Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation

Size: px
Start display at page:

Download "Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation"

Transcription

1 Spotting Seprtor Points t Line Terminls in Compressed Document Imges for Text-line Segmenttion Amrnth R. Deprtment of Studies in Computer Science, University of Mysore, Indi. ABSTRACT Line seprtors re used to segregte text-lines from one nother in document imge nlysis. Finding the seprtor points t every line terminl in document imge would enle text-line segmenttion. In prticulr, identifying the seprtors in hndwritten text could e thrilling exercise. Oviously it would e chllenging to perform this in the compressed version of document imge nd tht is the proposed ojective in this reserch. Such n effort would prevent the computtionl urden of decompressing document for text-line segmenttion. Since document imges re generlly compressed using run length encoding (RLE) technique s per the CCITT stndrds, the first column in the RLE will e white column. The vlue (depth) in the white column is very low when prticulr line is text line nd the depth could e lrger t the point of text line seprtion. A longer consecutive sequence of such lrger depth should indicte the gp etween the text lines, which provides the seprtor region. In cse of over seprtion nd under seprtion issues, corrective ctions such s deletion nd insertion re suggested respectively. An extensive experimenttion is conducted on the compressed imges of the enchmrk dtsets of ICDAR13 nd Alirez et l [17] to demonstrte the efficcy. Generl Terms Line seprtor points t every line terminl in compressed hndwritten document imges enling text line segmenttion. Keywords Line seprtors, Document imge nlysis, Hndwritten text, Compression nd decompression, RLE, CCITT. 1. INTRODUCTION Generlly, document imge is represented in compressed formt. The formt is developed sed on the guidelines of CCITT Group 4 stndrds, which is prt of ITU (Interntionl Telegrph Union) [1]. This compression stndrd fcilittes oth efficient storge nd trnsmission [12] nd therefore it is utilized in rel-time pplictions including fx mchines, photocopy mchines, digitl lirries nd communiction networks. The compressed representtion of document could imply solution to the ig dt prolems rising from the document imges, prticulrly with regrd to storge nd trnsmission. However to perform digitl document nlysis (DDA) [20], the imge in the compressed formt hs to undergo the decompression stge [13, ]. This pre-requisite wrrnts dditionl uffer spce nd lso extr time. If DDA could e crried out directly in the compressed version, then the document imge compression could e viewed s n effective P. Nghushn Deprtment of Studies in Computer Science, University of Mysore, Indi. solution to the ig dt prolem rising from the document imges. Few literture reported working directly on the compressed version of the printed text. But the chllenging jo is to perform DDA on the hndwritten imges ecuse of oscilltory vritions, inclined orienttions nd frequent touching of text lines while scriing the text lines. Therefore, performing the segmenttion in n uncompressed hndwritten text could e difficult tsk. However, we foresee this possiility in view of the literture presented y Jved et l [13] which reports the reserch effort in the compressed printed document. In this reserch pper, the proposl is to spot the seprtor points t every line terminl in the compressed hndwritten imges enling text line segmenttion. The CCITT Group-3 / Group-4 nd JBIG protocols re developed sed on the run-length encoding (RLE) [15], widely ccepted for inry document compression. The RLE of the document imge is represented in mtrix formt. The first column of the mtrix lwys strts with white spce. This represents the left mrgin. The depth (length) of the white spce is lrger t the seprtion points compred to the depth of the white spce when it encounters the text lines. However, the lst column of RLE does not infer the depth of right mrgin of the document. So we crete virtul column contining lst non-zero vlue of every row of the RLE dt. In summry, we propose to mke use of single column inorder to find the seprtor points t every line terminl. If the depth of the white spce in the first column is equl to tht of the document width, then it certinly infers text-line segmenttion. But most of the time this sitution my not occur in cse of hndwritten texts. This is ecuse of oscilltory vritions, inclined orienttions nd frequent touching of consecutive lines, prticulrly while writing on the white pge (un-ruled pper). Further, every text-line in hndwritten document does not necessrily strt or end with sme left/right mrgin spce. Such sitution is more evident in the first nd the lst text-lines in every prgrph. The depth of the white spce would e lrger t the point of seprtion thn the depth elsewhere, ut this depth my not e pronounced even t the expected seprtor points when two text lines re touching t the eginning of the line itself nd thus it cuses under seprtion. So the correction is to insert seprtor points. Similrly deeper mrgin for consecutive text lines could lso cuse under seprtion, y showing the entire stretch s one seprtion. On the other hnd, lrger concvity in the chrcter, higher indent spce, nd disjoint composition of chrcter my result in perceivly high depth nd hence pseudo seprtion, cusing over seprtion. Therefore, the correction requires the deletion of such over seprtion points. 40

2 The orgnistion of the pper is s follows Section 2 contins relted reserch work. Section 3 includes n understnding of the RLE structure. The lgorithmic model of the proposed method is explined in Section 4. Experimentl nlysis conducted on enchmrk dtsets is presented in Section 5. Summry nd future possiilities re presented in Section RELATED WORK In spite of the extensive serch, there is no contriution reported in the field of DDA directly operting we could identify some relted works pertining to the compressed imge processing. Most of the contriutions re in the field of skew detection / correction, document mtching nd rchivl. The overview of this literture is covered in Tle 1. All the literture ppers presented in this tle refer to some DDA on the compressed printed document imges. In summry, the motivtion is the sence of the work on the compressed version of hndwritten document, nd the hope tht cn e trced prticulrly ecuse of [8,13,14]. Tle 1. Relted reserch work Reserch Are Authors Contriution Interntionl Journl of Computer Applictions ( ) 3. COMPRESSED IMAGE REPRESENTATION AND TERMINOLOGIES The CCITT Group 3 [2] or Modified Huffmn (MH) [15] imge formt primrily uses line y line coding technique. Bsiclly the MH uses RLE s its sis encoding function. RLE descries the length of the run tht crries similr pixel vlue which is either 0 or 1. The pixel crrying vlue 1 (on) is interpreted s foreground wheres the pixel crrying the vlue 0 (off) is considered s ckground. An exmple of RLE formt is represented in the tle 2. The RLE consists of lternte columns of numer of runs of 0 nd 1 cknowledged s odd columns (1, 3, 5, ) nd even columns (2, 4, 6, ) respectively. The column lwys strts with white runs. In senti of white run t the strting point tht is in the first column, it is essentil to mke n entry s 0 (note the line 7 nd 8 in Tle 2). Further this tle shows how the RLE compression technique is involved in shrinking inry imge dt of length sy 14 its to 5 columns. Ech vlue in the RLE represents the mgnitude or depth of the corresponding runs. Skew detection / correction in CCITT Group 4 Shuln Deng et l [3] Exploiting 2-dimensionl correltion etween scn lines y extrcting connected component. Employed occurrence frequency of word ojects Skew detection on Run dt Y. Shim et l [5] Coordinte trnsformtion sed on projection profile method. Skew detection Directly on compressed CCITT Group 4 A.L. Spitz [6] Used position loctions of lck nd white structures to determine skew ngles. Skew detection in JBIG J. Kni et l [7] Used projection profile for predicting skews Oject Identifiction C. M [4] Lyout Anlysis E. Regentov et l [9] Document Retrievl J. J. Hull [10, 11] Document Retrievl Yue Lu et l [12] Segmenttion Mohmmed Jved et l [8, 13, 14] Attempted in identifying r code directly in compressed CCITT Group 4 imges. A prticulr pttern from reltive position of pixels etween scn lines were used. Used the connected-component-detection nd lelling techniques on JBIGencoded imges for otining glol lyout Used psscode of CCITT Group 4 s feture vectors. He used Husdorff distnce mesure for document mtching Hve worked on connected component techniques of CCITT Group 4 stndrd imges. Word ojects re ounded y extrcting chnging elements. These word ojects re mtched sed on weighted Husdorff distnce Hve performed Line, Word, nd Chrcter Segments directly from runlength compressed dt. They hve used horizontl projection profiled nd locl minim points to estimte the text lines. Tle 2. Binry imge dt [13] Line Binry dt

3 For etter understnding, figure 1 () nd () show portion of the smple document imge nd its compressed version. Fig. 2 shows the RLE structure of this smple imge. 3.1 Depth of the White Spce The vlues in the first column of RLE represent the depth of the white spce strting from the left order of the document pge. Fig 3 shows the depth projection for portion of the first column extrcted from figure 2. It is oserved tht the entries in the first column re non-zero nd this indictes minimum white spce s the left mrgin, even in the presence of the text-line. () Uncompressed document () Compressed document Fig. 1: Length pttern oserved from compressed text line (Reference: A portion of ICDAR13 test imge -214.tif) Fig. 3: The depth of the white spce from left end of the document () The first column of the RLE, () Projection of vlues The first column of the RLE implies the left mrgin of the document, wheres in cse of the right mrgin the depth of the white spce hs to e trced in the RLE ecuse it is not ville s column. Here, the lst non-zero entry of every row of RLE is considered s the right mrgin of the document nd hence virtul column is uilt. An illustrtion is provided in fig 4 where the lst non-zero entries re tken from the odd column of every row. In some cses, the lst non-zero entry ppers in n even column nd so zero entry should e dded for the virtul column of the corresponding row. A lst non-zero entry in the even column indictes tht the text-line touches the right order of the document. Fig. 2: The RLE Structure (Reference: A portion of ICDAR13 test imge -214.tif) Fig. 4: The depth of the white spce from right end () RLE formt, () Virtul column 42

4 3.2 Under Seprtion One of the resons for under seprtion is the touching or overlpping of two text-lines t the strting point itself. Here, the depth of the white-run is resonly low. Fig 5 () shows n exmple where the text-lines 3 nd 4 re touching ech other t the eginning of the text line. The other reson is when lrge mrgin spce is indented t the eginning of the text line. This is shown in Fig 5 () where the second text-line hs more left mrgin white spce compred to other text-lines. 4.1 Finding the nds of consecutive rows with lrger white depths The gol of this method is to identify the seprtor (non-text) nd non-seprtor (text) regions. The first column of RLE nd threshold re the inputs. The threshold vlue (t) is heuristiclly chosen s 1/25 of the document width. This threshold is considered fter nlysing the other thresholds including 1/35 nd 1/15 s well. Initilly, we remove the mrgin spce from the left order of the document y sutrcting the vlues with minimum vlue. After this elimintion process, if the vlue is greter thn the threshold, then the corresponding index position is lelled s seprtor point (sy 1 ), otherwise it is presumed s text region (sy 0 ). Fig 7 () shows smple imge mrked with seprtor nds (lck ptches) long the left order of the document. Fig 7 () shows the periodicity of the seprtor nds. Fig. 5: Under Seprtion (Reference: A portion of ICDAR13 test imges tif nd 220.tif) () Touching of lines t the strting point, () Text line with more spce for left mrgin 3.3 Over Seprtion The over seprtion occurs when text line is identified s non-text (white spce) region. Fig 6 shows the chrcter J cusing pseudo seprtion point. The over seprtion is due to concvity of the chrcter from the left end. The other ffecting fctor could e the multiple disjoint frctions or components which compose chrcter. Fig. 6: Over Seprtion (Reference: A portion of ICDAR13 test imge tif) 4. IDENTIFICATION OF TEXT-LINE SEPARATORS IN COMPRESSED IMAGES From the detils presented in Section 3, there re three min stges () Finding the nds of consecutive rows with lrger white depths, () Finding the under seprtion (c) Finding the over seprtion. A detiled explntion is provided for ech stge in the following su sections. Fig. 7: Formtion of Seprtor nds (Reference: A ICDAR13 test imge tif) () Seprtor nds, () Periodicity of the seprtor nd The first column of RLE nd the threshold re represented s FC nd t respectively in the lgorithm. The finl output, sy Seprtor Bnd (SB), represents the region of text line seprtion. Algorithm CretingSeprtorBnds Input: Output: The time complexity of finding the minimum vlue is, where m = size of the first column. The lgorithm scns the input rry once gin to find the seprtor points. Overll, the worst cse of the lgorithm is. 43

5 4.2 Finding the under seprtion The two fctors cusing under seprtion hve een detiled in Section 3.2. In this section, we del with the seprtor nd width which is reltively lrge. The under seprtor region could e seen in Fig 8. Fig 5() in Section 3 shows the region of interest (ROI). When seprtor nd width is two times lrger thn tht of n verge nd width, then it is presumed s under seprtor region or ROI. To resolve this, the ROI would e recursively iterted with the sme lgorithm descried in the previous section. The recursion termintes when no ROI is detected. On the other hnd, the seprtor nd width would e extremely lrge, sometimes it my cover more thn 1/10 of the document height, which definitely ffects the verge seprtor nd width. This scenrio is shown in Fig 9. So we directly tke this region s ROI nd this would not e considered for clculting the verge. The threshold 1/10 is chosen heuristiclly sed on the verge numer of the text lines in the dtset. Algorithm FindingUnderSeprtion Input: Output: Fig. 8: Seprtion nd nd frequency (Reference: ICDAR13 test imge tif) The time complexity for finding the verge seprtor nd width is. The detection of the ROI is. The worst cse scenrio for this lgorithm is. Next, the seprtor points re identified y tking the mid position of ech nd with respect to its position. Suppose the strting nd the ending position of seprtor nd re respectively, then the mid-point is computed s seprtor exmple.. Fig. 10 shows the line Fig. 9: Seprtor nds (Reference: A ICDAR13 test imge tif) () A lrger seprtion nd, () Seprtion nds fter Itertion Fig. 10: Line Seprtors (Reference: A portion of ICDAR13 test imge tif) 44

6 The other under seprtion prolem is illustrted in Section 3.2 (Fig 5()) when two djcent text lines re touching t the eginning of the text-line. We nlyze the frequency of the seprtor points. If the gp etween the two djcent seprtor points is more thn twice its verge gp, then it is considered s n under seprtion region. The under seprtion region could e seen in fig 11 with its corresponding seprtor frequency. The over seprtion points re detected when the gp etween the djcent is lesser thn 1/3 of the verge gp. In Fig 11, the gp etween the seprtor points 6 nd 7 is identified s over seprtion. In this scenrio, the seprtor point 6 is to e removed ecuse this seprtor point is comprtively closer to its djcent point 5 thn the gp etween 7 nd 8. The mthemticl model is given elow. Fig. 11: Under seprtion nd frequency (Reference: A portion of ICDAR13 test imge tif) To resolve this, first we compute the verge seprtion gp etween the djcent seprtors. Next, we re-compute the verge seprtion gp y ignoring the touching seprtor points. This newly computed verge is used in-order to insert the seprtor exctly in the midpoint of the two touching textlines. The sme lgorithm to identify the under seprtion region is employed. Insted of computing the verge seprtor nd width, we tke the verge gp etween the seprtor points. Therefore, the time complexity is. 4.3 Finding the over seprtion As descried in Section 3.3, the resons for over seprtion re disjoint chrcter composition nd perceivly higher concve chrcter structure. The over seprtor points re detected sed on the frequent ppernce of the seprtor points thn expected. This could e seen in Fig 11, where the seprtor line 6 is closely locted to the seprtor 7. The lgorithm scns the seprtor points twice nd so the overll time complexity is. 4.4 Cretion of virtul column t the right end To work on the right mrgin of the document imge, we consider the lst non-zero entry of every row of RLE dt nd we uild virtul column. This is explined clerly in Section 3.1. The lgorithmic skeleton is provided here under. Algorithm VirtulColumn Input: RLE Output: VC Virtul Column- consists of lst non-zero vlue of every row in RLE dt This lgorithm tkes Fig. 12: Under seprtion nd frequency (Reference: A portion of ICDAR13 test imge tif) Algorithms in 4.1, 4.2 nd 4.3 cn e pplied on this virtul column to spot the seprtor points t right order of the document. A smple result of seprtor points t left nd right order is shown in Fig

7 The mchine lerning sttistics such s True Negtive (TN) nd Flse Positive (FP) in terms of under seprtion nd over seprtion respectively is shown elow. The totl seprtor points t left/right order of document is the sum of the numer of gps etween the text lines nd the two mrgins (top nd ottom) of the document pge. Fig. 13: Seprtor points t left nd right orders (Reference: A portion of ICDAR13 test imge tif) 5. EXPERIMENTAL ANALYSIS There is no stndrd compressed hndwritten dtset ville in the literture. However, the enchmrk dtsets such s ICDAR2013 [16], Alirez et l [17] of Knnd, Oriy, Persin nd Bngl documents re compressed using the RLE technique. The compression stndrd is dopted s presented in [14]. The system is evluted y counting the numer of mtches etween the entities (seprtor points) detected y the lgorithm nd the entities present in the ground truth, proposed in the literture [16]. Let N e the count of groundtruth elements nd the numer of one-to-one mtches e o2o, the detection rte (DR) is defined s follows: While experimenting, we ignore the seprtor point t the top mrgin of every document. The tle 3 shows the DR on evluting the lgorithms on the hndwritten dtsets. The tle shows one-to-one detection on oth ends (left nd right). Different threshold vlues including 1/15 nd 1/35 were experimented. However, the threshold vlue 1/25 would give reltively higher DR. In prticulr, the Persin hndwritten dtset holds lesser DR. This is ecuse the Persin chrcters or words re composed of disjoint components. For Persin texts the performnce t the right end is etter thn left ecuse it is written in left-to-right direction, cusing lrger indent mrgin t left end when compred to its right. Tle 3. Detection Rte tested with vrious compressed dtsets Dtsets (Hndwritten) Totl Lines (N) Detected Undetected (%) o2o Rte (%) Left Right Left Right Left Right TN FP TN FP ICDAR13 [16] Knnd [17] Oriy [17] Bngl [17] Persi [17] CONCLUSION AND FUTURE WORK In this pper, novel ide of working directly in the compressed representtion of the document imge is presented. We spotted the sequence of seprtor points t every line terminl in the RLE dt. These seprtor points would enle the text line segmenttion. Certinly, these points determine the text line segmenttion in the printed compressed document. Though the entire RLE dt is ville, we used just the first column of the RLE to spot seprtor points on the left end of the document. In cse of the right end, the lst non-zero entry of every row in the RLE dt is chosen to form virtul column. The lgorithm hs some limittions in working with skews, lrge mrgins (indents), consecutive touching lines nd disjoint chrcters. These limittions cn e considered for the future work. 7. REFERENCES [1] CCITT: 'Recommendtion T.6 Fcsimile Coding Schemes nd Coding Control Function from Group 4, Interntionl Telecommuniction Union', (Extrct from the Blue Book), Genev, [2] CCITT: 'Recommendtion T.4, Stndrdiztion of group 3 fcsimile pprtus for document trnsmission', terminl equipments nd protocols for telemtic services, vol. vii, fscicle, vii.3, genev, tech. rep.,

8 [3] Shuln Deng, Shhrm Ltifi, nd Junichi Kni: Mnipultion of Text Documents in the Modified Group 4 Domin', IEEE Second Workshop on Multimedi Signl Processing, [4] C. M:'Identifying the existence of r codes in compressed imges', CVGIP: Grphicl Models nd Imge Processing, pp. 56: , [5] Y. Shim, S. Kshiok, nd J. Higshino: 'A High-speed Rottion Method for Binry Imges Bsed on Coordinte Opertion of Run Dt', Systems nd Computers in Jpn, Vol. 20, No. 6, pp , [6] A.L. Spitz: 'Anlysis of Compressed Document Imges for Dominnt Skew, Multiple Skew, nd Logotype Detection', Computer Vision nd Imge Understnding, Vol. 70, No. 3, June, pp , [7] J. Kni nd A. D. Bngdnov: 'Projection profile sed skew estimtion lgorithm for jig compressed imges', Interntionl Journl on Document Anlysis nd Recognition (IJDAR 98), vol. 1, pp , [8] Mohmmed Jved, P. Nghushn, nd B.B. Chudhuri: 'Extrction of Line Word Chrcter Segments Directly from Run Length Compressed Printed Text Documents'. [9] E. Regentov, S. Ltifi, D. Chen, K. Tghv, nd D. Yo: 'Document nlysis y processing jig-encoded imges', IJDAR, vol. 7, pp , [10] J. J. Hull: 'Document mtching on ccitt group 4 compressed imges', SPIE Conference on Document Recognition IV, pp. 8 14, Fe [11] J. J. Hull: 'Document imge similrity nd equivlence detection', Interntionl Journl on Document Anlysis nd Recognition (IJDAR 98), vol. 1, pp , [12] Y. Lu nd C. L. Tn: 'Document retrievl from compressed imges', Pttern Recognition, vol. 36, pp , [13] Mohmmed Jved, P. Nghushn, nd B.B. Chudhuri: 'Extrction of line-word-chrcter segments directly from run-length compressed printed textdocuments', 2013 Fourth Ntionl Conference on Computer Vision, Pttern Recognition, Imge Processing nd Grphics (NCVPRIPG). [14] Mohmmed Jved, P. Nghushn, nd B.B. Choudhuri: 'Direct Processing of Run-Length Compressed Document Imge for Segmenttion nd Chrcteriztion of Specified Block', Interntionl Journl of Computer Applictions ( ) Volume 83 - No.15, Decemer [15] Mohmmed Jved, Krishnnnd S.H, P. Nghushn, nd B. B. Chudhuri: 'Visulizing CCITT Group 3 nd Group 4 TIFF Documents nd Trnsforming to Run- Length Compressed Formt Enling Direct Processing in Compressed Domin', Interntionl Conference on Computtionl Modelling nd Security (CMS 2016). [16] Nikolos Stmtopoulos, Bsilis Gtos, Georgios Louloudis, Umpd Pl nd Alirez Alei: 'ICDAR2013 Hndwritting Segmenttion Contest', th Interntionl Conference on Document Anlysis nd Recognition. [17] Alirez Alei, Umpd Pl nd P. Nghushn: 'Dtset nd Ground Truth for Hndwritten Text in Four Different Scripts', Int. J. Ptt. Recogn. Artif. Intell. 26, (2012). [18] Alirez Alei, Umpd Pl nd P. Nghushn:'A New Scheme for Unconstrined Hndwritten Text-line Segmenttion', Pttern Recognition 44 (2011), [19] D. Brodic: 'Methodology for the Evlution of the Algorithms for Text Line Segmenttion Bsed on Extended Binry Clssifiction', Mesurement Science Review, Volume 11, No. 3, [20] B. B. Chudhuri nd Chndrnth Adk:'An Approch for Detecting nd Clening of Struck-out Hndwritten Text', Pttern Recognition, IJCA TM : 47

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Information Retrieval and Organisation

Information Retrieval and Organisation Informtion Retrievl nd Orgnistion Suffix Trees dpted from http://www.mth.tu.c.il/~himk/seminr02/suffixtrees.ppt Dell Zhng Birkeck, University of London Trie A tree representing set of strings { } eef d

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Suffix trees, suffix arrays, BWT

Suffix trees, suffix arrays, BWT ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION Hee Ju Prk OLOUR IMAGE MATHING FOR DTM GENERATION AND HOUSE EXTRATION Hee Ju PARK, Petr ZINMMERMANN * Swiss Federl Institute of Technology, Zuric Switzerlnd Institute for Geodesy nd Photogrmmetry heeju@ns.shingu-c.c.kr

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

Character-Stroke Detection for Text-Localization and Extraction

Character-Stroke Detection for Text-Localization and Extraction Chrcter-Stroke Detection for Text-Locliztion nd Extrction Krishn Subrmnin ksubrm@bbn.com Prem Ntrjn pntrj@bbn.com Michel Decerbo mdecerbo@bbn.com Dvid Cstñòn Boston University dc@bu.edu Abstrct In this

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

The dictionary model allows several consecutive symbols, called phrases

The dictionary model allows several consecutive symbols, called phrases A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle Textiles nd Light ndustril Science nd Technology (TLST) Volume 3, 2014 DO: 10.14355/tlist.2014.0301.01 http://www.tlist-journl.org Anlysis of Computed Diffrction Pttern Digrm for Mesuring Yrn Twist Angle

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

CS 430 Spring Mike Lam, Professor. Parsing

CS 430 Spring Mike Lam, Professor. Parsing CS 430 Spring 2015 Mike Lm, Professor Prsing Syntx Anlysis We cn now formlly descrie lnguge's syntx Using regulr expressions nd BNF grmmrs How does tht help us? Syntx Anlysis We cn now formlly descrie

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Object and image indexing based on region connection calculus and oriented matroid theory

Object and image indexing based on region connection calculus and oriented matroid theory Discrete Applied Mthemtics 147 (2005) 345 361 www.elsevier.com/locte/dm Oject nd imge indexing sed on region connection clculus nd oriented mtroid theory Ernesto Stffetti, Antoni Gru, Frncesc Serrtos c,

More information

YMCA Your Mesh Comparison Application

YMCA Your Mesh Comparison Application YMCA Your Mesh Comprison Appliction Johnn Schmidt, Reinhold Preiner, Thoms Auzinger, Michel Wimmer, M. Edurd Gröller, Memer, IEEE CS, nd Stefn Bruckner Memer, IEEE CS Alg. 01 Alg. 02 Alg. 03 Alg. 01 Alg.

More information

Computer Vision and Image Understanding

Computer Vision and Image Understanding Computer Vision nd Imge Understnding 116 (2012) 25 37 Contents lists ville t SciVerse ScienceDirect Computer Vision nd Imge Understnding journl homepge: www.elsevier.com/locte/cviu A systemtic pproch for

More information

Lexical analysis, scanners. Construction of a scanner

Lexical analysis, scanners. Construction of a scanner Lexicl nlysis scnners (NB. Pges 4-5 re for those who need to refresh their knowledge of DFAs nd NFAs. These re not presented during the lectures) Construction of scnner Tools: stte utomt nd trnsition digrms.

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Stack. A list whose end points are pointed by top and bottom

Stack. A list whose end points are pointed by top and bottom 4. Stck Stck A list whose end points re pointed by top nd bottom Insertion nd deletion tke plce t the top (cf: Wht is the difference between Stck nd Arry?) Bottom is constnt, but top grows nd shrinks!

More information

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures Other Issues Stck Mnipultion support for procedures (Refer to section 3.6), stcks, frmes, recursion mnipulting strings nd pointers linkers, loders, memory lyout Interrupts, exceptions, system clls nd conventions

More information

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS COMPUTATION & LOGIC Sturdy st April 7 : to : INSTRUCTIONS TO CANDIDATES This is tke-home exercise. It will not

More information

Topological Queries on Graph-structured XML Data: Models and Implementations

Topological Queries on Graph-structured XML Data: Models and Implementations Topologicl Queries on Grph-structured XML Dt: Models nd Implementtions Hongzhi Wng, Jinzhong Li, nd Jizhou Luo Astrct In mny pplictions, dt is in grph structure, which cn e nturlly represented s grph-structured

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia PPS: User Mnul Krishnendu Chtterjee, Mrtin Chmelik, Rghv Gupt, nd Ayush Knodi IST Austri (Institute of Science nd Technology Austri), Klosterneuurg, Austri In this section we descrie the tool fetures,

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Inference of node replacement graph grammars

Inference of node replacement graph grammars Glley Proof 22/6/27; :6 File: id293.tex; BOKCTP/Hin p. Intelligent Dt Anlysis (27) 24 IOS Press Inference of node replcement grph grmmrs Jcek P. Kukluk, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

2-3 search trees red-black BSTs B-trees

2-3 search trees red-black BSTs B-trees 2-3 serch trees red-lck BTs B-trees 3 2-3 tree llow 1 or 2 keys per node. 2-node: one key, two children. 3-node: two keys, three children. ymmetric order. Inorder trversl yields keys in scending order.

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

ON THE DEHN COMPLEX OF VIRTUAL LINKS

ON THE DEHN COMPLEX OF VIRTUAL LINKS ON THE DEHN COMPLEX OF VIRTUAL LINKS RACHEL BYRD, JENS HARLANDER Astrct. A virtul link comes with vriety of link complements. This rticle is concerned with the Dehn spce, pseudo mnifold with oundry, nd

More information

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application. ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,

More information

The gamuts of input and output colour imaging media

The gamuts of input and output colour imaging media In Proceedings of IS&T/SPIE Electronic Imging 1 The gmuts of input nd output colour imging medi án Morovic,* Pei Li Sun* nd Peter Morovic * Colour & Imging Institute, University of Dery, UK School of Informtion

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

PLWAP Sequential Mining: Open Source Code

PLWAP Sequential Mining: Open Source Code PL Sequentil Mining: Open Source Code C.I. Ezeife School of Computer Science University of Windsor Windsor, Ontrio N9B 3P4 cezeife@uwindsor.c Yi Lu Deprtment of Computer Science Wyne Stte University Detroit,

More information

Orthogonal line segment intersection

Orthogonal line segment intersection Computtionl Geometry [csci 3250] Line segment intersection The prolem (wht) Computtionl Geometry [csci 3250] Orthogonl line segment intersection Applictions (why) Algorithms (how) A specil cse: Orthogonl

More information

From Indexing Data Structures to de Bruijn Graphs

From Indexing Data Structures to de Bruijn Graphs From Indexing Dt Structures to de Bruijn Grphs Bstien Czux, Thierry Lecroq, Eric Rivls LIRMM & IBC, Montpellier - LITIS Rouen June 1, 201 Czux, Lecroq, Rivls (LIRMM) Generlized Suffix Tree & DBG June 1,

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

SERIES. Patterns and Algebra OUT. Name

SERIES. Patterns and Algebra OUT. Name D Techer Student Book IN OUT 8 Nme Series D Contents Topic Section Ptterns Answers nd (pp. functions ) identifying ptterns nd nd functions_ creting ptterns_ skip equtions counting nd equivlence completing

More information

CMPSC 470: Compiler Construction

CMPSC 470: Compiler Construction CMPSC 47: Compiler Construction Plese complete the following: Midterm (Type A) Nme Instruction: Mke sure you hve ll pges including this cover nd lnk pge t the end. Answer ech question in the spce provided.

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets

More information

Mathematics Background

Mathematics Background For more roust techer experience, plese visit Techer Plce t mthdshord.com/cmp3 Mthemtics Bckground Extending Understnding of Two-Dimensionl Geometry In Grde 6, re nd perimeter were introduced to develop

More information

COMPUTER SCIENCE 123. Foundations of Computer Science. 6. Tuples

COMPUTER SCIENCE 123. Foundations of Computer Science. 6. Tuples COMPUTER SCIENCE 123 Foundtions of Computer Science 6. Tuples Summry: This lecture introduces tuples in Hskell. Reference: Thompson Sections 5.1 2 R.L. While, 2000 3 Tuples Most dt comes with structure

More information

HW Stereotactic Targeting

HW Stereotactic Targeting HW Stereotctic Trgeting We re bout to perform stereotctic rdiosurgery with the Gmm Knife under CT guidnce. We instrument the ptient with bse ring nd for CT scnning we ttch fiducil cge (FC). Above: bse

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Slicer Method Comparison Using Open-source 3D Printer

Slicer Method Comparison Using Open-source 3D Printer IOP Conference Series: Erth nd Environmentl Science PAPER OPEN ACCESS Slicer Method Comprison Using Open-source 3D Printer To cite this rticle: M K A Mohd Ariffin et l 2018 IOP Conf. Ser.: Erth Environ.

More information

PNC NC code PROGRAMMER'S MANUAL

PNC NC code PROGRAMMER'S MANUAL PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this

More information