Chapter 8: Adaptive Networks

Size: px
Start display at page:

Download "Chapter 8: Adaptive Networks"

Transcription

1 Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and Machine Intelligence, First Edition, Prentice Hall, 17 Introduction (.1) Almost all kinds of Neural Networks aradigms with suervised learning caabilities are unified through adative networks Nodes are rocess units. Causal relationshis between the connected nodes are eressed with links All or art of the nodes are adative, which means that the oututs of these nodes are driven by modifiable arameters ertaining to these nodes Ch. : Adative Networks 1

2 Introduction (.1) (cont.) A learning rule elains how these arameters (or weights) should be udated to minimize a redefined error measure The error measure comutes the discreancy between the network s actual outut and a desired outut The steeest descent method is used as a basic learning rule. It is also called backroagation Architecture (.2) Definition: An adative network is a network structure whose overall inut-outut behavior is determined by a collection of modifiable arameters The configuration of an adative network is comosed of a set of nodes connected by direct links Each node erforms a static node function on its incoming signals to generate a single node outut Each link secifies the direction of signal flow from one node to another Ch. : Adative Networks 2

3 A feedforward adative network in layered reresentation Eamle 1 : Parameter sharing in adotive network A single node Parameter sharing roblem Ch. : Adative Networks 3

4 Architecture (.2) cont.) There are 2 tyes of adotive networks Feedforward (acyclic directed grah such as in fig..1) Recurrent (contains at least one directed cycle) A recurrent adative network Ch. : Adative Networks 4

5 Architecture (.2) (cont.) Static Maing A feedforward adative network is a static maing between its inuts and outut saces This maing may be linear or highly nonlinear Our goal is to construct a network for achieving a desired nonlinear maing Architecture (.2) (cont.) Static Maing (cont.) This nonlinear maing is regulated by a data set consisting of desired inut-outut airs of a target system to be modeled: this data set is called training data set The rocedures that adjust the arameters to imrove the network s erformance are called the learning rules Ch. : Adative Networks 5

6 Architecture (.2) (cont.) Static Maing (cont.) Eamle 2: An adative network with a single linear node 3 f 3 ( 1, 2 ; a 1, a 2, a 3 ) a 1 1 a 2 2 a 3 where: 1, 2 are inuts; a 1, a 2 and a 3 are modifiable arameters A linear single-node adative network Ch. : Adative Networks 6

7 Architecture (.2) (cont.) Static Maing (cont.) Identification of arameters can be erformed through the linear least-squares estimation method of chater 5 Eamle 3: Percetion network 3 f 3 ( 1, 2 ; a 1, a 2, a 3 ) a 1 1 a 2 2 a 3 and 4 f 4 ( 1 ) 0 if if (f 4 is called a ste function) < 0 A nonlinear single-node adative network Ch. : Adative Networks 7

8 Architecture (.2) (cont.) The ste function is discontinuous at one oint (origine) and flat at all other oints, it is not suitable for derivative based learning rocedures use of sigmoidal function Sigmoidal function has values between 0 and 1 and is eressed as: 1 4 f4(3 ) 1 e 3 ( ) Sigmoidal function is the building-block of the multi-layer ercetron Architecture (.2) (cont.) Eamle 4: A multilayer ercetron 7 1 e [ ( w w w t )] 4,7 4 where 4, 5 and 6 are oututs from nodes 4, 5 and 6 resectively and the set of arameters of node 7 is {w 4,7, w 5,7, w 6,7, t 7 } 1 5,7 5 6,7 6 7 Ch. : Adative Networks

9 A neural network Backroagation for Feedforward Networks (.3) Basic learning rule for adative networks It is a steeest descent-based method discussed in chater 6 It is a recursive comutation of the gradient vector in which each element is the derivative of an error measure with resect to a arameter The rocedure of finding a gradient vector in a network structure is referred to as backroagation because the gradient vector is calculated in the direction oosite to the flow of the outut of each node Ch. : Adative Networks

10 Backroagation for Feedforward Networks (.3) (cont.) Once the gradient is comuted, regression techniques are used to udate arameters (weights, links) Notations: Assume we have L layers (l 0, 1,, L 1) N(l) reresents the number of nodes in layer l l,i reresents the outut of node i in layer l (i 1,, N(l)) f l,i reresents the function of node i Backroagation for Feedforward Networks (.3) (cont.) Princile Since the outut of a node deends on the incoming signals and the arameter set of the node, we can write: l,i fl,i (l 1,1,l 1,2,..., l 1,N(l 1), α, β, γ,...) where α, β, γ,, are the arameters of this node. Ch. : Adative Networks 10

11 A layered reresentation Backroagation for Feedforward Networks (.3) (cont.) Princile (cont.) Let assume that the training set has P atterns, therefore we define an error for the th attern as: E N(L) ( dk L,k ) k 1 Where: d k is the k-th comonent of the th desired outut vector and L,K is the k-th comonent of the redicted outut vector roduced by resenting the th inut vector to the network The task is to minimize an overall measure defined as: P E E 1 2 Ch. : Adative Networks 11

12 Backroagation for Feedforward Networks (.3) (cont.) Princile (cont.) To use the steeest descent to minimize E, we have to comute E (gradient vector) Causal Relationshis Change in arameter α Change in oututs of nodes containing α Change in network s outut Change in error measure Backroagation for Feedforward Networks (.3) (cont.) Princile (cont.) Therefore, the basic concet in calculating the gradient vector is to ass a form of derivative information starting from the outut layer and going backward layer by layer until the inut layer is attained Let s define as the error signal on ε l,i E the node i in layer l (ordered derivative) l,i Ch. : Adative Networks 12

13 Backroagation for Feedforward Networks (.3) (cont.) Princile (cont.) Eamle: Ordered derivatives and ordering artial derivatives Consider the following adative network Ordered derivatives & ordinary artial derivatives z g(, y) y f() Ch. : Adative Networks 13

14 Backroagation for Feedforward Networks (.3) (cont.) For the ordinary artial derivative, z g(, y) and y are assumed indeendent without aying attention that y f() For the ordered derivative, we take the indirect causal relationshi into account, z g(,f()) g(, y) g(, y) y f () y y The gradient vector is defined as the derivative of the error measure with resect to the arameter variables. If α is a arameter of the ith node at layer l, we can write: E α E l,i f * α l,i ε l,i f α l,i f () Where ε l,i is comuted through The indirect causal relationshi f * Backroagation for Feedforward Networks (.3) (cont.) The derivative of the overall error measure E with resect to α is: E α P 1 E α Using a steeest descent scheme, the udate for α is: E αnet αnow η α Ch. : Adative Networks 14

15 Backroagation for Feedforward Networks (cont.) Eamle.6 Adative network and its error roagation model In order to calculate the error signals at internal nodes, an error-roagation network is built Error roagation model Ch. : Adative Networks 15

16 Ch. : Adative Networks 16 Backroagation for Feedforward Networks (.3) (cont.) { { w,7 7 w, f f f * E f * E E ) 2(d E E ) 2(d E E ε ε ε ε ε Backroagation for Feedforward Networks (.3) (cont.) There are 2 tyes of learning algorithms: Batch learning (off-line learning): the udate for α takes lace after the whole training data set has been resented (one eoch) On-line learning (attern-by-attern learning): the arameters α are udated immediately after each inut outut air has been resented

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Parimala, A., Asstt. Prof., Det. of Telecommunication, MSRIT; Jain University Research Scholar, Bangalore. Raol, J. R., Prof. Emeritus,

More information

FLIGHT CONTROL BY MEANS OF ARTIFICIAL INTELIGENCE

FLIGHT CONTROL BY MEANS OF ARTIFICIAL INTELIGENCE FLIGHT CONTROL BY MEANS OF ARTIFICIAL INTELIGENCE Ing. Michal Turčaník, PhD. NAO Litovský Mikuláš, 031 01 Abstract Nonlinear redictable sstems can be controlled b recurrent neural networks (RNN). Recurrent

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

A Concise Workbook for College Algebra

A Concise Workbook for College Algebra City University of New York (CUNY) CUNY Academic Works Oen Educational Resources Queensborough Community College Summer 6--08 A Concise Workbook for College Algebra Fei Ye Queensborough Community College

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A NN Image Classification Method Driven by the Mixed Fitness Function

A NN Image Classification Method Driven by the Mixed Fitness Function Comuter and Information Science November, 2009 A NN Image Classification Method Driven by the Mixed Fitness Function Shan Gai, Peng Liu, Jiafeng Liu & Xianglong Tang School of Comuter Science and Technology,

More information

CS 450: COMPUTER GRAPHICS 2D TRANSFORMATIONS SPRING 2016 DR. MICHAEL J. REALE

CS 450: COMPUTER GRAPHICS 2D TRANSFORMATIONS SPRING 2016 DR. MICHAEL J. REALE CS 45: COMUTER GRAHICS 2D TRANSFORMATIONS SRING 26 DR. MICHAEL J. REALE INTRODUCTION Now that we hae some linear algebra under our resectie belts, we can start ug it in grahics! So far, for each rimitie,

More information

Approximate Star-Shaped Decomposition of Point Set Data

Approximate Star-Shaped Decomposition of Point Set Data Eurograhics Symosium on Point-Based Grahics (2007) M. Botsch, R. Pajarola (Editors) Aroimate Star-Shaed Decomosition of Point Set Data Jyh-Ming Lien George Mason University, Fairfa, Virginia, USA Abstract

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION

EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION ISSN 76-459 Int j simul model 6 (7), 4-3 Original scientific aer EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION Li, Q.; Sato, I. & Murakami, Y. GSJ/AIST - National Institute of Advanced

More information

Multiple optimal learning factors for feed-forward networks

Multiple optimal learning factors for feed-forward networks Please verify that () all ages are resent, () all figures are accetable, (3) all fonts and secial characters are correct, and (4) all text and figures fit within the Multile otimal learning factors for

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

A Deep Architecture for Matching Short Texts

A Deep Architecture for Matching Short Texts A Dee Architecture for Matching Short Texts Zhengdong Lu Noah s Ark Lab Huawei Technologies Co. Ltd. Sha Tin, Hong Kong Lu.Zhengdong@huawei.com Hang Li Noah s Ark Lab Huawei Technologies Co. Ltd. Sha Tin,

More information

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch Decision Science Letters 7 (2018) 301 310 Contents lists available at GrowingScience Decision Science Letters homeage: www.growingscience.com/dsl The degree constrained k-cardinality minimum sanning tree

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Simple example. Analysis of programs with pointers. Points-to relation. Program model. Points-to graph. Ordering on points-to relation

Simple example. Analysis of programs with pointers. Points-to relation. Program model. Points-to graph. Ordering on points-to relation Simle eamle Analsis of rograms with ointers := 5 tr := @ *tr := 9 := rogram S1 S2 S3 S4 deendences What are the deendences in this rogram? Problem: just looking at variable names will not give ou the correct

More information

GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES

GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES AIAA Modeling and Simulation Technologies Conference and Exhibit 5-8 August 22, Monterey, California AIAA 22-4694 GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES Eric N. Johnson *

More information

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect A simulated Linear Mixture Model to Imrove Classification Accuracy of Satellite Data Utilizing Degradation of Atmosheric Effect W.M Elmahboub Mathematics Deartment, School of Science, Hamton University

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Recommender Systems Based on Doubly Structural Network

Recommender Systems Based on Doubly Structural Network Proceedings of the 8th nternational Conference on nnovation & Management 975 Recommender Systems Based on Doubly Structural Network Na Chang, Takao Terano Deartment of Comutational ntelligence and Systems

More information

Applying subclustering and L p distance in Weighted K-Means with distributed centroid

Applying subclustering and L p distance in Weighted K-Means with distributed centroid Alying subclustering and L distance in Weighted K-Means with distributed centroid Renato Cordeiro de Amorim a,, Vladimir Makarenkov b a School of Comuting, University of Hertfordshire, College Lane, AL10

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

A label distance maximum-based classifier for multi-label learning

A label distance maximum-based classifier for multi-label learning Bio-Medical Materials and Engineering 26 (2015) S1969 S1976 DOI 10.3233/BME-151500 IOS ress S1969 A label distance maximum-based classifier for multi-label learning Xiaoli Liu a,b, Hang Bao a, Dazhe Zhao

More information

Ensemble Learning Based on Parametric Triangular Norms

Ensemble Learning Based on Parametric Triangular Norms Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Perception of Shape from Shading

Perception of Shape from Shading 1 Percetion of Shae from Shading Continuous image brightness variation due to shae variations is called shading Our ercetion of shae deends on shading Circular region on left is erceived as a flat disk

More information

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking B.T.R.Naresh Reddy, Prasad Nagelli, K.Srinivasulu Reddy Abstract Vehicle detection lays an imortant role in

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

Robot Path and End-Effector Orientation Planning Using Augmented Reality

Robot Path and End-Effector Orientation Planning Using Augmented Reality Available online at www.sciencedirect.com Procedia CIRP 3 (2012 ) 191 196 45 th CIRP Conference on Manufacturing Systems 2012 Robot Path and End-Effector Orientation Planning Using Augmented Reality H.C.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Andreas Nürnberger, Aljoscha Klose, Rudolf Kruse University of Magdeburg, Faculty of Comuter Science 39106 Magdeburg, Germany

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Function Point Estimation and Demonstration on Website Projects

Function Point Estimation and Demonstration on Website Projects www.ccsenet.org/cis Comuter and Information Science Vol. 5, No. 3; May 1 Function Point Estimation and Demonstration on Website Projects Feng Jingchun 1, Zhang Fujie 1, Zhu Dandan 1 & Zhang Fei 1 1 Institute

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

Optimization of Collective Communication Operations in MPICH

Optimization of Collective Communication Operations in MPICH To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Argo Programming Guide

Argo Programming Guide Argo Programming Guide Evangelia Kasaaki, asmus Bo Sørensen February 9, 2015 Coyright 2014 Technical University of Denmark This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Accurate, Efficient and Scalable Graph Embedding

Accurate, Efficient and Scalable Graph Embedding Accurate, Efficient and Scalable Grah Embedding Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgoal Kannan, Viktor Prasanna University of Southern California Los Angeles, USA {zengh, hongkuaz, ajiteshs,

More information

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image -D Fir Filter Design And Its Alications In Removing Imulse Noise In Digital Image Nguyen Thi Huyen Linh 1, Luong Ngoc Minh, Tran Dinh Dung 3 1 Faculty of Electronic and Electrical Engineering, Hung Yen

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Magdy Saeb, Meer Hamza, Ashraf Soliman. Arab Academy for Science, Technology & Maritime Transort Comuter Engineering

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Simulating Ocean Currents. Simulating Galaxy Evolution

Simulating Ocean Currents. Simulating Galaxy Evolution Simulating Ocean Currents (a) Cross sections (b) Satial discretization of a cross section Model as two-dimensional grids Discretize in sace and time finer satial and temoral resolution => greater accuracy

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

CLUSTER ANALYSIS AND NEURAL NETWORK

CLUSTER ANALYSIS AND NEURAL NETWORK LUSTER ANALYSIS AND NEURAL NETWORK P.Dostál,P.Pokorný Deartment of Informatics, Faculty of Business and Management, Brno University of Technology Institute of Mathematics, Faculty of Mechanical Engineering,

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Factoring Variations in Natural Images with Deep Gaussian Mixture Models Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Model-based Testing of Real-time Adaptive Motion Planning (RAMP)*

Model-based Testing of Real-time Adaptive Motion Planning (RAMP)* Model-based Testing of Real-time Adative Motion Planning (RAMP)* Mahmoud Abdelgawad 1, Sterling McLeod 2, Anneliese Andrews 1, and Jing Xiao 2 Abstract It is a ractically challenging roblem to test the

More information

Distributed Fingerprint Enhancement on a Multicore Cluster

Distributed Fingerprint Enhancement on a Multicore Cluster Distributed Fingerrint Enhancement on a Multicore Cluster N.P. Khanyile 1, J.-R. Taamo, and E. Dube 1 Council for Scientific and Industrial Research; University of KwaZulu-Natal, South Africa University

More information

Generating Social Network Features for Link-based Classification

Generating Social Network Features for Link-based Classification Generating Social Network Features for Link-based Classification Jun Karamon 1, Yutaka Matsuo 2, Hikaru Yamamoto 3, and Mitsuru Ishizuka 1 1 The University of Tokyo, 7-3-1 Hongo Bunkyo-ku Tokyo, Jaan,

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

A Robust Similarity Measure for Volumetric Image Registration with Outliers

A Robust Similarity Measure for Volumetric Image Registration with Outliers A Robust Similarity Measure for Volumetric Image Registration with Outliers Patrick Snae a,, Stefan Pszczolkowski c, Stefanos Zafeiriou a, Georgios Tzimirooulos b, Christian Ledig a, Daniel Rueckert a

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information