Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Size: px
Start display at page:

Download "Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique"

Transcription

1 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique Bilan Zhu and Maaki Nakagawa Department of Computer and Information Science, Tokyo Univerity of Agriculture and Technology, Tokyo , Japan {zhubilan, nakagawa}@cc.tuat.ac.jp Abtract Thi paper decribe a method for building a compact on-line Markov random field (MRF) recognizer for large handwritten Japanee character et uing tructured dictionary repreentation and vector quantization (VQ) technique. The method plit character pattern into radical, whoe model by MRF are hared by different character uch that a character model i contructed from the contituent radical model. Many ditinct radical are hared by many character with the reult that the torage pace of model dictionary can be aved. Moreover, in order to further compre the parameter, we employ VQ technique to cluter parameter et of the mean vector and covariance matrixe for MRF unary feature and binary feature a well a the tranition probabilitie of each tate into group. By haring a common parameter et for each group, the dictionary of the MRF recognizer can be greatly compreed without recognition accuracy lo.. Introduction Due to the development and proliferation of penbaed or touch-baed input device uch a tablet terminal, mart phone, electronic whiteboard and digital pen (e.g., Anoto pen), on-line handwritten character recognition i reviving even larger attention than before. Although character claifier with high recognition accuracy have been reported [-5], the demand for peeding up recognition and mall memory conumption i very high for portable device a well a dek-top application for which handwriting recognition i incorporated a one of module. Performance of thee relatively mall device require a handwriting recognition ytem a mall a poible and recognition peed a fat a poible while maintaining high accuracy. Even for a dektop PC with relatively high device performance, recognition peed within 0.5 econd per page and memory conumption within 0 MB are required in actual application. Therefore, we need to refine the recognition cheme to reduce the ytem memory conumption. Chinee, Japanee or Korean have thouand of different categorie and their large character et i problematic not only in recognition rate but alo in recognition peed and memory conumption. We have propoed a robut on-line handwritten Japanee character recognition method uing a MRF model [4, 5]. Although it realize high recognition performance, however, the MRF recognizer require about 20MB memory conumption due to the larger character et of 7,097 character categorie within which included are 2,965 Kanji character of the JIS level- tandard and 3,390 Kanji character of the level-2 tandard a well a kana, Englih alphabet and o on. After combining the MRF recognizer with an off-line recognizer by the modified quadratic dicriminant function (MQDF) and linguitic context proceing at the tring recognition tep, the recognition ytem would require more larger memory conumption becaue of the large memory ize for the MQDF dictionary and the linguitic context dictionary. Therefore, we need to compre the memory ize a greatly a poible while maintaining high accuracy. In egmentation-free HMM-baed Englih word recognition, each letter i modeled a a HMM, word HMM are contructed by concatenating letter HMM during recognition [6-8]. We can regard each radical of Japanee character a an Englih letter and each Japanee character a an Englih word, then we can /2 $ IEEE DOI 0.09/ICFHR

2 apply the Englih word recognition method to recognize Japanee character. However, the radical in Japanee character are different from the Englih letter largely, where the radical with the ame type from different Japanee character may have different ize, vertical-horizontal ratio and poition with the reult that they have very different covariance matrixe among MRF model. It reult in low recognition performance if we merge the radical MRF model with different covariance matrixe. We preented an effective tructured templatebaed on-line recognizer [9]. However, it did not need to conider the covariance matrixe of feature point, o that there wa no problem uch a MRF recognizer. Nakai et al. [0-2] preented a tructured HMMbaed on-line Japanee recognizer, where ubtroke HMM were ued to contruct the character model by concatenating them. However, only few character categorie (06 categorie) were ued o that it did not caue the problem that the radical with the ame type from different Japanee character have very different covariance matrixe. Moreover, only haring the common parameter of ubtroke limit the compreion effectivene. Long et al. [3] contructed a compact off-line MQDF recognizer by VQ technique. They plit each two adjacent parameter element of feature vector a a et, and clutered the parameter et into group, and then by haring a common parameter et for each group, the dictionary of the recognizer wa greatly compreed. In our on-line MRF recognizer, there are many imilar unary feature and binary feature among character or radical. Therefore, we can plit the parameter of each mean vector, thoe of each covariance matrix for unary feature and binary feature, a well a thoe of the tranition probabilitie of each tate a a et, and cluter the parameter et into group, with each group haring a common parameter et. It can reult in more effective compreion. In thi paper, we preent a method for building a compact on-line MRF recognizer for large handwritten Japanee character et, where the radical model are hared by different character, and a character model i contructed from the contituent radical MRF model. We invetigate how to normalize the ize and poition of radical with the ame type from different character. Moreover, we employ VQ technique to cluter the parameter et of the mean vector and the covariance matrixe a well a the tate tranition probabilitie for MRF into group. By haring a common parameter et for each group, the dictionary of the MRF recognizer can be greatly compreed without recognition accuracy lo. The ret of thi paper i organized a follow: Section 2 give an overview of our online handwritten character recognition method. Section 3 preent the contruction of our tructured MRF dictionary. Section 4 decribe the dictionary compreion by VQ. Section 5 preent the experimental reult and Section 6 draw our concluion. 2. Recognition ytem overview We linearly normalize an input pattern by converting the pen-tip trace pattern to a tandard ize, preerving the horizontal-vertical ratio. After normalization, we extract feature point uing the method developed by Ramner [4]. Firt, the tart and end point of every troke are picked up a feature point. Then, the mot ditant point from the traight line between adjacent feature point i elected a a feature point if the ditance to the traight line i greater than a threhold value. Thi election i done recurively until no more feature point are elected. Thi feature point extracting proce i hown in Fig. (a). The extracted feature point repreent the tructure of a pattern. They are effective and more efficient to proce compared with proceing all the pen-tip point, a wa done in previou tudie [6-8]. We et feature point from an input pattern a ite S={, 2, 3,, I } and tate of a C a label L={l, l 2, l 3,,l J }. The method recognize the input pattern by aigning label to the ite to make the matching between the input pattern and each C uch a F={ = l, 2 = l, 3 = l 3,, 9 = l 8, 0 = l 8 }, a hown in Fig. (b). The notation F i a configuration and denote a mapping from S to L. We employ the coordinate of feature point a unary feature and the difference in coordinate between the neighboring feature point a binary feature. We then ue a MRF model to match the feature point with the tate of each character cla and obtain a imilarity for each one. We then elect the each character cla with the larget imilarity a the recognition reult [4, 5]. The neighborhood ytem of MRF model i et according to the ucceive adjacent feature point in writing order. We define a linear-chain MRF for each C, a hown in Fig. (c), where each label ha a tate and each tate ha three tranition. Therefore, the energy function i a follow: 56

3 E( O, F C) = E( O F, C) + E( F C). = I [ log P( O l log P( O l ], l log P( l l i i i i i i i i i= () (a) (b) where l i the label of a C aigned to i, i unary feature vector extracted from ite i, and O i the i O i j i the binary feature vector extracted from the combination of i and j. The maller the energy function in () become, the larger the imilarity between the input pattern and a C. Each C ha a linear-chain MRF, and the ytem ue the Viterbi earch to match feature point of the input pattern with tate for the MRF model of each C and to find the matching path with the mallet energy in () for each C. The unary feature vector O i comprie X and Y coordinate of i. The binary feature vector O ha i i two element (dx: X coordinate of i - X coordinate of i-, dy: Y coordinate of i - Y coordinate of i- ). Gauian function are ued to etimate P( O l, and i P( O l, l. P( l l i i ii i i i i etimated a follow: (c) Figure. Feature point extraction and labeling and linear-chain MRF. P( l i P( l Number of tranition from l to l i i l = i. (2) Number of ite aigned l l 0 = Number of Number of aigned l i (a) To train the MRF of each C, we firt initialize the feature point of an arbitrary character pattern among the training pattern of the C a tate of the MRF, et each unary feature vector of each feature point a the mean of the Gauian function for each ingle-tate, and et each binary feature vector between two adjacent feature point a the mean of the Gauian function for each pair-tate, and initialize the variance of thoe Gauian function and the tate tranition probabilitie a. Then we ue the Viterbi algorithm or the Baum-Welch algorithm to train the parameter of the MRF (the mean and variance of Gauian function and the tate tranition probabilitie). We repeat the training until the optimal parameter are obtained. 3. Contruction of tructured MRF dictionary Figure 2. Interface to conruct tructured MRF dictionary. (b) We firt create a MRF recognizer at the character level. From each character MRF model, we can obtain the mean vector of unary feature that repreent the mean coordinate of the feature point of training 57

4 pattern. Fig. 2 (a) and (b) how the mean coordinate of two character [ ] and [ ]. Each mall red rectangle how a feature point. All the troke are concatenated into a troke for each character to achieve troke-number independence. We created an interface to contruct tructured MRF dictionary a hown in Fig. 2. By a moue right click at a feature point, we can cut the character pattern at the feature point and, by a moue left click at a feature point we can concatenate the two radical beide the feature point. We can plit each character model into everal part by thee operation. Then, for each part we can regiter it a a new radical to the radical dictionary by cutting it and normalizing it to the radical dictionary ize. We can alo earch imilar radical from the regitered radical dictionary then elect a imilar radical index to regiter it. Fig. 2 how the plit character model for character [ ] and [ ]. After all character MRF model are plit and are regitered, we match all training pattern with character MRF model, and then we can cut each training pattern into radical at the place where character MRF model are plit. From the bounding boxe of radical of training pattern, we can obtain the mean bounding box a hown in Fig. 2. A hown in Fig. 2, we can ee that the radical with the ame type uch a [ ] from different character may have different ize and poition. We need to normalize the ize and poition of radical pattern. We can normalize them by the following two method: Method : Normalize each radical pattern according to the bounding box of the radical pattern. Method 2: Normalize each radical pattern according to the mean bounding box of the radical of training pattern In the method, there i a problem to extract radical pattern from character pattern. Thi i very difficult for Japanee character. Without robut extraction method, we need to hypothetically egment radical at every feature point, which reult in very larger proceing time. To olve the problem, we normalize radical pattern by the mean bounding boxe of radical appearing in n the ame character cla a hown in Fig.3, where the orange pattern how the input radical pattern. We cut out radical pattern, and then normalize them by the mean bounding box, then ue the normalized radical pattern to train the radical MRF model. When recognizing, we et the radical MRF model into the character model according to the mean bounding boxe by normalizing the mean vector and the covariance matrixe with the mean bounding box to contruct the character model. Each radical MRF may come from variou radical pattern in many character categorie that have very different ize and poition. We conider that different ize will bring different variance, which may reult in low recognition performance if we merge the radical MRF model with too different variance. Therefore, we propoe a method that ue the k-mean method to cluter the ize of each radical into group and plit the radical into multiple clae. We optimize the number of the group. 3. Dictionary compreion by VQ We propoe a dictionary compreion method inpired by the contruction method for a compact offline MQDF recognizer uing VQ technique [3]. In our on-line MRF recognizer, there are many imilar unary feature and binary feature among character model or radical model. We ue a linear-chain MRF for MRF model, where each label ha a tate and each tate ha three tranition. A hown in Fig. 4, each mean vector ha two parameter element, and each covariance matrix ha four parameter element for both of unary feature and binary feature. Each tate Figure 3. Radical pattern normalization. 58

5 TABLE I. STATISTICS OF CHARACTER PATTERN DATABASES. Nakayoi_t Kuchibue_d #writer Total,962 0,403 #character /each writer Kanji/Kana/ Symbol/alpha #character categorie /each writer #average category character 5,643/5,068/ 5,799/3,723/ numeral,085/66 86/65 Total 4,438 3,356 Kanji/Kana/ Symbol/alpha numeral 4058/69 49/ /69/ 46/62 Total Kanji/Kana/ Symbol/alpha numeral.4/ /.0.9/30.0/ 7.4/2.7 We firt compared the performance of three model: the original MRF without tructured dictionary repreentation, the tructured MRF (Str-MRF), and the tructured MRF which plit each radical into multiple clae by clutering the ize for each radical with a k-mean method (Str-MRF2). Table 2 how the reult where C r i the character recognition rate, peed i the average time to recognize a character. ha three tranition probabilitie o that it ha three parameter element. We conider the parameter of each mean vector, thoe of each covariance matrix and thoe of three tranition probabilitie of each tate a a et. Then we cluter the parameter et into group, with each group haring a common parameter et that i the canter of the group. Therefore, we only need to tore the indexe of the group and the center parameter of the group, o that it can realize more effective compreion. 4. Experiment Figure 4. Clutering parameter by VQ. We evaluate the compact recognizer for 2,965 Kanji character of the JIS level- tandard. We trained the character recognizer by uing an on-line Japanee handwriting databae called Nakayoi [5]. On the other hand, the performance tet wa made on an on-line Japanee handwriting databae called Kuchibue [5]. Table how the detail of the databae. Each character cla (character category) ha a different number of ample pattern, and kana and ymbol have more pattern (ee Table ). To maintain balance, we elected 00 pattern at random from each character cla of the Kuchibue databae and ued the ame number of ample pattern for each character cla to evaluate the performance. The experiment were implemented on an Intel(R) Xeon(R) CPU 3.36 GHz 3.36 GHz (2 proceer) with 2 GB memory. TABLE II. COMPARISON OF STRUCTED MODELS Method Original Performance MRF Str-MRF Str-MRF2 Cr (%) Tet memory 8MB 690KB 2.9MB peed 78.8u 78.9u 78.7u From thee reult, we can ee that Str-MRF largely degrade the character recognition accuracy, although it compree the memory pace largely. Str- MRF2 yield better recognition accuracy than Str- MRF, and it alo compree the memory pace from the original MRF. A for the peed, no lo ha been oberved. Then, we compared the performance of the dictionary compreion method by VQ. We can cluter the parameter et into 255 group, and ave each group index at byte data (VQ). We can alo cluter the parameter et into the optimal number of group, and ave each group index at 2 byte data (VQ2). Moreover, after contructing the tructured MRF, we can apply the VQ method to the tructured dictionary to further compre the dictionary. For original MRF, we ue 4 byte data to tore each parameter of the tate tranition probabilitie and the covariance matrixe, and ue 2 byte data to tore each parameter of the mean vector. Table 3 how the reult. 59

6 Method Performance Tet TABLE III. Original MRF dictionary COMPARISON OF VQ S VQ VQ2 VQ2+ Str- MRF2 Cr (%) memory 8MB 975KB.72MB 750KB peed 78.8u 96.6u 96.6u 96.6u From thee reult, we can ee that VQ2 achieve better character recognition accuracy, although it conume lightly more memory pace compared to VQ. Combining the tr-mrf2 with VQ2 yield better recognition accuracy and maller memory pace than VQ. A for the peed, little lo ha been oberved from VQ. 5. Concluion Thi paper preented a method for building a compact on-line MRF recognizer for large handwritten Japanee character et uing tructured dictionary repreentation and VQ technique. The radical model were hared by different character, and a character model wa contructed from the contituent radical MRF model. Moreover, we employed VQ technique to further compre the memory pace without recognition accuracy lo. Reference [] B. Zhu, X.-D. Zhou, C.-L. Liu and M. Nakagawa: A robut model for on-line handwritten Japanee text recognition, Int l J. Document Analyi and Recognition (IJDAR), 3(2), pp.2-3, 200. [2] H. Oda, B. Zhu, J. Tokuno, M. Onuma: A. Kitadai and M. Nakagawa: A compact on-line and off-line combined recognizer. Proc. 0th IWFHR, pp , [3] C.-L. Liu and X.-D. Zhou: Online Japanee character recognition uing trajectory-baed normalization and direction feature extraction, Proc. 0th IWFHR, pp , [4] B. Zhu and M. Nakagawa: A MRF model with parameter optimization by CRF for on-line recognition of handwritten Japanee character, Proc. Document Recognition and Retrieval XVIII (DRR) that i part of IS&T/SPIE Electronic Imaging, San Joe, USA, 20. [5] B. Zhu and M. Nakagawa: On-line handwritten Japanee character recognition uing a MRF model with Parameter Optimization by CRF, Proc. th ICADR, pp , 20. [6] S. Gunter and H. Bunke: HMM-baed handwritten word recognition: on the optimization of the number of tate, training Iteration and Gauian component, Pattern Recognition, 37, pp , [7] M. Liwicki and H. Bunke: HMM-baed on-line recognition of handwritten whiteboard note, Proc. 0th IWFHR, pp , [8] S. Jaeger, S. Manke and J. Reichert: Online handwriting recognition: the Npen++ recognizer, Int l J. Document Analyi and Recognition, Vol. 3, pp , 200. [9] M. Nakagawa and L.V. Tu: Structural learning of character pattern for on-line recognition of handwritten Japanee character, Advance in Structural and Syntactic Pattern Recognition, P. Perner, P. Wang, and A. Roenfeld, ed., pp , Springer-Verlag, 996. [0] M. Nakai, N. Akira, H. Shimodaira and S. Sagayama: Subtroke approach to HMM-baed on-line kanji handwriting recognition, Prof. 6th ICDAR, pp , 200. [] M. Nakai, T. Sudo, H. Shimodaira and S. Sagayama: Pen preure feature for writer-independent on-line handwriting recognition baed on ubtroke HMM, Proc. 6th ICPR, 3, pp , [2] M. Nakai, H. Shimodaira and S. Sagayama: Generation of hierarchical dictionary for troke-order free kanji handwriting recognition baed on ubtroke HMM, Proc. 7th ICDAR, pp , [3] T. Long and L. Jin: Building compact MQDF claifier for large character et recognition by ubpace ditribution haring, Pattern Recognition, 4, pp , [4] U. Ramer: An iterative procedure for the polygonal approximation of plan cloed curve, Computer Graphic and Image Proceing, (3), pp , 972. [5] M. Nakagawa and K. Matumoto: Collection of on-line handwritten Japanee character pattern databae and their analyi, Int l J. Document Analyi and Recognition (IJDAR), 7(), pp.69-8,

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

A reduced reference image quality metric based on feature fusion and neural networks

A reduced reference image quality metric based on feature fusion and neural networks Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images 2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

Problem Set 2 (Due: Friday, October 19, 2018)

Problem Set 2 (Due: Friday, October 19, 2018) Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

A semi-incremental recognition method for on-line handwritten Japanese text

A semi-incremental recognition method for on-line handwritten Japanese text 2013 12th International Conference on Document Analysis and Recognition A semi-incremental recognition method for on-line handwritten Japanese text Cuong Tuan Nguyen, Bilan Zhu and Masaki Nakagawa Department

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Interface Tracking in Eulerian and MMALE Calculations

Interface Tracking in Eulerian and MMALE Calculations Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Audio-Visual Voice Command Recognition in Noisy Conditions

Audio-Visual Voice Command Recognition in Noisy Conditions Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Tracking High Speed Skater by Using Multiple Model

Tracking High Speed Skater by Using Multiple Model Vol. 2, No. 26 Tracing High Speed Sater by Uing Multiple Model Guojun Liu & Xianglong Tang School of Computer Science & Engineering Harbin Intitute of Technology Harbin 5000, China E-mail: hitliu@hit.edu.cn

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognition Letters 35 (2014) 178 185 Contents lists available at SciVerse ScienceDirect Pattern Recognition Letters journal homepage: www.elsevier.com/locate/patrec Training of an on-line handwritten

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION

A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION ABSTRACT Najva Izadpanah Department of Computer Engineering, Ilamic Azad Univerity, Qazvin Branch, Qazvin, Iran In mot practical

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Effect of Text/Non-text Classification for Ink Search employing String Recognition

Effect of Text/Non-text Classification for Ink Search employing String Recognition 2012 10th IAPR International Workshop on Document Analysis Systems Effect of Text/Non-text Classification for Ink Search employing String Recognition Tomohisa Matsushita, Cheng Cheng, Yujiro Murata, Bilan

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

Engineering Parallel Software with

Engineering Parallel Software with Engineering Parallel Software with Our Pattern Language Profeor Kurt Keutzer and Tim Matton and (Jike Chong), Ekaterina Gonina, Bor-Yiing Su and Michael Anderon, Bryan Catanzaro, Chao-Yue Lai, Mark Murphy,

More information

Learning-Based Candidate Segmentation Scoring for Real-Time Recognition of Online Overlaid Chinese Handwriting

Learning-Based Candidate Segmentation Scoring for Real-Time Recognition of Online Overlaid Chinese Handwriting 2013 12th International Conference on Document Analysis and Recognition Learning-Based Candidate Segmentation Scoring for Real-Time Recognition of Online Overlaid Chinese Handwriting Yan-Fei Lv 1, Lin-Lin

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Khoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3

Khoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3 I J C T A, 9(-A), 016, pp 763-777 International Science Pre A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed on Graylevel Cluter Similarity for Automatic Multilevel Image Threholding

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Analysis of slope stability

Analysis of slope stability Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10

Computer Aided Drafting, Design and Manufacturing Volume 25, Number 3, September 2015, Page 10 Computer Aided Drafting, Deign and Manufacturing Volume 5, umber 3, September 015, Page 10 CADDM Reearch of atural Geture Recognition and Interactive Technology Compatible with YCbCr and SV Color Space

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information