VIDEO WATERMARKING IN 3D DCT DOMAIN

Size: px
Start display at page:

Download "VIDEO WATERMARKING IN 3D DCT DOMAIN"

Transcription

1 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP VIDEO WATERMARKING IN 3D DCT DOMAIN M. Carli, R. Mazzeo, ad A. Neri AE Departmet Uiversity of Roma TRE, Roma, Italy phoe: + (39) , fax: + (39) , (carli, eri)@uiroma3.it web: ABSTRACT I this work a ovel scheme of embeddig data i a video sequece is preseted. The method is based o a modified Quatizatio Idex Modulatio (QIM) embeddig algorithm i the 3D-DCT domai. Differet zoes i the 3D DCT cube have bee aalyzed i order to obtai better performaces i term of robustess ad imperceptibility. Aalysis of the results shows the effectiveess of the proposed scheme. 1. GENERAL INFORMATION The icreasig presece of multimedia data i every day life is the result of the fusio ad spreadig of several factors as Iteret, third-geeratio mobile commuicatio, WLAN easy to access ad use etworks, ad so o. The availability of low cost systems to process digital data allows a easy maipulatio of them. Despite of the maliciousess or ot of the modificatio or duplicatio of digital data, the availability of digital tools to protect the digital iformatio is eeded. A commoly used method to icrease the security is the watermarkig of digital data. By watermarkig the origial data before its distributio over the etwork, a copyright data, or mark, is embedded i the versio to be distributed so that o other user (malicious or ot) will be able to produce a idetical copy of the origial data ad yet does ot cotai the embedded message. Amog the several costraits to be observed, every embeddig system should ot affect the perceptual quality of the video (ivisibility) producig oticeable distortios i the received data. Besides, the mark should ot be sigificatly altered by malicious (a attempt to alter the mark) or uitetioal (compressio, trasmissio or filterig) operatios (robustess). Furthermore, it should ot be possible to remove the mark from the video, eve if the embeddig scheme is kow (security). These costraits are i some sese atagoist. Icreasig the robustess, for example, geerally icreases the visibility of the mark. Several embeddig methods have bee proposed i the literature; a first classificatio of these methods ca be doe accordig to the particular domai i which the embeddig process is performed. The mark ca be iserted either i the spatial domai [1-3] or i a ad hoc trasform domai such as DCT, Fourier, or wavelet [4-6]. I a previous work [7], the authors proposed a 3D DCT based embeddig system i order to obtai eough capacity to hide the lumiace compoet, dow sampled versio of a frame, 8 bit / pixel, iside a shot of a video. This capacity allows improvig the performaces of a error cocealmet method [9]. The experimetal results have show the effectiveess of the idea ad push us to improve the method to be more robust to wated or uwated data modificatio. I that work [7], three differet embeddig schemes were applied to 3D DCT domai ad the results were ivestigated. I particular, two schemes were obtaied by applyig the 2D modified Cox s embeddig scheme [5], while the third oe cosisted i a hybrid applicatio of Least Sigificat Bit substitutio method to the 3D volume. I this work we employed a differet scheme to select the key frame of a video shot detectio techique ad a differet embeddig scheme i the 3D DCT domai. Furthermore, several schemes have bee studied ad compared to determie the most effective procedure cocerig both visibility ad robustess costraits. The rest of the paper is orgaized as follows. I Sectio 2 the 3D DCT trasform is briefly itroduced. I Sectio 3 the embeddig scheme is preseted, while i Sectio 4 prelimiary results are preseted. Fially, Sectio 5 draws the coclusios. 2. 3D DCT TRANSFORM I literature, 3D trasform based algorithms have bee recetly experimeted, especially for video compressio as they should perform better tha curret block-based motio compesated predictive methods. I particular the 3D DCT has bee proposed for both image [3, 4] ad video compressio. Recetly this domai has also bee cosidered for data embeddig purposes [7]. The 3D Discrete Cosie Trasform (DCT) is a real-valued, separable, orthoormal trasform whose basis fuctios are cosie fuctios. Let X be a 3D sigal of size m by by t, which, i our case, correspods to a set of cosecutive video frames. Let Y be the 3D DCT of X, of size m by by t. The matrix Y ca be computed as follows: N f 1 M 1N 1 k i j tm t= 0 m= 0 = 0 ( 2 + 1) π ( 2 + 1) ( 2t+ 1) π k Ykij = ααα X cos i 2N π icos m i j cos 2M 2N f

2 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP where 1 1, k = 0, i = 0 T M αk = αi = 2 2, else, else T M 1, j = 0 N α j = 2, else N Sice the 3D DCT is a separable fuctio, the above expressio ca be evaluated by applyig the 1D DCT trasform alog each of the three dimesios of X. 3. EMBEDDING ALGORITHM The first step of the proposed system is the partitioig of the video i shots. To this ed, if the ormalized correlatio betwee two cosecutive frames drops below a give threshold, the a shot boudary is detected. Specifically, i the umerical results reported here the threshold has bee set to 0.3, after a set of experimets performed o several videos with differet cotet. The umber of frames icluded i a shot also determies the size of the 3rd dimesio of the 3D sigal support. To be compliat with a previous work, ad to be able to better compare the performace, i the simulatios each shot is composed by 8 frames. The embeddig algorithm is applied every 8 frames cosecutively. I this work we apply the Scalar Costa Scheme embeddig algorithm (SCS)[12, 13] i the 3D-DCT domai. I the followig we breifely summarized the method described i the cited papers. The biary represetatio of the watermark message m is ecoded ito a sequece of watermark letters d. The elemets d belog to a alphabet D = {0,1,..., D 1}. I the followig, let us deote with x the host sigal ad with s the watermarked oe. For a Costa-type embeddig of the watermarks letters d ito the sigal x, a sequeceq = w /α, which is early orthogoal to x, has to be determied. This is reduced to the sample wise operatio d d q = Q x + k x + D k D where k [0,1) is a elemet of cryptographically secured pseudoradom sequece k ad Q { i } deotes a scalar uiform quatizatio process with step size. Fially, the trasmitted watermark sequece is give by: w = αq The watermarked data is give by s= x+ w= x+ αq. At the receiver side, the marked sigal is r = x+ w+ v. I order to extract the mark, the followig rule is applied: y = Q { r k } { r k } For biary SCS ( D = 2), /2 be close to zero if y, where should y d = 0 is trasmitted ad close to ± /2for d = 1. I our experimet we use 1 α =. Some cosideratios ca be carried out about the embeddig scheme. The amout of data to be embedded, the robustess to be achieved, ad especially the purpose of the applicatio are importat factors to be cosidered. The computatioal complexity obviously icreases if the embeddig is performed every 8 frames. O the other side, such a temporal embeddig scheme allows to gai i robustess versus frame droppig, sychroizatio ad trasmissio errors. For istace, whe data hidig is fialized to support error cocealmet [9], the effectiveess of the restoratio is directly related to the quality of the recovered mark. I fact, i that case, the mark cosists i a thumbail of the frame itself: by embeddig more ofte the full gray scale versio of it, the probability to extract a cleaer versio of the mark is higher, resultig i improved visual quality of the processed video. More cosideratios about this problem are i the coclusios. The mark we wat to embed is the best represetative of each shot. The for each shot, a sigle frame summarizig its cotet, amed key frame, is extracted. At this ed, several algorithms, with differet computatioal complexity are available. Here, to face the computatioal burde we resorted to a simple algorithm that selects as key frame the cetral frame of each shot. Sice we are dealig with video, the idea is that the frame i middle will preset the lower iterframe differece from the other frames i the shot. The biary mark sequece is the computed by subsamplig the lumiace compoet of the key frame. Specifically, sequetially scaig the 8 bit plas correspodig to the gray-scale image, we obtai a biary sequece cosistig of 8 biary frames. 4. EXPERIMENTAL RESULTS All the results here reported, refer to the coastguard sequece (144x176 pixels). Tests performed o other sequeces with differet cotet, preset similar performaces. The DCT cube is 144x176x8 elemets ad the embedded mark is a cube of 36x88x8 pixels. The mark has bee iserted i three differet areas of the DCT cube: Startig from coefficiet (,, 1), top left area i the DCT cube. High Zoe. Startig from coefficiet (54, 44, 1), cetral part of the cube. Middle Zoe Startig from coefficiet (8, 88, 1), bottom right area. To test the proposed scheme, we have performed some modificatios of the embeddig parameters. I the first test, we have varied the quatizatio step : by icreasig it, the

3 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP mark robustess ad also the itroduced artifacts icrease. I Figure 1 the average PSNR amog origial ad marked frames is depicted Origial Frames vs Watermarked High Zoe Middle Zoe Delta Figure 1: average PSNR betwee origial ad watermarked frames for the three differet embeddig zoes. As expected, Figure 1 shows that by icreasig the quatizatio factor, the average error of the frame decreases. The maximum differece from the three zoes is below 0.1 db. To measure the perceived quality of the embedded frames, the Weighted-PSNR (WPSNR) [9] fuctio, based o the Cotrast Sesitivity Fuctio, has bee computed. I Figure 2, the results are plotted. It ca be easily oticed that less artifacts are itroduced if the low or the middle areas i the DCT cube are modified. I Figure 3, a example of origial ad marked frame ( =50) is reported. It is useful to metio that, sice we are dealig with a video sequece, small localized artifacts i a sigle frame, are ot to likely visible by a user lookig at the video. W Origial Frames vs Watermarked High Zoe Middle Zoe Delta Figure 2: average W-PSNR betwee origial ad watermarked frames for the three differet embeddig zoes. I the secod trial the robustess versus some attacks has bee tested, i order to select the best embeddig scheme ad to tue some embeddig parameters. Figure 3: origial (left) ad marked frame (right). ( =50) I the followig the mai results obtaied are reported. JPEG compressio of the frames i a shot. The idea is to measure the degradatio of the recovered mark, whe JPEG compressio is performed o the cover sigal. I Figures 4-6 is reported the PSNR of the extracted mark versus the origial oe for compressio rates, 5 quatizatio levels, ad for the three embeddig zoes. It ca be oticed that icreasig the quatizatio level, higher robustess is achieved. I Figure 7, the results of compariso amog the three methods are reported ( =50). As expected, due the JPEG compressio algorithm, the quality of the extracted mark is higher i the High Zoe scheme. A qualitative compariso ca be performed by lookig at Figure 8 i which the origial ad the extracted mark images are reported ( =50,, JPEG quality Factor = ). PSNR 68 db. PSNR attack. This is performed by applyig the classical Stirmark [-11]. I Figure 9 the PSNR curves correspodig to High zoe, are plotted. I this attack, this zoe is more sesitive to the attacks. Nevertheless, the value of the PSNR betwee origial ad extracted mark i the worst case is still over 62 db. I the followig, typical maipulatios of watermarked video have bee cosidered. I all the performed tests, for the quatizatio parameter the value =50 has bee used. Cotrast chage: the DCT coefficiets preset cosiderable variatios especially i the low frequecies. Hece, the High zoe is more sesitive to this attach. I Figure the results correspodig to PSNR vs. Cotrast chage are reported. Note that the value of cotrast chage=±50% correspod to causig the cotet of the frame to be uitelligible. The value of PSNR for the extracted mark is 68 db. Itesity value attack: also i this case the modificatio of itesity values of the video, affects the DCT coefficiets resultig a decreased performaces for the High zoe embeddig scheme. Nevertheless, the PSNR of the extracted mark whe a Middle zoe scheme is adopted, ad a variatio of +% for the itesity is used, is still over db. Video compressio: the watermarked video has bee compressed by usig MPEG1, MPEG2, ad other video coders freely available o Iteret.

4 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP High Zoe - JPEG Delta= Delta= Delta= rates. The mark is almost perfectly recostructed (both MPEG1 ad MPEG2 coders) i High ad Middle Zoe. Little degradatios appear istead i (87,27 db). We obtai comparable results also with the commercial video coders. JPEG High Zoe Middle Zoe 50 Figure 4: JPEG compressio- High Zoe scheme Middle Zoe - JPEG Delta= Delta= Delta= 50 Figure 7: JPEG compressio PSNR compariso at costat quatizatio parameter 50 Figure 5: JPEG compressio- Middle Zoe scheme - JPEG Delta= Delta= Delta= Figure 8: JPEG compressio. Origial ad extracted mark. PSNR=68dB High Zoe - PSNR Delta= Delta= Delta= 50 Figure 6: JPEG compressio- High Zoe scheme 0 50 PSNR Figure 9: PSNR attack- High Zoe scheme I Figure 11 is reported the PSNR betwee origial ad extracted mark correspodig to several compressio rates for a MPEG2 coder. The quality factor 1 idicates a o compressed video. The High Zoe scheme has always better performaces, also at low compressio Frame loss: this situatio ofte occurs durig video trasmissio over packet etworks. We tried to simulate this attack by droppig oe frame startig to the first oe of the 3D DCT block to the last oe, verifyig the effects o the extracted mark. I the detectio phase, i order to rebuilt the sequece of eight frames eeded to compute

5 14th Europea Sigal Processig Coferece (EUSIPCO 06), Florece, Italy, September 4-8, 06, copyright by EURASIP the 3D DCT cube, we simply added as eight frame, the ith oe. The results show the importace of the positio of the mark i the 3D cube. It is also useful to shuffle the data to be embedded to icrease the robustess. Video Maipulatio - Cotrast High Zoe Middle Zoe Cotrast 1 Figure : Cotrast attack Video Compressio High Zoe Middle Zoe Figure 11: Video Compressio attack. High zoe scheme outperforms the other two schemes at high ad middle levels of compressio rates. 5. CONCLUSIONS I this paper, a embeddig scheme, based o Scalar Costa Scheme i 3D DCT domai, for video watermarkig has bee preseted. The performed tests cofirm the effectiveess to use a volume i order to hide a huge amout of data with little or o visible distortio to the host video. The quality of the extracted mark remais high eve after may attacks. The performed simulatios allow selectig the best scheme depedig o applicatio. It is importat to uderlie that digital watermarkig is ot oly data hidig. The requiremets ad the costraits deped o the fial applicatio. The variatios of the embeddig scheme are proposed 50 to uderstad possible real applicatios of the geeral method. I our future study we are goig to apply other watermarkig schemes i 3D domai both for autheticatio ad for cocealmet of the video. REFERENCES [1] N. Nikolaidis ad I. Pitas, Robust image watermarkig i the spatial domai, Sigal Processig, vol. 66, o. 3, pp. 3 3, May [2] R. Wolfgag ad E. Delp, A watermark for digital images, i IEEE Proc. It. Cof. Image Proc. ICIP 1996, 1996, pp [3] D. Gruhl W. Beder ad N. Morimoto, Techiques for data hidig, Tech. rep., MIT Media Lab, Cambridge, MA, [4] M. Bari, F. Bartolii, V. Cappellii, ad A. Piva, A dctdomai system for robust image watermarkig, Sigal Processig, vol. 66, o. 3, pp , May [5] I. Cox, J. Kilia, F. Leighto, ad T. Shamoo, Secure spread spectrum watermarkig for multimedia, IEEE Trasactio o Image Processig, vol. 6, o. 12, December [6] H. Ioue, A. Miyazaki, ad T. Katsura, A image watermarkig method based o the wavelet trasform, i Proceedigs of IEEE Iteratioal Coferece o Image Processig, Kobe, Japa, October 1999, pp [7] M. Carli, C. Adsumilli, V. Razzauti, A. Neri Video watermarkig i 3D DCT domai, Proc. IEEE 05 Iteratioal Workshop o Spectral Methods ad Multirate Sigal Processig, SMMSP 05, Riga, Latvia, Jue -22, 05. [8] S. Pereira, S. Voloshyovskiy, M. Madueño, S. Marchad-Maillet ad T. Pu, Secod geeratio bechmarkig ad applicatio orieted evaluatio, I Iformatio Hidig Workshop III, Pittsburgh, PA, USA, April 01 [9] C.B. Adsumilli, M.C.Q. Farias, S.K. Mitra, ad M. Carli, A robust error cocealmet techique usig data hidig for image ad video trasmissio over lossy chaels, IEEE Trasactios o Circuits ad Systems for Video Techology, vol.15, o 11, Nov. 05 Page(s): [] F. A. P. Petitcolas, R. J. Aderso, M. G. Kuh. Attacks o copyright markig systems, i David Aucsmith (Ed), Iformatio Hidig, Secod Iteratioal Workshop, IH 98, Portlad, Orego, U.S.A., April 15-17, 1998, Proceedigs, LNCS 1525, Spriger-Verlag, ISBN , pp [11] F. A. P. Petitcolas, Watermarkig schemes evaluatio. I.E.E.E. Sigal Processig, vol. 17, o. 5, pp , September 00. [12] J. J. Eggers, R. Bauml, R. Tzschoppe, ad B. Girod, Scalar Costa Scheme for iformatio embeddig, IEEE Trasactios o Sigal Processig, vol. 51, o. 4, pp. 3 19, April 03. [13] M. H. M. Costa, Writig o dirty paper, IEEE Trasactios o Iformatio Theory, vol. 29, o. 3, pp May 1983.

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Precise Psychoacoustic Correction Method Based on Calculation of JND Level

Precise Psychoacoustic Correction Method Based on Calculation of JND Level Vol. 116 (2009) ACTA PHYSICA POLONICA A No. 3 Optical ad Acoustical Methods i Sciece ad Techology Precise Psychoacoustic Correctio Method Based o Calculatio of JND Level Z. Piotrowski Faculty of Electroics,

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

An Optimal Robust Digital Image Watermarking Based on Genetic Algorithms in Multiwavelet Domain

An Optimal Robust Digital Image Watermarking Based on Genetic Algorithms in Multiwavelet Domain A Optimal Robust Digital Image Watermarkig Based o Geetic Algorithms i Multiwavelet Domai PRAYOTH KUMSAWAT, KITTI ATTAKITMONGCOL AND ARTHIT SRIKAEW School of Telecommuicatio Egieerig, School of Electrical

More information

A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION

A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION Ju Liu,, Xigag Zhag, Jiade Su ad Miguel Agel Laguas, 3 School of Iformatio Sciece ad Egieerig, Shadog Uiversity, Jia 5, Chia Telecommuicatios Techological

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

On the Accuracy of Vector Metrics for Quality Assessment in Image Filtering

On the Accuracy of Vector Metrics for Quality Assessment in Image Filtering 0th IMEKO TC4 Iteratioal Symposium ad 8th Iteratioal Workshop o ADC Modellig ad Testig Research o Electric ad Electroic Measuremet for the Ecoomic Uptur Beeveto, Italy, September 5-7, 04 O the Accuracy

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Protecting Biometric Templates with Image Watermarking Techniques

Protecting Biometric Templates with Image Watermarking Techniques Protectig Biometric Templates with Image Watermarkig Techiques Nikos Komios ad Tassos Dimitriou Athes Iformatio Techology, GR-19002 Peaia Attiki, Greece {kotdim}@ait.edu.gr Abstract. Biometric templates

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

IMAGE VISUAL QUALITY METRICS VERIFICATION BY TID2013: EXPLORING OF MEAN SQUARE ERROR DRAWBACKS

IMAGE VISUAL QUALITY METRICS VERIFICATION BY TID2013: EXPLORING OF MEAN SQUARE ERROR DRAWBACKS IMAGE VISUAL QUALITY METRICS VERIFICATION BY TID: EXPLORING OF MEAN SQUARE ERROR DRAWBACKS Nikolay Poomareko ( ), Vladimir Luki( ), Oleg Ieremeiev ( ), Beoit Vozel( ), Kacem Chehdi( ), Kare Egiazaria (

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme

Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme Header for SPIE use Further Attacks o Yeug-Mitzer Fragile Watermarkig Scheme Jiri Fridrich, Miroslav Golja, ad Nasir Memo a Departmet of Systems Sciece ad Idustrial Egieerig, SUNY Bighamto, Bighamto, NY

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Primitive polynomials selection method for pseudo-random number generator

Primitive polynomials selection method for pseudo-random number generator Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the

More information

Outline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions

Outline. Applications of FFT in Communications. Fundamental FFT Algorithms. FFT Circuit Design Architectures. Conclusions FFT Circuit Desig Outlie Applicatios of FFT i Commuicatios Fudametal FFT Algorithms FFT Circuit Desig Architectures Coclusios DAB Receiver Tuer OFDM Demodulator Chael Decoder Mpeg Audio Decoder 56/5/ 4/48

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

Wavelet Based Dual Encoding Lossless Medical Image Compression

Wavelet Based Dual Encoding Lossless Medical Image Compression avelet Based Dual Ecodig Lossless Medical Image Compressio *V.Maohar, Asst. Professor, SR Egieerig College, aragal, TG, Idia, maoharvu@gmail.com **Dr.G. Laxmiarayaa, Professor, oly Mary Istitute of Techology,

More information

BLOCK MATCHING AND 3D COLLABORATIVE FILTERING ADAPTED TO ADDITIVE SPATIALLY CORRELATED NOISE

BLOCK MATCHING AND 3D COLLABORATIVE FILTERING ADAPTED TO ADDITIVE SPATIALLY CORRELATED NOISE BLOCK MATCHING AND 3D COLLABORATIVE FILTERING ADAPTED TO ADDITIVE SPATIALLY CORRELATED NOISE Aleksey Rubel (*), Vladimir Luki (*), Kare Egiazaria (**) (*) Natioal Aerospace Uiversity, Kharkov, Ukraie (**)

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

VALIDATING DIRECTIONAL EDGE-BASED IMAGE FEATURE REPRESENTATIONS IN FACE RECOGNITION BY SPATIAL CORRELATION-BASED CLUSTERING

VALIDATING DIRECTIONAL EDGE-BASED IMAGE FEATURE REPRESENTATIONS IN FACE RECOGNITION BY SPATIAL CORRELATION-BASED CLUSTERING VALIDATING DIRECTIONAL EDGE-BASED IMAGE FEATURE REPRESENTATIONS IN FACE RECOGNITION BY SPATIAL CORRELATION-BASED CLUSTERING Yasufumi Suzuki ad Tadashi Shibata Departmet of Frotier Iformatics, School of

More information

A Fast Fractal Model Based ECG Compression Technique Lin Yin 1,a, Fang Yu* 1,b

A Fast Fractal Model Based ECG Compression Technique Lin Yin 1,a, Fang Yu* 1,b 4th Iteratioal Coferece o Computer, Mechatroics, Cotrol ad Electroic Egieerig (ICCMCEE 2015) A Fast Fractal Model Based ECG Compressio Techique Li Yi 1,a, Fag Yu* 1,b 1 Electroicsad iformatio egieerig

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

A Fully SNR, Spatial and Temporal Scalable 3DSPIHT-Based Video Coding Algorithm for Video Streaming Over Heterogeneous Networks

A Fully SNR, Spatial and Temporal Scalable 3DSPIHT-Based Video Coding Algorithm for Video Streaming Over Heterogeneous Networks A Fully SNR, Spatial ad Temporal Scalable 3DSIHT-Based ideo Codig Algorithm for ideo Streamig Over Heterogeeous Networks Habibollah Dayali ad Alfred Mertis School of Electrical, Computer ad Telecommuicatios

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual) Wavelet Trasform CSE 49 G Itroductio to Data Compressio Witer 6 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1%

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1% We are ItechOpe, the first ative scietific publisher of Ope Access books 3,350 108,000 1.7 M Ope access books available Iteratioal authors ad editors Dowloads Our authors are amog the 151 Coutries delivered

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Vision & Perception. Simple model: simple reflectance/illumination model. image: x(n 1,n 2 )=i(n 1,n 2 )r(n 1,n 2 ) 0 < r(n 1,n 2 ) < 1

Vision & Perception. Simple model: simple reflectance/illumination model. image: x(n 1,n 2 )=i(n 1,n 2 )r(n 1,n 2 ) 0 < r(n 1,n 2 ) < 1 Visio & Perceptio Simple model: simple reflectace/illumiatio model Eye illumiatio source i( 1, 2 ) image: x( 1, 2 )=i( 1, 2 )r( 1, 2 ) reflectace term r( 1, 2 ) where 0 < i( 1, 2 ) < 0 < r( 1, 2 ) < 1

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

Spectral leakage and windowing

Spectral leakage and windowing EEL33: Discrete-Time Sigals ad Systems Spectral leakage ad widowig. Itroductio Spectral leakage ad widowig I these otes, we itroduce the idea of widowig for reducig the effects of spectral leakage, ad

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE Z.G. Zhou, S. Zhao, ad Z.G. A School of Mechaical Egieerig ad Automatio, Beijig Uiversity of Aeroautics ad Astroautics,

More information

FACIAL MOTION TRACKING AND ANIMATION: AN ICA-BASED APPROACH

FACIAL MOTION TRACKING AND ANIMATION: AN ICA-BASED APPROACH FACIAL MOTION TRACKING AND ANIMATION: AN ICA-BASED APPROACH Lucas D Terissi ad Jua C Gómez Laboratory for System Dyamics ad Sigal Processig FCEIA, Uiversidad Nacioal de Rosario Riobamba 245 Bis, 2000 Rosario

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Image Restoration from Patch-based Compressed Sensing Measurement

Image Restoration from Patch-based Compressed Sensing Measurement Image Restoratio from Patch-based Compressed Sesig Measuremet Guagtao Nie 1, Yig Fu 1, Yiqiag Zheg 2, Hua Huag 1 1 Beijig Istitute of Techology, 2 Natioal Istitute of Iformatics {lightbillow,fuyig,huahuag}@bit.edu.c,

More information

Analysis of Documents Clustering Using Sampled Agglomerative Technique

Analysis of Documents Clustering Using Sampled Agglomerative Technique Aalysis of Documets Clusterig Usig Sampled Agglomerative Techique Omar H. Karam, Ahmed M. Hamad, ad Sheri M. Moussa Abstract I this paper a clusterig algorithm for documets is proposed that adapts a samplig-based

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

The impact of GOP pattern and packet loss on the video quality. of H.264/AVC compression standard

The impact of GOP pattern and packet loss on the video quality. of H.264/AVC compression standard The impact of GOP patter ad packet loss o the video quality of H.264/AVC compressio stadard MIROSLAV UHRINA, JAROSLAV FRNDA, LUKÁŠ ŠEVČÍK, MARTIN VACULÍK Departmet of Telecommuicatios ad Multimedia Uiversity

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Modified Curvelet Thresholding Algorithm for Image Denoising

Modified Curvelet Thresholding Algorithm for Image Denoising Joural of Computer Sciece 6 (1): 18-3 010 ISSN 1549-3636 010 Sciece Publicatios Modified Curvelet Thresholdig Algorithm for Image Deoisig 1 Al-Dahoud Ali Preety D. Swami ad 3 J. Sighai 1 Departmet of Computer

More information

Polymorph: Morphing Among Multiple Images

Polymorph: Morphing Among Multiple Images Feature Article Polymorph: Morphig Amog Multiple Images Image metamorphosis has prove to be a powerful visual effects tool. May breathtakig examples ow appear i film ad televisio, depictig the fluid trasformatio

More information

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Title: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity.

Title: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity. 7 IEEE. Persoal use of this material is permitted. Permissio from IEEE must be obtaied for all other uses, i ay curret or future media, icludig repritig/republishig this material for advertisig or promotioal

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Evaluation of Pure-Fractal and Wavelet-Fractal Compression Techniques

Evaluation of Pure-Fractal and Wavelet-Fractal Compression Techniques Evaluatio of Pure-Fractal ad Wavelet-Fractal Compressio Techiques Mohammad. R. N. Avaaki * 3 Hamid Ahmadiead 4 Reza Ebrahimpour. Electroics departmet of Shahid Raaei Uiversity Laviza Tehra Ira. Electroics

More information

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Face Recognition Algorithm Using Discrete Gabor Transform

Face Recognition Algorithm Using Discrete Gabor Transform Selected Papers from: Commuicatios & Iformatio Techology 2008, Circuits, Systems ad Sigals 2008, Applied Mathematics, Simulatio, Modellig 2008, Maratho Beach, Attica, Greece, Jue 1-3, 2008 Face Recogitio

More information

are two specific neighboring points, F( x, y)

are two specific neighboring points, F( x, y) $33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

ALU Augmentation for MPEG-4 Repetitive Padding

ALU Augmentation for MPEG-4 Repetitive Padding ALU Augmetatio for MPEG-4 Repetitive Paddig Georgi Kuzmaov Stamatis Vassiliadis Computer Egieerig Lab, Electrical Egieerig Departmet, Faculty of formatio Techology ad Systems, Delft Uiversity of Techology,

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Design of Efficient Pipelined Radix-2 2 Single Path Delay Feedback FFT

Design of Efficient Pipelined Radix-2 2 Single Path Delay Feedback FFT IOSR Joural of VLSI ad Sigal Processig IOSR-JVSP Volume Issue Ver. I May-Ju. 0 PP 88-9 e-iss: 9 00 p-iss o. : 9 97 www.iosrjourals.org Desig of Efficiet Pipelied Radi- Sigle Path Delay Feedbac FFT isha

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information