Facial Expression Recognition using Image Processing and Neural Network

Size: px
Start display at page:

Download "Facial Expression Recognition using Image Processing and Neural Network"

Transcription

1 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Facial Exression Recognition using Image Processing and eural etwork Keerti Keshav Kanchi PG Student, Deartment of Electronics and Communication Engineering SD College of Engineering and Technology Dharwad , Karnataka, India -id: keertikanchi@gmail.com Abstract Face recognition is an imortant techniue and has drawn the attention of many researchers due to its varying alications such as security systems, medical systems, entertainment. A face recognition system is one of the biometric information rocessing systems. The develoed algorithm for the facial exression recognition system, which uses the two-dimensional discrete cosine transform(2d- DCT) for image comression and the self organizing ma(so) neural network for recognition urose, simulated in ATLAB. By using 2D-DCT we extract image vectors and these vectors become the inut to neural network classifier, which uses self organizing ma algorithm to recognize familiar faces (trained) and faces with variations in exression. In this aer we have develoed and illustrated a recognition system for human faces using a novel self organizing ma based retrieval system. SO has good feature extracting roerty due to its toological ordering. The facial analytics result for the 25 images of AT &T database reflects that the face recognition rate using one the neural network algorithm SO is 95.05% for 5 ersons. Keywords- 2D-Discrete Cosine Transform (2D-DCT), Facial Exression Recognition, eural etwork, Self Organizing a. I. ITRODUCTIO Face recognition is one of the most successful alications of attern recognition and image analysis which has recently received significant attention, esecially during the ast several years. At least two reasons account for this trend: the first is the wide range of commercial and law enforcement alications, and the second is the availability of feasible technologies after 30 years of research. Face Recognition has gained momentum and ractical vitality in the wake of increased and growing security concerns. A facial recognition and face verification system can be considered as a comuter alication for automatically identifying or verifying a erson in a digital image in as much as the rocessing is carried out on digital still facial images []. The facial exression recognition system was introduced in 978 by Suwa et. Al. The main issue of building a facial exression recognition system is face detection and alignment, image normalization, feature extraction, and classification. There are number of techniues which we use for recognizing the facial exression. This aer resents a novel aroach to recognize face using two dimensional discrete cosine transforms (2D- DCT) and self organize ma (SO) eural etwork as classifier. A block diagram of roosed techniue for facial exression recognition using SO eural etwork is as shown in the fig. In the first stage all the 25 face images are comressed for feature rocessing using two dimensional discrete cosine transform (2D-DCT). When the 2D DCT is alied with a mask, high-coefficients in an image are discarded []. Then the 2D IDCT is alied to regenerate the comressed image, which is blurred due to loss of uality and also smaller in size. In next stage uses a self-organizing ma (SO) with an unsuervised learning techniue which is trained to classify vectors into grous to recognize if the subject in the inut image is resent or not resent in the image database. After training all the 25 face images, we now take a single inut image, comress it using 2D- DCT and regenerate it using IDCT. All the 25 trained images and untrained inut image are simulated. The untrained inut image is comared with all trained images, if the face image is classified as resent, the best match image is found in the training database using minimum absolute deviation and that image is dislayed otherwise if the image is not found then image is not found in the database is dislayed. ISS : Vol. 4 o. 05 ay

2 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Fig. Block Diagram of Facial Exression Recognition using SO eural etwork II. DISCRETE COSIE TRASFOR For feature extraction 2-D Discrete Cosine Transform (2D-DCT) is used. A discrete cosine transform (DCT) exresses a seuence of finitely many data oints in terms of a sum of cosine functions oscillating at different freuencies. The use of cosine rather than sine functions is critical in these alications: for comression, it turns out that cosine functions are much more efficient, whereas for differential euations the cosines exress articular choice of boundary conditions [2]. The DCT, and in articular the DCT-II, is often used in signal and image rocessing, esecially for lossy data comression, because it has a strong "energy comaction". ost of the signal information tends to be concentrated in a few low-freuency comonents of the DCT.DCT is real valued and rovides a better aroximation of a signal with fewer coefficients. The 2D-DCT of an matrix A is defined as follows: 2 2 m n B A cos cos,0,0 (2.) mn m0 n0 2 2 The values B are the DCT coefficients. The DCT is an invertible transform, and the 2D-IDCT (2D Inverse- DCT) is defined as follows: A mn 0 0 B cos 2m 2n 2 cos 2,0 m,0 n (2.2) The values and in euation (2.) and (2.2) are given by: 2,, 0 2 The roosed techniue uses the DCT transform matrix in the ATLAB Image Processing Toolbox. This techniue is efficient for small suare inuts such as image blocks of 8 8 ixels. The transform matrix T is given by:,, 0 (2.3) ISS : Vol. 4 o. 05 ay

3 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) T 2, cos 0, 0 2 2, The DCT transformation matrix is imlemented in ATLAB and the feature is extracted. The 2D DCT reduces the size of the data significantly by transforming the image from the satial reresentation into the freuency domain. The lower freuencies are characterized by relatively larger magnitude while the higher freuencies have smaller magnitudes [3]. The higher freuency comonents are ignored as it does not significantly affect the accuracy of work. In short, the 2D DCT coefficient of lower freuency values catures the most relevant information of the facial exressions. A. 2D-DCT Image Comression The roosed design techniue calculates the 2D-DCT of the image blocks of size 8 8 ixels using 8 out of the 64 DCT coefficients for masking. The other 56 remaining coefficients are discarded (set to zero). The image is then reconstructed by comuting the 2D-IDCT of each block using the DCT transform matrix comutation method. Finally, the outut is a set of arrays. Each array is of size 8 8 ixels and reresents a single image [4]. Emirically, the uer left corner of each 2D-DCT matrix contains the most imortant values, because they corresond to low-freuency comonents within the rocessed image block. III. SELF ORGAIZIG AP Self organizing ma also known as kohonen ma is well known artificial neural network. It is unsuervised learning rocess in which the learning is based uon the inut data which is known as unlabeled data and is indeendent of the desired outut data. Self organizing ma can also be termed as a toology reserving ma [5]. There is a cometition among the neurons to be activated and only one neuron that wins the cometition is fired and is called the winner. Kohonen rule is used to learn the winner neuron and neurons within a certain neighborhood of the winning neuron. This rule allows the weight of neuron to learn an inut vector so this makes it erfect for recognition. Hence in this system SO is used as classifier. The SO network used in this system contains nodes ordered in two dimensional lattice architecture and each node has 2 or 3 neighbor nodes. SO has three hases of life cycle: learning hase, training hase and testing hase. A. Unsuervised Learning During the learning the neurons having weight closest with the inut vector declare as winner [6]. Based on winning neuron weights of all neighborhood neurons are adjusted by an amount inversely roortional to the Euclidean distance. The learning algorithm is summarized as follows:. Initialization: Choose random values for the initial weight vectors w j 0, the weight vector being different for j =, 2,...,l where l is the total number of neurons. T n w i w i, w i 2,..., w il (3.) 2. Samling: Draw a samle x from the inut sace with a certain robability. Where x T n x x, 2, x l (3.2) i x at time t, 0 < t n by using the minimum distance Euclidean criterion: i x arg min x( n) w, j,2... l (3.3), 0 3. Similarity atching: Find the best matching (winning) neuron j j 4. Udating: Adjust the synatic weight vector of all neurons by using the udate formula: wj ( n ) wj ( n) ( n) hj, i( x) ( n) x( n) wj ( n) (3.4) n is learning rate arameter, and h i xn nand are xn winning neuron. Both h i (2.4) j, is the neighbourhood function centred around the j, varied dynamically during learning for best results. 5. Continue with ste 2 until no noticeable changes in the feature ma are observed. B. Training During the training hase feature vector are resented to the SO one at a time. For each node net determines the outut unit that is best matches for current inut samle. The weight vector for the winner is adjusted with resect to the learning algorithm described in learning hase [7]. At the end of this hase each ISS : Vol. 4 o. 05 ay

4 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) node has two values: total number of winning times for the subject resent in the database, and total number of winning times for the subject not resent in the database. C. Testing During the testing hase firstly every inut vector is comared with the all the SO nodes and then the best match is found based on minimum Euclidean distance as given in euation (3.3). After that final outut result is shown. IV. EXPERIETAL WORK A. Image Database The training database consists of 25 images, containing five subjects and each subject having 5 individual face images with 5 different facial exressions. The image databases for of 25 subjects with different facial exressions are as shown below: (a) (b) Fig. 2 Training and testing image database (a) Image database for training of 25 subjects with 5 different facial exressions. (b) Untrained image for testing. B. Validation Techniue All the face images were resized to 8 x 8 ixels and saved; the next ste was to comress them by alying the 2D blocked DCT. When the 2D DCT is alied with a mask, high-coefficients in the image are discarded. Then the 2D IDCT is alied to regenerate the comressed image, which is blurred due to loss of uality and also smaller in size. For the image data to be inut into the neural network, it should follow the form of only one column, desite the number of rows. Currently, all the resized and DCT comressed face images are in the form of 8 x 8 ixels. Hence the image data needed to be reshaed from an 8 x 8 matrix to a 64 x array for it to be used both for the inut and training database of the neural network. SO s were found to be efficient for image data management and roved to be an accurate closest matching techniue of untrained inut images with trained database of images. For the design of SO, a set of 25 image data, 5 different subjects with 5 different facial exressions for the training database was loaded into ATLAB [8]. A SO was then created and the Parameters for the SO network were selected to be a minimum and maximum oint for each row on vector; training database. There were 64 minimum and 64 maximum oints selected altogether. After the SO neural network was created, it was trained for 2000 eochs. The figure 3 is the SO layer weight for the 25 face images in the training database and figure 4 is the SO weight vectors is as shown below: ISS : Vol. 4 o. 05 ay

5 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Fig. 3 SO layer weights for the 25 face images in the training database. Fig.4 SO weight vectors After the SO neural network was trained and simulated for the 25 images in the training database, the SO neural network was then simulated for the single inut face image. After the SO neural network is simulated for the inut face image, the image in the training database which is the closest match by the SO neural network for the inut face image is found by finding the minimum absolute deviation. After the closest matched training database images are found, they are then classified. Classification of the subject is the answer of the face recognition system. C. Determining Otimal umber of Eochs for Training Eochs are neural network training arameters. They are defined as one comlete cycle through the neural network for all cases, which resent the entire training set to the neural network. Each time a record goes through the net, it is one trial, one swee of all records is termed as an Eoch. Less number of eochs used for training leads to less training time for the training data set. The goal is to find the otimal number of eochs for training which will roduce accurate neural network results and at the same reuire the least amount of time for rogram execution. The SO neural network was tested to determine the otimal number of eochs to be used for neural network training. This test was erformed by varying the number of eochs and network training time to find the best ossible recognition rate. Table I shows the tabulated results for the test. The training database for this test consists of 25 face images of 5 subjects, each subject having 5 individual images with different facial exressions. ISS : Vol. 4 o. 05 ay

6 Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Table I. Comarison of number of eochs vs. network training time and Recognition rate umber of eochs etwork Training Time (in sec) Recognition Rate (%) Table I shows the tabulated results generated by varying the number of eochs. The most efficient number of eochs for training and with resect to fastest training time is 2000, with achieves best ossible recognition rate as 95.05%. V. COCLUSIO This aer has resented a novel facial exression recognition techniue that uses features derived from DCT coefficients, along with a self organizing ma (SO)-based classifier. The 2D-DCT and SO neural network are the heart for the design and imlementation of efficient facial exression recognition system. The system was evaluated in ATLAB using an image database of 25 face images, containing five subjects and each subject having 5 images with different facial exressions. After training for aroximately 2000 eochs the system achieved a recognition rate of 95.05% for fastest network training time. The system having less comutational reuirement this make system well suited for low cost, real-time hardware imlementation. VI. ACKOWLEDGET It is a great leasure to exress sincere and humble gratitude to the guide Dr. Vijaya C for valuable guidance and encouragement given during the course of work. The author would also like to extend sincere thanks to the Princial, HOD and to all teaching and non-teaching staff of Electronics and Communication Engineering deartment of SD College of Engineering and Technology, Dharwad, Karnataka, India for their constant suort. REFERECES [] Jawad agi, Syed Khaleel Ahmed and Farrukh agi, A ATLAB based Face Recognition System using Image Processing and eural etworks, 4th International Collouium on Signal Processing and its Alications, arch 7-9, 2008, Kuala Lumur, alaysia. [2] Dinesh Chandra Jain and V. P. Pawar, A ovel Aroach For Recognition Of Human Face Automatically Using eural etwork ethod, International Journal of Advanced Research in Comuter Science and Software Engineering, Volume 2, Issue, January 202. [3].andini, P.Bhargavi and G.Raja Sekhar, Face Recognition Using eural etworks, International Journal of Scientific and Research Publications, Volume 3, Issue 3, arch 203. [4] Digital Image Processing - R.C. Gonzalez Richards and Xiuing Jia, enlarged edition, Sringer-Verlag, 999. Woods, Addison Wesley, 992. [5] Simon Haykin, eural etwork-a Comrehensive Foundation, 2 nd Ed., Pearson Education, 2004 [6] Steve Lawrence, C. Lee Giles, Ah Chung Tsoi and Andrew D. Back, Face Recognition: A Convolutional eural etwork Aroach, Acceted for ublication, IEEE Transactions on eural etworks, Secial Issue on eural etworks and Pattern Recognition. [7] Angel oe artinez-gonzalez and Victor Ayala-Ramirez, Real Time Face Detection Using eural etworks, 20 0th exican International Conference on Artificial Intelligence. [8] Abdallah S. Abdallah, A. Lynn Abbott, and ohamad Abou El-asr, A ew Face Detection Techniue using 2D DCT and Self Organizing Feature a, Proceedings Of World Academy Of Science, Engineering And Technology Volume 2 ay ISS : Vol. 4 o. 05 ay

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image -D Fir Filter Design And Its Alications In Removing Imulse Noise In Digital Image Nguyen Thi Huyen Linh 1, Luong Ngoc Minh, Tran Dinh Dung 3 1 Faculty of Electronic and Electrical Engineering, Hung Yen

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

Face Recognition with Local Binary Patterns

Face Recognition with Local Binary Patterns Face Recognition with Local Binary Patterns Ammad Ali, Shah Hussain, Farah Haroon, Sajid Hussain and M. Farhan Khan Abstract- This aer is about roviding efficient face recognition i.e. feature extraction

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Dynamic Signature Verification System Using Statistics Analysis

Dynamic Signature Verification System Using Statistics Analysis Dr. S.A Daramola et. al. / (IJCSE International Journal on Comuter Science and Engineering Vol. 0 o. 07 00 466-470 Dnamic Signature Verification Sstem Using Statistics Analsis Dr. S.A Daramola and Prof..S

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

CLUSTER ANALYSIS AND NEURAL NETWORK

CLUSTER ANALYSIS AND NEURAL NETWORK LUSTER ANALYSIS AND NEURAL NETWORK P.Dostál,P.Pokorný Deartment of Informatics, Faculty of Business and Management, Brno University of Technology Institute of Mathematics, Faculty of Mechanical Engineering,

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

NON-UNIFORM TO UNIFORM IMAGE RESAMPLING UTILIZING A 2D FARROW STRUCTURE

NON-UNIFORM TO UNIFORM IMAGE RESAMPLING UTILIZING A 2D FARROW STRUCTURE NON-UNIFORM TO UNIFORM IMAGE RESAMPLING UTILIZING A D FARROW STRUCTURE Harish Essay Sanaran, Mihail Georgiev, Atanas Gotchev and Karen Egiaarian Noia Cororation, Hermianatu, Tamere, FINLAND, harish.essaysanaran@noia.com

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

An Iteratively Reweighted Norm Algorithm for Total Variation Regularization

An Iteratively Reweighted Norm Algorithm for Total Variation Regularization An Iteratively eweighted Norm Algorithm for Total Variation egularization Paul odríguez and Brendt Wohlberg Abstract Total Variation TV regularization has become a oular method for a wide variety of image

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Chapter 7, Part B Sampling and Sampling Distributions

Chapter 7, Part B Sampling and Sampling Distributions Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

A Novel Ensemble Method for Regression via Classification Problems

A Novel Ensemble Method for Regression via Classification Problems Journal of Comuter Science 7 (3): 387-393, 0 ISSN 549-3636 0 Science Publications A Novel Ensemble Method for Regression via Classification Problems Sami M. Halawani, Ibrahim A. Albidewi and Amir Ahmad

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Invariant Descriptors and Classifiers Combination for Recognition of Isolated Printed Tifinagh Characters

Invariant Descriptors and Classifiers Combination for Recognition of Isolated Printed Tifinagh Characters IJACSA Secial Issue on Selected aers from Third international symosium on Automatic Amazigh rocessing (SITACAM 3) Invariant Descritors and Classifiers Combination for Recognition of Isolated rinted Tifinagh

More information

Detection of TCP Attacks Using SOM with Fast Nearest-Neighbor Search

Detection of TCP Attacks Using SOM with Fast Nearest-Neighbor Search Detection of TCP Attacs Using SOM with Fast Nearest-Neighbor Search Jun Zheng Mingzeng Hu Deartment of Comuter Science, Harbin Institute of Technology P.O.Box 320, Harbin Institute of Technology, Harbin,

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text

More information

PATTERN RECOGNITION USING NEURAL NETWORKS

PATTERN RECOGNITION USING NEURAL NETWORKS PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Depth Estimation for 2D to 3D Football Video Conversion

Depth Estimation for 2D to 3D Football Video Conversion International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

Support Vector Machines for Face Authentication

Support Vector Machines for Face Authentication Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas 1 2 1 CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Change Detection in Synthetic Aperture Radar Images Using Contourlet Based Fusion and Kernel K-Means Clustering

Change Detection in Synthetic Aperture Radar Images Using Contourlet Based Fusion and Kernel K-Means Clustering Cloud Publications International Journal of Advanced Remote Sensing and GIS 013, Volume, Issue 1,. 316-35, Article ID Tech-161 ISSN 30-043 Research Article Oen Access Change Detection in Synthetic Aerture

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

A Multiscale Representation Including Opponent Color Features for Texture Recognition

A Multiscale Representation Including Opponent Color Features for Texture Recognition 14 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 7, NO. 1, JANUARY 1998 nonlinear restoration algorithm. The results indicate that reasonably good assband restoration was accomlished, and there is evidence

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

Chapter 7b - Point Estimation and Sampling Distributions

Chapter 7b - Point Estimation and Sampling Distributions Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT Jian Zhao and Sen-ching S. Cheung University of Kentucky Center for Visualization and Virtual Environment 1 Quality Street, Suite

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

A Fast Image Restoration Method Based on an Improved Criminisi Algorithm

A Fast Image Restoration Method Based on an Improved Criminisi Algorithm A Fast Image Restoration Method Based on an Imroved Algorithm Yue Chi1, Ning He2*, Qi Zhang1 Beijing Key Laboratory of Information Services Engineering, Beijing Union University, Beijing 100101, China.

More information

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect A simulated Linear Mixture Model to Imrove Classification Accuracy of Satellite Data Utilizing Degradation of Atmosheric Effect W.M Elmahboub Mathematics Deartment, School of Science, Hamton University

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

Introduction to Visualization and Computer Graphics

Introduction to Visualization and Computer Graphics Introduction to Visualization and Comuter Grahics DH2320, Fall 2015 Prof. Dr. Tino Weinkauf Introduction to Visualization and Comuter Grahics Grids and Interolation Next Tuesday No lecture next Tuesday!

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

A Global Sampling Based Image Matting Using Non-Negative Matrix Factorization

A Global Sampling Based Image Matting Using Non-Negative Matrix Factorization A Global Samling Based Image atting Using on-egative atrix Factorization AVEED ALA*, UHAAD SARI*, AD ABDUL BASIT SHAIKH* RECEIVED O 04..05 ACCEPTED O 6.0.06 ABSTRACT Image matting is a technique in which

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Digital Air Brush a 10 DOF bimanual tool

Digital Air Brush a 10 DOF bimanual tool Digital Air Brush a 10 DOF bimanual tool Paulo Pacheco,1 George Fitzmaurice 1, Ian Ameline 1 William Buxton 1, 1 Alias wavefront Toronto, Ontario Canada Deartment of Comuter Science University of Toronto

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

Using Kullback-Leibler Divergence to Model Opponents in Poker

Using Kullback-Leibler Divergence to Model Opponents in Poker Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information