Subband coding of image sequences using multiple vector quantizers. Emanuel Martins, Vitor Silva and Luís de Sá

Size: px
Start display at page:

Download "Subband coding of image sequences using multiple vector quantizers. Emanuel Martins, Vitor Silva and Luís de Sá"

Transcription

1 Sund coding of imge sequences using multiple vector quntizers Emnuel Mrtins, Vitor Silv nd Luís de Sá Instituto de Telecomunicções, Deprtmento de Engenhri Electrotécnic Pólo II d Universidde de Coimr, 3030 COIMBRA, PORTUGAL ABSTRACT One efficient wy to compress digitl imges is sund coding. Sund coding using vector quntiztion could e competitor to DCT-like imge compression schemes. In this pper we will descrie n imge sequence compression lgorithm sed on difference imge coding techniques, with lock motion compenstion, difference imge segmenttion in rectngles using qudtrees, decomposition of rectngles in sunds nd vector quntiztion of the sunds. The vector quntiztion scheme uses multiple vector quntizers, which yields etter itrte lloction. The quntiztion of ech sund is performed y 3 different tree structured vector quntizers (TSVQ) t vrile tree depths. The Rte-Distortion (R-D) curves of ll the rectngles re scnned to get the est glol R-D comintion. The est comintion prmeters re coded nd used to quntize the sunds of ll the rectngles. The results show slightly etter performnce of the this scheme in reltion to the optiml sclr quntiztion of sunds (Entropy Limit). The coding speed of this VQ scheme is only 3 times slower thn 1 single vector quntiztion per vector. Keywords: Imge coding, sund coding, vector quntiztion, multiple quntizers 1. INTRODUCTION Nowdys there re numer of existing stndrds for digitl video compression 1,2,3 with very good performnce in terms of the qulity/rte rtio. These use similr nd common techniques with reduced differences etween them. They comine interfrme prediction, lock trnsform, sclr quntiztion, run-length encoding nd sclr entropy coding. The video coding system descried in this pper differs from the existing stndrds, ecuse it uses vrile size rectngle segmenttion, sund coding nd vector quntiztion. The im of this work ws to study vector quntiztion (VQ) in comintion with sund coding. Sund decomposition hs shown to chieve good visul results in comprison to lock trnsform techniques. VQ is very efficient method for compression of voice nd imge signls 5,6, in prticulr is very suitle for low itrte pplictions, where the desired finl visul qulity is not too high. However VQ needs too mny resources for rel time imge compression such s computtionl power nd memory. For prcticl resons vector dimensions greter thn 16 re voided, otherwise the compression system ecomes too much complex. In this pper we compre Vector Quntiztion (VQ) to sclr quntiztion (SQ) with regrd to the performnce of n existing video compression system 7 using temporl prediction, sund decomposition, sclr quntiztion nd entropy coding. In order to mke the comprison, the SQ prt of the lgorithm ws chnged y VQ. The remining prts of the lgorithm were left unchnged. In this study VQ is pplied to locks of pels elonging to the sunds, using multivector quntizers with vrile dimensions (2 1 up to ). In order to reduce the computtionl effort of the encoder, quternry tree structured vector quntiztion (TSVQ) ws employed. 2. THE VIDEO COMPRESSION SYSTEM The hyrid compression system used in this work comines severl techniques of digitl imge compression. A rief review of these techniques is presented Coding of imge differences Moving imges re very correlted in time. The 1st order entropy of one single frme in movie is greter thn the 1st order entropy of the difference etween consecutive frmes.

2 SPLIT frme 21 frme21 - frme 20 current frme difference frme difference frme encoder compressed difference frme previous decoded frme current decoded frme 1 frme dely difference frme decoder decoded difference frme =trnsmited dt strem = decoder replic in encoder Fig.1 - First order entropy. () Isolted frme, H 1 = 6,89 pp. () difference etween consecutive frmes, H 1 = 3,61 pp. (SPLIT movie, 8pp). Fig.2 - Video encoder sed on simple prediction nd difference coding. Almost ll the video compression systems exploit this temporl correltion nd use interfrme prediction, e.g. they encode the difference etween frmes insted of isolted frmes. Fig.2 shows the interfrme prediction scheme used in our encoder. The dt to e coded is the difference etween the current frme, in the entrnce of the encoder, nd the previous coded frme. The previous coded frme is the one expected on the decoder output, if no error occurs in the trnsmission chnnel Imge segmenttion nd motion estimtion nd lock merging The system divides the difference imge in locks of 8 8 pels (moving locks) nd drops those with smll energy, the not moving locks (ckgrounds normlly). Fig.3 shows n exmple where only 0% of the totl imge is to e coded. c c c c () () (c) (d) Fig.3 - () Blocks to e coded, from Fig.1 (in gry). () Blocks to e coded fter relxtion (lck res re not coded). (c) Block merging. Simple exmple. (d) Result of lock merging of Fig.3 (1 lock = 8 8 pels). The moving locks (with energy ) re merged in rectngulr regions. In order to get smll numer of (nd wide) regions relxtion lgorithm is pplied to the locks resulting from the segmenttion stge. This method produces more homogeneous res fter the merging nd llows etter results for sund coding. Fig.3 shows the result of the relxtion procedure. The merging lgorithm uses qudtrees to construct the wide rectngles efficiently 8. Fig.3c shows the result of the lock merging lgorithm for prticulr exmple. This procedure reduces the order effects cused y sund quntiztion nd decorreltes etter imge dt. The system performs lso motion estimtion like MPEG. Mtching locks hve only 8 8 pels nd the serch re is within window of ±16 pels. The motion vectors re encoded like in MPEG Sund decomposition Sund decomposition is one of mny ville methods used to decorrelte dt. Sund decomposition cn e seen s specil trnsform. The most used method to decorrelte dt in imge compression is the DCT - Discrete Cosine Trnsform, lock trnsform, normlly pplied to locks of 8 8 pels. In this system we chose sund coding in order to get good visul results in the decoded imges nd to void common lock rtifcts tht pper in lock trnsform sed pproches.

3 Current Imge Difference Imge Msk Informtion Overhed extrct chnged locks sund decomposition VQ with multi-tsvq vector codes 1imge rectng. Dec. Bnds LL LH HL HH LL 0 LH 1 HL 2 HH 3 L= low, low frequency H= high, high frequency Dec. Bnds LL LH HL HH LL LH 5 HL 6 HH 7 Dec. Bnds 1st letter- horizontl 2nd letter-vertic. LL LH HL HH LL 8 LH 9 HL 10 HH 11 Fig. - Sund decomposition of rectngle. p p e r2 h ḋ rw Previous decoded imge motion estimtion Dely of 1 imge = dt trnsmited to decoder motion dt overhed motion dt overhed Current decoded imge motion compensted Msk Informtion Overhed (shded picture) the copy of decoder in the coder inverse VQ inverse decomposition Fig. 5 - Glol digrm of the video encoder. pper2.drw This system uses pyrmid sund decomposition of rectngles, where ech rectngle is decomposed in sunds: LL (low-low), the low frequencies nd, LH (low-high), HL (high-low) nd HH (high-high). L nd H mens the kind of filtering tht is done to the 2-D signl. The 2-D filters used in the decomposition re seprle so tht they implemented through 2 1- D filters: one low-pss filter nd one high-pss filter. The 1-D filters re FIR (Finite Impulse Response) filters with length nd re pplied first horizontlly nd then verticlly. The filters were designed in order to otin n optiml performnce from the point of view of imge coding gin 9. The LL nd is further decomposed in new sunds if the originl rectngle is greter or equl to lock of pels. The second LL sund is even further decomposed in new sunds if the originl rectngle is greter or equl to lock of pels. Fig. shows the pyrmid sund decomposition scheme used in our system. After sund decomposition ech smple (coefficient) of the sunds re sclr quntized. The quntiztion of the sunds reduces the it rte generted y the imges ut introduces distortion to the reconstructed imges. The glol digrm of the video encoder is shown in Fig SUBBAND QUANTIZATION Sclr quntiztion is used in the mjority of imge compression systems ecuse it is esy to use nd llows entropy coding without incresing too much the complexity of the system. Vector quntizers re less used ecuse of their complexity, despite the existence of low complexity schemes tht hve only smll decrese of performnce in comprison to the most effective nd complex ones. The dvntge of tree structured quntizers, TSVQ 6, is tht its coding speed is greter tht tht of the Full Serch VQ (FSVQ), in the group of memoryless VQ. There re, of course, VQ techniques with etter performnce like ECVQ - Entropy Constrined Vector Quntiztion 10 - or EPTSVQ - Entropy-Pruned Tree Structured Vector Quntiztion 11. However they hve prohiited complexity for imge compression systems with men/high qulity Multiple quntizers Ech sund hs its own sttistics, we use different quntizers nd codeooks for ech sund. These quntizers nd codeooks re especilly designed for the sund they re intended for. In order to overcome some limittions of TSVQ quntizers, in terms of vrile it rte through wide rnge, we choose severl quntizers up to mximum of per sund, vrying for ech one the dimensions of the vectors. Of course, the low frequencies sunds will need more it rte to e coded thn the high frequencies sunds ecuse they crry more visul informtion nd re more sensile to quntiztion distortion. After decomposing ech rectngle in severl sunds, they re reorgnized to fit in the sme rectngle like the exmples of Figures 6, 6c nd 6d. These new rectngles of sunds re prtitioned in locks of x elements s shown in Fig.6 nd these re the locks which will e vector quntized. In the exmple of Fig.6 we cn see tht there re locks distriuted over 1, 2 or sunds. Becuse ech lock must e quntized only with one codeook, it ws necessry to choose wht codeook to ssign to ech lock. For given x lock we ssign the codeook tht corresponds to the sund where the upper left pixel of the x lock lies (see Fig. 6, dotted squres). In this we use the codeook of the frequency sund when the x lock spns more thn one sund (note tht low frequency sunds need more trnsmission it rte thn high frequency sunds)

4 sunds () sund numer of lock () (c) (d) quntifier x pplied once worst distortion low rte quntifier x2 pplied twice quntifier 2x2 pplied times quntifier 2x1 pplied 8 times etter qulity high rte Fig.6 - Reorgnizing of one rectngle in sunds nd locks of x pels. () Loction of sunds fter 2 decompositions. () Numering sund locks. (c) Loction of sunds fter 1 decomposition. (d) Loction of sunds fter 3 decompositions. Fig.7 - Prtition of one lock of elements. There re severl quntizers for ech sund, depending on the desired finl imge qulity. Ech quntizer s tree must not occupy more memory thn tht occupied y vectors, otherwise the encoder will spent much memory. It ws necessry to devise wy of rising the it rte without rising the size of the trees. So, ech lock of elements is prtitioned in severl locks of lower dimensions depending on the rte/distortion of the lock. These sulocks re coded y different quntizers. Fig. 7 shows severl possiilities of prtitioning one lock of elements. This prtition method llows vrile it rtes per pel. Greter dimensions, like nd 2, re used for low itrtes with high distortion. Lower dimensions, like 2 2 nd 2 1, re used for high qulity using high itrtes Trining codeooks A different quntizer ws ssigned to ech of the 12 sunds nd, in ech sund, there re severl possiilities for the size of the vectors to e quntized (, 2, 2 2 nd 2 1). This mens tht the compression system would spend memory to mintin 8 codeooks. For memory sving purposes this numer ws decresed to less thn 16 codeooks, exploiting the fct tht codeook trined with one of LL sunds cn e used to code the others sunds, if they hve similr sttistics (when using the scheme in Fig.). One test hs shown tht using quntizer to code sund (LL) trined with sund led to the sme result thn using codeook trined with sund 0 (LL lso). Using this ssumption, the codeook trined with sund 0 is used to code sunds 0, nd 8 (the LL sunds). This procedure is lso pplied in the other sunds. In order to trin the codeooks used y the vector quntizers, we hd to choose n imge sequence (movie) representtive of wide rnge of imges tht could pper t the encoder input. We used the LTS/EPFL sequence 12, ecuse this sequence is rich in complex motion like cmer pn, zooming nd unzooming. Normlly this kind of motion does not pper when testing video compression stndrds. The vectors used to trin the codeooks for the video encoder were otined using dedicte progrm. This progrm is replic of the video encoder, without the quntiztion prt. The vectors in the input of the quntiztion prt re those tht would e vector quntized. After getting the trin vectors, ech codeook ws trined using the LBG lgorithm 13 for TSVQ. The size of the designed quternry trees is 6 levels with vectors per level, wht gives mximum of 096 vectors per codeook. We choose quternry trees ecuse of their serch speeds. Binry trees re fstest, ut hve not so good qulity s quternry trees. If we choose more thn vectors per rnch of the tree, we will increse the coding time nd the encoder would ecome very slow Vrile rte quntiztion Better results cn e chieved y vrying the lloction of the ville it rte long the rectngles of the frme to encode. Some locks of the frme need more itrte to code thn others, ssuming the sme finl qulity. So, this system mkes use of compression fctor for ech rectngle, where different compression fctor mens different it rte to tht rectngle nd lso different quntizer nd vector size. We ve chosen 16 compression fctors for ech lock. This gives 16x12=192 prmeters to choose. The configurtion of the encoder (the reltion etween the compression fctor nd the vector quntizer used t ech sund nd the it rte used with ech vector) ws, in certin wy, heuristic. We hd some difficulty to choose ll the 192 prmeters nd this is still under study.

5 The ttriution of the compression fctors to ech rectngle is mde fter quntizing ech rectngle with ll the 16 compression fctors. The distortion nd rte for ech fctor nd rectngle is otined nd n itertive procedure finds good comintion of compression fctors for ll the rectngles tht mximize the finl PSNR of the decoded imge. This optimiztion procedure of the compression fctors is only 3 to times slower thn one single quntiztion insted of eing 16 times slower. It is not necessry to quntize ech rectngle for ll the 16 compression fctors ecuse we use, for different compression fctors, the sme quntizers ut with different serching depth levels of the tree. After choosing the compression fctors for ll the rectngles, the encoder send the indexes of the compression fctors for the decoder nd the codes of ech quntized vector. With this lst informtion plus the motion vectors, the imge msk nd the previous decoded imge, the decoder cn reconstruct the encoded imge.. RESULTS We hve simulted the video compression system descried efore. The tests were mde in severl monochromtic imge sequences, like SPLIT (6 people moving simultneously), Miss Americ nd Trevor. All imge sequences hve CIF resolution ( pels). The results re presented in figures 8, 9 nd 10 in terms of PSNR (Pek Signl to Noise Rtio) versus frme numer. PSNR [db] Frme Numer Fig. 8 - PSNR of the sequence SPLIT coded t 0.3 pp (26 ). 1 st imge coded with norml TSVQ of pels locks t 0.3 pp. Thick Line: Sund VQ with multiple quntizers (<PNSR>=32.16 db). Dshed line: Sund SQ with idel entropy coding (<PSNR>=31.29 db). PSNR [db] Frme Numer Fig.9 - PSNR for severl imge sequences coded t 0.3 pp (originls t 8 pp) (26 ). 1 st imge known y the decoder. Thick line = Miss Americ. Norml line = Trevor. Dshed line = SPLIT. PSNR [db] Frme Numer Fig.10 - PSNR of decoded sequence Miss Americ. 1 st imge known y the decoder. Thick Line: 0.15 pp (52 ). Dshed line: 0.11 pp (72 ). In Fig.8 we compre the performnce of the VQ coding lgorithm relted to the SQ coding of the sunds coefficients. Fig. 8 shows difference of 1 db in PSNR etween VQ nd SQ which mens tht the VQ system offers only smll increse in performnce. In Fig.9 we show the results in terms of PSNR for severl sequences compressed 26 times (0.3 pp), Miss Americ, Trevor nd SPLIT. Fig 10 shows the performnce in PSNR for higher compression rtes (52 times nd 72 times) for the Miss Americ sequence.

6 5. CONCLUSION We hve presented new video compression method using vector quntiztion of sunds with multiple quntizers. The encoder includes sund decomposition, imge segmenttion nd motion estimtion. The performnce of this system using vector quntiztion is slightly etter thn the similr system using sclr quntiztion with idel entropy coding. The system is not yet fully explored ecuse its configurtion hs mny vrile prmeters. 6. REFERENCES 1. ITU-T Rec. H.261, Video Codec for udiovisul services t px6 kit/s, Genev, 1990; revised t Helsinki, ISO/IEC , Coding of moving picture nd ssocited udio for digitl storge medi up to out 1,5 Mit/s, Prt 2: Video, 1993 (MPEG-1). 3. ISO/IEC ITU-T Rec. H.262, Generic coding of moving pictures nd ssocited udio informtion Prt 2: Video, Octoer 199, (MPEG-2).. J.W. Woods (editor), Sund imge coding, Kluwer Acdemic Pulishers, R.M. Gry, Vector Quntiztion, IEEE ASSP Mgzine, pp. -29, April A. Gersho nd R.M. Gry, Vector Quntiztion nd signl compression, Kluwer Acdemic Pulishers, Boston, MA V. Silv nd L. Sá, Vrile lock size wvelet video coding, in Proc. of IEEE-SP Interntionl Symposium on Time- Frequency nd Time-Scle Anlysis, pp.32-35, V. Silv nd L. Sá, Qudtree sed lock merging lgorithm for su-nd coding, Proc. SPIE - Europen Symposium on dvnced Network nd Services, 20-2 Mrch V.Silv nd L. Sá, Anlyticl Optimiztion of CQF filters, IEEE Trns. on Signl Processing, Vol., No. 6, pp , June P.A. Chou, T. Lookugh nd R.M. Gry, "Entropy-Constrined Vector Quntiztion", IEEE Trns. on Acoustics, Speech, nd Signl Processing, Vol. 37, No.1, pp.31-2, Jnury E. A. Riskin., T. Lookugh, P.A. Chou nd R.M. Gry, "Vrile Rte Vector Quntiztion for Medicl Imge Compression", IEEE Trns. on Medicl Imging, pp , Septemer André Nicoulin, The LTS/EPFL video sequence for very low it rte coding, Swiss Federl Institute of Technology, Lusnne, Y. Linde, A. Buzo nd R. Gry, An lgorithm for vector quntizer design, IEEE Trns. on Communictions, vol.28, nº.1, pp.8-95, Jnury 1980.

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Video-rate Image Segmentation by means of Region Splitting and Merging

Video-rate Image Segmentation by means of Region Splitting and Merging Video-rte Imge Segmenttion y mens of Region Splitting nd Merging Knur Anej, Florence Lguzet, Lionel Lcssgne, Alin Merigot Institute for Fundmentl Electronics, University of Pris South Orsy, Frnce knur.nej@gmil.com,

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho

IMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho IMAGE QUALITY OPTIMIZATIO BASED O WAVELET FILTER DESIG AD WAVELET DECOMPOSITIO I JPEG2000 Do Qun nd Yo-Sung Ho School of Informtion & Mechtronics Gwngju Institute of Science nd Technology (GIST) 26 Cheomdn-gwgiro

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

Digital Design. Chapter 1: Introduction. Digital Design. Copyright 2006 Frank Vahid

Digital Design. Chapter 1: Introduction. Digital Design. Copyright 2006 Frank Vahid Chpter : Introduction Copyright 6 Why Study?. Look under the hood of computers Solid understnding --> confidence, insight, even better progrmmer when wre of hrdwre resource issues Electronic devices becoming

More information

Image Segmentation Using Wavelet and watershed transform

Image Segmentation Using Wavelet and watershed transform Imge Segmenttion Using Wvelet nd wtershed trnsform Atollh Hdddi, Mhmod R. Shei, Mohmmd J. Vldn Zoej, Ali mohmmdzdeh Fculty of Geodesy nd Geomtics Engineering, K. N. Toosi University of Technology, Vli_Asr

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle Textiles nd Light ndustril Science nd Technology (TLST) Volume 3, 2014 DO: 10.14355/tlist.2014.0301.01 http://www.tlist-journl.org Anlysis of Computed Diffrction Pttern Digrm for Mesuring Yrn Twist Angle

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

Machine vision system for surface inspection on brushed industrial parts.

Machine vision system for surface inspection on brushed industrial parts. Mchine vision system for surfce inspection on rushed industril prts. Nicols Bonnot, Rlph Seulin, Frederic Merienne Lortoire Le2i, CNRS UMR 5158, University of Burgundy, Le Creusot, Frnce. ABSTRACT This

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Lossy Images Compression Based on Multiresolution

Lossy Images Compression Based on Multiresolution Reserch Article Open Access Lossy Imges Compression Bsed on Multiresolution Rn T. Al-Timimi Deprtment of Bnking nd Finncil Sciences, College of Mngement nd Economic, Mustnsiriyh University, IRAQ *Author

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

An Effective Thresholding Technique for Otsu s Method using Contrast Enhancement 1 A Sankar Reddy, 2 C Usha Rani, 3 M. Sudhakar

An Effective Thresholding Technique for Otsu s Method using Contrast Enhancement 1 A Sankar Reddy, 2 C Usha Rani, 3 M. Sudhakar www.ijecs.in Interntionl Journl Of Engineering And Computer Science ISSN:39-74 Volume 6 Issue 8 August 07, Pge No. 96-304 Index Copernicus vlue (05): 58.0 DOI: 0.8535/ijecs/v6i8. An Effective Thresholding

More information

An Expressive Hybrid Model for the Composition of Cardinal Directions

An Expressive Hybrid Model for the Composition of Cardinal Directions An Expressive Hyrid Model for the Composition of Crdinl Directions Ah Lin Kor nd Brndon Bennett School of Computing, University of Leeds, Leeds LS2 9JT, UK e-mil:{lin,brndon}@comp.leeds.c.uk Astrct In

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Chapter 1: Introduction

Chapter 1: Introduction Chpter : Introduction Slides to ccompny the textbook, First Edition, by, John Wiley nd Sons Publishers, 7. http://www.ddvhid.com Copyright 7 Instructors of courses requiring Vhid's textbook (published

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

Naming 3D objects. 1 Name the 3D objects labelled in these models. Use the word bank to help you.

Naming 3D objects. 1 Name the 3D objects labelled in these models. Use the word bank to help you. Nming 3D ojects 1 Nme the 3D ojects lelled in these models. Use the word nk to help you. Word nk cue prism sphere cone cylinder pyrmid D A C F A B C D cone cylinder cue cylinder E B E prism F cue G G pyrmid

More information

A COLOUR CORRECTION PREPROCESSING METHOD FOR MULTIVIEW VIDEO CODING

A COLOUR CORRECTION PREPROCESSING METHOD FOR MULTIVIEW VIDEO CODING A COLOR CORRECTO REROCESSG METHOD FOR MLTEW DEO CODG Colin Doutre nd nos siopoulos Deprtment of Electricl nd Computer Engineering, niversity of British Columbi 66 Min Mll, 6T Z4, ncouver, BC, Cnd emil:

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 (19) United Sttes US 2013 0235938A1 (12) Ptent Appliction Publiction (10) Pub. No.: US 2013/0235938 A1 HUANG et l. (43) Pub. Dte: Sep. 12, 2013 (54) RATE-DISTORTION OPTIMIZED (52) U.S. Cl. TRANSFORMAND

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example: cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles

More information

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,

More information

International Journal of Research in Computer and Communication Technology, Vol 4, Issue 2, February- 2015

International Journal of Research in Computer and Communication Technology, Vol 4, Issue 2, February- 2015 Interntionl Journl of Reserch in Computer nd Medicl nd Multimedi Imge Compression using Multi Resolution Trnsforms P.V.L. Suvrchl, A.3 Um Devi, 3 Ch. Sireesh, 4 P. Rjesh Associte Professor.3.4,(B.Tech

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Loop Pipelining in Hardware-Software Partitioning

Loop Pipelining in Hardware-Software Partitioning Loop Pipelining in Hrdwre-Softwre Prtitioning Jinhwn Jeon nd Kioung Choi School of Electricl Engineering Seoul Ntionl Universit Seoul, Kore 151-742 Tel: +82-2-880-5457 F: +82-2-887-6575 e-mil: {jeonjinh,kchoi}@popp.snu.c.kr

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a.

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a. Chpter Prerequisites for Clculus. Functions nd Grphs Wht ou will lern out... Functions Domins nd Rnges Viewing nd Interpreting Grphs Even Functions nd Odd Functions Smmetr Functions Defined in Pieces Asolute

More information

Agenda & Reading. Class Exercise. COMPSCI 105 SS 2012 Principles of Computer Science. Arrays

Agenda & Reading. Class Exercise. COMPSCI 105 SS 2012 Principles of Computer Science. Arrays COMPSCI 5 SS Principles of Computer Science Arrys & Multidimensionl Arrys Agend & Reding Agend Arrys Creting & Using Primitive & Reference Types Assignments & Equlity Pss y Vlue & Pss y Reference Copying

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

YOU ARE: AND THIS IS:

YOU ARE: AND THIS IS: YOU ARE: AND THIS IS: SoHE CMS Mnul As edited August 4, 015 TABLE OF CONTENTS 3 Logging in 4 Pge types within the dshord 5-6 Exploring the toolr 7-8 Adding pge 9 Editing pge 10 Pge templtes: Met Templte

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information