Finding Repeats With Fixed Gap

Size: px
Start display at page:

Download "Finding Repeats With Fixed Gap"

Transcription

1 Finding Repeats With Fixed Gap Roman Kolpakov, Gégoy Kucheov To cite this vesion: Roman Kolpakov, Gégoy Kucheov Finding Repeats With Fixed Gap 7th Intenational Symposium on Sting Pocessing Infomation Retieval - SPIR 2000, 2000, ouna, Spain, I ompute Society, pp , 2000 <inia > HAL Id: inia Submitted on 19 Oct 2006 HAL is a multi-disciplinay open access achive fo the deposit and dissemination of scientific eseach documents, whethe they ae published o not The documents may come fom teaching and eseach institutions in Fance o aboad, o fom public o pivate eseach centes L achive ouvete pluidisciplinaie HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau echeche, publiés ou non, émanant des établissements d enseignement et de echeche fançais ou étanges, des laboatoies publics ou pivés

2 Finding Repeats With Fixed Gap Roman Kolpakov Fench-Russian Institute fo Infomatics and Applied Mathematics Moscow Univesity Moscow, Russia Gegoy Kucheov LORIA/IRIA-Loaine 61, ue du Jadin Botanique BP Villes-lès-ancy, Fance Abstact We popose an algoithm fo finding in a wod all pais of occuences of the same subwod within a given distance The obtained complexity is, whee is the size of the output We also show how the algoithm can be modified in ode to find all such pais of occuences sepaated by a given wod The solution uses an algoithm fo finding all quasi-squaes in two stings, a poblem that genealizes the well-known poblem of seaching fo squaes 1 Intoduction Repetitions in wods ae impotant objects often playing a fundamental ole in combinatoial popeties of wods and thei applications to sting pocessing, such as compession [Sto88] o biological sequence analysis [Gus97] A geat deal of wok, in wod combinatoics and sting matching, has been devoted to contiguous epetitions, when a fagment is epeated contiguously two o moe times [o81, Sli83, o83, AP83, ML84, ML8, Mai89, Kos94, IMS97, SG98a, KK99b, SG98b, KK99a] A simplest fom of contiguous epetition is a squae (tandem epeat), which is a subwod of the fom On the othe hand, some applications bing up the poblem of finding subwods epeated in a wod in a possibly non-contiguous way As an example, it is well known that the suffix tee [Mc76, Ukk9] allows to easily compute the longest subwod occuing at least twice in a wod Moe about finding epeated subwods in a wod can be found in [Gus97] Pat of this wok has been done duing the fist autho s visit of LORIA/IRIA-Loaine in August-Octobe 1999, within a joint poject of the Fench-Russian AMLiapunov Institut of Applied Mathematics and Infomatics at Moscow Univesity A peliminay vesion of this wok has been published as IRIA eseach epot [KK00] An intemediate poblem, occuing fo example in molecula biology applications, consists in finding subwods epeated within some specified distance This poblem has been studied in a ecent pape [BLPS99] Moe pecisely, the poblem consideed was to find all subwods, whee the size of, called the gap, belongs to a specified inteval Using suffix tees togethe with binay seach tees, it has been shown in [BLPS99] that all such pais (of occuences of ) can be found in time, whee is the size of the output In this pape, we conside a esticted vesion of this poblem, when has a fixed size, and show that all epeated occuences of with a gap equal to can be found in time The appoach we use is simila to the one used in [Mai89, KK99a] fo finding so-called maximal (contiguous) epetitions It is based on two ideas The fist one is a special factoization of the wod Slightly diffeent definitions of this factoization ae known unde the name s-factoization [o83] (f-factoization in [R94]), o Lempel-Ziv factoization [Gus97], because of its use in the well-known Lempel-Ziv compession method [LZ76, ZL77] In this pape, fo pesentation puposes, we use the Lempel-Ziv factoization The second component of ou method is longest common extension functions [ML84] To illustate the idea, assume we ae given two wods!#", and want to compute, fo each position $ of %", the length of the longest pefix of which occus at position $ in %" A vaiation of the Knuth-Mois-Patt algoithm (see [ML84, R94]) allows to compute all these lengths in time ( " This computation, unde diffeent vaiants, appeaed to be vey useful in seveal sting matching poblems [o83, ML84, Mai89, KK99a, SG98b] Afte giving basic definitions in Section 2, we fist conside a poblem of finding quasi-squaes in two wods This poblem, which plays an auxiliay ole in this pape, genealizes the poblem of finding usual squaes in a wod and is

3 inteesting on its own In Section 3, we popose an efficient solution to this poblem Then, in Section 4, we pesent an algoithm fo finding all epeats with a fixed gap Finally, in Section we show how this algoithm can be modified to find all epeated subwod occuences with a fixed wod between them 2 Definitions onside a wod denotes the length of $, fo $, denotes the subwod povided that $, and the empty wod othewise A position $ in is an intege numbe between and, associated to the factoization, whee $ A subwod of is said to stat (espectively end) at position $ if is a pefix of (espectively suffix of ) A subwod contains position $ if it stats at a position smalle o equal than $, and ends at a position geate o equal than $ Fo a set, denotes the cadinality of Let "! be a given intege An occuence in of subwod #, whee! and, is called an -gapped epeat (fo shot, -epeat) in The fist occuence of is called the left oot, and the second the ight oot Fo an -epeat #, the length is denoted $ # 3 Finding quasi-squaes in two wods In this section we conside an auxiliay poblem, which howeve is inteesting on its own, as it genealizes the wellknown poblem of finding all squaes in a wod Assume we ae given two wods of equal length,, % We say that wods contain a quasi-squae iff fo some ()* and $! we have +, $-/01 $2 $-/0 By analogy to usual squaes, $ is called the peiod of the quasi-squae, and wods + $3-"4 $2, $6-0 ae called espectively its left oot and ight oot xample 1 The pai+"789:;< =)89:;: contains five quasi-squaes, with oots 9 (> ), (? ), ; (( ), (@"A ), ;: (@/A ) Given two wods, the poblem is to find all quasi-squaes in them lealy, this genealizes the poblem of finding all squaes in a wod which coesponds to finding all quasisquaes in two equal wods Recall that finding all squaes in a wod is a poblem which has been extensively studied Since the numbe of all squaes can be ", one way is to conside only pimitively-ooted squaes, of which the numbe is, o othe epetitive stuctues, such as maximal intege o maximal factional epetitions 1 Seveal algoithms [o81, AP83, ML84] allow to find all such 1 Fomal definitions of these notions can be found in [KK99b] stuctues in time ach of these algoithms is able to extact all squaes in time, whee is the numbe of output squaes (see also [SG98a]) On the othe hand, ochemoe [o83] poposed an algoithm to test, in linea time, if a wod contains at least one squae Using the technique poposed in [KK99a], this algoithm can be actually extended to find all squaes in time This bound was claimed in [Kos94], and follows fom late woks [SG98b, KK99a] Denote B the set of all quasi-squaes of wods We show that B can be computed in time, whee B The algoithm we popose is based only on longest common extension functions and does not use suffix tee-like data stuctues It is simila to the algoithm of [ML84] fo finding all epetitions An advantage of the poposed solution is that the output quasi-squaes ae natually gouped into families of quasi-squaes with the same oot length and stating at successive positions in the wod 2 In xample 1, the quasisquaes with oots 8 and 8 fom such a family, as they both have length 3 and ae shifted by one lette one with espect to the othe We will use this featue of the algoithm in Section Assume D, and denote B F the subset of B consisting of those quasi-squaes which contain position To pove the bound, it is sufficient to show that all quasi-squaes fom B 2 can be found in time B F Decompose B F into two subsets B HG and B JI containing position espectively in the left oot and the ight oot onside the set B HG (B JI is teated similaly) Let +, $@-0 $2 $?-K4 be a quasisquae fom B JG with peiod $, that is * $6-" Define LMO $ to be the length of the longest common pefix of wodsp and $ :, and L RQ $ to be the length of the longest common suffix of : $7 Fom the consideed quasisquae, it is easily seen that LSMO $ L RQ $ % $ (see Figue 1) Vice vesa, if fo some $T>;, LSMO $ L JQ $ % $, then thee exists a quasi-squae with peiod $ fom B HG Moe pecisely, the following Lemma holds Lemma 1 Fo $UV4, thee exists a quasi-squae of B HG with peiod $ iff LMO $ L RQ $ % $ When this inequality holds, thee is a family of quasisquaes with peiod $ fom B G, with the left oots stating at positions -WL JQ $ OX(Ÿ Z7[ LSMO $ \$F]9- $9 To use Lemma 1 as an algoithm fo computing B HG, we have to compute values 2 This families ae analogous to uns of squaes in [IMS97, SG98a] 2

4 m LSF(p) LPR(p) w = left oot LSF(p) LPR(p) w"= ight oot p Figue 1 Finding quasi-squaes LSMO $ L JQ $ fo $ ; All these values can be computed efficiently in time using a vaiation of the Knuth-Mois-Patt sting matching algoithm We efe to [ML84, R9] fo details of how this can be done We conclude that the quasi-squaes of B RG can be computed in time B JG Similaly, all quasi-squaes of B I can be computed in time B RI, and theefoe all quasi-squaes of B in time B A s- taightfowad divide-and-conque algoithm gives the unning time B fo finding all quasisquaes in Theoem 1 The set B of all quasi-squaes in wods can be found in time B 4 Finding epeats with a fixed gap We now tun to ou main poblem finding all -epeats in a given wod We fist define the Lempel-Ziv factoization Definition 1 The Lempel-Ziv factoization of a wod is ecusively defined as follows: %, fo $ ;,, whee is the longest wod, occuing at least twice in, and is the lette following the pefix % in (in othe wods, + is the shotest wod which occus only as a suffix in % % ) xample 2 The Lempel-Ziv factoization of the wod ;9:;7;9:;7; is 7; 89: The Lempel-Ziv factoization is diectly elated to the Lempel-Ziv compession algoithm [ZL77] and to the undelying definition of complexity of a sting [LZ76] A salient popety of Lempel-Ziv factoization is that it can be computed in time This can be done using the suffix tee data stuctue [Mc76, Ukk9], developed in the context of sting matching applications (see [RP81]) 3 onvesely, the Lempel-Ziv factoization (and its close elative the s-factoizaiton [o83]) tuned out itself to be useful in sting matching applications elated to the seach fo epetitions in the wod [Mai89, KK99a, SG98b] This pape gives anothe example of such an application Let be a wod of length Without loss of geneality, we assume that does not occu elsewhee in Assume we computed the Lempel-Ziv factoization fo Fist, we intoduce some notation Let 44; be the positions delimiting = s, that is, and H <4;!+ fo $ We also denote +, $ 4 Fo evey $( ; O-), define, if!, and 6, if To simplify the pesentation, we assume that $S fo $S, whee is a lette not belonging to the alphabet Let us split the set of all -epeats into the set O of those -epeats which contain positions 4 and the set W of the emaining -epeats (Obviously, an -epeat cannot contain because of the assumption about the last lette, and if it contains, it also contains ) We now concentate on the -epeats of O, and futhe split O into (disjoint) subsets O, $ ; O-, so that W consists of those -epeats which contain but don t contain Futhemoe, each W is split into the following subsets: (a) #T G I iff the left oot of # contains, (b) #T II iff the ight oot of # contains, 3 We note that the Lempel-Ziv factoization can also be computed in linea time with the DAWG data stuctue [BBH 8, o86] 3

5 $ p+ w= LPR LSF i (p) i (p) LPR LSF i (p) i (p) left oot ight oot e ^ i e i+1 e i Figue 2 ase (a) p+ w= RSF i (p) left oot RPR i (p) RSF i (p) ight oot RPR i (p) e i e i+1 Figue 3 ase (b) (c) # I iff the ight oot of # contains, but does not contain, (d) # iff the ight oot of # contains neithe, no ases (a) and (b) cove the situation when is contained in the left (espectively ight) oot of # Othewise, is contained in the gap between the oots ases (c) and (d) distinguish whethe the ight oot contains o not (note that (c) is not possible if, as # does not contain ) We now conside sepaately -epeats belonging to each of the cases (a)-(d) and show how to find them (a) Finding -epeats of G I Let # U G I and $ # $ Since # does not contain, then $, and theefoe $ O- - In paticula, G I is empty wheneve Assume now that! Define LMOP $ to be the length of the longest common pefix of + and + $ - 0, and L RQ $ to be the length of the longest common suffix of F $9 and the suffix of <4; + of length $ Fom the -epeat #, it is easily seen that L RQ $ LSMO $ % $ The situation is depicted on Figue 2 onvesely, if fo some $ : - -, L RQ $ # LSMO $ % $, then thee exists a family of -epeats of G I with the oot length $, stating at positions - L JQ $ X(Ÿ Z=[ LSMOP $ -6$F]; We summaize the above in the following lemma Lemma 2 Thee exists an -epeat G I with oot length $ ($ - =- ) iff L RQ $ LMO $ % $ When this inequality holds, all such -epeats stat at positions F-UL JQ $ X(Y Z=[ LSMOP $ - $2]4 Lemma 2 suggests a method of computing G I ompute the longest common extension functions L RQ $ and LSMO $ fo all $ - - This computation can be done in time linea on the length of involved wods, that is in time, using the Knuth-Mois-Patt technique (see Section 3) Then all -epeats of G I can be output using Lemma 2 The whole computation takes time G I (b) Finding -epeats of II onside # I I with # $ Fom Definition 1 of Lempel-Ziv factoization it follows that the ight oot of # stats to the ight of % On the othe hand, fom the definition of I I, it ends to the left of Theefoe, U$T - We poceed similaly to case (a), and define longest common extension functions WMOW $ and JQ $ fo $ : - WMOP $ is defined as the length of the longest common pefix of = - 0 and P- -/$ -, and JQ $ as the length of the longest common suffix of and the suffix of - -T$7 of length - Similaly to case (a), the following Lemma holds (see Figue 3) Lemma 3 Thee exists an -epeat # II with oot length $ ($ - ) iff WMO $ # RQ $ % $ When this inequality holds, the ight oots of all such -epeats stat at positions - X(Ÿ ZF[ RQ $ $2]: WMO $ - $7 Again, functions WMO and JQ can be computed in time linea in the length of involved wods, that is in time Theefoe, all -epeats of I I can be epoted in time II 4

6 p MSF i (p) MPR i (p) MSF i (p) MPR i (p) w= left oot ight oot e i e^ i e i+1 Figue 4 ase (c) w= left oot e i ight oot e^ i=e i+1 w ### ### w" Figue ase (d) (c) Finding -epeats of I ote that this case is defined only when, that is when! onside # / I with $ # $ The ight oot of # lies inside - 0, and theefoe $ - Using the same appoach, we define MOO $ to be the length of the longest pefix of = - 0 and -K$, and JQ $ to be the length of the longest suffix of = and the suffix of : F- $7 of length - The following Lemma holds (see Figue 4) Lemma 4 Thee exists an -epeat # V I with oot length $ ($ - ) iff MO $ JQ $ % $ When this inequality holds, the ight oots of all such - epeats stat at positions - X(Y Z=[ JQ $ \$F]: MO $ - $7 Functions MO and JQ $ can be computed in time and all -epeats of I can be epoted in time I (d) Finding -epeats of onside now # with $T $ # Denote H 2- J X Ÿ Z=[ 8] The ight oot of # lies inside = - 4, and theefoe $6 =- This case diffes fom cases (a)-(c) in that we cannot a pioi select a position contained in the ight (o left) oot of # Theefoe, we cannot apply diectly the technique of longest common extension functions We educe this case to the poblem of finding quasi-squaes, consideed in Section 3 Since the stat position of the ight oot is contained in the wod -0, the end position of the left oot is contained in the wod - :-*H- Since $T -, the left oot of # is contained in the wod " H- The length of is D - Let # be anothe fesh lette Denote by the wod? -0 The constuction is illustated in #" Figue (case ) Lemma Thee exists an -epeat # iff thee exists a quasi-squae in wodsp ach such quasisquae coesponds to an -epeat #T Theefoe, thee is a one-to-one coespondence between the set and the set of quasi-squaes in the wods constucted above Moeove, a quasi-squae with the left oot stating at position inp coesponds to an -epeat stating at position =- - A in By Theoem 1, all those quasi-squaes can be found in time R We conclude that all -epeats of can be epoted in time R, which, using X(Y Z=[ ], we estimate as Putting togethe cases (a)-(d), all -epeats of can be found in time ( W Summing up ove all $, we obtain that all -epeats of can be found in time W Finding -epeats of W can be done using a technique simila to the one used in [KK99a] The key obsevation hee is that each -epeat of O occus inside some facto (ie does not contain positions and ) By definition of the factoization, each such -epeat is a copy of anothe -epeat occuing to the left When constucting the Lempel-Ziv factoization, we can stoe, fo each facto, a efeence to an occuence of to the left (see Definition 1) Afte finding all -epeats of, we sot

7 them, using basket sot, in inceasing ode of thei stat position and, fo each stat position, in inceasing ode of thei oot length Then we pocess all factos fom left to ight and fo each facto, copy coesponding ealie found -epeats occuing in the efeenced copy of We efe the eade to [KK99a] fo full details The unning time of this stage is O We conclude with the final esult Theoem 2 The set of all -epeats in a wod can be found in time We end this section by noting that when (that is, usual squaes ae looked fo), only cases (a),(b) emain to be dealt with The algoithm we obtain is actually the algoithm of ochemoe [o83] allowing to find, in linea time, all squaes containing facto bodes, augmented with the technique of [KK99a] allowing to find the emaining squaes (cf Section 3) Thus, we obtain an algoithm fo finding all squaes The same algoithm woks fo, since in this case too, cases (a),(b) cove all possible elative positions of -epeats and facto bodes Finding -epeats with a fixed gap wod The algoithm pesented in Section 4 can be modified in ode to find all -epeats with a fixed wod between the two oots Assume is a fixed wod of length Denote by the set of -epeats of the fom, whee % We show that all those epeats can be found in time To do that, we fist find, using any linea-time sting matching algoithm (fo example, the Knuth-Mois-Patt algoithm) all stat occuences of in Fo each position $ of, we compute the position $, defined as the neaest stat position of stictly to the ight of $ Fom the algoithm of Section 4 fo finding the set, it should be clea that all the -epeats of can be epesented by families each consisting of -epeats with a given oot length and stating at all positions fom a given inteval In othe wods, each family can be specified by an inteval $ and a numbe $, and encodes all -epeats with oot length $ stating at positions fom $ Fom this specification, using function $, we can easily extact all -epeats of in time popotional to the numbe of those Fo that, we fist assume that each family is specified by an inteval of end positions of the left oot (as the oot length $ is known fo each family, the tanslation can be tivially computed by just adding $ to the inteval of stat positions) Then we pocess all the families and extact fom each inteval those positions which ae stat positions of an occuence of Using function, this can be easily done in time popotional to the numbe of such positions Afte pocessing all families, we have found all -epeats fom the set W "W in time # W Then, using a pocedue fo finding -epeats fom, descibed in Section 4, we find all -epeats fom O > P in time As, all -epeats fom ae found in time 6 onclusions An inteesting natual question is whethe all -epeats can be found in time The bottleneck implying the facto comes fom the poblem of finding quasi-squaes an all quasi-squaes be found in time B? Refeences [AP83] A Apostolico and FP Pepaata Optimal offline detection of epetitions in a sting Theoetical ompute Science, 22(3):297 31, 1983 [BBH 8] A Blume, J Blume, D Haussle, A henfeucht, M T hen, and J Seifeas The smallest automaton ecognizing the subwods of a text Theoetical ompute Science, 40:31, 198 [BLPS99] G Bodal, R Lyngsø, h Pedesen, and J S- toye Finding maximal pais with bounded gap In M ochemoe and M Pateson, editos, Poceedings of the 10th Annual Symposium on ombinatoial Patten Matching, volume 164 of Lectue otes in ompute Science Spinge-Velag, 1999 [R94] [R9] M ochemoe and W Rytte Text algoithms Oxfod Univesity Pess, 1994 M ochemoe and W Rytte Squaes, cubes, and time-space efficient sting seaching Algoithmica, 13:40 42, 199 [o81] M ochemoe An optimal algoithm fo computing the epetitions in a wod Infomation Pocessing Lettes, 12:244 20, 1981 [o83] M ochemoe Recheche linéaie d un caé dans un mot omptes Rendus Acad Sci Pais Sé I Math, 296: , 1983 [o86] M ochemoe Tansduces and epetitions Theoetical ompute Science, 4:63 86, 1986 [Gus97] D Gusfield Algoithms on Stings, Tees, and Sequences ambidge Univesity Pess,

8 [IMS97] [KK99a] S Iliopoulos, D Mooe, and WF Smyth A chaacteization of the squaes in a Fibonacci sting Theoetical ompute Science, 172: , 1997 R Kolpakov and G Kucheov Finding maximal epetitions in a wod in linea time In Poceedings of the 1999 Symposium on Foundations of ompute Science, ew Yok (USA) I ompute Society, Octobe [KK99b] R Kolpakov and G Kucheov On maximal epetitions in wods In Poceedings of the 12- th Intenational Symposium on Fundamentals of omputation Theoy, 1999, Iasi (Romania), Lectue otes in ompute Science, August 30 - Septembe [KK00] Roman Kolpakov and Gegoy Kucheov Finding epeats with fixed gap Technical Repot RR-3901, IRIA, Mach 2000 [Kos94] S R Kosaaju omputation of squaes in sting In M ochemoe and D Gusfield, editos, Poceedings of the th Annual Symposium on ombinatoial Patten Matching, numbe 807 in Lectue otes in ompute Science, pages Spinge Velag, 1994 [SG98a] J Stoye and D Gusfield Simple and flexible detection of contiguous epeats using a suffix tee In M Faach-olton, edito, Poceedings of the 9th Annual Symposium on ombinatoial Patten Matching, numbe 1448 in Lectue otes in ompute Science, pages Spinge Velag, 1998 [SG98b] J Stoye and D Gusfield Linea time algoithms fo finding and epesenting all the tandem epeats in a sting Technical Repot S- 98-4, ompute Science Depatment, Univesity of alifonia, Davis, 1998 [Sli83] [Sto88] AO Slisenko Detection of peiodicities and sting matching in eal time Jounal of Soviet Mathematics, 22: , 1983 JA Stoe Data ompession: Methods and Theoy ompute Science Pess, Rockville, MD, 1988 [Ukk9] Ukkonen On-line constuction of suffix tees Algoithmica, 14(3): , 199 [ZL77] J Ziv and A Lempel A univesal algoithm fo sequential data compession I Tans Inf Theoy IT-23, 3: , May 1977 [LZ76] A Lempel and J Ziv On the complexity of finite sequences I Tans Inf Theoy IT- 22, pages 7 81, Jan 1976 [Mai89] M G Main Detecting leftmost maximal peiodicities Discete Applied Mathematics, 2:14 13, 1989 [Mc76] M Mceight A space-economical suffix tee constuction algoithm Jounal of the AM, 23(2): , 1976 [ML84] MG Main and RJ Loentz An algoithm fo finding all epetitions in a sting Jounal of Algoithms, (3): , 1984 [ML8] MG Main and RJ Loentz Linea time ecognition of squae fee stings In A A- postolico and Z Galil, editos, ombinatoial Algoithms on Wods, volume 12 of ATO Advanced Science Institutes, Seies F, pages Spinge Velag, 198 [RP81] M Rodeh, VR Patt, and S ven Linea algoithm fo data compession via sting matching Jounal of the AM, 28(1):16 24, Jan

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

zeo, i.e., each watchman emains stationay, and we have the at galley poblem. At the othe limit, if m = 1, we have the watchman oute poblem. Anothe con

zeo, i.e., each watchman emains stationay, and we have the at galley poblem. At the othe limit, if m = 1, we have the watchman oute poblem. Anothe con Optimum Guad Coves and m-watchmen Routes fo Resticted Polygons Svante Calsson y Bengt J. Nilsson yz Simeon Ntafos x Abstact A watchman, in the teminology of at galleies, is a mobile guad. We conside seveal

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

3D Periodic Human Motion Reconstruction from 2D Motion Sequences

3D Periodic Human Motion Reconstruction from 2D Motion Sequences 3D Peiodic Human Motion Reconstuction fom D Motion Sequences Zonghua Zhang and Nikolaus F. Toje BioMotionLab, Depatment of Psychology Queen s Univesity, Canada zhang, toje@psyc.queensu.ca Abstact In this

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

CONJUGATE SU(r)-CONNECTIONS AND HOLONOMY GROUPS

CONJUGATE SU(r)-CONNECTIONS AND HOLONOMY GROUPS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 18, Numbe 3, Pages 865 871 S 000-9939(99)05457-X Aticle electonically published on Septembe 9, 1999 CONJUGATE SU()-CONNECTIONS AND HOLONOMY GROUPS

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Properties of Tilings by Convex Pentagons

Properties of Tilings by Convex Pentagons eview Foma, 1, 113 18, 006 Popeties of Tilings by Convex Pentagons Teuhisa SUGIMOTO 1 * and Tohu OGAWA,3 1 The Institute of Statistical Mathematics, 4-6-7 Minami-Azabu, Minato-ku, Tokyo 106-8569, Japan

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Web scale image retrieval using compact tensor aggregation of visual descriptors

Web scale image retrieval using compact tensor aggregation of visual descriptors Web scale image etieval using compact tenso aggegation of visual desciptos Romain Negel, David Picad, Philippe-Heni Gosselin To cite this vesion: Romain Negel, David Picad, Philippe-Heni Gosselin. Web

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Compiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany

Compiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany Compile-based Implementation of Syntax-Diected Functional Pogamming Katia Gladitz ehstuhl fu Infomatik II, RWTH Aachen Ahonstae 55, W{5100 Aachen, Gemany Heinz Fabende and Heiko Vogle Abt. Theoetische

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

New Algorithms for Daylight Harvesting in a Private Office

New Algorithms for Daylight Harvesting in a Private Office 18th Intenational Confeence on Infomation Fusion Washington, DC - July 6-9, 2015 New Algoithms fo Daylight Havesting in a Pivate Office Rohit Kuma Lighting Solutions and Sevices Philips Reseach Noth Ameica

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Multidimensional Fuzzy Association Rules for Developing Decision Support System at Petra Christian University

Multidimensional Fuzzy Association Rules for Developing Decision Support System at Petra Christian University Multidimensional Fuzzy ssociation Rules fo eveloping ecision Suppot System at Peta histian Univesity Yulia 1, Siget Wibisono 2, Rolly Intan 1 1,2 Peta histian Univesity, Suabaya, Indonesia 1 {yulia, intan}@peta.ac.id,

More information

vaiation than the fome. Howeve, these methods also beak down as shadowing becomes vey signicant. As we will see, the pesented algoithm based on the il

vaiation than the fome. Howeve, these methods also beak down as shadowing becomes vey signicant. As we will see, the pesented algoithm based on the il IEEE Conf. on Compute Vision and Patten Recognition, 1998. To appea. Illumination Cones fo Recognition Unde Vaiable Lighting: Faces Athinodoos S. Geoghiades David J. Kiegman Pete N. Belhumeu Cente fo Computational

More information

Functional Dependencies in OWL ABoxes

Functional Dependencies in OWL ABoxes Functional Dependencies in OWL ABoxes Jean-Paul Calbimonte, Fabio Poto, C. Maia Keet 3 École Polytechnique Fédéale de Lausanne (EPFL) Database Laboatoy - Switzeland jean-paul.calbimonte@epfl.ch National

More information

17/5/2009. Introduction

17/5/2009. Introduction 7/5/9 Steeo Imaging Intoduction Eample of Human Vision Peception of Depth fom Left and ight eye images Diffeence in elative position of object in left and ight eyes. Depth infomation in the views?? 7/5/9

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

ASSIGN 01: Due Monday Feb 04 PART 1 Get a Sketchbook: 8.5 x 11 (Minimum size 5 x7 ) fo keeping a design jounal and a place to keep poject eseach & ideas. Make sue you have you Dopbox account and/o Flash

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Pledge: Signature:

Pledge: Signature: S/PM 0 Final Exam 7 May 005 Name: KEY E-mail ID: @viginia.edu Pledge: Signatue: Thee ae 80 minutes 3 hous fo this exam and 80 oints on the test; don t send too long on any one uestion! Thee is an exam

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information