) 38.37(+7.22%) II ~ (+0.76%) (+0.47%) (+0.52%) II ~ (+6.27%) (+2.69%) (+2.75%) II ~ (+13.88%) 40.72(+8.25%) 40.89(+8.68%) III ~ (+6.34%) (+2.54%) (+2.38%) IV ~ (+14.38%) (+7.17%) (+7.62%) V ~ (+26.12%) (+12.26%) (+11.89%) VI ~ (+24.76%) (+10.47%) (+11.21%) different coding schemes which encode locations directly, by using temoral, and by using redicted from object detection algorithms. Exerimental results shows that utilizing temoral and rediction can effectively reduced the overhead for encoding regions. Further work will include combining the schemes of differential-coding and reconstructed-coding such that the coding erformance can be further imroved. Acknowledgements This aer is suorted in art by the following grants: National Science Foundation of China (No , and 61102), the Chinese national 973 roject (2010CB731401), the SMC grant of SJTU, and Shanghai Pujiang Program (12PJ ). References [1] D. Chai, K.N. Ngan, "Face segmentation using skin-color ma in videohone alications," IEEE Trans. Circuits and Systems for Video Technology, vol.9, no.4, , 1999 [2] M.-J.. Chen, M.-C. Chi, C.-T. Hsu and J.-W. Chen, Video Coding Based on H.263+ with Robust Skin-color Detection Technique, IEEE Trans. Consumer Electronics, vol. 49, , [3] B. Menser and M. Brunig, Face Detection and Tracking for Video Coding Alications, IEEE Int l Conf. Signal, Systems and Comuters, vol. 1, , [4] H.-M. Hu, B. Li, W. Lin, W. Li and M.-T. Sun, Region-Based Rate Control for H.264/AVC for Low Bit-Rate Alications, IEEE Trans. Circuits and Systems for Video Technology, vol. 22, , [5] P. Viola and M. Jones, Robust Real-Time Object Detection, Int l J. Comuter Vision, vol. 57, no. 2, , 2004 [6] Y. Itoh, N. Cheung, Universal variable length code for DCT coding IEEE Int l Conf. Image Processing, vol. 1, , 2000 [7] RD6.1,ft:// /incoming/video_codec/AVS2_P2/RD6.1.zi [8] J. Wu, J. M. Rehg, CENTRIST: A Visual Descritor for Scene Categorization IEEE Trans. Pattern Analysis and Machine Intelligence, vol.33, , [9] AVS-N2021, Common test conditions on AVS2-P2 surveillance rofile, December, 2012, Shenzhen, 47 th AVS meeting

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Decoding-Workload-Aware Video Encoding

Decoding-Workload-Aware Video Encoding Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Ensemble Learning Based on Parametric Triangular Norms

Ensemble Learning Based on Parametric Triangular Norms Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text

More information

CALCULATION METHOD OF MILLING CONTACT AREA FOR BALL-END MILLING TOOL WITH TOOL INCLINATION ANGLE

CALCULATION METHOD OF MILLING CONTACT AREA FOR BALL-END MILLING TOOL WITH TOOL INCLINATION ANGLE U.P.B. Sci. Bull., Series D, Vol. 76, Iss. 3, 214 ISSN 1454-2358 CALCULATION METHOD OF MILLING CONTACT AREA FOR BALL-END MILLING TOOL WITH TOOL INCLINATION ANGLE Yishu HAO 1, Guoqing TANG 2, Meng ZHANG

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Depth Estimation for 2D to 3D Football Video Conversion

Depth Estimation for 2D to 3D Football Video Conversion International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football

More information

PHOTOGRAMMETRIC TECHNIQUES FOR ROAD SURFACE ANALYSIS

PHOTOGRAMMETRIC TECHNIQUES FOR ROAD SURFACE ANALYSIS The International Archives of the Photogrammetry, Remote Sensing and Satial Information Sciences, Volume XLI-B5, 6 XXIII ISPRS Congress, 9 July 6, Prague, Czech Reublic PHOTOGRAMMETRIC TECHNIQUES FOR ROAD

More information

A Texture Based Matching Approach for Automated Assembly of Puzzles

A Texture Based Matching Approach for Automated Assembly of Puzzles A Texture Based Matching Aroach for Automated Assembly of Puzzles Mahmut amil Saırolu 1, Aytül Erçil Sabancı University 1 msagiroglu@su.sabanciuniv.edu, aytulercil@sabanciuniv.edu Abstract The uzzle assembly

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT Jian Zhao and Sen-ching S. Cheung University of Kentucky Center for Visualization and Virtual Environment 1 Quality Street, Suite

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article. Robot vision system design and implementation based on Open CV

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article. Robot vision system design and implementation based on Open CV Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 3, 5():68-689 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Robot vision system design and imlementation based on Oen

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Power Savings in Embedded Processors through Decode Filter Cache

Power Savings in Embedded Processors through Decode Filter Cache Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425

More information

Invariant Descriptors and Classifiers Combination for Recognition of Isolated Printed Tifinagh Characters

Invariant Descriptors and Classifiers Combination for Recognition of Isolated Printed Tifinagh Characters IJACSA Secial Issue on Selected aers from Third international symosium on Automatic Amazigh rocessing (SITACAM 3) Invariant Descritors and Classifiers Combination for Recognition of Isolated rinted Tifinagh

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

Real Time Compression of Triangle Mesh Connectivity

Real Time Compression of Triangle Mesh Connectivity Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity

More information

Using Kullback-Leibler Divergence to Model Opponents in Poker

Using Kullback-Leibler Divergence to Model Opponents in Poker Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

Optimization of Collective Communication Operations in MPICH

Optimization of Collective Communication Operations in MPICH To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William

More information

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Proceedings of the International MultiConference of Engineers and Comuter Scientists 2013 Vol I, Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Shree Krishna

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION ISSN 76-459 Int j simul model 6 (7), 4-3 Original scientific aer EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION Li, Q.; Sato, I. & Murakami, Y. GSJ/AIST - National Institute of Advanced

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

Multipoint Filtering with Local Polynomial Approximation and Range Guidance

Multipoint Filtering with Local Polynomial Approximation and Range Guidance Multioint Filtering with Local Polynomial Aroximation and Range Guidance Xiao Tan, Changming Sun, and Tuan D. Pham The University of New South Wales, Canberra, ACT 2600, Australia CSIRO Comutational Informatics,

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Numerical Methods for Particle Tracing in Vector Fields

Numerical Methods for Particle Tracing in Vector Fields On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Research on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool

Research on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool 06 International Conference on aterials, Information, echanical, Electronic and Comuter Engineering (IECE 06 ISBN: 978--60595-40- Research on Inverse Dynamics and rajectory Planning for the 3-P Parallel

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.

More information

Fast Shape-based Road Sign Detection for a Driver Assistance System

Fast Shape-based Road Sign Detection for a Driver Assistance System Fast Shae-based Road Sign Detection for a Driver Assistance System Gareth Loy Comuter Vision and Active Percetion Laboratory Royal Institute of Technology (KTH) Stockholm, Sweden Email: gareth@nada.kth.se

More information

An accurate and fast point-to-plane registration technique

An accurate and fast point-to-plane registration technique Pattern Recognition Letters 24 (23) 2967 2976 www.elsevier.com/locate/atrec An accurate and fast oint-to-lane registration technique Soon-Yong Park *, Murali Subbarao Deartment of Electrical and Comuter

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Object tracking mask-based NLUT on GPUs for real-time generation of holographic videos of three-dimensional scenes

Object tracking mask-based NLUT on GPUs for real-time generation of holographic videos of three-dimensional scenes Object tracking mask-based NLUT on GPUs for real-time generation of holograhic videos of three-dimensional scenes Min-Woo Kwon 1, Seung-Cheol Kim 1, Sung-Eui Yoon 2, Yo-Sung Ho 3, Eun-Soo Kim 1,* 1 HoloDigilog

More information

Detecting Video Events Based on Action Recognition in Complex Scenes Using Spatio-Temporal Descriptor

Detecting Video Events Based on Action Recognition in Complex Scenes Using Spatio-Temporal Descriptor Detecting Video Events Based on Action Recognition in Comlex Scenes Using Satio-Temoral Descritor Guangyu Zhu, Ming Yang 2, Kai Yu 2, Wei Xu 2, Yihong Gong 2 National Laboratory of Pattern Recognition,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information