Trainable Context Model for Multiscale Segmentation

Size: px
Start display at page:

Download "Trainable Context Model for Multiscale Segmentation"

Transcription

1 Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN {hui, ecn.purdue.edu Abtract Mot previou approache to Bayeian egmentation have ued imple prior model, uch a Markov random field (MRF), to enforce regularity in the egmentation. While thee method improve claification accuracy, they are t well uited to modeling complex contextual tructure. In thi paper, we propoe a context model for multicale egmentation which can capture very complex behavior on both local and global cale. Our method work by uing binary claification tree to model the tranition probabilitie between egmentation at adjacent cale. The claification tree can be efficiently trained to model eential apect of contextual behavior. In addition, the data model in our approach i vel in the ene that it can incorporate the correlation among the wavelet feature vector acro cale. We apply our method to the problem of document egmentation to illutrate it uefulne. 1 Introduction It i well kwn that accurate prior modeling can ubtantially improve egmentation accuracy by incorporating prior information regarding context. To thi end, previou approache to tatitical egmentation have generally relied on imple prior model, uch a Markov random field (MRF), that encourage the formation of large uniformly claified region. However, in many application prior information regarding context can be very complex, with both local and global apect. For example, when egmenting a cene, we may kw that ky may t be urrounded by ground or that car mut have mooth boundarie while tree have irregular boundarie. In thi paper, we introduce a multicale Bayeian context model which can capture complex apect of both local and global contextual behavior. The Thi work wa upported by the Xerox Corporation. Appeared in ICIP 98, vol. 1, pp , Chicago, IL, October 4-7, method i baed on the ue of tree claifier [1, 2] to model the tranition probabilitie between adjacent cale in the multicale tructure. Thi multicale tructure i imilar to previouly propoed egmentation model [3, 4, 5, 6], with the egmentation at each cale forming a Markov chain in cale. However, the tree baed claifier allow for much more complex tranition rule, while uing only a moderate number of parameter. Moreover, the tree baed claifier i computationally efficient to both train and apply. In addition, the multicale data model in thi approach can capture both the textural information at all cale and the correlation among feature vector acro cale. Thi i different from mot of other approache which aume independence among image feature. In our data model, the textural information at variou cale i captured through a hidden Markov model [7], and the dependence of feature between adjacent cale i extracted uing linear prediction. We apply thi algorithm to the problem of document egmentation becaue it repreent a excellent example of an application in which complex contextual dependencie can be very important [8]. The model i trained uing training image and their ground truth egmentation in a one-pa coare-to-fine proce. 2 Multicale Segmentation Model Fig. 1 how the tructure of our multicale egmentation model [6]. The pyramid to the left of Fig. 1 i the multicale context model. Each point in the pyramid contain a value x (n) which i a cla label at cale n and poition in the 2-D lattice S (n). Each label x (n) i aumed to depend on ome neighborhood of point at the coarer cale, x (n+1). Here, dete a neighborhood of point in the lattice S (n+1) at cale n+1. Therefore, the egmentation x (n) form a Markov chain in cale. The pyramid to the right of Fig. 1 i the multicale date model which contain the feature vector

2 X (0) X (1) X (2) Y (2) Y (1) Y (0) parent Figure 1: The tructure ued for our multicale egmentation model. The left pyramid model the contextual behavior, while the right pyramid model the data feature extracted uing a Haar wavelet tranform. extracted from the gray cale image uing a imple Haar bai wavelet tranform. Each feature, y (n),i a vector of three number correponding to the three wavelet coefficient at that location. The feature vector y (n) i aumed conditionally independent given the cla label x (n) and feature vector y (n+1) d at the coarer cale, where d i referred to a the parent of. We alo aume that y (n) can be predicted by α (n) x y (n+1) d + β x (n), and the prediction error ỹ (n) are conditionally independent given x (n) ỹ (n) = y (n) [ α (n) x y (n+1) d, ] + β x (n) where α (n) x, β x (n) are the prediction coefficient for cla x (n) at cale n. Our data model i different from other approache in that it model t only the textural information at each cale, but alo capture the correlation among the wavelet feature vector acro cale. To compute the egmentation, we ue the equential MAP (SMAP) egmentation approach of [3]. In the SMAP approach, claification proceed equentially from coare to fine cale, by computing the MAP egmentation given Y and the previou coarer cale egmentation ˆx (n+1). Formally, the SMAP egmentation i given by ˆx (n) = arg max 0 k M 1 +logp x (n) { log py x (n)(y k) (1) x (n+1) (k ˆx (n+1) ) } where M i the number of clae. Importantly, the term log p (n) y x (y k) may be efficiently computed in cloed form uing a imple hidden Markov model define for a quadtree [6]. Notice that (1) conit of two term, the firt i a data term while the econd enforce a priori kwledge regarding context, and i olely determined by the tranition probability p (n) x (k ˆx (n+1) x (n+1) ). coare neighbor children Figure 2: Thi diagram illutrate the tranition probabilitie that interpolate a pixel at the previou coarer reolution into four pixel at the current reolution uinga5 5 coare cale neighborhood. 3 Trainable Context Model For our context model, we aume that each label x (n) only depend on the label of a neighborhood of pixel at the previou coarer reolution x (n+1).intuitively, thi i a model for interpolating a pixel (n+1) into four children pixel (n) i (i =1, 2, 3, 4) at the next finer reolution. Fig. 2 how the cae of interpolating four children pixel uing a 5 5 neighborhood at the coarer cale. Since there are four ditinct children for each coare neighborhood, we will ue four ditinct tranition probability function, p (n) i ( ) (i =1, 2, 3, 4) at each reolution n. Define an indicator function I(), where I() = i, if i the i-th child of it parent. Alo, we ue the variable c and f to dete x (n) and x (n+1) repectively. Then, the tranition probabilitie are given by p x (n) x (n+1) (c f) = p (n) I() (c f). (2) Unfortunately, p (n) i (c f) may be very difficult to etimate, if the coare cale neighborhood i large. For example, a 5 5 neighborhood uing M =2reultin 2 25 poible value of f, which make direct parameter etimation impoible. In order to model each of the tranition probabilitie p (n) i (c f), we ue a cla probability tree (CPT) [1] a hown in Fig. 3. The CPT repreent a equence of deciion or tet that mut be made in order to compute the ditribution of c given f. The input to the tree i f, an encoded verion of the feature vector f. At each interior de, a plitting rule i ued to determine which of the two child de hould be taken. In our cae, the plitting rule i computed by comparing A t f µt to 0, where A t i a pre-computed matrix and µ t i a pre-computed calar. In thi way, f goe down

3 ~ A 1 f µ 1 ye ~ ~ A 2f µ 2 A f µ 3 3 X (0) X (1) X (2) ˆX (2) ˆX (1) ˆX (0) ye ye Ground Truth SMAP Etimate p (c f) p (c f) p (c f) ye ~ A 4f µ 4 p (c f) p (c f) 4 5 Figure 3: The cla probability tree ued to repreent tranition probabilitie between adjacent cale. At each interior de, a linear tet i ued to plit the de. The probability ma function p (n) i (c f) iapproximated eparately at each leaf de. the tree until it reache a leaf de. Each leaf de t i aigned a probability ma function ˆp t (c). When f reache a leaf de t, ˆp t (c)iuedaanapproximation to the true tranition probability p (n) i (c f). To contruct a CPT, we ue the recurive tree contruction algorithm (RTCA) of Gelfand, Ravihankar, and Delp [2] together with a leat quare baed plitting rule. The RTCA partition the training ample et into two halve and alternate the role of each half. Initially, a tree i grown uing the firt half and pruned on the econd half. Then the pruned tree i re-grown uing the econd half and pruned uing the firt half. Thi proce i repeated until the tree converge. The ample et for contructing a CPT are generated from a databae of training image which i produced by canning typical document. Scanned image are then manually egmented into deired component which form the ground-truth egmentation at each reolution. The training of the CPT i done in a coare-tofine procedure which i illutrated in Fig. 4. The method work by etimating the tranition probabilitie p (n) i (c f) from the ground truth egmentation x (n) and the coarer cale SMAP egmentation ˆx (n+1). Importantly, ˆx (n+1) doe t depend on the tranition probabilitie p (n) i (c f). Thi can be een from (1), the equation for computing the SMAP egmentation. Thi i a crucial fact ince it allow ˆx (n+1) to be computed before p (n) i (c f) i etimated. Once p (n) i (c f) ieti- decimation parameter etimation SMAP etimation Figure 4: Parameter etimation of the context model: (1) Compute the egmentation at the coaret reolution, ˆx (2). (2) Etimate the tranition probabilitie p (1) i (c f) uing the SMAP egmentation ˆx (2) and the decimated ground truth egmentation x (1).(3) Compute ˆx (1) uing p (1) i (c f). (4) Etimate p (0) i (c f) uing ˆx (1) and x (0). Thi procedure i then repeated for all cale. mated, it i then ued to compute ˆx (n), allowing the etimation of p (n 1) i (c f). Thi proce i then recurively repeated until the tranition parameter at all cale are etimated. Thi training procedure i very computationally efficient and yield accurate egmentation reult. 4 Simulation Fig. 5 how an example of egmenting a document image that i t contained in the training data et. The document i egmented into background, text and image clae. The model wa firt trained uing 20 canned document image together with hand egmented ground truth. Fig. 5(a) i the original image, Fig. 5(b) how the reult of egmentation uing the propoed egmentation algorithm, referred a the trainable SMAP (TSMAP) algorithm, with a 5 5 coare cale neighborhood, Fig. 5(c) how the egmentation uing TSMAP with a 1 1 coare cale neighborhood, and Fig. 5(d) how the egmentation uing only the finet reolution feature combined with the MRF a the context model. Notice that the larger neighborhood dramatically improve the quality and accuracy of egmentation. It i intereting to te that image region are enforced to be uniform, while text region are allowed to be mall with fine detail. Even ingle text line, revere text and page mark are labeled correctly. Our algorithm alo correctly claifie image region from different background, uch a paper background, halftone background and black background. Among the egmentation reult hown in Fig. 5, the egmentation computed uing the MRF

4 (a) (b) (c) (d) Figure 5: (a) Original image. (b) Segmentation reult uing TSMAP with a 5 5 neighborhood. (c) Segmentation reult uing TSMAP with a 1 1 neighborhood. (d) Segmentation uing MRF. Red, green and blue repreent text, image and background, repectively. i the pooret. There are many mall background region between text line that are miclaified a image region, and the boundarie of image region are quite irregular. The miclaification indicate that the MRF fail to capture eugh contextual information. Fig. 6 how the egmentation reult of two other image outide the training et uing TSMAP with a 5 5 coare neighborhood. In Fig. 7, we how the effect of the number of training image on the quality of the reulting egmentation. The TSMAP algorithm with a 5 5 coare cale neighborhood i trained on three training et which conit of 20, 10 and 5 training image, repectively. The reulting egmentation are hown in Fig. 7(b)- (d). Notice that the egmentation degrade gracefully a the number of training image decreae. There i little difference between the egmentation computed uing the TSMAP trained on 20 image and the egmentation baed on 10 training image. But when the number of training image i too mall, uch a 5, the egmentation reult (ee Fig. 7 (d)) begin to degrade. The experiment how that the TSMAP algorithm i t exceively enitive to the ize of the training et. Reference [1]L.Breiman,J.H.Friendman,R.A.Olhen,and C. J. Stone, Claification and Regreion Tree. Belmont, CA: Wadworth International Group, [2] S. B. Gelfand, C. S. Ravihankar, and E. J. Delp, An iterative growing and pruning algorithm for claification tree deign, IEEE Tran. on Pattern Analyi and Machine Intelligence, vol. 13,. 2, pp , February [3] C. A. Bouman and M. Shapiro, A multicale random field model for Bayeian image egmentation, IEEE Tran. on Image Proceing, vol. 3,. 2, pp , March [4] J. M. Laferte, F. Heitz, P. Perez, and E. Fabre, Hierarchical tatitical model for the fuion of multireolution image date, Proc. Int l Conf. on Computer Viion, June 1995, Cambridge, MA, pp [5] M. L. Comer and E. J. Delp, Multireolution image egmentation, Proc. of IEEE Int l Conf. on Acout., Speech and Sig. Proc., May 1995, Detroit, Michigan, pp [6] H. Cheng, C. A. Bouman, and J. P. Allebach, Multicale document egmentation, Proc. of IS&T 50th Annual Conf., May 1997, Cambridge, MA, pp [7] M. S. Croue, R. D. Nowak, and R. G. Baraniuk, Wavelet-baed tatitical ignal proceing uing hidden markov model, IEEE Tran. on Signal Proceing, vol. 46,. 4, pp , April [8] R. M. Haralick, Document image undertanding: Geometric and logical layout, Proc. of IEEE Computer Soc. Conf. on Computer Viion and

5 (a) (b) (c) (d) Figure 6: (a) Original image. (b) Segmentation reult uing TSMAP with a 5 5 neighborhood. (c) Original image. (d) Segmentation reult uing TSMAP with a 5 5 neighborhood. Red, green and blue repreent text, image and background, repectively. Pattern Recognition, vol. 8, April 1994, Seattle, WA, pp

6 (a) (b) (c) (d) Figure 7: (a) Original image. (b) TSMAP egmentation when trained on 20 image. (c) TSMAP egmentation when trained on 10 image. (d) TSMAP egmentation when trained on 5 image. Red, green and blue repreent text, image and background, repectively.

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

A reduced reference image quality metric based on feature fusion and neural networks

A reduced reference image quality metric based on feature fusion and neural networks Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10 Computer Aided Drafting, Deign and Manufacturing Volume 5, umber 3, September 015, Page 10 CADDM Reearch of atural Geture Recognition and Interactive Technology Compatible with YCbCr and SV Color Space

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY (A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY Chri Old, Chri Merchant Univerity of Edinburgh, The Crew Building, Wet Main Road, Edinburgh, EH9 3JN, United Kingdom Email: cold@ed.ac.uk Email:

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

Kalman filtering in pairwise Markov trees

Kalman filtering in pairwise Markov trees Signal Proceing 86 (2006) 1049 1054 wwweleviercom/locate/igpro Kalman filtering in pairwie Markov tree Franc-oi Debouvrie, Jean Lecomte, Wojciech Pieczynki GET/INT/dépt CITI and CNRS UMR 5157, 9 rue Charle

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Bayesian segmentation for damage image using MRF prior

Bayesian segmentation for damage image using MRF prior Bayeian egmentation for damage image uing MRF prior G. Li 1, F.G. Yuan 1, R. Haftka and N. H. Kim 1 Department of Mechanical and Aeropace Engineering, North arolina State Univerity, Raleigh, N, 7695-791,

More information

Tracking High Speed Skater by Using Multiple Model

Tracking High Speed Skater by Using Multiple Model Vol. 2, No. 26 Tracing High Speed Sater by Uing Multiple Model Guojun Liu & Xianglong Tang School of Computer Science & Engineering Harbin Intitute of Technology Harbin 5000, China E-mail: hitliu@hit.edu.cn

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 2 Issue 5, May

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 2 Issue 5, May Intertage Pipeline VLI Architecture for 2-D DWT Ajinkya. Bankar 1,Bhavika. haha 2, P.K. Kadbe 3 E&TC Department, Pune Univerity 1,2,3 VPCOE Baramati Abtract In thi paper, a cheme for the deign of a high-pd

More information

Research Article Unsupervised SAR Image Segmentation Based on a Hierarchical TMF Model in the Discrete Wavelet Domain for Sea Area Detection

Research Article Unsupervised SAR Image Segmentation Based on a Hierarchical TMF Model in the Discrete Wavelet Domain for Sea Area Detection Dicrete Dynamic in Nature and Society, Article ID 354704, 9 page http://dx.doi.org/10.1155/2014/354704 Reearch Article Unupervied SAR Image Segmentation Baed on a Hierarchical TMF Model in the Dicrete

More information

A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition.

A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition. A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition. Andrzej Ruta, Yongmin Li School of Information Sytem, Computing & Mathematic Brunel Univerity Uxbridge, Middleex UB8 3PH, United

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Audio-Visual Voice Command Recognition in Noisy Conditions

Audio-Visual Voice Command Recognition in Noisy Conditions Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity

More information

CS 467/567: Divide and Conquer on the PRAM

CS 467/567: Divide and Conquer on the PRAM CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Improved Inference in Bayesian Segmentation Using Monte Carlo Sampling: Application to Hippocampal Subfield Volumetry

Improved Inference in Bayesian Segmentation Using Monte Carlo Sampling: Application to Hippocampal Subfield Volumetry Improved Inference in Bayeian Segmentation Uing Monte Carlo Sampling: Application to Hippocampal Subfield Volumetry Juan Eugenio Igleia a, Mert Rory Sabuncu a, Koen Van Leemput a,b,c, for the Alzheimer

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Image Morphing Using Deformation Techniques

Image Morphing Using Deformation Techniques Image Morphing Uing Deformation Technique Seung-Yong Lee, Kyung-Yong Chwa, Jame Hahn, and Sung Yong Shin Department of Computer Science Korea Advanced Intitute of Science and Technology 373-1 Kuong-dong

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

M 4 CD: A Robust Change Detection Method for Intelligent Visual Surveillance

M 4 CD: A Robust Change Detection Method for Intelligent Visual Surveillance 1 M 4 CD: A Robut Change Detection Method for Intelligent Viual Surveillance Kunfeng Wang, Member, IEEE, Chao Gou, and Fei-Yue Wang, Fellow, IEEE Abtract In thi paper, we propoe a robut change detection

More information

A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition

A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com A New Approach for In-Vehicle Camera Traffic Sign Detection and Recognition Andrzej Ruta, Fatih Porikli, Yongmin Li, Shintaro Watanabe, Hirohi

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information