1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

Size: px
Start display at page:

Download "1. Discovering Important Nodes through Graph Entropy The Case of Enron Database"

Transcription

1 1. Discovering Important Nodes through Graph Entropy The Case of Enron Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR 08, Vancouver, BC, Canada. 3. Entropy Metric for XML DTD Documents ACM SIGSOFT Software Engineering Notes. 4. Information Theoretic Semantic Multimedia Indexing CIVR 07, July 9-11, 2007, Amsterdam, The Netherlands. 5. Nonextensive Entropic Kernels Appearing in Proceedings of the 25 th International Conference on Machine Learning, Helsinki, Entropy-Based Bounds for Online Algorithms ACM Transactions on ALGORITHMS, Vol.3, No.1, Article 7, Publication date: February Information Distance from a Question to an Answer ACM KDD 07, August 12-15, 2007, San Jose, California, USA. 8. Toward an Understanding of FLOW in Video Games ACM Computers in Entertainment, Vol.6, No.2, Article 20, Publication Date: July MILCS: A Mutual Information Learning Classifier System GECCO 07, July 7-11, 2007, London, England, United Kingdom. 10. Aligning Database Columns using Mutual Information ACM Proceedings of the 2005 national conference on Digital government research.

2 11. Implementing the LZ-index: Theory VERSUS Practice ACM Journal of Experimental Algorithmics, Vol. 13, Article No.1.2, Publication date: November Compressed Text Indexes: From Theory to Practice ACM Journal of Experimental Algorithmics, Vol.13, ARTICLE 1.12, Publication date: December AN Information-Theoretic Approach to traffic Matrix Estimation ACM SIGCOMM 03, August 25-29, 2003, Karlsruhe, Germany. 14. A Camera-based Mobile Data Channel : Capacity and Analysis ACM MM 08, October 26-31, 2008, Vancouver, British Columbia, Canada. 15. AN Information-Theoretic Approach to Automatic Query Expansion ACM Transactions on Information Systems, Vol. 19, No.1, January 2001, Pages Information-Theoretic Co-clustering ACM SIGKDD 03, August 24-27, 2003, Washington, DC, USA. 17. Estimating Point-to-Point and Point-to-Multipoint Traffic Matrices : An Information- Theoretic Approach IEEE/ACM Transactions on Networking, Vol. 13, No 5, October An Information Theoretic Exploratory Method for Learning Patterns of Conditional Gene Coexpression from Microarray Data IEEE/ACM Transactions on Computational Biology and Bioinformatics, Vol.5, No.1, January-March Gene Mapping and Marker Clustering Using Shannon s Mutual Information IEEE/ACM Transactions on Computational Biology and Bioinformatics, Vol.3, No.1, January-march Understanding the Efficiency of Social Tagging Systems using Information Theory HT 08, June 19-21, 2008, PITTSBURGH, Pennsylvania, USA.

3 21. Compression, Information Theory, and Grammars : A Unified Approach ACM Transactions on Information Systems, Vol.8, No. 1, January 1990, Pages Data Compression Using Antidictionaries Proceeding of The IEEE, Vol.88, No.11, November Medical Image Registration Using Mutual Information Proceedings of The IEEE, Vol.91, No. 10, October On Compressing Encrypted Data IEEE Transactions on Signal Processing, Vol. 52, No. 10, October A Reproducing Kernel Hilbert Space Framework for Information-Theoretic Learning IEEE Transactions on Signal Processing, Vol. 56, No. 12, December On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding IEEE Transactions on Information Forensics and Security. Vol. 3, No. 3, September Information-Theoretic Analysis of Interscale and Intrascale Dependencies Between Image Wavelet Coefficients IEEE Transactions on Image processing, Vol. 10, No. 11, November Optimization of Mutual Information for Multiresolution Image Registration IEEE Transaction on Image Processing, Vol. 9, No. 12, December AN Information Theoretic Criterion for Evaluating the Quality of 3-D Reconstructions From Video IEEE Transaction on Image Processing, Vol. 13, No. 7, July 2004.

4 30. A Nonparametric Statistical Method for Image Segmentation Using Information Theory and Curve Evolution IEEE Transaction on Image Processing, Vol. 14, No.10, October Unsupervised Image-Set Clustering Using an Information Theoretic Framework IEEE Transaction on Image Processing, Vol. 15, No. 2, February A Method for Measuring the Complexity of image Databases IEEE Transaction on Multimedia, Vol. 4, No. 2, June Vector Autoregressive Model-Order Selection From Finite Samples Using Kullback s Symmetric Divergence IEEE Transactions on Circuits and Systems I: Regulars, Vol. 53, No.10, October Information Theory-Based Shot Cut/Fade Detection and Video Summarization IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No.1, January Secure Covert Channels in Multiplayer Games ACM MM&Sec 08, September 22-23, 2008, Oxford, United Kingdom. 36. Capacity of Steganographic Channels ACM MM-SEC 05, August 1-2, 2005, New York, New York, USA. 37. Scalar Costa Scheme for Information Embedding IEEE Transactions on signal processing, Vol.51, No. 4, April Authentication Over Noisy Channels IEEE Transactions on Information Theory. Vol. 55, No. 2, February 2009.

5 39. Capacity Estimates for Data Hiding in Compressed Images IEEE Transaction on Image Processing, Vol. 10, No. 8, August Robust Image-Adaptive Data Hiding Using Erasure and Error Correction IEEE Transaction on Image Processing, Vol. 13, No. 12, December Application of Arithmetic Coding to Compression of VLSI Test Data IEEE Transactions on Computers. Vol. 54, No.9, September Lightweight Error Correction Coding for System-Level Interconnects IEEE Transaction on computers, Vol. 56, No. 3, March An Elementary Condition for Non-Norm Elements IEEE Transactions on Information Theory, Vol. 55, No. 3, March Error-Correction of Multidimensional Bursts IEEE Transaction on Information Theory, Vol. 55, No. 3, March An Information Theoretic Foundation of Synchronized Detection IEEE Transaction in Communications, Vol. 49, No. 12, December A Theory of Program Size Formally Identical to Information Theory Journal of the Association for Computing Machinery, Vol. 22, No. 3, July 1975, pp Information Theoretic Approach to Complexity Reduction of FIR Filter Design IEEE Transactions on Circuits and Systems I: Regular Paper, Vol. 55, No. 8, September A Generalized Reverse Block Jacket Transform IEEE Transactions on Circuits and Systems Regular Papers, Vol. 55, No. 6, July 2008.

6 1. The Bidirectional Communication Theory A Generalization of Information Theory IEEE Transactions on communications, Vol. COM-21, No. 12, December Properties of the Eigenvectors of Persymmetric Matrices with Applications to Communication Theory IEEE Transactions on Communications, Vol. COM-24, No. 8, August Block Permutation Coding of Images Using Cosine Transform IEEE Transactions on Communications, Vol. 43, No. 11, November Maximum Entropy Charge-Constrained Run-Length Codes IEEE Journal on Selected Areas in Communications Vol. 10, No. 1, January 1992.

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Example. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review:

Example. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review: Following are three examples of calculations for MCP employees (undefined hours of work) and three examples for MCP office employees. Examples use the data from the table below. For your calculations use

More information

Event Sensing on Distributed Video Sensor Networks

Event Sensing on Distributed Video Sensor Networks Event Sensing on Distributed Video Sensor Networks Edward Chang Associate Professor Department of Electrical and Computer Engineering University of California Collaborator Prof. Yuan-Fang Wang Industry

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

AKIKO MANADA. The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, , JAPAN

AKIKO MANADA. The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, , JAPAN Curriculum Vitæ AKIKO MANADA The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, 182-8585, JAPAN Email: amanada@uec.ac.jp WORK EXPERIENCE Assistant Professor: February 2012 Present

More information

Medical Image Segmentation Based on Mutual Information Maximization

Medical Image Segmentation Based on Mutual Information Maximization Medical Image Segmentation Based on Mutual Information Maximization J.Rigau, M.Feixas, M.Sbert, A.Bardera, and I.Boada Institut d Informatica i Aplicacions, Universitat de Girona, Spain {jaume.rigau,miquel.feixas,mateu.sbert,anton.bardera,imma.boada}@udg.es

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N.

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. Dartmouth, MA USA Abstract: The significant progress in ultrasonic NDE systems has now

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Coursework Completion

Coursework Completion Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students

More information

Institute For Arts & Digital Sciences SHORT COURSES

Institute For Arts & Digital Sciences SHORT COURSES Institute For Arts & Digital Sciences SHORT COURSES SCHEDULES AND FEES 2017 SHORT COURSES - GRAPHIC DESIGN Adobe Photoshop Basic 07 February 28 February Tuesdays 14:30-17:30 Adobe Photoshop Basic 07 February

More information

Dimension reduction : PCA and Clustering

Dimension reduction : PCA and Clustering Dimension reduction : PCA and Clustering By Hanne Jarmer Slides by Christopher Workman Center for Biological Sequence Analysis DTU The DNA Array Analysis Pipeline Array design Probe design Question Experimental

More information

Object and Action Detection from a Single Example

Object and Action Detection from a Single Example Object and Action Detection from a Single Example Peyman Milanfar* EE Department University of California, Santa Cruz *Joint work with Hae Jong Seo AFOSR Program Review, June 4-5, 29 Take a look at this:

More information

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada

More information

Mitel for Microsoft Dynamics CRM Client V5 Release Notes

Mitel for Microsoft Dynamics CRM Client V5 Release Notes Mitel for Microsoft Dynamics CRM Client V5 Release Notes February 08, 2018. Mitel for Microsoft Dynamics CRM Client V5 Release Notes Description: This Application Note Consists of the dates and version

More information

Keywords - DWT, Lifting Scheme, DWT Processor.

Keywords - DWT, Lifting Scheme, DWT Processor. Lifting Based 2D DWT Processor for Image Compression A. F. Mulla, Dr.R. S. Patil aieshamulla@yahoo.com Abstract - Digital images play an important role both in daily life applications as well as in areas

More information

PATTERN RECOGNITION USING NEURAL NETWORKS

PATTERN RECOGNITION USING NEURAL NETWORKS PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,

More information

Performance Evaluation of XHTML encoding and compression

Performance Evaluation of XHTML encoding and compression Performance Evaluation of XHTML encoding and compression Sathiamoorthy Manoharan Department of Computer Science, University of Auckland, Auckland, New Zealand Abstract. The wireless markup language (WML),

More information

PATTERN CLASSIFICATION AND SCENE ANALYSIS

PATTERN CLASSIFICATION AND SCENE ANALYSIS PATTERN CLASSIFICATION AND SCENE ANALYSIS RICHARD O. DUDA PETER E. HART Stanford Research Institute, Menlo Park, California A WILEY-INTERSCIENCE PUBLICATION JOHN WILEY & SONS New York Chichester Brisbane

More information

Software Architecture Recovery based on Dynamic Analysis

Software Architecture Recovery based on Dynamic Analysis Software Architecture Recovery based on Dynamic Analysis Aline Vasconcelos 1,2, Cláudia Werner 1 1 COPPE/UFRJ System Engineering and Computer Science Program P.O. Box 68511 ZIP 21945-970 Rio de Janeiro

More information

Presentation of the book BOOLEAN ARITHMETIC and its Applications

Presentation of the book BOOLEAN ARITHMETIC and its Applications Presentation of the book BOOLEAN ARITHMETIC and its Applications This book is the handout of one Post Graduate Discipline, offered since 1973, named PEA - 5737 Boolean Equations Applied to System Engineering,

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

JOYCE JIYOUNG WHANG EDUCATION

JOYCE JIYOUNG WHANG EDUCATION JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University.

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University. JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

Shifted Linear Interpolation Filter

Shifted Linear Interpolation Filter Journal of Signal and Information Processing, 200,, 44-49 doi:0.4236/jsip.200.005 Published Online November 200 (http://www.scirp.org/journal/jsip) Shifted Linear Interpolation Filter H. Olkkonen, J. T.

More information

Automatic Text Processing

Automatic Text Processing Automatic Text Processing The Transformation, Analysis, and Retrieval of Information by Computer Gerard Salton Cornell University Technlsche Univerariat Darmstadt FACHBEREICH1NFORMATJK BIBLIOTHE.K Invented.:

More information

Marketing Opportunities

Marketing Opportunities Email Marketing Opportunities Write the important dates and special events for your organization in the spaces below. You can use these entries to plan out your email marketing for the year. January February

More information

Locality Preserving Projections (LPP) Abstract

Locality Preserving Projections (LPP) Abstract Locality Preserving Projections (LPP) Xiaofei He Partha Niyogi Computer Science Department Computer Science Department The University of Chicago The University of Chicago Chicago, IL 60615 Chicago, IL

More information

CALENDAR OF FILING DEADLINES AND SEC HOLIDAYS

CALENDAR OF FILING DEADLINES AND SEC HOLIDAYS CALENDAR OF FILING S AND SEC HOLIDAYS INFORMATION IN THIS CALENDAR HAS BEEN OBTAINED BY SOURCES BELIEVED TO BE RELIABLE, BUT CANNOT BE GUARANTEED FOR ACCURACY. PLEASE CONSULT WITH PROFESSIONAL COUNSEL

More information

THE TRANSFORM AND DATA COMPRESSION HANDBOOK

THE TRANSFORM AND DATA COMPRESSION HANDBOOK THE TRANSFORM AND DATA COMPRESSION HANDBOOK Edited by K.R. RAO University of Texas at Arlington AND RC. YIP McMaster University CRC Press Boca Raton London New York Washington, D.C. Contents 1 Karhunen-Loeve

More information

Stat 428 Autumn 2006 Homework 2 Solutions

Stat 428 Autumn 2006 Homework 2 Solutions Section 6.3 (5, 8) 6.3.5 Here is the Minitab output for the service time data set. Descriptive Statistics: Service Times Service Times 0 69.35 1.24 67.88 17.59 28.00 61.00 66.00 Variable Q3 Maximum Service

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Minoru SASAKI and Kenji KITA. Department of Information Science & Intelligent Systems. Faculty of Engineering, Tokushima University

Minoru SASAKI and Kenji KITA. Department of Information Science & Intelligent Systems. Faculty of Engineering, Tokushima University Information Retrieval System Using Concept Projection Based on PDDP algorithm Minoru SASAKI and Kenji KITA Department of Information Science & Intelligent Systems Faculty of Engineering, Tokushima University

More information

Programming Logic and Design Sixth Edition

Programming Logic and Design Sixth Edition Objectives Programming Logic and Design Sixth Edition Chapter 6 Arrays In this chapter, you will learn about: Arrays and how they occupy computer memory Manipulating an array to replace nested decisions

More information

RLG Model Request for Information (RFI) for Digital Imaging Services

RLG Model Request for Information (RFI) for Digital Imaging Services RLG Model Request for Information (RFI) for Digital Imaging Services The Research Libraries Group, Inc. 1997 This document was prepared by Cornell University under contract to RLG. It is a sample (or model)

More information

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch

More information

Color Space Projection, Feature Fusion and Concurrent Neural Modules for Biometric Image Recognition

Color Space Projection, Feature Fusion and Concurrent Neural Modules for Biometric Image Recognition Proceedings of the 5th WSEAS Int. Conf. on COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, Venice, Italy, November 20-22, 2006 286 Color Space Projection, Fusion and Concurrent Neural

More information

Tag Recommendation for Photos

Tag Recommendation for Photos Tag Recommendation for Photos Gowtham Kumar Ramani, Rahul Batra, Tripti Assudani December 10, 2009 Abstract. We present a real-time recommendation system for photo annotation that can be used in Flickr.

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Fully Integrated Digital Imaging In an Access Control and Security System

Fully Integrated Digital Imaging In an Access Control and Security System Fully Integrated Digital Imaging In an Access Control and Security System Charles Oram, Felix Collins, Nick Body Cardax (International) Ltd. New Zealand. Abstract Traditional analogue Closed Circuit Television

More information

CHIROPRACTIC MARKETING CENTER

CHIROPRACTIC MARKETING CENTER Marketing Plan Sample Marketing Calendar Here is a sample yearly marketing plan. You should use something similar, but of course add or remove strategies as appropriate for your practice. Letter and advertisement

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING

IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING SECOND EDITION IMAGE ANALYSIS, CLASSIFICATION, and CHANGE DETECTION in REMOTE SENSING ith Algorithms for ENVI/IDL Morton J. Canty с*' Q\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC

More information

Ptolemy Seamlessly Supports Heterogeneous Design 5 of 5

Ptolemy Seamlessly Supports Heterogeneous Design 5 of 5 In summary, the key idea in the Ptolemy project is to mix models of computation, rather than trying to develop one, all-encompassing model. The rationale is that specialized models of computation are (1)

More information

Incoming, Outgoing Degree and Importance Analysis of Network Motifs

Incoming, Outgoing Degree and Importance Analysis of Network Motifs Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.758

More information

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h) HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

CPA PEP 2018 Schedule and Fees

CPA PEP 2018 Schedule and Fees CPA PEP Schedule and Fees The CPA Professional Education Program (CPA PEP) is a graduatelevel program. CPA PEP comprises a series of modules that focus primarily on enhancing CPA candidates ability to

More information

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science

More information

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412)

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412) Please review your report carefully. If corrections are needed, please fax us the pages requiring correction. Otherwise, sign and return to your Verified Account Coordinator by fax or email. Fax to: 415-461-6007

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, Universität Karlsruhe (TH) 76131 Karlsruhe, Germany

More information

This work is licensed under the Creative Commons Attribution 4.0 International License. Page 1 of 10

This work is licensed under the Creative Commons Attribution 4.0 International License. Page 1 of 10 This work is licensed under the Creative Commons Attribution 4.0 International License. Page 1 of 10 1.1 1.2 2.1 1 Page 2 of 10 2.3 2.4 2.4.1 2.4.2 2 Page 3 of 10 2.5 2.6 Page 4 of 10 2.7 2.8 Page 5 of

More information

/Internet Random Moment Sampling. STATE OF ALASKA Department of Health and Social Services Division of Public Assistance

/Internet Random Moment Sampling. STATE OF ALASKA Department of Health and Social Services Division of Public Assistance E-mail/Internet Random Moment Sampling STATE OF ALASKA Department of Health and Social Services Division of Public Assistance RMS Training Objectives Goal: Upon completion of this training session, participants

More information

All MSEE students are required to take the following two core courses: Linear systems Probability and Random Processes

All MSEE students are required to take the following two core courses: Linear systems Probability and Random Processes MSEE Curriculum All MSEE students are required to take the following two core courses: 3531-571 Linear systems 3531-507 Probability and Random Processes The course requirements for students majoring in

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Modified SPIHT Image Coder For Wireless Communication

Modified SPIHT Image Coder For Wireless Communication Modified SPIHT Image Coder For Wireless Communication M. B. I. REAZ, M. AKTER, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - The Set Partitioning

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Dashboard. 16 Jun Jun 2009 Comparing to: 16 Jun Jun % Bounce Rate. 62,921 Visits. 407,003 Page Views

Dashboard. 16 Jun Jun 2009 Comparing to: 16 Jun Jun % Bounce Rate. 62,921 Visits. 407,003 Page Views JAWA CZ Owners Club Dashboard 16 Jun 2008-16 Jun 2009 Comparing to: 16 Jun 2007-15 Jun 2008 Previous: Visits Visits 400 400 200 200 16 June 2008 19 July 2008 21 August 2008 23 September 26 October 200

More information

MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY

MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY 2018 January 01 02 03 04 05 06 07 Public Holiday 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Supplementary exam: Basic s, Grooming 27 28 29 30 31 01 02 03 04 05 06 Notes: 2018 February 29

More information

CLASSIFICATION AND CHANGE DETECTION

CLASSIFICATION AND CHANGE DETECTION IMAGE ANALYSIS, CLASSIFICATION AND CHANGE DETECTION IN REMOTE SENSING With Algorithms for ENVI/IDL and Python THIRD EDITION Morton J. Canty CRC Press Taylor & Francis Group Boca Raton London NewYork CRC

More information

Sinusoidal Data Worksheet

Sinusoidal Data Worksheet Sinusoidal Data Worksheet West Coast Tidal Analysis: Fill in the following chart for the low tide and high tides per day for the researched two-day period (so four low tides and high tides all inter-distributed)

More information

3.5 Filtering with the 2D Fourier Transform Basic Low Pass and High Pass Filtering using 2D DFT Other Low Pass Filters

3.5 Filtering with the 2D Fourier Transform Basic Low Pass and High Pass Filtering using 2D DFT Other Low Pass Filters Contents Part I Decomposition and Recovery. Images 1 Filter Banks... 3 1.1 Introduction... 3 1.2 Filter Banks and Multirate Systems... 4 1.2.1 Discrete Fourier Transforms... 5 1.2.2 Modulated Filter Banks...

More information

Social Behavior Prediction Through Reality Mining

Social Behavior Prediction Through Reality Mining Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO

More information

CMMI Version 1.2. Josh Silverman Northrop Grumman

CMMI Version 1.2. Josh Silverman Northrop Grumman CMMI Version 1.2 Josh Silverman Northrop Grumman Topics The Concept of Maturity: Why CMMI? CMMI Overview/Aspects Version 1.2 Changes Sunsetting of Version 1.1 Training Summary The Concept of Maturity:

More information

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 31 st July 01. Vol. 41 No. 005-01 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 1 SRIRAM.B, THIYAGARAJAN.S 1, Student,

More information

Integration of Global and Local Information in Videos for Key Frame Extraction

Integration of Global and Local Information in Videos for Key Frame Extraction Integration of Global and Local Information in Videos for Key Frame Extraction Dianting Liu 1, Mei-Ling Shyu 1, Chao Chen 1, Shu-Ching Chen 2 1 Department of Electrical and Computer Engineering University

More information

Optimization of Bit Rate in Medical Image Compression

Optimization of Bit Rate in Medical Image Compression Optimization of Bit Rate in Medical Image Compression Dr.J.Subash Chandra Bose 1, Mrs.Yamini.J 2, P.Pushparaj 3, P.Naveenkumar 4, Arunkumar.M 5, J.Vinothkumar 6 Professor and Head, Department of CSE, Professional

More information

Linear Discriminant Analysis for 3D Face Recognition System

Linear Discriminant Analysis for 3D Face Recognition System Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.

More information

April 1, 2018 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc.

April 1, 2018 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc. April 1, 2018 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc. CA 2,322,909 CA 2,482,015 CA 2,575,035 CA 2,575,037 CA 2,575,038 CA 2,628,000 CA 2,629,277 CA 2,630,140 CA 2,688,848 CA 2,688,849 CA 2,688,851

More information

RELEASE NOTES SHORETEL MS DYNAMICS CRM CLIENT VERSION 8

RELEASE NOTES SHORETEL MS DYNAMICS CRM CLIENT VERSION 8 RELEASE NOTES SHORETEL MS DYNAMICS CRM CLIENT VERSION 8 Compatibility Supports MS Dynamics CRM 2011, 2013, 2015 and 2016 (Online and Onpremises) as well as CRM deployed within Office 365 environments.

More information

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts Appl. Math. Inf. Sci. 6 No. 1S pp. 93S-97S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Novel Image Classification Model Based

More information

Invisible Watermarking Using Eludician Distance and DWT Technique

Invisible Watermarking Using Eludician Distance and DWT Technique Invisible Watermarking Using Eludician Distance and DWT Technique AMARJYOTI BARSAGADE # AND AWADHESH K.G. KANDU* 2 # Department of Electronics and Communication Engineering, Gargi Institute of Science

More information

hereby recognizes that Timotej Verbovsek has successfully completed the web course 3D Analysis of Surfaces and Features Using ArcGIS 10

hereby recognizes that Timotej Verbovsek has successfully completed the web course 3D Analysis of Surfaces and Features Using ArcGIS 10 3D Analysis of Surfaces and Features Using ArcGIS 10 Completed on September 5, 2012 3D Visualization Techniques Using ArcGIS 10 Completed on November 19, 2011 Basics of Map Projections (for ArcGIS 10)

More information

Register Reassignment for Mixed-width ISAs is an NP-Complete Problem

Register Reassignment for Mixed-width ISAs is an NP-Complete Problem Register Reassignment for Mixed-width ISAs is an NP-Complete Problem Bor-Yeh Shen, Wei Chung Hsu, and Wuu Yang Institute of Computer Science and Engineering, National Chiao Tung University, Taiwan, R.O.C.

More information

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and Chapter 7 FACE RECOGNITION USING CURVELET 7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and computer vision, because of its ability to capture localized

More information

Compressive Sensing Based Image Reconstruction using Wavelet Transform

Compressive Sensing Based Image Reconstruction using Wavelet Transform Compressive Sensing Based Image Reconstruction using Wavelet Transform Sherin C Abraham #1, Ketki Pathak *2, Jigna J Patel #3 # Electronics & Communication department, Gujarat Technological University

More information

MAP OF OUR REGION. About

MAP OF OUR REGION. About About ABOUT THE GEORGIA BULLETIN The Georgia Bulletin is the Catholic newspaper for the Archdiocese of Atlanta. We cover the northern half of the state of Georgia with the majority of our circulation being

More information

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Final Report Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This report describes a method to align two videos.

More information

April 1, 2019 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc.

April 1, 2019 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc. April 1, 2019 ATSC Attachment 1 Page 1 of 12 LG Electronics Inc. CA 2,322,909 CA 2,482,015 CA 2,575,035 CA 2,575,037 CA 2,575,038 CA 2,628,000 CA 2,629,277 CA 2,630,140 CA 2,688,848 CA 2,688,849 CA 2,688,851

More information

Print and Online Editorial Calendar

Print and Online Editorial Calendar January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,

More information

Feature Selection Using Principal Feature Analysis

Feature Selection Using Principal Feature Analysis Feature Selection Using Principal Feature Analysis Ira Cohen Qi Tian Xiang Sean Zhou Thomas S. Huang Beckman Institute for Advanced Science and Technology University of Illinois at Urbana-Champaign Urbana,

More information

Cross Reference Strategies for Cooperative Modalities

Cross Reference Strategies for Cooperative Modalities Cross Reference Strategies for Cooperative Modalities D.SRIKAR*1 CH.S.V.V.S.N.MURTHY*2 Department of Computer Science and Engineering, Sri Sai Aditya institute of Science and Technology Department of Information

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION

FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION Supritha G M 1, Shivanand R D 2 1 P.G. Student, Dept. of Computer Science and Engineering, B.I.E.T College, Karnataka,

More information

Matlab project Independent component analysis

Matlab project Independent component analysis Matlab project Independent component analysis Michel Journée Dept. of Electrical Engineering and Computer Science University of Liège, Belgium m.journee@ulg.ac.be September 2008 What is Independent Component

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 23009-1 First edition 2012-04-01 Information technology Dynamic adaptive streaming over HTTP (DASH) Part 1: Media presentation description and segment formats Technologies

More information

Preface to the Second Edition. Preface to the First Edition. 1 Introduction 1

Preface to the Second Edition. Preface to the First Edition. 1 Introduction 1 Preface to the Second Edition Preface to the First Edition vii xi 1 Introduction 1 2 Overview of Supervised Learning 9 2.1 Introduction... 9 2.2 Variable Types and Terminology... 9 2.3 Two Simple Approaches

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Interactive Progressive Encoding System For Transmission of Complex Images

Interactive Progressive Encoding System For Transmission of Complex Images Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431

More information

COMP 551 Applied Machine Learning Lecture 16: Deep Learning

COMP 551 Applied Machine Learning Lecture 16: Deep Learning COMP 551 Applied Machine Learning Lecture 16: Deep Learning Instructor: Ryan Lowe (ryan.lowe@cs.mcgill.ca) Slides mostly by: Class web page: www.cs.mcgill.ca/~hvanho2/comp551 Unless otherwise noted, all

More information

Jan 30,2018. PULSE: HIE Connectivity for Disaster Response Patient Unified Lookup System for Emergencies

Jan 30,2018. PULSE: HIE Connectivity for Disaster Response Patient Unified Lookup System for Emergencies Jan 30,2018 PULSE: HIE Connectivity for Disaster Response Patient Unified Lookup System for Emergencies PULSE Background History 2013: California Emergency Medical Services Authority (EMSA) holds its first

More information

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( ) A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233

More information

Project Participants

Project Participants Annual Report for Period:10/2004-10/2005 Submitted on: 06/21/2005 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of

More information

Locality Preserving Projections (LPP) Abstract

Locality Preserving Projections (LPP) Abstract Locality Preserving Projections (LPP) Xiaofei He Partha Niyogi Computer Science Department Computer Science Department The University of Chicago The University of Chicago Chicago, IL 60615 Chicago, IL

More information