Contour is the shape or format of an object and can be either bi- or multidimensional. In

Size: px
Start display at page:

Download "Contour is the shape or format of an object and can be either bi- or multidimensional. In"

Transcription

1 Contour Algoriths Review arcos da Silva Sapaio Universidade Federal da Bahia (UFBA) Pedro Kroger Universidade Federal da Bahia (UFBA) Abstract: In this paper, we present soe probles of two usic Contour Relations Theory operations algoriths: the Refineent of Contour Reduction Algorith, which was developed by Rob Schultz, and the Equivalence Contour Class Prie For algorith, which was developed by Elizabeth arvin and Paul Laprade. We also propose two alternative algoriths to solve these probles. Keywords: usic Contour Theory, Reduction Algorith, Algorith, Equivalent contour classes. I. Introduction Contour is the shape or forat of an object and can be either bi- or ultidiensional. In usic, a contour is an abstraction of eleents such as pitch, chord density, duration, tibre, or intensity. A elodic contour, for instance, is a ap of pitches in tie. usical contour is "a set of points in one sequential diension ordered by any other sequential diension" []. The study of contour is iportant because, as is the case with otifs and pitch class sets, it can contribute to usical coherence. The usical Contour Relations Theory provides concepts and operations with which to establish contour identity and siilarity easures for analytical and copositional purposes. This theory has supported the analysis of works by coposers such as W. A. ozart [], Luigi Dallapicolla [6], Arnold Schoenberg [, ], Anton Webern [], Olivier essiaen [], Elliott Carter, Pierre Boulez, Iannis enakis, Alois Haba, ilton Babbitt, Harrison Birtwistle, and Igor Stravinsky [], as well as video gae soundtracks [8]. In this paper, we present soe probles of two Contour Theory operations algoriths: the Refineent of Contour Reduction Algorith [] and the Equivalence Contour Class Prie For algorith [6, 7]. We also propose two alternative algoriths for solving the. II. Contour Theory basic concepts and operations A coplete presentation of Contour Theory concepts and operations is outside the scope or this paper. However, an understanding of contour space, contour segent, coparison atrix, class equivalence, prie for, and contour reduction is necessary to follow this paper s preise. See Beard [], Bor [], and Sapaio [] for further inforation concerning usic Contour Theory. 7

2 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Figure : Fugue subject, The Well-Tepered Clavier by J.S. Bach Table : Coparison atrix of the contour < 5 5 > Contour space is a usical space coposed of the contour eleents (or contour points [CPs] ). The contour space of pitches, for instance, is coposed of all pitches represented as integers fro low to high and nubered fro to n [9], where n denotes cardinality. For instance, the contour space of pitches in the elody shown in Figure is S = {,,,,, 5, 6}, representing the pitches Eb, F, G, Ab, B, C, and D. A contour segent, or, ore siply, a contour, is an ordered set of contour points. For instance, the contour of the first five notes in Figure is < 5 5 >. Noralization (or translation) is an operation that siplifies the contour representation by re-enuerating fro to n. The otive < 5 5 > noralization is < >. The relation of any pair of CPs is ternary: one CP is lower, equal to, or higher than the other. The contour can be analyzed and represented in a linear or cobinatorial way. The linear contour regards only the relations between adjacent CPs; the cobinatorial contour considers relations between adjacent and non-adjacent CPs. For instance, in the contour, the relation between 5 and is lower ( ), whereas it is higher (+) between and. The relations aong the contour points are represented in a coparison atrix (cf. Table ). Two contours are equivalent if they share the sae coparison atrix. The set of equivalent contours fors a contour class. This class is represented by an equivalent class prie for. According to arvin and Laprade citearvin987, the retrograded, inverted, and retrogradedinverted versions of a contour belong to its equivalence class. The prie for of this class can be calculated with a siple algorith (cf. Section IV). Any contour can be reduced to a prie for through the Contour Reduction Algorith []. This algorith, like the Schenkerian reductive techniques, sets up hierarchical levels of pitch salience. High and low peaks are selected: "passing notes" and "inner voices" are pruned. That is, the algorith provides a criterion for associating nonadjacent notes by picking out those that are presuably ost obvious to the ear []. Robert orris [] proposed 5 basic contour prie fors to which any contour could be reduced. Rob Schultz [] proposed a refineent to this algorith because soe contours such as See Lewin [5] for further inforation regarding usical spaces. A contour point is also known as a contour pitch, or c-pitch. Do not confuse this with prie contours, as proposed by Robert orris []. 7

3 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. A < > are not reducible to one of the basic pries by the orris algorith. The equivalence classes and prie contours are useful for checking the identity of the contours for analytical and copositional purposes. For instance, the contours A < > and B < > belong to the sae class, as represented by their prie for < >. The B contour is obtained by inverting and retrograding the A contour. As another exaple of this, the contours C < > and D < > have a coon prie: P < >, as obtained by the Refined Contour Reduction Algorith. III. Refined Contour Reduction Algorith (by Schultz) The Refined Contour Reduction Algorith [] (cf. Algorith ) reoves interediary CPs and preserves salient ones with the support of an auxiliary internal structure called the ax-/in-list. This algorith has a preliinary coponent (Steps to 5), as well as a recurrent one (Steps 6 to 7). CONTOUR-REDUCTION-ALGORITH(C), where C is a contour. Let variable N: Step : Set N to. Step : Flag all axia in C upwards; call the resulting set the ax-list. Step : Flag all inia in C downwards; call the resulting set the in-list. Step : If all c-pitches are flagged, go to step 6. Step : Delete all non-flagged c-pitches in C. Step 5: N is increented by (i.e., N becoes N + ). Step 6: Flag all axia in the ax-list upward. For any string of equal and adjacent axia in the ax-list, flag all of the, unless: () one c-pitch in the string is the first or last c-pitch of C, then flag only it; or () both the first and last c-pitches of C are in the string, then flag (only) both the first and last c-pitches of C. Step 7: Flag all inia in in-list downward. For any string of equal and adjacent inia in the in-list, flag all of the, unless: () one c-pitch in the string is the first or last c-pitch of C, then flag only it; or () both the first and last c-pitches of C are in the string, then flag (only) both the first and last c-pitches of C. Step 8: For any string of equal and adjacent axia in the ax-list in which no inia intervene, reove the flag fro all but (any) one c-pitch in the string. Step 9: For any string of equal and adjacent inia in the in-list in which no axia intervene, reove the flag fro all but (any) one c-pitch in the strings. Step : If all c-pitches are flagged, and no ore than one c-pitch repetition in the ax-list and in-list (cobined) exists, not including the first and last c-pitches of C, proceed directly to step 7. Step : If ore than one c-pitch repetition in the ax-list and/or in-list (cobined) exists, not including the first and last c-pitches of C, reove the flags on all repeated c-pitches except those closest to the first and last c- pitches of C. Step : If both flagged c-pitches reaining fro step are ebers of the ax-list, flag any one (and only one) forer eber of the in-list whose flag was reoved in step ; if both c-pitches are ebers of the in-list, flag any one (and only one) forer eber of the ax-list whose flag was reoved in step. Step : Delete all non-flagged c-pitches in C. Step : If N =, N is increented by (i.e., N becoes N + ). Step 5: If N =, N is increented by (i.e., N becoes N + ). Step 6: Go to step 6. Step 7: End. N is the "depth" of the original contour C. 7

4 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Algorith Refined Contour Reduction Algorith (by Schultz) A axiu point exists if, in a triad of CPs, the iddle CP is equal to or greater than its neighbors. By default, the first and last CPs in a sequence are also axia. The axia-list is calculated in a linear anner with Algorith (in pseudocode). This algorith returns a ax-list fro a given sequence of CPs. The inia and in-list are calculated in an analogous way. For instance, the axia- and inia-list of the contour S < > are = [,, ], and = [,, ]. Algorith axia list algorith A-LIST(S), where S is a sequence of CPs, represented as S = {S, S,..., S n, S n } and n is its cardinality. Let ax-list Add S to ax-list for i fro to n do if (S i+ S i ) (S i+ S i+ ) then Add S i to ax-list end if end for Add S n to ax-list return ax-list In the Reduction Algorith, the CPs are recurrently flagged as axia and inia, and the CPs that are not flagged are reoved. Each loop iteration increases the algorith depth value that represents the coplexity of the contour reduction. The loop finishes when all CPs are flagged. In the first part, the contour is used as the sequence of CPs for ax- and in-list calculus. In the second part, the ax- and in-lists theselves are used for the calculus. As an illustration, consider the reduction of the contour A 5 < > following Algorith. Step. N =. Step. axia flag: {A, A, A, A 5, A 7, A 9, A, A } (Figure a). Step. inia flag: {A, A, A, A 6, A 8, A, A } (Figure b). Step. Conditional: all flagged, jup to Step 6. Step 6. First part: Flag axia fro ax-list: {A, A, A 5, A 7, A, A } (Figure c). Second part: The repeated adjacent axia sequence ({A 5, A 7 }) does not involve either the first or the last CP. Thus, both are flagged. Step 7. First part: Flag inia fro in-list: {A, A, A, A 6, A 8, A, A } (Figure c). Second part: The adjacent inia sequence ({A, A, A 6, A 8, A }) does not involve either the first or the last CP. Thus, both are flagged. Step 8. The repeated adjacent axia sequence ({A 5, A 7 }) contains an intervening inia (A 6 ). Thus, the flag is kept. Step 9. The repeated adjacent inia sequence ({A, A, A 6, A 8, A }) contains a slice with two intervening axia ({A, A 6, A 8 }) and two other slices without it ({A, A } and {A 8, A }). The slices without the intervening axia have the flag reoved. The resulting in-list is {A, A, A 6, A 8, A } (Figure d). 5 In this analysis, we are representing the axia and inia using sall triangles above and below the CPs, with the letters (for axia) and (for inia) and the contour as a sequence A = {A, A,..., A, A }. 75

5 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Step. There are CPs not flagged ({A, A, A 9, A }), and the cobined axia and inia repeat ({A, A 5, A 6, A 7 }). Go to Step. Step. Reove the flags fro the cobined CPs, keeping the CPs near the beginning and end of the contour (Figure e). Step. The CPs flagged in Step ({A, A 7 }) belong to the ax- and in-lists and reain unchanged. Step. Reove non-flagged CPs ({A, A, A 5, A 6, A 9, A }) (Figure f). Step. N =. aintain the CPs as being unchanged. Step 5. N =. Increent of units: N =. Step 6. Return to Step 6. The second iteration begins with the CPs, axia and inia flags illustrated in the figure a 6 Step 6. First part: Flag axia fro ax-list: ({A, A, A, A }) (Figure b). Second part: The repeated adjacent axia sequence ({A, A }) does not involve either the first or the last CP. Thus, all axia are flagged. Step 7. First part: Flag inia fro in-list: ({A, A, A 8, A }). Second part: The repeated adjacent inia sequence ({A, A 8 }) does not involve either the first or the last CP. Thus, all inia are flagged. Step 8. The adjacent repeated axia sequence ({A, A }) has two inia intervene ({A, A 8 }). Step 9. The adjacent repeated inia sequence ({A, A 8 }) has not yet had the axia intervene. The flag of the one repeated inia (A 8 ) is reoved (Figure c). Step. There are CPs that are not flagged ({A 7, A 8 }). Go to Step. Step. There is no cobined CP repetition. Step. There is no cobined CP repetition. Step. Reove non-flagged CPs ({A 7, A 8 }) (Figure d). Step. N =. Increent of unit: N = Step 5. N =. aintain the contour as being unchanged. Step 6. Return to Step 6. The third iteration begins with the CPs, axia and inia flags illustrated in the figure : {A, A, A, A } and {A, A, A }. Step 6. First part: Flag axia fro ax-list: ({A, A, A, A }) (Figure ). Second part: The repeated adjacent axia sequence ({A, A }) does not involve either the first or the last CP. Thus, all axia are flagged. Step 7. First part: Flag inia fro in-list: ({A, A, A }) (Figure ). Second part: There are no repeated adjacent inia sequences. Step 8. The repeated adjacent axia sequence contains an intervening inia. Thus, the flag is kept. Step 9. There are no adjacent repeated inia sequences. Step. All CPs are flagged, and there are no cobined axia and inia repetitions. Jup to Step 7. Step 7. The contour A has a depth of, is reduced to < >, and is noralized to < >. i. Reduction algorith review There are two probles in this algorith:. Cobined adjacent axia and inia repetition is in Step. 6 For siplification reasons, we keep the original sequence index. 76

6 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Contour < > Contour < > (a) Step (b) Step Contour < > Contour < > (c) Steps 6 8 (d) Steps 9 and Contour < > Contour < > (e) Steps and (f) Steps 6 Figure : Reduction algorith flags in the first iteration 77

7 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Contour < > Contour < > (a) Initial state (b) Steps 6 8 Contour < > Contour < > (c) Steps 9 (d) Steps 6 Figure : Reduction algorith flags in the second iteration Contour < > Figure : Reduction algorith flags in the third iteration 78

8 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No...5 Contour < > Figure 5: Cobined adjacent axia and inia repetitions..5 Contour < > Figure 6: Contour < > and flagged axia and inia.. There is indefiniteness in the repeated axia and inia sequences of Steps 8 and 9. Step contains two conditions with two possible results: continue with Step or jup to the algorith s end at Step 7. In the second condition, the expression "no ore than one" leads to an error because prie contours cannot have cobined axia and inia repetitions, and this expression allows for at least one. Thus, the algorith ust not end while these repetitions are in the contour. For instance, the contour A < > (Figure 5) has all CPs flagged and only one ax-in cobined repetition of CPs and. Thus, in Step, the algorith ends, and the repetition is not reoved. To fix this proble, this step should be rewritten as "and there are no repeated cobined CPs in ters of the axia and inia." The expression "string of equal and adjacent axia" in Step 8 is not precise concerning the length of the string. For instance, the contour A < > (Figure 6) has three repeated axia. There are two possible interpretations of "string" in this exaple: the unique sequence with three repeated axia {A, A, A }, or each of the two sequences of repeated axia {A, A } and {A, A }. Considering the unique sequence {A, A, A } as the string, there is an intervening inia 79

9 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No.. Contour < >. Contour < > (a) with inia between the axia (b) without inia between the axia..5. Contour < > (c) with and without inia between the axia Figure 7: Contour with and without inia between axia (A ), and we should ove to Step 9. Considering each pair of repeated axia as a string, there is no intervening inia in the first pair, and we should reove the flag fro one of these axia. In the first case, with a unique string, the algorith ends with the unchanged contour < >, and with the repeated axia. In the second case, with two strings, one of the axia is reoved, and the algorith finishes with the correct prie contour < >. There are three particular situations for the equal and adjacent axia in axia-list:. with inia between the axia (Figure 7a).. without inia between the axia (Figure 7b).. with slices with and without inia between axia in the sae string (Figure 7c). In the first situation, all the axia flags ust be kept; in the second, only the first axia ust keep it flag; and in the third situation, in the slice without inia between the axia, these axia ust be unflag, and, in the slices with inia between axia, the axia adjacent to the intervening inia ust be kept. In this third situation, there are cases where two equal adjacent 8

10 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. axia are between two inia. In these cases, the second axia ust be unflag (See C 6 in the figure 7c). There is a siilar proble in the analogous Step 9, related to axia between equal adjacent inia. We propose a new version of the algorith with these questions reviewed (Algorith ). CONTOUR-REDUCTION-ALGORITH-REVIEW(C), where C is a contour. Let variable N. First part Step : Set N to. Step : Flag all axia in C upwards, and call the resulting sequence the ax-list; flag all inia in C downwards, and call the resulting sequence the in-list. All odification in a axor in-list will result in a new ax-/in- list. Step : If all CPs are flagged, go to Step. Step : Delete all non-flagged CPs in C, and increent N by (i.e., N becoes N + ). Second part Step : Flag all axia in the ax-list upward, and flag all inia in the in-list downward. Step 5: If there are no adjacent repeated axia in ax-list and inia in in-list, go to Step. Step 6: For any string of equal and adjacent axia in the ax-list: if First and last CP are present in the string then Flag the. else if First or last CP are present in the string then Flag it. else Flag all axia in the string. end if Step 7: For any string of equal and adjacent inia in the ax-list: if First and last CP are present in the string then Flag the. else if First or last CP are present in the string then Flag it. else Flag all inia in the string. end if Step 8: For any string of equal and adjacent axia in ax-list: if There is no iniu between the axia then Flag the first axia and unflag the others. else if There are inia between all the axia then Flag all the axia. else Flag the axia that are adjacent to the inia and unflag the others. if There is two adjacent axia between two inia then Unflag the second axia. end if end if Step 9: For any string of two equal and adjacent inia in the in-list: 8

11 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. if There is no axiu between the inia then Flag the first inia and unflag the others. else if There are axia between all the inia then Flag all the inia. else Flag the inia that are adjacent to the axia and unflag the others. if There is two adjacent inia between two axia then Unflag the second inia. end if end if Step : If there is no CP repetition in the ax-list and in-list (cobined), not including the first and last CPs of C, go to Step. Step : Reove the flags on all repeated CPs except those closest to the first and last CP of C. Step : If both flagged CPs reaining fro Step are ebers of the ax-list, flag any one (but only one) forer eber of the in-list whose flag was reoved in Step. Step : If both flagged CP reaining fro Step are ebers of the in-list, flag any one (but only one) forer eber of the ax-list whose flag was reoved in Step. Step : If all CP are flagged, go to Step 7. Step 5: Delete all non-flagged CP in C and, if N =, increent N by (i.e., N becoes N + ); otherwise, increent N by (i.e., N becoes N + ). Step 6: Go to Step. Step 7: End. N is the "depth" of the original contour C. Algorith Reviewed Contour Reduction Algorith IV. Equivalence Contour Class Prie For The equivalence contour class prie for is obtained with the algorith proposed by arvin and Laprade [7] (Algorith ). Algorith Equivalence Contour Class Prie For Algorith EQUIVALENCE-CONTOUR-CLASS-PRIE-FOR(cseg), where cseg is contour: Step : If necessary, translate the cseg so its content consists of integers fro to (n ), Step : If (n ) inus the last c-pitch is less than the first c-pitch, invert the cseg, Step : If the last c-pitch is less than the first c-pitch, retrograde the cseg. The ain feature of this prie for is the copactness in the contour beginning. This feature is inspired by the Post-Tonal Theory s set class prie for. The Contour Interval Succession 7 is a useful tool for how copact the beginning of the contour is. For instance, the contour A < > belongs to the sae class of its retrograde, inverted, and retrograded/inverted versions: R(A) < >, I(A) < > and RI(A) < >. Table contains the interval successions of these contours. The RI (A) version starts with the lowest positive value of the Contour Interval Succession. arvin and Laprade s algorith has soe conditions to invert and/or retrograde the contour to find the prie for of its equivalent class. 7 A sequence with the differences (or contour intervals) between adjacent CPs []. 8

12 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Table : Contour Interval Succession of contour A < >, R(A), I(A) and RI(A) Contour Contour Interval Sucession A < > [,,, ] R(A) < > [,,, ] I(A) < > [,,, ] RI(A) < > [,,, ] i. Algorith review This algorith, however, fails in 8 of 5 equivalent classes according to the arvin and Laprade table [7] (cf. prie for fails in Table ). Each of these classes has two prie fors. For instance, both contours A < > and RI(A) < > belong to the cseg-class 5-, but according to the arvin/laprade algorith, each one has a particular prie for. They are not changed by the algorith steps. Let the processing of the two contours A and RI(A) occur while coparing each step: Step : Both contour A and RI(A) are noralized. aintain the contour as being unchanged. Step : Both contours have the sae cardinality (N = 5), and the sae last CP (). Therefore, the condition (5 ) < is false. aintain both contours as being unchanged. Step : Both contours have the sae first () and last CP (). Thus, the condition < is false. aintain both contours as being unchanged. Hence, this algorith fails with soe classes. To fix this proble, we propose a new algorith that is tested using the arvin/laprade table (Algorith 5). Algorith 5 Equivalence Contour Class Prie for Algorith Reviewed EQUIVALENCE-CONTOUR-CLASS-PRIE-FOR-REVIEW(cseg), where cseg is the contour: Let the array arr: Step : Noralize cseg. Step : Get the result of inversion (I), retrogression (R), and retrogression-inversion (RI) and add the to arr. Step : Sort the array arr. Step : The prie for is the first contour of the array arr. V. Conclusions In this paper, we revealed probles with the Refined Contour Reduction and the Equivalence Class Prie For algoriths that lead the to fail with soe contour inputs. We deonstrated how and why these algoriths fail, as well as how to fix the issues, and we proposed alternative algoriths. The probles with the Refined Contour Reduction Algorith raised here do not allow for an output of the correct reduction of soe of the contours with cobined axia-inia like < >, and with strings of repeated axia (or inia) with intervening inia (or axia), such as < >. However, a review of the string definition and a sall change in the algorith s tenth step fixed these probles. The proble with the Equivalent Class Prie For Algorith led to it returning two prie fors for the sae class in 8 of the 5 arvin/laprade classes, as shown in the table showing the sae [7]. The alternative algorith proposed in this paper fixed this proble. 8

13 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. Table : Equivalent Class with Two Prie Fors Cseg class FP correta FP incorreta 5- < > < > 5-8 < > < > 5-5 < > < > 5-7 < > < > 6- < 5 > < 5 > 6-9 < 5 > < 5 > 6- < 5 > < 5 > 6-5 < 5 > < 5 > 6- < 5 > < 5 > 6-7 < 5 > < 5 > 6-5 < 5 > < 5 > 6-59 < 5 > < 5 > 6-5 < 5 > < 5 > 6-9 < 5 > < 5 > 6-5 < 5 > < 5 > 6-7 < 5 > < 5 > 6- < 5 > < 5 > 6-9 < 5 > < 5 > 6- < 5 > < 5 > 6-9 < 5 > < 5 > 6-78 < 5 > < 5 > 6-8 < 5 > < 5 > 6-8 < 5 > < 5 > 6-8 < 5 > < 5 > 6-8 < 5 > < 5 > 6-86 < 5 > < 5 > 6-88 < 5 > < 5 > 6-9 < 5 > < 5 > 8

14 usat: Brazilian Journal of usic and atheatics Deceber 6 Vol. I, No. References [] BEARD, R. D. (). Contour odeling by ultiple linear regression of the nineteen piano sonatas by ozart. Phd Dissertation, Florida State University. [] BOR,. (9). Contour reduction algoriths: a theory of pitch and duration hierarchies for post-tonal usic. Phd Dissertation, University of British Colubia. [] CLIFFORD, R. J. (995). Contour as a structural eleent in selected pre-serial works by Anton Webern. Phd Dissertation, University of Wisconsin-adison. [] FRIEDANN,. L. (985). A ethodology for the Discussion of Contour: Its Application to Schoenberg s usic. Journal of usic Theory, vol. 9, no. : pp. -8. [5] LEWIN, D. (7). Generalized usical intervals and transforations. Oxford University Press. [6] ARVIN, E. W. (988). A generalized theory of usical contour: its application to elodic and rhythic analysis of non-tonal usic and its perceptual and pedagogical iplications. Phd Dissertation, University of Rochester. [7] ARVIN, E. W., and LAPRADE, P. A. (987). Relating usical contours: Extensions of a Theory for Contour. Journal of usic Theory, vol., no. : pp [8] ORAES, T., and SAPAIO,. S. (5). Relações de contornos entre eleentos sonoros e visuais do jogo Super ario Bros. In: Proceedings of SBGae 5, pp [9] ORRIS, R. D. (987). Coposition with pitch-classes: A theory of copositional design. Yale University Press. [] ORRIS, R. D. (99). New Directions in the Theory and Analysis of usical Contour. usic Theory Spectru, vol. 5, no. : pp [] SAPAIO,. S. (). A Teoria de Relações de Contornos usicais: inconsistências, soluções e ferraentas. Tese de Doutorado, Universidade Federal da Bahia. [] SCHULTZ, R. D. (8). elodic Contour and Nonretrogradable Structure in the Birdsong of Olivier essiaen. usic Theory Spectru, vol., no. : pp [] SCHULTZ, R. D. (9). A diachronic-transforational theory of usical contour relations. Phd Dissertation, University of Washington. 85

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m]

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m] Localization based on Visibility Sectors using Range Sensors Sooyong Lee y Nancy. Aato Jaes Fellers Departent of Coputer Science Texas A& University College Station, TX 7784 fsooyong,aato,jpf938g@cs.tau.edu

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

KS3 Maths Progress Delta 2-year Scheme of Work

KS3 Maths Progress Delta 2-year Scheme of Work KS3 Maths Progress Delta 2-year Schee of Work See the spreadsheet for the detail. Essentially this is an express route through our higher-ability KS3 Maths Progress student books Delta 1, 2 and 3 as follows:

More information

THE rounding operation is performed in almost all arithmetic

THE rounding operation is performed in almost all arithmetic This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Wavelets for Computer Graphics: A Primer Part 1

Wavelets for Computer Graphics: A Primer Part 1 Wavelets for Coputer Graphics: A Prier Part Eric J. Stollnitz Tony D. DeRose David H. Salesin University of Washington Introduction Wavelets are a atheatical tool for hierarchically decoposing functions.

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Hangzhou, China, April 15-17, 2007 229 Fast Accuulation Lattice Algorith for Mining Sequential Patterns NANCY P. LIN, WEI-HUA

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Data pre-processing framework in SPM. Bogdan Draganski

Data pre-processing framework in SPM. Bogdan Draganski Data pre-processing fraework in SPM Bogdan Draganski Outline Why do we need pre-processing? Overview Structural MRI pre-processing fmri pre-processing Why do we need pre-processing? What do we want? Reason

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION 10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Abstract Matrix Arithmetic

Abstract Matrix Arithmetic Abstract Matrix Arithetic Alan P Sexton and Volker Sorge School of Coputer Science University of Biringha wwwcsbhaacuk/ aps vxs Stephen M Watt Coputer Science Departent University of Western Ontario wwwcsduwoca/

More information

Keyword Search in Spatial Databases: Towards Searching by Document

Keyword Search in Spatial Databases: Towards Searching by Document IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Classification of Benign and Malignant DCE-MRI Breast Tumors by Analyzing the Most Suspect Region

Classification of Benign and Malignant DCE-MRI Breast Tumors by Analyzing the Most Suspect Region Classification of Benign and Malignant DCE-MRI Breast Tuors by Analyzing the Most Suspect Region Sylvia Glaßer 1, Uli Nieann 1, Uta Prei 2, Bernhard Prei 1, Myra Spiliopoulou 3 1 Departent for Siulation

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Shape Optimization of Quad Mesh Elements

Shape Optimization of Quad Mesh Elements Shape Optiization of Quad Mesh Eleents Yufei Li 1, Wenping Wang 1, Ruotian Ling 1, and Changhe Tu 2 1 The University of Hong Kong 2 Shandong University Abstract We study the proble of optiizing the face

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Set Theoretic Estimation for Problems in Subtractive Color

Set Theoretic Estimation for Problems in Subtractive Color Set Theoretic Estiation for Probles in Subtractive Color Gaurav Shara Digital Iaging Technology Center, Xerox Corporation, MS0128-27E, 800 Phillips Rd, Webster, NY 14580 Received 25 March 1999; accepted

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Approaching the Skyline in Z Order

Approaching the Skyline in Z Order Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Error estimation of bathymetric grid models derived from historic and contemporary datasets 1 Introduction

Error estimation of bathymetric grid models derived from historic and contemporary datasets 1 Introduction Error estiation of bathyetric grid odels derived fro historic and conteporary datasets Martin Jakobsson, Brian Calder, Larry Mayer and Andy Arstrong Center for Coastal and Ocean Mapping, University of

More information

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract

More information

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK.

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK. Iage Processing for fmri John Ashburner Wellcoe Trust Centre for Neuroiaging, 12 Queen Square, London, UK. Contents * Preliinaries * Rigid-Body and Affine Transforations * Optiisation and Objective Functions

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS

More information

The Unit Bar Visibility Number of a Graph

The Unit Bar Visibility Number of a Graph The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal

More information

Depth Estimation of 2-D Magnetic Anomalous Sources by Using Euler Deconvolution Method

Depth Estimation of 2-D Magnetic Anomalous Sources by Using Euler Deconvolution Method Aerican Journal of Applied Sciences 1 (3): 209-214, 2004 ISSN 1546-9239 Science Publications, 2004 Depth Estiation of 2-D Magnetic Anoalous Sources by Using Euler Deconvolution Method 1,3 M.G. El Dawi,

More information

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model 1746 J. Opt. Soc. A. A/ Vol. 22, No. 9/ Septeber 2005 Y. J. Xiao and Y. F. Li Optiized stereo reconstruction of free-for space curves based on a nonunifor rational B-spline odel Yi Jun Xiao Departent of

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Vito R. Gervasi, Adam Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin

Vito R. Gervasi, Adam Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin GEOMETRY AND PROCEDURE FOR BENCHMARKING SFF AND HYBRID FABRICATION PROCESS RESOLUTION Vito R. Gervasi, Ada Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin ABSTRACT Since

More information