Image authentication and tamper detection using fragile watermarking in spatial domain

Size: px
Start display at page:

Download "Image authentication and tamper detection using fragile watermarking in spatial domain"

Transcription

1 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: Image authentication and tamper detection uing fragile watermarking in patial domain Yadwinder Kaur, Dr. Sukhjeet Kaur Ranade Abtract In thi paper a fragile watermarking cheme baed on adaptive embedding rule i propoed. The watermark embedding and detection rule are applied according to the characteritic of image block. In our algorithm we have ued gray level variance of image block to ditinguih it a mooth and unmooth block. The dicrete embedding rule are applied for mooth and unmooth block to improve authentication of the image. In order to acce the performance of the propoed cheme copy and pate attack ha been applied to the watermarked image. Experimental reult have been compared with Hu and Tu [9] method and found ignificant increae in PSNR of the watermarked image and decreae in Fale negative rate and Fale poitive rate. Index Term Fragile watermarking, Image authentication, Spatial domain, Tamper detection. I. INTRODUCTION Due to rapid growth of internet and digital technologie, the digital image can be eaily hared acro the globe. At the ame time, the data hared can be eaily manipulated with the help of image proceing tool uch a Photohop. The eae and extent of uch manipulation draw the attention to the need of image authentication. Therefore, verifying the integrity of digital image ha become a crucial reearch topic. Image authentication can be implemented uing digital ignature or digital watermarking. A digital ignature i an encrypted or igned hah value of image content. A digital ignature can detect that an image i modified but it drawback i that it cannot locate the tampered region. Digital watermarking enable not only identifying whether an image i tampered, but alo locate the tampered part. Thu digital watermarking overcome the limitation of digital ignature. Digital watermark baed authentication cheme ha two tep: the firt i embedding of the watermark and the econd i tamper detection. The digital watermarking cheme not only identify whether an image i tampered, but can alo locate the tampered part. In digital watermarking fragile watermarking i ued for the purpoe of authentication of the image. Fragile watermarking can be applied in patial domain or tranform domain. In patial domain the intenity value of the pixel are modified directly to embed the watermark. In cae of the tranform Manucript received July, Yadwinder Kaur, Department of Computer Science, Punjabi Univerity Patiala, India. Dr. Sukhjeet Kaur Ranade, Aociate Profeor, Department of Computer Science, Punjabi Univerity Patiala, India. domain the tranform coefficient of the image are modified to embed the watermark. We have choen to work in patial domain a it i eay to implement and it computational complexity i le. II. LITERATURE SURVEY The firt fragile watermarking technique wa propoed by Walton [1] in 1995 baed on the ue of the checkum which i calculated from the 7 mot ignificant bit and embedded in the leat ignificant bit. It ha a limitation that one can change the image content by keeping the leat ignificant bit unchanged and it cannot detect the tamper location. Yeung and Mintzer [2] propoed an algorithm to verify that an image i not modified by the ue of an inviible watermark embedded into the image pixel value. The watermark extraction proce extract the embedded watermark from watermarked image uing the verification key. The limitation of thi technique i that watermark can be eaily forged. Kailaanathan [3] propoed a modified verion of the Yeung Mintzer cheme in order to prevent the two main attack propoed for Yeung Mintzer method. Lee and Lin [4] propoed a cheme that ue the dual watermark for the purpoe of the image tamper detection and recovery. In propoed cheme every block in the image contain watermark of further two block. For every non-overlapping block in the image there are two copie of watermark. Therefore there are two copie of watermark for the entire image and when firt copy i detroyed the econd watermark can be ued. A ecret key that i end along with the watermarked image i ued to extract the watermark for tamper recovery purpoe. Zhang and Wang [5] propoed a method baed upon novel fragile watermarking which can recover the original image from the tampered image. In thi cheme a watermark which conit of reference bit and check bit i embedded into the original image uing data hiding method. In order to find the tampered image block the extracted bit can be compared with the calculated check bit. The diadvantage of thi technique i that it cannot recover the tampered part if the tampered area i large. Rawat and Raman [6] dicued a novel chao baed watermarking algorithm for image authentication and. All Right Reerved 2017 IJARCET 1058

2 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: tamper detection. The propoed method can detect any change made to the image and can alo how the pecific location that have been changed. Two chaotic map are ued to improve the ecurity of the propoed cheme. In thi cheme the initial value of the chaotic map are ued a ecret key. In order to extract the right watermark the peron hould have the correct key. The cheme ha two limitation firt the cat map that i ued to diarrange the hot image i appropriate only for quare image. Second it cannot reit collage attack. Teng et al [7] propoed the cheme that analyzed the ecurity of a chaotic ytem baed fragile watermarking cheme for image tamper detection propoed by Rawat and Raman [6].The propoed method dicued ome error and modification attack againt Rawat and Raman cheme. The experimental reult and theoretical analyi howed that the fragile watermarking cheme of Rawat i not ecure. Thi method propoed an improved verion in order to improve the ecurity of the exiting technique. Performance evaluation i carried out by performing the attack uch a cut and pate attack, text addition and collage attack. Caragata et al [8] propoed two attack on Teng et al [7] fragile watermarking cheme. The attacker can apply valid watermark on tampered image in both the cae, therefore making the watermarking cheme uele. The firt attack ue the watermarked verion of two choen image, and the econd attack i a generalization of the firt, ue a number of arbitrary watermarked image. The paper alo model the cryptanalyi proce for the econd attack uing Markov chain in order to demontrate that the neceary number of image i relatively mall for a high probability of ucceful attack. All the reult that are preented in thi paper have been confirmed by a practical implementation. Hu and Tu [9] propoed the cheme that ue the moothne to differentiate the type of image block and ue different watermark embedding, tamper detection, and recovery cheme for different block type. The performance of thi cheme can be improved further by changing it embedding rule and tamper detection procedure. III. PROPOSED METHOD In thi work the embedding and tamper detection procedure of the exiting cheme [9] i modified in order to improve it efficiency. In the propoed cheme the watermark embedding rule are defined according to the characteritic of image block. The gray level variance of image block i ued to ditinguih it a mooth and unmooth block. The patial domain layout of non mooth and mooth mall block are hown in Fig.1 and Fig.2 repectively, where each row repreent eight bit b 7, b 6,..., b 0 of a pixel. A i the authentication information of a mall block, R i the recovery information of a mall block, R l i the recovery information of a large block, M i the two bit information obtained from the two mot ignificant bit of the mean of each mall block. b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 p 0 p 1 p 2 p 3 A A A R l Fig. 1 Watermark embedding rule for unmooth mall block A A M M b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 R R A R A A R A M R R l M Fig. 2 Watermark embedding rule for mooth mall block The watermarking embedding and tamper detection procedure i decribed in detail a follow: Watermark embedding procedure: 1. Divide the entire image into k = M N/64 non-overlapping large block of 8 8. Each large block conit of 16 mall block of 2 2. M and N are height and width of image repectively. 2. Compute gray level variance of each large block and ort it in decending order. The top (M N/)/ (64 3) block are non-mooth block and the remaining are mooth block. 3. Iterate for each large block a) Compute the mean of the large block and convert it in the binary form and then generate the 16 bit information by producing combination of firt four mot ignificant bit four time and then mot ignificant bit. Embed thee 16 bit in R l poition of 16 mall block. b) Calculate the mean of each 2 2 non-mooth mall block and convert it into binary form. Embed the five mot ignificant bit of the mean in R poition. c) If the current block i the lat block then proceed to tep 4 ele go to tep 3 (a). 4. In order to minimize the difference between the watermarked image and original image the following equation i ued a moothing function. where x i the value of the five mot ignificant bit of original pixel of the image, d i the difference between the value of three leat ignificant bit after a watermark i embedded and value of three leat ignificant bit of original pixel of the image. 5. Input the ecret key. 6. Iterate for each mall block p 0 p 1 p 2 p 3 (1) All Right Reerved 2017 IJARCET 1059

3 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: a) Compute Meage Diget 5 [10] over the mall block and then apply the XOR over the meage diget and ecret key. Fold the information to the 5 bit. If current block i mooth block the embed the firt four bit in the A poition ele embed the five bit in A poition. b) Compute the mean of the mall block and convert it into the binary form. Embed the two mot ignificant bit in M poition. c) If current block i the lat block then go to tep 7 ele go to tep 6(a). 7. Compute the performance parameter and return the watermarked image. Tamper detection procedure: The image tamper detection model revere the whole procedure of embedding and verifie the embedding to recognize the tampered part. In our cheme two level tamper detection i performed in order to detect the tampered region in the image. 1. Input the tampered image. 2. Divide the entire image into k = M N/64 non-overlapping large block of 8 8. Each large block conit of 16 mall block of 2 2. M and N are height and width of image repectively. 3. Compute gray level variance of each large block and ort it in decending order. The top (M N)/ (64 3) block are non-mooth block and the remaining are mooth block. 4. Input the ecret key ued during the embedding proce. 5. Initialize a binary image equal to the ize of input image, detect binary. 6. Iterate for each mall block a) Compute Meage Diget 5 [10]over the mall block and then apply the XOR over the meage diget and ecret key. Fold the information to the 5 bit. If current block i mooth block the compare the firt four bit with the pre-embedded information in the A poition ele compare the 5 bit with the pre-embedded information in A poition. b) Compute the mean of the mall block and convert it into the binary form. Extract the two mot ignificant bit of the mean and compare it with the pre-embedded information in M poition. c) If both the information doe not match with pre-embedded information then current 2 2 block i marked a invalid and the correponding pixel in detect binary. are aigned the value 1 (i.e. white color to repreent the tampered part). d) If current block i the lat block then go to tep 7 ele go to tep 6(a). 7. Return the detect binary image mentioning the tampered region and compute the performance parameter. IV. EXPERIMENTATION AND RESULTS All the experiment are performed in MATLAB (R2010a) on a PC with 1.70 GHz Intel Core i3 CPU, 4 GB RAM and 1 TB HDD under window 8 environment. In order to evaluate the performance of the propoed ytem copy-move attack ha been applied on the watermarked image uing the adobe Photohop. All the image are of ize and are in tiff format. The performance evaluation metric ued are Peak Signal to Noie Ratio (PSNR), Fale negative rate (FNR), Fale poitive rate (FPR), True poitive rate (TPR) and True negative rate (TNR). PSNR i meaured in decibel and i given by following equation: where MSE i mean quare error and i given by: (3) where and repreent the length and width of the two dimenional image repectively In order to meaure the tamper detection accuracy FNR, FPR, TPR and TNR are ued. Fale negative rate i the proportion of actual tampered pixel that were erroneouly reported a untampered pixel. (4) Fale poitive rate i the proportion of actual untampered pixel that were erroneouly reported a tampered pixel. True poitive rate i the proportion of actual tampered pixel that are reported a tampered pixel. (6) True negative rate i the proportion of actual untampered pixel that were reported a untampered pixel. where repreent True Poitive, repreent Fale Negative, repreent Fale Poitive and repreent True Negative. True Poitive mean the number of pixel that are tampered and judged a tampered. Fale Negative mean the number of pixel that are tampered but judged a untampered. Fale Poitive mean the number of pixel that are untampered but judged a tampered. True negative mean the number of pixel that are untampered and judged a untampered. Table I. PSNR, FPR, FNR, TPR, TNR of propoed cheme. (5) (7) (2) Image name PSNR (db) FPR FNR TNR TPR Baboon Barbara Jet plane Pirate Pepper Lena Gold Bridge Couple Zelda Elaine Sailboat Average All Right Reerved 2017 IJARCET 1060

4 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: Table II. Comparion between experimental data of propoed method and Hu and Tu cheme [9]. Method PSNR (db) FPR FNR TNR TPR Propoed Hu and Tu (a) (b) (c) (d) (e) (f) (g) (h) ( i) (j) (k) (l) Fig. 3 Watermarked image (a) Baboon (b) Barb (c) Jet plane (d) Pirate (e) Pepper (f) Lena (g) Gold (h) Bridge (i) Couple (j) Zelda (k) Elaine (l) Sailboat (a) (b) ( c) (d) (e) (f) (g) (h) All Right Reerved 2017 IJARCET 1061

5 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: (i) (j) (k) (l) Fig. 4 Copy-move attack experiment (a) Baboon (b) Barb (c) Jet plane (d) Pirate (e) Pepper (f) Lena (g) Gold (h) Bridge (i) Couple (j) Zelda (k) Elaine (l) Sailboat (a) (b) (c) (d) (e) (f) (g) (h) (i ) (j) (k) (l) Fig.5 Tamper detection reult of copy move attack (White zone are tampered zone). V. CONCLUSION In thi paper fragile watermarking cheme baed on adaptive embedding i implemented. The experimental reult of PSNR how that the watermarked image have high viual imperceptibility. Comparion reult of Table II how that our cheme outperform the exiting technique by reducing fale poitive rate and fale negative rate and increaing the PSNR of watermarked image. Future cope of thi work include extending thi cheme for authentication of color image. ACKNOWLEGDEMENT With profound gratitude and due regard, I whole heartedly and incerely acknowledge the effort, encouragement and proper guidance by Dr. Sukhjeet Kaur Ranade Aociate Profeor, Department of Computer Science, Punjabi Univerity, Patiala. REFERENCES [1] S. Walton, Information authentication for a lippery new age, Dr. Dobb Journal, 20.4(1995): [2] M.M. Yeung and F. Mintzer, An Inviible Watermarking Technique for Image Verification", International Conference on Image Proceing, IEEE (1997). [3] C. Kailaanathan,"Fragile watermark baed on polarity of pixel point." Image and Signal Proceing and Analyi, Proceeding of the 3rd International Sympoium on. 2(2003). [4] T.Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery." Pattern recognition (2008): [5] X. Zhang and S. Wang, "Fragile watermarking with error-free retoration capability." IEEE Tranaction on Multimedia 10.8 (2008): [6] S. Rawat and B. Raman, "A chaotic ytem baed fragile watermarking cheme for image tamper detection." AEU-International Journal of Electronic and Communication (2011): All Right Reerved 2017 IJARCET 1062

6 International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume xx, Iue xx, Month 20xx, ISSN: [7] L. Teng, X. Wang and X. Wang, "Cryptanalyi and improvement of a chaotic ytem baed fragile watermarking cheme." AEU-International Journal of Electronic and Communication 67.6 (2013): [8] D. Caragata, et al, "Cryptanalyi of an improved fragile watermarking cheme." AEU-International Journal of Electronic and Communication 70.6 (2016): [9] C.S. Hu and S.F. Tu,"Image tamper detection and recovery uing adaptive embedding rule." Meaurement 88 (2016): [10] R. Rivet, RFC1321: The MD5 meage-diget algorithm, RFC Editor,United State, Yadwinder Kaur i a tudent of M.Tech (CSE) in Department of Computer Science, Punjabi Univerity, Patiala carrying out her reearch work under the guidance of Dr. Sukhjeet Kaur Ranade. Her main reearch interet i digital watermarking. Dr. Sukhjeet Kaur Ranade i preently erving a Aociate Profeor in Department of Computer Science, Punjabi Univerity, Patiala. Her key reearch area are image proceing and information hiding. She ha publihed more than 50 paper in variou journal and conference of international and national repute. All Right Reerved 2017 IJARCET 1063

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique

More information

A New Digital Watermarking Scheme of Content Authentication of Vector Maps

A New Digital Watermarking Scheme of Content Authentication of Vector Maps American Journal of Engineering Reearch (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-6, Iue-12, pp-404-409 www.ajer.org Reearch Paper Open Acce A New Digital Watermarking Scheme of Content Authentication

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function 016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory

Anisotropic filtering on normal field and curvature tensor field using optimal estimation theory Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Possible application of fractional order derivative to image edges detection. Oguoma Ikechukwu Chiwueze 1 and Alain Cloot 2.

Possible application of fractional order derivative to image edges detection. Oguoma Ikechukwu Chiwueze 1 and Alain Cloot 2. Life Science Journal 3;(4) Poible application of fractional order derivative to image edge detection Oguoma Iechuwu hiwueze and Alain loot. Department of Mathematic and Applied Mathematic Facult of Natural

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

An Image Edge Detection Algorithm using Wavelet Transform and Fuzzy Techniques

An Image Edge Detection Algorithm using Wavelet Transform and Fuzzy Techniques An Image Edge Detection Algorithm uing Wavelet Tranform and Fuzzy Technique Bin Huang 1*, Jiaofeng Wang,Xiaomei Jin 3 1.College of Teacher Education, Quzhou Univerity, Zheiang Quzhou, china. Quzhou Vocational

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

PROBLEM -1. where S. C basis x. 0, for entering

PROBLEM -1. where S. C basis x. 0, for entering ISSN: 77754 ISO 9:8 Certified Volume 4 Iue 8 February 5 Optimum Solution of Linear Programming Problem by New Method Putta aburao; Supriya N. Khobragade and N.W.Khobragade Department of Mathematic RTM

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Edge preserving smoothing by Euclidean shortening flow

Edge preserving smoothing by Euclidean shortening flow Proceeding International Mathematica Sympoium 5 5-8 Augut 5, Perth, Autralia UR: http://internationalmathematicaympoium.org/ims5/ Edge preerving moothing by Euclidean hortening flow Deign of Algorithm

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Performance Evaluation of search engines via user efforts measures

Performance Evaluation of search engines via user efforts measures IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1

More information

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY

(A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY (A)ATSR RE-ANALYSIS FOR CLIMATE - CLOUD CLEARING METHODOLOGY Chri Old, Chri Merchant Univerity of Edinburgh, The Crew Building, Wet Main Road, Edinburgh, EH9 3JN, United Kingdom Email: cold@ed.ac.uk Email:

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

A Survey of Fragile Watermarking-based Image Authentication Techniques

A Survey of Fragile Watermarking-based Image Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced

More information

Audio-Visual Voice Command Recognition in Noisy Conditions

Audio-Visual Voice Command Recognition in Noisy Conditions Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

A reduced reference image quality metric based on feature fusion and neural networks

A reduced reference image quality metric based on feature fusion and neural networks Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

Motivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis

Motivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis Level Set Motivation: Roger Crawfi Slide collected from: Fan Ding, Charle Dyer, Donald Tanguay and Roger Crawfi 4/24/2003 R. Crawfi, Ohio State Univ. 109 Eay Cae Ue Marching Cube Input Data Noiy 4/24/2003

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Wavelet Decomposition for Denoising GPS/INS Outputs in Vehicular Navigation System

Wavelet Decomposition for Denoising GPS/INS Outputs in Vehicular Navigation System Wavelet Decompoition for Denoiing GPS/INS Output in Vehicular Navigation Syem SALAM ISMAEEL 1 and AYMAN AL-KHAZRAJI 2 Department of Computer Science Ryeron Univerity 35 Victoria St, Toronto, ON M5B 2K3

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Abhijeet Shinde 1 and Sachin Ruikar 2

Abhijeet Shinde 1 and Sachin Ruikar 2 N e a r e t N e i g h b o r a n d I n t e r p o l a t i o n B a e d S u p e r - R e o l u t i o n Nearet Neighbor and Interpolation Baed Super-Reolution Abhijeet Shinde 1 and Sachin Ruikar 2 1,2 Department

More information