VIDEO WATERMARKING IN 3D DCT DOMAIN
|
|
- Rosamund Rice
- 5 years ago
- Views:
Transcription
1 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP VIDEO WATERMARKING IN 3D DCT DOMAIN M. Carli, R. Mazzeo, ad A. Neri AE Departmet Uiversity of Roma TRE, Roma, Italy phoe: + (39) , fax: + (39) , (carli, eri)@uiroma3.it web: ABSTRACT I this work a ovel scheme of embeddig data i a video sequece is preseted. The method is based o a modified Quatizatio Idex Modulatio (QIM) embeddig algorithm i the 3D-DCT domai. Differet zoes i the 3D DCT cube have bee aalyzed i order to obtai better performaces i term of robustess ad imperceptibility. Aalysis of the results shows the effectiveess of the proposed scheme. 1. GENERAL INFORMATION The icreasig presece of multimedia data i every day life is the result of the fusio ad spreadig of several factors as Iteret, third-geeratio mobile commuicatio, WLAN easy to access ad use etworks, ad so o. The availability of low cost systems to process digital data allows a easy maipulatio of them. Despite of the maliciousess or ot of the modificatio or duplicatio of digital data, the availability of digital tools to protect the digital iformatio is eeded. A commoly used method to icrease the security is the watermarkig of digital data. By watermarkig the origial data before its distributio over the etwork, a copyright data, or mark, is embedded i the versio to be distributed so that o other user (malicious or ot) will be able to produce a idetical copy of the origial data ad yet does ot cotai the embedded message. Amog the several costraits to be observed, every embeddig system should ot affect the perceptual quality of the video (ivisibility) producig oticeable distortios i the received data. Besides, the mark should ot be sigificatly altered by malicious (a attempt to alter the mark) or uitetioal (compressio, trasmissio or filterig) operatios (robustess). Furthermore, it should ot be possible to remove the mark from the video, eve if the embeddig scheme is kow (security). These costraits are i some sese atagoist. Icreasig the robustess, for example, geerally icreases the visibility of the mark. Several embeddig methods have bee proposed i the literature; a first classificatio of these methods ca be doe accordig to the particular domai i which the embeddig process is performed. The mark ca be iserted either i the spatial domai [1-3] or i a ad hoc trasform domai such as DCT, Fourier, or wavelet [4-6]. I a previous work [7], the authors proposed a 3D DCT based embeddig system i order to obtai eough capacity to hide the lumiace compoet, dow sampled versio of a frame, 8 bit / pixel, iside a shot of a video. This capacity allows improvig the performaces of a error cocealmet method [9]. The experimetal results have show the effectiveess of the idea ad push us to improve the method to be more robust to wated or uwated data modificatio. I that work [7], three differet embeddig schemes were applied to 3D DCT domai ad the results were ivestigated. I particular, two schemes were obtaied by applyig the 2D modified Cox s embeddig scheme [5], while the third oe cosisted i a hybrid applicatio of Least Sigificat Bit substitutio method to the 3D volume. I this work we employed a differet scheme to select the key frame of a video shot detectio techique ad a differet embeddig scheme i the 3D DCT domai. Furthermore, several schemes have bee studied ad compared to determie the most effective procedure cocerig both visibility ad robustess costraits. The rest of the paper is orgaized as follows. I Sectio 2 the 3D DCT trasform is briefly itroduced. I Sectio 3 the embeddig scheme is preseted, while i Sectio 4 prelimiary results are preseted. Fially, Sectio 5 draws the coclusios. 2. 3D DCT TRANSFORM I literature, 3D trasform based algorithms have bee recetly experimeted, especially for video compressio as they should perform better tha curret block-based motio compesated predictive methods. I particular the 3D DCT has bee proposed for both image [3, 4] ad video compressio. Recetly this domai has also bee cosidered for data embeddig purposes [7]. The 3D Discrete Cosie Trasform (DCT) is a real-valued, separable, orthoormal trasform whose basis fuctios are cosie fuctios. Let X be a 3D sigal of size m by by t, which, i our case, correspods to a set of cosecutive video frames. Let Y be the 3D DCT of X, of size m by by t. The matrix Y ca be computed as follows: N f 1 M 1N 1 k i j tm t= 0 m= 0 = 0 ( 2 + 1) π ( 2 + 1) ( 2t+ 1) π k Ykij = ααα X cos i 2N π icos m i j cos 2M 2N f
2 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP where 1 1, k = 0, i = 0 T M αk = αi = 2 2, else, else T M 1, j = 0 N α j = 2, else N Sice the 3D DCT is a separable fuctio, the above expressio ca be evaluated by applyig the 1D DCT trasform alog each of the three dimesios of X. 3. EMBEDDING ALGORITHM The first step of the proposed system is the partitioig of the video i shots. To this ed, if the ormalized correlatio betwee two cosecutive frames drops below a give threshold, the a shot boudary is detected. Specifically, i the umerical results reported here the threshold has bee set to 0.3, after a set of experimets performed o several videos with differet cotet. The umber of frames icluded i a shot also determies the size of the 3rd dimesio of the 3D sigal support. To be compliat with a previous work, ad to be able to better compare the performace, i the simulatios each shot is composed by 8 frames. The embeddig algorithm is applied every 8 frames cosecutively. I this work we apply the Scalar Costa Scheme embeddig algorithm (SCS)[12, 13] i the 3D-DCT domai. I the followig we breifely summarized the method described i the cited papers. The biary represetatio of the watermark message m is ecoded ito a sequece of watermark letters d. The elemets d belog to a alphabet D = {0,1,..., D 1}. I the followig, let us deote with x the host sigal ad with s the watermarked oe. For a Costa-type embeddig of the watermarks letters d ito the sigal x, a sequeceq = w /α, which is early orthogoal to x, has to be determied. This is reduced to the sample wise operatio d d q = Q x + k x + D k D where k [0,1) is a elemet of cryptographically secured pseudoradom sequece k ad Q { i } deotes a scalar uiform quatizatio process with step size. Fially, the trasmitted watermark sequece is give by: w = αq The watermarked data is give by s= x+ w= x+ αq. At the receiver side, the marked sigal is r = x+ w+ v. I order to extract the mark, the followig rule is applied: y = Q { r k } { r k } For biary SCS ( D = 2), /2 be close to zero if y, where should y d = 0 is trasmitted ad close to ± /2for d = 1. I our experimet we use 1 α =. Some cosideratios ca be carried out about the embeddig scheme. The amout of data to be embedded, the robustess to be achieved, ad especially the purpose of the applicatio are importat factors to be cosidered. The computatioal complexity obviously icreases if the embeddig is performed every 8 frames. O the other side, such a temporal embeddig scheme allows to gai i robustess versus frame droppig, sychroizatio ad trasmissio errors. For istace, whe data hidig is fialized to support error cocealmet [9], the effectiveess of the restoratio is directly related to the quality of the recovered mark. I fact, i that case, the mark cosists i a thumbail of the frame itself: by embeddig more ofte the full gray scale versio of it, the probability to extract a cleaer versio of the mark is higher, resultig i improved visual quality of the processed video. More cosideratios about this problem are i the coclusios. The mark we wat to embed is the best represetative of each shot. The for each shot, a sigle frame summarizig its cotet, amed key frame, is extracted. At this ed, several algorithms, with differet computatioal complexity are available. Here, to face the computatioal burde we resorted to a simple algorithm that selects as key frame the cetral frame of each shot. Sice we are dealig with video, the idea is that the frame i middle will preset the lower iterframe differece from the other frames i the shot. The biary mark sequece is the computed by subsamplig the lumiace compoet of the key frame. Specifically, sequetially scaig the 8 bit plas correspodig to the gray-scale image, we obtai a biary sequece cosistig of 8 biary frames. 4. EXPERIMENTAL RESULTS All the results here reported, refer to the coastguard sequece (144x176 pixels). Tests performed o other sequeces with differet cotet, preset similar performaces. The DCT cube is 144x176x8 elemets ad the embedded mark is a cube of 36x88x8 pixels. The mark has bee iserted i three differet areas of the DCT cube: Startig from coefficiet (,, 1), top left area i the DCT cube. High Zoe. Startig from coefficiet (54, 44, 1), cetral part of the cube. Middle Zoe Startig from coefficiet (8, 88, 1), bottom right area. To test the proposed scheme, we have performed some modificatios of the embeddig parameters. I the first test, we have varied the quatizatio step : by icreasig it, the
3 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP mark robustess ad also the itroduced artifacts icrease. I Figure 1 the average PSNR amog origial ad marked frames is depicted Origial Frames vs Watermarked High Zoe Middle Zoe Delta Figure 1: average PSNR betwee origial ad watermarked frames for the three differet embeddig zoes. As expected, Figure 1 shows that by icreasig the quatizatio factor, the average error of the frame decreases. The maximum differece from the three zoes is below 0.1 db. To measure the perceived quality of the embedded frames, the Weighted-PSNR (WPSNR) [9] fuctio, based o the Cotrast Sesitivity Fuctio, has bee computed. I Figure 2, the results are plotted. It ca be easily oticed that less artifacts are itroduced if the low or the middle areas i the DCT cube are modified. I Figure 3, a example of origial ad marked frame ( =50) is reported. It is useful to metio that, sice we are dealig with a video sequece, small localized artifacts i a sigle frame, are ot to likely visible by a user lookig at the video. W Origial Frames vs Watermarked High Zoe Middle Zoe Delta Figure 2: average W-PSNR betwee origial ad watermarked frames for the three differet embeddig zoes. I the secod trial the robustess versus some attacks has bee tested, i order to select the best embeddig scheme ad to tue some embeddig parameters. Figure 3: origial (left) ad marked frame (right). ( =50) I the followig the mai results obtaied are reported. JPEG compressio of the frames i a shot. The idea is to measure the degradatio of the recovered mark, whe JPEG compressio is performed o the cover sigal. I Figures 4-6 is reported the PSNR of the extracted mark versus the origial oe for compressio rates, 5 quatizatio levels, ad for the three embeddig zoes. It ca be oticed that icreasig the quatizatio level, higher robustess is achieved. I Figure 7, the results of compariso amog the three methods are reported ( =50). As expected, due the JPEG compressio algorithm, the quality of the extracted mark is higher i the High Zoe scheme. A qualitative compariso ca be performed by lookig at Figure 8 i which the origial ad the extracted mark images are reported ( =50,, JPEG quality Factor = ). PSNR 68 db. PSNR attack. This is performed by applyig the classical Stirmark [-11]. I Figure 9 the PSNR curves correspodig to High zoe, are plotted. I this attack, this zoe is more sesitive to the attacks. Nevertheless, the value of the PSNR betwee origial ad extracted mark i the worst case is still over 62 db. I the followig, typical maipulatios of watermarked video have bee cosidered. I all the performed tests, for the quatizatio parameter the value =50 has bee used. Cotrast chage: the DCT coefficiets preset cosiderable variatios especially i the low frequecies. Hece, the High zoe is more sesitive to this attach. I Figure the results correspodig to PSNR vs. Cotrast chage are reported. Note that the value of cotrast chage=±50% correspod to causig the cotet of the frame to be uitelligible. The value of PSNR for the extracted mark is 68 db. Itesity value attack: also i this case the modificatio of itesity values of the video, affects the DCT coefficiets resultig a decreased performaces for the High zoe embeddig scheme. Nevertheless, the PSNR of the extracted mark whe a Middle zoe scheme is adopted, ad a variatio of +% for the itesity is used, is still over db. Video compressio: the watermarked video has bee compressed by usig MPEG1, MPEG2, ad other video coders freely available o Iteret.
4 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP High Zoe - JPEG Delta= Delta= Delta= rates. The mark is almost perfectly recostructed (both MPEG1 ad MPEG2 coders) i High ad Middle Zoe. Little degradatios appear istead i (87,27 db). We obtai comparable results also with the commercial video coders. JPEG High Zoe Middle Zoe 50 Figure 4: JPEG compressio- High Zoe scheme Middle Zoe - JPEG Delta= Delta= Delta= 50 Figure 7: JPEG compressio PSNR compariso at costat quatizatio parameter 50 Figure 5: JPEG compressio- Middle Zoe scheme - JPEG Delta= Delta= Delta= Figure 8: JPEG compressio. Origial ad extracted mark. PSNR=68dB High Zoe - PSNR Delta= Delta= Delta= 50 Figure 6: JPEG compressio- High Zoe scheme 0 50 PSNR Figure 9: PSNR attack- High Zoe scheme I Figure 11 is reported the PSNR betwee origial ad extracted mark correspodig to several compressio rates for a MPEG2 coder. The quality factor 1 idicates a o compressed video. The High Zoe scheme has always better performaces, also at low compressio Frame loss: this situatio ofte occurs durig video trasmissio over packet etworks. We tried to simulate this attack by droppig oe frame startig to the first oe of the 3D DCT block to the last oe, verifyig the effects o the extracted mark. I the detectio phase, i order to rebuilt the sequece of eight frames eeded to compute
5 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP the 3D DCT cube, we simply added as eight frame, the ith oe. The results show the importace of the positio of the mark i the 3D cube. It is also useful to shuffle the data to be embedded to icrease the robustess. Video Maipulatio - Cotrast High Zoe Middle Zoe Cotrast 1 Figure : Cotrast attack Video Compressio High Zoe Middle Zoe Figure 11: Video Compressio attack. High zoe scheme outperforms the other two schemes at high ad middle levels of compressio rates. 5. CONCLUSIONS I this paper, a embeddig scheme, based o Scalar Costa Scheme i 3D DCT domai, for video watermarkig has bee preseted. The performed tests cofirm the effectiveess to use a volume i order to hide a huge amout of data with little or o visible distortio to the host video. The quality of the extracted mark remais high eve after may attacks. The performed simulatios allow selectig the best scheme depedig o applicatio. It is importat to uderlie that digital watermarkig is ot oly data hidig. The requiremets ad the costraits deped o the fial applicatio. The variatios of the embeddig scheme are proposed 50 to uderstad possible real applicatios of the geeral method. I our future study we are goig to apply other watermarkig schemes i 3D domai both for autheticatio ad for cocealmet of the video. REFERENCES [1] N. Nikolaidis ad I. Pitas, Robust image watermarkig i the spatial domai, Sigal Processig, vol. 66, o. 3, pp. 3 3, May [2] R. Wolfgag ad E. Delp, A watermark for digital images, i IEEE Proc. It. Cof. Image Proc. ICIP 1996, 1996, pp [3] D. Gruhl W. Beder ad N. Morimoto, Techiques for data hidig, Tech. rep., MIT Media Lab, Cambridge, MA, [4] M. Bari, F. Bartolii, V. Cappellii, ad A. Piva, A dctdomai system for robust image watermarkig, Sigal Processig, vol. 66, o. 3, pp , May [5] I. Cox, J. Kilia, F. Leighto, ad T. Shamoo, Secure spread spectrum watermarkig for multimedia, IEEE Trasactio o Image Processig, vol. 6, o. 12, December [6] H. Ioue, A. Miyazaki, ad T. Katsura, A image watermarkig method based o the wavelet trasform, i Proceedigs of IEEE Iteratioal Coferece o Image Processig, Kobe, Japa, October 1999, pp [7] M. Carli, C. Adsumilli, V. Razzauti, A. Neri Video watermarkig i 3D DCT domai, Proc. IEEE 05 Iteratioal Workshop o Spectral Methods ad Multirate Sigal Processig, SMMSP 05, Riga, Latvia, Jue -22, 05. [8] S. Pereira, S. Voloshyovskiy, M. Madueño, S. Marchad-Maillet ad T. Pu, Secod geeratio bechmarkig ad applicatio orieted evaluatio, I Iformatio Hidig Workshop III, Pittsburgh, PA, USA, April 01 [9] C.B. Adsumilli, M.C.Q. Farias, S.K. Mitra, ad M. Carli, A robust error cocealmet techique usig data hidig for image ad video trasmissio over lossy chaels, IEEE Trasactios o Circuits ad Systems for Video Techology, vol.15, o 11, Nov. 05 Page(s): [] F. A. P. Petitcolas, R. J. Aderso, M. G. Kuh. Attacks o copyright markig systems, i David Aucsmith (Ed), Iformatio Hidig, Secod Iteratioal Workshop, IH 98, Portlad, Orego, U.S.A., April 15-17, 1998, Proceedigs, LNCS 1525, Spriger-Verlag, ISBN , pp [11] F. A. P. Petitcolas, Watermarkig schemes evaluatio. I.E.E.E. Sigal Processig, vol. 17, o. 5, pp , September 00. [12] J. J. Eggers, R. Bauml, R. Tzschoppe, ad B. Girod, Scalar Costa Scheme for iformatio embeddig, IEEE Trasactios o Sigal Processig, vol. 51, o. 4, pp. 3 19, April 03. [13] M. H. M. Costa, Writig o dirty paper, IEEE Trasactios o Iformatio Theory, vol. 29, o. 3, pp May 1983.
A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationPrecise Psychoacoustic Correction Method Based on Calculation of JND Level
Vol. 116 (2009) ACTA PHYSICA POLONICA A No. 3 Optical ad Acoustical Methods i Sciece ad Techology Precise Psychoacoustic Correctio Method Based o Calculatio of JND Level Z. Piotrowski Faculty of Electroics,
More informationNew HSL Distance Based Colour Clustering Algorithm
The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationAn Optimal Robust Digital Image Watermarking Based on Genetic Algorithms in Multiwavelet Domain
A Optimal Robust Digital Image Watermarkig Based o Geetic Algorithms i Multiwavelet Domai PRAYOTH KUMSAWAT, KITTI ATTAKITMONGCOL AND ARTHIT SRIKAEW School of Telecommuicatio Egieerig, School of Electrical
More informationA DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION
A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION Ju Liu,, Xigag Zhag, Jiade Su ad Miguel Agel Laguas, 3 School of Iformatio Sciece ad Egieerig, Shadog Uiversity, Jia 5, Chia Telecommuicatios Techological
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationOn the Accuracy of Vector Metrics for Quality Assessment in Image Filtering
0th IMEKO TC4 Iteratioal Symposium ad 8th Iteratioal Workshop o ADC Modellig ad Testig Research o Electric ad Electroic Measuremet for the Ecoomic Uptur Beeveto, Italy, September 5-7, 04 O the Accuracy
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationLow Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationProtecting Biometric Templates with Image Watermarking Techniques
Protectig Biometric Templates with Image Watermarkig Techiques Nikos Komios ad Tassos Dimitriou Athes Iformatio Techology, GR-19002 Peaia Attiki, Greece {kotdim}@ait.edu.gr Abstract. Biometric templates
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationIMAGE VISUAL QUALITY METRICS VERIFICATION BY TID2013: EXPLORING OF MEAN SQUARE ERROR DRAWBACKS
IMAGE VISUAL QUALITY METRICS VERIFICATION BY TID: EXPLORING OF MEAN SQUARE ERROR DRAWBACKS Nikolay Poomareko ( ), Vladimir Luki( ), Oleg Ieremeiev ( ), Beoit Vozel( ), Kacem Chehdi( ), Kare Egiazaria (
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationA Note on Least-norm Solution of Global WireWarping
A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract
More informationFurther Attacks on Yeung-Mintzer Fragile Watermarking Scheme
Header for SPIE use Further Attacks o Yeug-Mitzer Fragile Watermarkig Scheme Jiri Fridrich, Miroslav Golja, ad Nasir Memo a Departmet of Systems Sciece ad Idustrial Egieerig, SUNY Bighamto, Bighamto, NY
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationPrimitive polynomials selection method for pseudo-random number generator
Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the
More informationOutline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions
FFT Circuit Desig Outlie Applicatios of FFT i Commuicatios Fudametal FFT Algorithms FFT Circuit Desig Architectures Coclusios DAB Receiver Tuer OFDM Demodulator Chael Decoder Mpeg Audio Decoder 56/5/ 4/48
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationEE123 Digital Signal Processing
Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add
More informationWavelet Based Dual Encoding Lossless Medical Image Compression
avelet Based Dual Ecodig Lossless Medical Image Compressio *V.Maohar, Asst. Professor, SR Egieerig College, aragal, TG, Idia, maoharvu@gmail.com **Dr.G. Laxmiarayaa, Professor, oly Mary Istitute of Techology,
More informationBLOCK MATCHING AND 3D COLLABORATIVE FILTERING ADAPTED TO ADDITIVE SPATIALLY CORRELATED NOISE
BLOCK MATCHING AND 3D COLLABORATIVE FILTERING ADAPTED TO ADDITIVE SPATIALLY CORRELATED NOISE Aleksey Rubel (*), Vladimir Luki (*), Kare Egiazaria (**) (*) Natioal Aerospace Uiversity, Kharkov, Ukraie (**)
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More informationVALIDATING DIRECTIONAL EDGE-BASED IMAGE FEATURE REPRESENTATIONS IN FACE RECOGNITION BY SPATIAL CORRELATION-BASED CLUSTERING
VALIDATING DIRECTIONAL EDGE-BASED IMAGE FEATURE REPRESENTATIONS IN FACE RECOGNITION BY SPATIAL CORRELATION-BASED CLUSTERING Yasufumi Suzuki ad Tadashi Shibata Departmet of Frotier Iformatics, School of
More informationA Fast Fractal Model Based ECG Compression Technique Lin Yin 1,a, Fang Yu* 1,b
4th Iteratioal Coferece o Computer, Mechatroics, Cotrol ad Electroic Egieerig (ICCMCEE 2015) A Fast Fractal Model Based ECG Compressio Techique Li Yi 1,a, Fag Yu* 1,b 1 Electroicsad iformatio egieerig
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationA Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System
A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality
More informationAccuracy Improvement in Camera Calibration
Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationA Fully SNR, Spatial and Temporal Scalable 3DSPIHT-Based Video Coding Algorithm for Video Streaming Over Heterogeneous Networks
A Fully SNR, Spatial ad Temporal Scalable 3DSIHT-Based ideo Codig Algorithm for ideo Streamig Over Heterogeeous Networks Habibollah Dayali ad Alfred Mertis School of Electrical, Computer ad Telecommuicatios
More informationStone Images Retrieval Based on Color Histogram
Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationAPPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview
APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationWavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)
Wavelet Trasform CSE 49 G Itroductio to Data Compressio Witer 6 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationWe are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1%
We are ItechOpe, the first ative scietific publisher of Ope Access books 3,350 108,000 1.7 M Ope access books available Iteratioal authors ad editors Dowloads Our authors are amog the 151 Coutries delivered
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationVision & Perception. Simple model: simple reflectance/illumination model. image: x(n 1,n 2 )=i(n 1,n 2 )r(n 1,n 2 ) 0 < r(n 1,n 2 ) < 1
Visio & Perceptio Simple model: simple reflectace/illumiatio model Eye illumiatio source i( 1, 2 ) image: x( 1, 2 )=i( 1, 2 )r( 1, 2 ) reflectace term r( 1, 2 ) where 0 < i( 1, 2 ) < 0 < r( 1, 2 ) < 1
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationNew Fuzzy Color Clustering Algorithm Based on hsl Similarity
IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper
More informationSpectral leakage and windowing
EEL33: Discrete-Time Sigals ad Systems Spectral leakage ad widowig. Itroductio Spectral leakage ad widowig I these otes, we itroduce the idea of widowig for reducig the effects of spectral leakage, ad
More informationHarris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c
Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi
More informationRESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE
RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE Z.G. Zhou, S. Zhao, ad Z.G. A School of Mechaical Egieerig ad Automatio, Beijig Uiversity of Aeroautics ad Astroautics,
More informationFACIAL MOTION TRACKING AND ANIMATION: AN ICA-BASED APPROACH
FACIAL MOTION TRACKING AND ANIMATION: AN ICA-BASED APPROACH Lucas D Terissi ad Jua C Gómez Laboratory for System Dyamics ad Sigal Processig FCEIA, Uiversidad Nacioal de Rosario Riobamba 245 Bis, 2000 Rosario
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationA General Framework for Accurate Statistical Timing Analysis Considering Correlations
A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of
More informationReversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits
Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More informationImage Restoration from Patch-based Compressed Sensing Measurement
Image Restoratio from Patch-based Compressed Sesig Measuremet Guagtao Nie 1, Yig Fu 1, Yiqiag Zheg 2, Hua Huag 1 1 Beijig Istitute of Techology, 2 Natioal Istitute of Iformatics {lightbillow,fuyig,huahuag}@bit.edu.c,
More informationAnalysis of Documents Clustering Using Sampled Agglomerative Technique
Aalysis of Documets Clusterig Usig Sampled Agglomerative Techique Omar H. Karam, Ahmed M. Hamad, ad Sheri M. Moussa Abstract I this paper a clusterig algorithm for documets is proposed that adapts a samplig-based
More information( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb
Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationFilter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design
Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of
More informationNeural Networks A Model of Boolean Functions
Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationThe impact of GOP pattern and packet loss on the video quality. of H.264/AVC compression standard
The impact of GOP patter ad packet loss o the video quality of H.264/AVC compressio stadard MIROSLAV UHRINA, JAROSLAV FRNDA, LUKÁŠ ŠEVČÍK, MARTIN VACULÍK Departmet of Telecommuicatios ad Multimedia Uiversity
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationModified Curvelet Thresholding Algorithm for Image Denoising
Joural of Computer Sciece 6 (1): 18-3 010 ISSN 1549-3636 010 Sciece Publicatios Modified Curvelet Thresholdig Algorithm for Image Deoisig 1 Al-Dahoud Ali Preety D. Swami ad 3 J. Sighai 1 Departmet of Computer
More informationPolymorph: Morphing Among Multiple Images
Feature Article Polymorph: Morphig Amog Multiple Images Image metamorphosis has prove to be a powerful visual effects tool. May breathtakig examples ow appear i film ad televisio, depictig the fluid trasformatio
More informationData Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types
Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity
More informationProbability of collisions in Soft Input Decryption
Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationProject 2.5 Improved Euler Implementation
Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationTitle: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity.
7 IEEE. Persoal use of this material is permitted. Permissio from IEEE must be obtaied for all other uses, i ay curret or future media, icludig repritig/republishig this material for advertisig or promotioal
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationEvaluation of Pure-Fractal and Wavelet-Fractal Compression Techniques
Evaluatio of Pure-Fractal ad Wavelet-Fractal Compressio Techiques Mohammad. R. N. Avaaki * 3 Hamid Ahmadiead 4 Reza Ebrahimpour. Electroics departmet of Shahid Raaei Uiversity Laviza Tehra Ira. Electroics
More informationOptimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method
Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationFace Recognition Algorithm Using Discrete Gabor Transform
Selected Papers from: Commuicatios & Iformatio Techology 2008, Circuits, Systems ad Sigals 2008, Applied Mathematics, Simulatio, Modellig 2008, Maratho Beach, Attica, Greece, Jue 1-3, 2008 Face Recogitio
More informationare two specific neighboring points, F( x, y)
$33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationPolynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0
Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity
More informationALU Augmentation for MPEG-4 Repetitive Padding
ALU Augmetatio for MPEG-4 Repetitive Paddig Georgi Kuzmaov Stamatis Vassiliadis Computer Egieerig Lab, Electrical Egieerig Departmet, Faculty of formatio Techology ad Systems, Delft Uiversity of Techology,
More informationEuclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process
Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig
More informationIdentification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.
Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationDesign of Efficient Pipelined Radix-2 2 Single Path Delay Feedback FFT
IOSR Joural of VLSI ad Sigal Processig IOSR-JVSP Volume Issue Ver. I May-Ju. 0 PP 88-9 e-iss: 9 00 p-iss o. : 9 97 www.iosrjourals.org Desig of Efficiet Pipelied Radi- Sigle Path Delay Feedbac FFT isha
More informationOptimal Mapped Mesh on the Circle
Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More information