A wireless sensor network for visual detection and classification of intrusions

Size: px
Start display at page:

Download "A wireless sensor network for visual detection and classification of intrusions"

Transcription

1 A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang Technological University, Blk N4 Nanyang Avenue SINGAPORE 3 SWPS, ul.chodakowska 19/31, Warszawa POLAND Abstract: - The paper reports works on a wireless sensor network supporting a huan operator onitoring a wide area of an unstructured environent. The ain objective is to develop echaniss allowing intelligent preliinary analysis of data (captured by a large nuber of sensing devices, including caeras) so that the huan intervention is needed only for cases identified as potentially dangerous intrusions. The developed feasibility-study platfor contains two types of nodes: relatively siple warning nodes with a variety of sensors detecting a potential presence of intruders (proxiity, vibration, agnetic activity, noise, etc.) and ore sophisticated nodes equipped with caeras and capable to perfor coplex iage analysis tasks so that the intrusion can be visually verified and (possibly) classified before involving a huan operator. The nodes can wirelessly counicate using a standard protocol. Several echaniss of visual detection have been proposed and ipleented. Thus, the actual details of a network for a given application can be optiized, taking into account the current conditions, hardware constraints and user-defined requireents. Generally, iniization of the wirelessly transitted data is of high priority. The paper briefly overviews the developed platfor and discusses ethodologies of the algoriths used in the syste. Soe ipleentation details are not disclosed. Key-Words: - visual surveillance, sensor network, FPGA, intrusion detection and classification 1 Introduction Although visual surveillance in considered the ost effective ethod of onitoring coplex environents, systes that could perfor such a task fully autonoously and reliably are still very difficult to build. In less abitious (but ore realistic) scenario, a huan operator can be supported by a visual surveillance syste that can autoatically handle typical situations. The huan intervention is needed only in special situation (or situations involving decisions which are reserved for huans). In this paper we report developent of wireless sensor network that is based on the aboveentioned concept. The network is supposed to onitor a relatively large area (and to detect intruders in this area) using sensor nodes (usually deployed randoly or partially randoly) of two types. The first-level nodes (which would be ore nuerous) contain relatively siple sensors detecting nonvisual signatures of intruders. When a potential presence of an intruder is detected, the second-level nodes are wirelessly activated. The second-level nodes are equipped with caeras that (upon activation of the node) capture iages of the area where the intrusion is suspected. The iages are subsequently processed by the digital hardware (FPGA) of the node in order to classify and possibly identify the intruder. If the node is unable to categorize the intrusion, the intruder s iage can be wirelessly transitted to a higher decision level, possibly involving a huan operator. In Section 2 of the paper, we briefly present the developed hardware platfor. Section 3 discusses iage processing algoriths used in the secondlevel nodes to classify intruders. More advanced techniques of intrusion identification (perfored by the host coputer using data transitted by the second-level nodes) are presented in Section 4. Section 5 suarizes the paper and highlights directions for the future works. 2 Description of the Network Coponents The developed network consists of an unspecified nuber of nodes no predefined structure of the network is envisaged. The first-level nodes (Fig. 1)

2 incorporate a wireless counication chip, a lowcost icrocontroller (perforing sensor data acquisition, generatingf wirelessly-transitted essages and interfacing the wireless chip) and basic non-vision sensors. Battery power supply is provided. Currently, only infrared proxiity sensors and vibrations sensors are used, but other additional options are planned (and the corresponding sensors are available). Therefore, only the kernel of a second-level node would be peranently active, while the other parts (e.g. the caeras) are activated only when a warning essage fro the first level is received. Two option are possible: (1) a second-level node can be activated by any first-level node within the wireless range or (2) a second-level level node can be activated by selected first-level nodes (i.e. the warning essages containing identifiers of other nodes are ignored). Fig. 1. The first-level node of the network. The sensors of first-level nodes onitor conditions in the protected area and act as preliinary detectors of possible intrusions. A possible intrusion is defined as a particular coincidence of sensor readings. Various definitions of possible intrusions can be used, either for different applications or within the sae application. Whenever a possible intrusion is sensed, the node wirelessly transits a essage containing the node identifier and (if several definitions of possible intrusions are siultaneously used) the type of sensed intrusion. To provide a higher level of reliability, the essage ay be repeated several ties. A standard counication protocol for low-power wireless networks is used. The second-level nodes area built around an FPGA odule that can control up to four caeras. Additionally, the nodes are equipped with the sae wireless counication coponents as the firstlevel nodes. Typically, one second-level node is associated with several first-level nodes, but the network structure is not peranent. As an illustration, a typical fragent of the network is shown in Fig. 2. Low energy consuption in the network nodes is a crucial issue since very long operational lifetie is expected. In the first-level nodes, this is achieved by using high perforance batteries and low-power coponents. Thus, the nodes can be peranently active during their whole operational lifetie. In the second-level nodes, power consuption by both FPGA s and caeras is relatively high. Fig. 2. Fragent of the network. Upon activation, a second-level node caera captures a short sequence of iages (typically two or three) that are subsequently processed using dedicated algoriths ipleented in the node s FPGA. In general, the purpose of iage processing is to extract the possible intruders fro a captured iage and to classify/identify the. After the task is copleted, selected fragents of caera-captured iages and/or other results produced by the algoriths ay be wirelessly transitted to higherlevel coponents of a decision syste (possibly including a huan operator). Additionally, the second-level nodes can be periodically activated in order to update the background iage (see Section 3). In general, the peak energy consuption in a second-level node ay be high, but the average power requireents could be low enough to provide long operational lifetie. In the prototype platfor, power is supplied by a DC adaptor. The prototype second-level nodes are built around a coercially available FPGA developent board (see Fig. 3). However, only selected resources available in the board are used in the prototype (as shown in Fig. 3). In the final product, a less powerful FPGA will be possibly used.

3 Details of iage processing algoriths ipleented in the second-level nodes are discussed in Section 3. Fig. 3. Coponents of the FPGA developent board used in the second-level node. Fig. 5. An exeplary scene containing an intruder. 3 Iage Processing in Intrusion Detection 3.1 Extraction of Intruder s Silhouettes When a caera attached to a second level node captures an iage of the suspected intrusion area, the first iage processing operation is extraction of fragents not present in the background iage currently eorized in the node. Although such an operation can be (hypothetically) ipleented as a siple iage subtraction, a ore sophisticated ethod is needed for scenarios of realistic coplexity. In general, the scene background ay be affected by both illuination variations and inor configuration changes (e.g. swaying trees, grass, vibrations of the network nodes, etc.). Fig. 4. An exeplary background iage captured by the caera. Fig. 6. Intruder s silhouettes extracted by the proposed algoriths (both versions are shown). The first proble can be solved by occasional background updates (see the later part of this section) but for the second one, a ore sophisticated approach has been proposed. In the developed syste, we apply a cobination of subtractions in RGB space (with a threshold defining the acceptable differences) followed by a sequence of selected

4 orphological operations. The purpose of the orphological operations is to filter out differences caused by inor configuration changes. The extracted silhouettes of intruders are available in two different fors: either as a binary blob of the intruder s shape or as a full iage within the extracted silhouette. Exaples of the original scene, the scene with the intruder, and two variants of the intruder s silhouette are shown in Figs 4, 5 and 6. The intruder s silhouettes can be subsequently used for either visual identification or for further analysis and classification of the intrusion. In the actual ipleentation of the ethod, two (or possibly ore) iages of the intruded area are captured, and the silhouettes are extracted fro both iages. The presented syste has been designed under the general assuption that the intruders can be associated with other physical phenoena, so that relatively siple sensors (proxiity, vibration, agnetic, etc.) can be used as warning devices indicating a potential presence of intruders. Thus, if there is a change in the caera-captured iages without the presence of the corresponding sensor warnings, it should be considered a background change rather than intrusion. Therefore, the algorith used for intruder extraction can also be used for periodical background update. It is particularly useful if the background change is due to rapid illuination changes (additional shadows, etc.). For slow changes of the background a siple correlation ethod has been ipleented based on the following forula: r = ( n n ( A ( A n A)( B 2 A)) ( n n B) ( B B)) 2 (3.1) Where A and B are the current background and a new iage, respectively. The background is updated when the value of r reaches the predefined threshold. 3.2 Further Analysis of Silhouettes Detected intruders can be further characterized by using selected features of their binary silhouettes. The proposed features are oents of low order, fro which several useful descriptors of the intruders can be derived. In particular, the type of intruder s obility can be broadly categorized by coparing the low order oents of the silhouettes extracted fro a pair of subsequently captured iages. The exaple in Fig. 7 shows a pair of (overlapping) silhouettes of a huan. A siple coparison of the low order oents calculated fro both silhouettes, would indicate that a vertical intruder of irregular shape is oving toward the node and turning to the left. The speed of otion can be estiated based on the size changes and displaceents of the gravity centre. Such a characteristic could be a sufficient evidence to recognize the intruder as a huan. In case of soe an-ade objects, the silhouettes extracted fro the iages would have ore consistent shapes so that a broad classification of such objects can be done within the second-level node by using oent invariants (eg. [2], [3]). Generally, intrusions that can be satisfactorily identified at the second-level node are not sent for visual verification by a huan operator. Unknown cases, however, have to be inspected. The iages of such intruders would be wirelessly transitted to the next level (which would usually incorporate a huan operator). In order to save the bandwidth, actually only the full-iage silhouettes (or their rectangular outlines) are transitted. Another prospective application of the full-iage silhouettes is discussed in the next section. Fig. 7. Intruder s silhouettes extracted fro two consecutive iages (the green area is shared by both silhouettes). 4 Advanced Method of Intruder Identification The shape-based ethods discussed in Section 4

5 would fail in ost cases where intruders are only partially visible. Therefore, selected ethods that have been originally intended for vision-based robotic navigation are being adopted for the developed syste. The proposed approach is based on detection and atching interest points in relative scale (e.g. [4], [5]). Interest points (soeties referred to as corner points) are easily perceivable sall areas where the corner response (based on the atrix of 2D partial derivatives of the iage intensities - see [X]) reaches its local axiu. Exaples of interest points autoatically found in two iages of real objects are shown in Fig. 8. Fig. 8. Two exaples of object iages with autoatically extracted interest points. If an object of interest is represented by a dataset of its interest points (including geoetric relations between the points) an iage of such an object can be hypothetically identified atching iageextracted interest points to the dataset. The ajor practical difficulties, i.e. sensitivity to illuination variation, scale of the objects and perspective distortions of 3D objects, have been successfully solved in the algorith presented in [7] and [8]. Exeplary results of atching interest point of a odel object and a caera-captured iage of a partially visible object (under different illuination conditions and in a different scale) are presented in Fig. 9. With a sufficient nuber of interest points atched, the presence of an object of interest can be positively verified in the caera-captured iage. Therefore, the identification of intruders by using their silhouettes can be done using the sae principle. Interest points are detected within the intruder s silhouettes (full-iage) and their paraeters would be wirelessly transitted to a higher level syste that contains a database of know objects. If the intruder can be verified based on the interest points, the huan assistance is not required. Fig. 9. Interest points in a odel object and their correspondences is geoetrically and photoetrically distorted iage of the object. 4 Conclusions The syste reported in this paper has been ipleented using coercially available developent boards (RC200 FPGA developent boards and Eber icrocontroller boards). The final prototype odel, however, will have a dedicated architecture designed based on conducted tests and further analysis and researches. Siilar concepts of an FPGA-based wireless sensor network are discussed in details in [1]. Although the paper highlights ostly the iage processing aspects of the developed systes, other coponents also play iportant roles in the overall functionality of the network. It can be briefly entioned that echaniss for reliable wireless transission have been ipleented in the syste (including on-chip ipleentation of AES-128 encryption algorith). Additional tests and experients are needed, however, to identify the ost suitable wireless protocols. Developent of a proprietary protocol is seriously taken as a feasible alternative. In the future, further developent is envisaged that ay lead to a coercially available product.

6 4 Acknowledgent The authors gratefully acknowledge the support and funding fro IntelliSys Research Centre, a partnership between Nanyang Technological University and Singapore Technologies Engineering. References: [1] Bellis, S.J. et al. Developent of field prograable odular wireless sensor network nodes for abient systes. Coputer Counications, to appear, [2] Hu M.K. Visual pattern recognition by oent invariants. IRE Trans.Inf.Theory vol.8, pp , [3] Maitra, S. Moent invariants, Proc. of IEEE, vol. 67(4), pp , [4] Mikolajczyk, K. and Schid, C. Scale & affine invariant interest point detectors, International Journal of Coputer Vision, vol. 60(1), pp , [5] Schid, C., Mohr, R. and Bauckhage, C. Evaluation of interest point detectors, International Journal of Coputer Vision, vol. 37(2), pp , [6] Harris, C. and Stephens, M. A cobined corner and edge detector, 4 th Alvey Vision Conference, Manchester, pp , [7] Isla, M.S. et al. Towards invariant interest point detection in an object, Conf. WSCG'2005, Plzen, pp , [8] Isla, M.S., Sluzek, A. and Zhu, L. Representing and Matching the Local Shape of an Object, Conf. MIRAGE 2005, Rocquencourt, pp 9-16, 2005.

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Vision Based Mobile Robot Navigation System

Vision Based Mobile Robot Navigation System International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Feature based stereo correspondence using moment invariant

Feature based stereo correspondence using moment invariant University of Wollongong Research Online Faculty of Inforatics - Papers (Archive) Faculty of Engineering and Inforation Sciences 008 Feature based stereo correspondence using oent invariant Prashan Prearatne

More information

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m]

Simulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m] Localization based on Visibility Sectors using Range Sensors Sooyong Lee y Nancy. Aato Jaes Fellers Departent of Coputer Science Texas A& University College Station, TX 7784 fsooyong,aato,jpf938g@cs.tau.edu

More information

Colorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science.

Colorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science. Professor Willia Hoff Dept of Electrical Engineering &Coputer Science http://inside.ines.edu/~whoff/ 1 Caera Calibration 2 Caera Calibration Needed for ost achine vision and photograetry tasks (object

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Region Segmentation Region Segmentation

Region Segmentation Region Segmentation /7/ egion Segentation Lecture-7 Chapter 3, Fundaentals of Coputer Vision Alper Yilaz,, Mubarak Shah, Fall UCF egion Segentation Alper Yilaz,, Mubarak Shah, Fall UCF /7/ Laer epresentation Applications

More information

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

On Fusion of Gated Imaging and Local Shape Features for Identification of Objects in Cluttered Scenes

On Fusion of Gated Imaging and Local Shape Features for Identification of Objects in Cluttered Scenes Proceedings of the 6th WSEAS International Conference on Robotics, Control and Manufacturing Technology, Hangzhou, China, April 16-18, 006 (pp187-19) On Fusion of Gated Imaging and Local Shape Features

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS

NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS I. Ernst a *, M. Hetscher a, K. Thiessenhusen a, M. Ruhé a, A. Börner b, S. Zuev a a DLR, Institute of Transportation Research,

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Feature-Centric Evaluation for Efficient Cascaded Object Detection

Feature-Centric Evaluation for Efficient Cascaded Object Detection IEEE Conference on Coputer Vision and Pattern (CVPR, 2004 Feature-Centric Evaluation for Efficient Cascaded Object Detection Henry Schneideran 1 Robotics Institute Carnegie Mellon University Pittsburgh,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

3D Human Action Recognition using Hu Moment Invariants and Euclidean Distance Classifier

3D Human Action Recognition using Hu Moment Invariants and Euclidean Distance Classifier Vol. 8, No. 4, 017 3D Huan Action Recognition using Hu oent Invariants and Euclidean Distance Classifier Fadwa Al-Azzo Syste Engineering Departent University of Arkansas at Little Rock Arkansas, USA Arwa

More information

Mirror Localization for a Catadioptric Imaging System by Projecting Parallel Lights

Mirror Localization for a Catadioptric Imaging System by Projecting Parallel Lights 2007 IEEE International Conference on Robotics and Autoation Roa, Italy, 10-14 April 2007 FrC2.5 Mirror Localization for a Catadioptric Iaging Syste by Projecting Parallel Lights Ryusuke Sagawa, Nobuya

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Hand Gesture Recognition for Human-Computer Interaction

Hand Gesture Recognition for Human-Computer Interaction Journal of Coputer Science 6 (9): 002-007, 200 ISSN 549-3636 200 Science Publications Hand Gesture Recognition for Huan-Coputer Interaction S. ohaed ansoor Rooi, R. Jyothi Priya and H. Jayalakshi Departent

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Supplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions

Supplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions Suppleentary Section In this section, we include ore details about our algorith, labeling functions, datasets as well as additional results and coparisons, which could not be included in the ain paper

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Abstract. 2. Segmentation Techniques. Keywords. 1. Introduction. 3. Threshold based Image Segmentation

Abstract. 2. Segmentation Techniques. Keywords. 1. Introduction. 3. Threshold based Image Segmentation International Journal of Advanced Coputer Research (ISSN (print): 49-777 ISSN (online): 77-7970) Volue-3 Nuber- Issue-8 March-03 MRI Brain Iage Segentation based on hresholding G. Evelin Sujji, Y.V.S.

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Lighting Control System with Low Rate Network Green Computing System. Abstract

Lighting Control System with Low Rate Network Green Computing System. Abstract The 2 nd RMUTP International Conference 2010 Page 24 Lighting Control Syste with Low Rate Network Green Coputing Syste Wanapun Waiyawut Departent of Coputer Engineering, Faculty of Engineering, Rajaangala

More information

Data Acquisition of Obstacle Shapes for Fish Robots

Data Acquisition of Obstacle Shapes for Fish Robots Proceedings of the 2nd WEA International Conference on Dynaical ystes and Control, Bucharest, oania, October -17, 6 Data Acquisition of Obstacle hapes for Fish obots EUNG Y. NA, DAEJUNG HIN, JIN Y. KIM,

More information

The Horizontal Deformation Analysis of High-rise Buildings

The Horizontal Deformation Analysis of High-rise Buildings Environental Engineering 10th International Conference eissn 2029-7092 / eisbn 978-609-476-044-0 Vilnius Gediinas Technical University Lithuania, 27 28 April 2017 Article ID: enviro.2017.194 http://enviro.vgtu.lt

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

INTRINSIC DECOMPOSITION FOR STEREOSCOPIC IMAGES

INTRINSIC DECOMPOSITION FOR STEREOSCOPIC IMAGES INTRINSIC DECOMPOSITION FOR STEREOSCOPIC IMAGES Dehua Xie 1, Shuaicheng Liu 1, Kaio Lin 2, Shuyuan Zhu 1, and Bing Zeng 1 1 School of Electronic Engineering, University of Electronic Science and Technology

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Modal Masses Estimation in OMA by a Consecutive Mass Change Method.

Modal Masses Estimation in OMA by a Consecutive Mass Change Method. Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

(Geometric) Camera Calibration

(Geometric) Camera Calibration (Geoetric) Caera Calibration CS635 Spring 217 Daniel G. Aliaga Departent of Coputer Science Purdue University Caera Calibration Caeras and CCDs Aberrations Perspective Projection Calibration Caeras First

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Development and self-calibration of a robotic visual inspecting system

Development and self-calibration of a robotic visual inspecting system nd International Conference on Machinery, Electronics and Control Siulation (MECS 7) Developent and self-calibration of a robotic visual inspecting syste Chengyi Yu, a, Xiaobo Chen,b and Juntong Xi3,c

More information

G045 3D Multiple Attenuation and Depth Imaging of Ocean Bottom Seismic Data

G045 3D Multiple Attenuation and Depth Imaging of Ocean Bottom Seismic Data G045 3D Multiple Attenuation and Depth Iaging of Ocean Botto Seisic Data J. Mispel* (StatoilHydro ASA), B. Arntsen (StatoilHydro ASA), A. Kritski (StatoilHydro ASA), L. Aundsen (StatoilHydro ASA), M. Thopson

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS*

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* irnper neuvork protocols. A. Danthine. editor, 'iniversite de liege. I'->7X. F3 FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* Gregor V. Bochann Departeent de Matheatiques Ecole Polytechnique Federals

More information

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida

More information

Asynchronous Distributed Data Parallelism for Machine Learning

Asynchronous Distributed Data Parallelism for Machine Learning Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Global Optimization of Transmitter Placement in Wireless Communication Systems

Global Optimization of Transmitter Placement in Wireless Communication Systems Global Optiization of Transitter Placeent in Wireless Counication Systes J. He, A. Verstak, L. T. Watson, T. S. Rappaport, C. R. Anderson, N. Raakrishnan, C. A. Shaffer, W. H. Tranter, K. Bae, J. Jiang

More information