Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types

Size: px
Start display at page:

Download "Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types"

Transcription

1 Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas Wiegand Abstract The robustness of color-based signatures in the presence of a selection of representative distortions is investigated. Considered are five signatures that have been developed and evaluated within a new odular fraework. Two signatures presented in this work are directly derived fro histogras gathered fro video fraes. The other three signatures are based on teporal inforation by coputing difference histogras between adjacent fraes. In order to obtain objective and reproducible results, the evaluations are conducted based on several randoly assebled test sets. These test sets are extracted fro a video repository that contains a wide range of broadcast content including docuentaries, sports, news, ovies, etc. Overall, the experiental results show the adequacy of color-histogra-based signatures for video fingerprinting applications and indicate which type of signature should be preferred in the presence of certain distortions. Keywords color histogras, robust hashing, video retrieval, video signature I. INTRODUCTION HE aount of accessible ultiedia inforation is ever Tincreasing. For the anageent of large-scale ultiedia data, efficient organization of databases is required. One efficient anageent tool is video retrieval, which can also be used for a variety of other applications, such as content advertising, detection of duplicated video sequences and autoatic detection of copyright violations. In video retrieval, one or ore videos are selected as query (query-by-exaple) and a list of siilar videos fro the database is returned in response. Recent approaches often use content-based video properties (e.g. color or texture features) A. Sánchez de la Fuente is with the Iage Processing Departent, Fraunhofer Institute for Telecounications Heinrich-Hertz-Institut, Berlin, Einsteinufer 37, D-0587 Gerany (phone: +49-(0) ; fax: +34- (0) ; e-ail: aritz.sanchez@hhi.fraunhofer.de). P. Ndjiki-Nya, K. Sühring, T. Hinz, and K. üller are with the Iage Processing Departent, Fraunhofer Institute for Telecounications Heinrich-Hertz-Institut, Berlin, Einsteinufer 37, D-043 Gerany (e-ail: {ndjiki,suehring,hinz,kueller}@hhi.de). T. Wiegand is the Head of the Iage Processing Departent, Fraunhofer Institute for Telecounications Heinrich-Hertz-Institut, Berlin, Einsteinufer 37, D-043 Gerany, and Head of the Iage Counication Chair, Departent of Telecounication Systes, School of Electrical Engineering and Coputer Sciences, Technical University of Berlin, Berlin, Einsteinufer 7, D-0587 Gerany (e-ail: wiegand@hhi.fraunhofer.de). for atching. ost frequently, a robust or perceptual video hash or a video signature is used for video identification. First approaches developed a cryptographic hash [], which is bitsensitive. Other approaches ap the visual inforation onto a fixed-length hash code that reains practically unaltered in presence of distortions of the original signal []. Hence, robust hashing allows slightly altered (e.g. daaged) videos to be also recognized as being siilar to the original unaltered video. Radhakrishnan and Bauer [3] propose a robust signature based on projections of cropped coarse difference-iages between adjacent fraes onto randoly generated atrices. The output hash for each difference-iage is of fixed length. A quantization using two reconstruction levels is afterwards applied using the edian of the hash-eleents as threshold. The final signature is the concatenation of all binary vectors. This description is highly robust against distortions introduced by video copression, spatial and brightness scaling, whereas being sensitive to other geoetric and frae-rate conversions. The binarization step described above is also used by Coskun and Sankur []. They deterine and apply one-bit quantization to the ost significant coefficients of 3D DCT for a given video signal. In addition to blurring and noise robustness, this hash code is also robust to distortions introduced by operations including video copression as well as contrast and brightness anipulation. In this paper, the robustness of color-based signatures to specific types of distortions is evaluated. The ain advantage of these signatures is the very low coplexity required for their extraction. For soe distortion types this ight be at the cost of retrieval perforance. For other distortion types, colorbased signatures ight offer a very good efficiencycoplexity trade-off. The signatures are evaluated in a new, odular fraework that allows easy plug-in of new data and signatures. The reainder of the paper is organized as follows. In section II, the fraework and the proposed signatures are described. Section III suarizes the siilarity easures used for each type of signature. The experiental results are presented in section IV. Finally, the conclusions are drawn and future research is discussed. 538

2 A. Overview II. SIGNATURE FRAEWORK The new fraework pursues three objectives: the coplete video retrieval process with all corresponding phases; a separate operation of the individual phases; and a odular syste in which data and signatures can be easily added or reoved. The first proble is addressed by covering a large nuber of aspects a fingerprinting task ight involve: wide variety of data, including altered and daaged videos, feature extraction and atching, and bencharking of the syste. As depicted in Fig., video processing is divided into five independent odules. The first stage as depicted in Fig. generates test sets of a predefined nuber of rando clips extracted fro the video repository (further explained in section IV.A). The distorted versions of all the query clips are added to each test set during the second phase (see section IV.B). Next, the signatures are extracted fro the query videos as well as fro the sequences contained in the test sets. atching of the query clips with the test sets is then conducted. Finally, the atching results are analyzed (see section IV.D) to assess the efficiency of the signatures. B. Integrated Signatures Five signatures have been ipleented in this work. They all derive fro the color histogras of the sequence fraes (see Fig. ). The histogras are 56-bin wide and the HSV color-space is used for their generation. As explained in [4], the reliability of color inforation to characterize visual content akes it one of the ost widely used features in retrieval tasks. The siple representation provided by color histogras and the ease of their coparison (e.g. Euclidean distance) is the other ain reason for the chosen feature in the present descriptions. Such descriptions do not properly represent grayscale content, which is therefore out of scope. This paper investigates the robustness of color-based signatures to typical video distortions. Test sets distorted sequences Video Repository. rando test sets generation. distortion generation 3. descriptor generation 4. atching 5. evaluation Fig. Operation chain of the proposed fraework descriptors Descriptor Repository ) The SCean Signature The first signature is calculated as the noralized color histogra teporally averaged along the sequence fraes. The average population p of the -th bin on the final histogra is calculated as follows: p N j p,,,...,, WH N j () where is the total nuber of bins. The population j p of the -th bin of the j-th frae (j =,,,N) of the sequence is averaged, i.e. sued up and noralized by N, W (width) and H (height) (). Hence, the description is a decial vector of 56 eleents and is, referred to as SCean. This signature needs a single vector to represent the overall color content of the whole sequence. This coputational saving ay iply soe detriental loss of detail. Dissiilar videos are expected to have different color content, hence producing different descriptions. However, such a signature ay be highly sensitive to color degradations. ) The SCDiffHist Signature The SCDiffHist signature characterizes the change in color between fraes and is inspired by the color-shift signature described in [4], where the signature consists of the scalar distances between noralized color histogras of adjacent fraes. For the SCDiffHist signature, the absolute unnoralized difference histogra, d j, between neighboring fraes j and (j+) is gathered. j j j d p p,,,...,, j,,..., N () The noralized ean histogra of these difference histogras, d j, is obtained as a decial description with 56 eleents. N j d d WH N j,,,..., Note that the largest possible distance between two histogras is now twice the diensions of the frae. For this reason, the noralization factor is doubled (WH). 3) The SCCop Signature The first- and second-order oents of the difference histogras are used for the third signature. Two different criteria are considered for the calculation of oents. On the one hand, the average c tie, x, ctie, y of the centers of ass of every difference histogra (4) and their standard deviations tie, x, tie, y (5) are estiated, both in x-and y-axis. N j (3) c tie, x c j, x, (4) N / N,,, tie x c j tie x c j x, (5) N 539

3 where c j,x denotes the coordinate in x-direction of the center of ass of the j-th difference histogra, and N refers to the nuber of fraes of the sequence. b j h(j) Fig. Color histogra h(j) of frae j On the other hand, the center of ass c spatial, x, cspatial, y and the standard deviations spatial, x, spatial, y in the ean difference histogra are calculated (6), (7), and (8). Here, the y coordinate of the centers of ass deterined is coincident for both ethods c tie, y cspatial, y c y. The y oents are noralized by W and H. c spatial p p p, x, (6) cspatial, y, (7) WH /, spatial x, c spatial x, (8) where corresponds to the bin nuber of the ean difference histogra, and denotes the nuber of coefficients of a histogra. All the equations for the y coordinate are siilarly obtained with adjusted (4), (5), and (8), with the additional noralization factor WH. The generated signature SCCop has only 7 decial eleents, as in (9): y c, c, c,,,, ] (9) [ y tie, x spatial, x tie, y tie, x spatial, y spatial, x SCCop inherits the potential weaknesses of SCean and SCDiffHist. Despite the advantages it features in ters of its copactness, this signature describes the video signal very coarsely. 4) The SCHistBin Signature The signature SCHistBin is a binary variation of the SCDiffHist signature. It is inspired by [], [3], where the purpose is to obtain a higher degree of robustness. Here, the unnoralized ean difference histogra is quantized with two reconstruction levels, using the edian of the bin populations as threshold. Any bin-value higher than the edian is set to. The others are set to 0. Binarization is expected to yield higher robustness to hoogeneous color changes in the teporal direction copared to SCDiffHist. A higher degree of robustness is also reported in [], [3]. 5) The SCeanHaar Signature The last signature corresponds to the definition of PEG- 7 s GoF/GoP descriptor [5]. The unnoralized ean color histogra is wavelet-transfored, using the Haar Transfor, as defined in the PEG-7 specification [6]. In this paper, it is referred to as SCeanHaar. III. SIILARITY EASURES For the SCean, SCDiffHist, and SCeanHaar signatures, the nor (Euclidean distance) is used as siilarity easure, D, (0) between two signatures a and b. / D a i i b i (0) For the SCCop signature, the siilarity between two sequences (a,b) is easured via area coparison. Fig. 3 Intersection areas of teporal oent rectangles (analog for the spatial oents) As depicted in Fig. 3, the center of ass and the standard deviations define the center and the argins of a rectangle. The intersection of the areas described by the rectangles of two signatures is calculated and noralized with respect to the largest area (), both for the teporal area.tie and spatial area.spatial oents. The ean of area. tie and area. spatial is subtracted fro, so that a perfect atch has a distance D 0 (). Sa Sb area ax( Sa, Sb ) () area. tie area. spatial D () 540

4 As SCHistBin is a binary signature, the noralized Haing distance (3) is used for siilarity estiation. That is, the nuber of deviating bits is noralized by the length of the signatures. D A. Data set ai bi, i,, a a, b b IV. EVALUATION i i (3) The developed signatures are tested on a large variety of video content, encoded in H.64/PEG4-AVC forat at QCIF (76 pixels x 44 pixels) resolution. The data is organized in shots or tracks. The latter are defined as a sequence of fraes that corresponds to an uninterrupted caera operation [4]. 00 query shots are atched against 0 randoly generated test sets. The query tracks were cleared beforehand, i.e. trivial sequences were reoved (e.g. too short clips, static videos). The query clips represent a wide range of visual content (Fig. 4): docuentaries, sports, news, real/aniated fils, advertiseents, and talk shows, aong others. Each test set contains 00 sequences, aong which 00 are distorted versions of the query tracks. A ground-truth set consists of a query track and distorted versions of it. For the retrieval experient, each query shot has distorted versions. The ground-truth size is thus always 3. However, there ight be other visually siilar sequences that are not listed as groundtruth. This proble could be addressed by annotating the content of the video database accordingly. However, this is ipractical due to its size: tracks. This is the ajor otivation for drawing rando subsets fro the video repository for evaluation. Reliability of the results is achieved by repeating the subset evaluation sufficiently often. The nuber of test sets used is expected to provide the required generality of the results, independently of the analyzed data. a) b) c) d) e) f) Fig. 4 Exaple query shots B. Tested distortions Soe exeplary visual alterations affecting color content are tested. They are: additive white Gaussian noise (AWGN), with zero ean and a standard deviation of 50; salt & pepper noise (ulticolor), with a 5% probability of occurrence; an additive cosine in tie of aplitude 5.5 (of a axiu of 55) and period 50 fraes; and color inversion. The latter is chosen, in order to show the liitations of the proposed signatures. All distorted video signals are encoded with three different quantization steps: 6, 40, and 48. Exaple iages are shown in Fig. 5. a) Original b) Gaussian noise c) Salt & pepper d) Cosine distortion e) Color inversion Fig. 5 Snapshots of evaluated distortions C. Efficiency easure As a easure of efficiency, the average retrieval rate (ARR) [5] of each signature is considered. The paraeter is calculated along the 0 test sets and for every query track. This value can be expressed as the ratio between the nuber of correctly recovered sequences and the total nuber of sequences stored in the ground-truth sets: L ARR ARR i i, L NQ # correct. atches ARRi NQ q NG q q, (4) where L denotes the nuber of test sets considered (0 in this case), ARR i refers to the average retrieval rate for every query shot and for the i-th test set, NQ is the nuber of query tracks used (00), and NG(q) expresses the nuber of sequences that belong to the ground-truth set of query q (in the present experient, NGq, q, as the query is ignored). The threshold K(q) represents the highest rank in the list of results that a ground-truth sequence of query q can achieve and is defined in [5] as K q 4 NGq, axngq, in q. (5) Every ground-truth sequence with a rank higher than K(q) is classified as issed, else it is a true positive atch. For this 54

5 experient, K(q) = 4. D. Experiental results Fig. 6 and Fig. 7 show the retrieval rates for each distortion type and each quantization step (QP). The standard deviation of the ARR along the test sets is very low (under 0.46%) and is, therefore, not displayed. Fro the results, it is obvious that SCCop always has very low retrieval rates (below 30%). This is caused by a high loss of description accuracy. The highest rates are achieved by SCeanHaar and SCean, closely followed by SCHistBin. SCean shows a hoogeneous response to the different types of distortion. typical distortions, where color inversion is not considered. The results lie between 70% and 75% for SCean, SCDHistBin, and SCeanHaar. SCCop is the worst colorbased signature. Although it is the only description that includes teporal inforation, it shows too low discriination capability. Overall, the ost efficient signature appears to be SCean. ost of the signatures proposed are appropriate for identifying distorted video signals of identical content in applications, where the considered set of distortions occurs. E. Size of the signatures The size of the descriptions is independent of the length of the sequences and of the diensions of the iage, as listed in TABLE I for each of the signature types. TABLE I SIGNATURE SIZE IN BYTES SCean SCDiffHist SCCop SCHistBin SCean- Haar Fig. 6 ARR for different distortion classes Fig. 7 ARR for different Quantization Paraeters (QP) Fig. 8 Overall ARR without color inversion For all investigated signatures, the retrieval rates are very siilar for different quantizations. Hence, all color-based signatures are relatively invariant to coding quantization. Aong the tested distortions, the highest ARR scores are obtained for Gaussian noise for alost every signature. Here, SCDiffHist and SCeanHaar are very robust. For salt & pepper noise, SCean signature achieves over 80% with the other signatures achieving lower ARR values. For cosine distortion, SCeanHaar achieves alost 85% ARR followed by the other signatures. Not surprisingly, color inversion leads to very bad scores, as it contains copleentary color distribution. This attack ight be overcoe if iagedifference were perfored previous to histogra generation. Hence, Fig. 8 displays the overall retrieval rates for the three Considering that the average length of the sequences tested is 4. s and the required disk space for the coded bitstrea of a single track is around 00 kbytes, the values of the table can be considered quite sall. Three signatures are about 50 ties saller than the original video and two signatures around 700 and 3000 ties saller. F. Coplexity of the signature extraction and atching For a sequence of N fraes, width W and height H, approxiate coputational coplexity orders of the signature extraction and atching are suarized in TABLE II. The ter WH refers to the -bin histogra generation fro the decoded fraes. On the one hand, for every signature the extraction ties highly depend on W, H, N, and. On the other hand, the atching is always constant for SCCop and depends only on when any of the other four signature types are atched. TABLE II COPUTATIONAL COPLEXITY OF EXTRACTION AND ATCHING Signature Extraction atching SCean O(WH + N) O() SCDiffHist O(WH + N) O() SCCop O(WH + N) O() SCHistBin O(WH + N) O() SCeanHaar O(WH + N) O() TABLE III lists the signature extraction and atching speeds (on a CPU of.66 GHz and 8 GB of RA, with QCIF resolution, = 56 bins, and a frae rate of 5 fps). The results show a very siilar tie-efficiency during the extraction for every signature type, which is validated by the coplexity orders given by TABLE II. Due to the slightly higher tie consuption introduced by the Haar Transfor, only SCeanHaar extracts less than 3 seconds of video per second, whereas the other four types of fingerprints reach a speed over 4.4 and under 4.8 seconds of video per second. 54

6 Regarding the atching stage, the signatures copared by the Euclidean distance are the slowest, closely followed by SCHistBin (Haing distance), and the fastest atches occur for SCCop (alost twice as fast as the slowest atching fingerprints). [6] A. Yaada,. Pickering, S. Jeannin, L. Cieplinski, J.R. Oh, and. Ki, PEG-7 Visual Part of experientation odel Version 0.0, ISO/IEC JTC/SC9/WG/N4063, Singapore, arch 00. TABLE III COPUTATIONAL SPEED OF EXTRACTION AND ATCHING Signature Extraction seconds of video / second atching pairs of signatures / second SCean SCDiffHist SCCop SCHistBin SCeanHaar V. CONCLUSIONS AND FUTURE WORK Five signatures based on color histogras have been tested in the presence of various distortion types. The results show that liiting the descriptions to histogra oents causes very high loss of description accuracy, leading to inefficient video retrieval. The use of difference histogras does not see to iprove the robustness of the signatures in coparison to the original histogras. However, the difference histogra perfors better, when binarization of the bin population is operated. Size reduction and lower atching coplexity are additionally achieved. The ean color histogra shows siilar results for different distortions. Therefore, this signature is considered as the steadiest and ost satisfactory overall. Another advantage of all signatures is their copactness. Using a nuber of rando subsets of the database, content-independence of the evaluation results is achieved. Future work will focus on the iproveent of the presented signatures as well as on further investigations on coplexity reduction. Furtherore, other daage classes (e.g. geoetric attacks, severe alterations on color content, or distortions in onochroe sequences) will be investigated. For such distortions, soe other feature or a ore robust version of the presented signatures ay be necessary. REFERENCES [] B. Preneel, R. Govaerts, and J. Vandewalle, "Cryptographic hash functions", Proceedings of the 3rd Syposiu on State and Progress of Research in Cryptography, W. Wolfowicz (ed.), Fondazione Ugo Bordoni, pp. 6-7, 993. [] B. Coskun, and B. Sankur, Robust Video Hash Extraction, EUSIPCO 004, pp , Vienna, April 004. [3] R. Radhakrishnan, and C. Bauer, Content-Based Video Signatures based on Projections of Difference Iages, IEEE 9th Workshop on ultiedia Signal Processing, pp , Greece, -3 Oct [4] T.C. Hoad, and J. Zobel, Detection of Video Sequences Using Copact Signatures, AC Transactions on Inforation Systes (TOIS), Volue 4, Issue, pp. -50, January 006. [5] B.S. anjunath, P. Salebier, and T. Sikora, Introduction to PEG-7: ultiedia Content Description Interface, John Wiley & Sons, Inc., New York, NY,

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Data pre-processing framework in SPM. Bogdan Draganski

Data pre-processing framework in SPM. Bogdan Draganski Data pre-processing fraework in SPM Bogdan Draganski Outline Why do we need pre-processing? Overview Structural MRI pre-processing fmri pre-processing Why do we need pre-processing? What do we want? Reason

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir

More information

Region Segmentation Region Segmentation

Region Segmentation Region Segmentation /7/ egion Segentation Lecture-7 Chapter 3, Fundaentals of Coputer Vision Alper Yilaz,, Mubarak Shah, Fall UCF egion Segentation Alper Yilaz,, Mubarak Shah, Fall UCF /7/ Laer epresentation Applications

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION 10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan

More information

A Novel Approach to Fractal Dimension based Fingerprint Recognition System

A Novel Approach to Fractal Dimension based Fingerprint Recognition System Volue: 03 Issue: 04 Apr-2016 www.irjet.net p-issn: 2395-0072 A Novel Approach to Fractal Diension based Fingerprint Recognition Syste Chiteranjan Sahu 1, Vinay Jain 2 1M.E. Scholar, Dept. of Electronics

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Real Time Displacement Measurement of an image in a 2D Plane

Real Time Displacement Measurement of an image in a 2D Plane International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882 Volue 5, Issue 3, March 2016 176 Real Tie Displaceent Measureent of an iage in a 2D Plane Abstract Prashant

More information

Video summarization based on shot boundary detection with penalized contrasts

Video summarization based on shot boundary detection with penalized contrasts Video suarization based on shot boundary detection with penalized contrasts Paschalina Medentzidou and Constantine Kotropoulos Departent of Inforatics Aristotle University of Thessaloniki Thessaloniki

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

On computing global similarity in images

On computing global similarity in images On coputing global siilarity in iages S Ravela and R Manatha Coputer Science Departent University of Massachusetts, Aherst, MA 01003 Eail: ravela,anatha @csuassedu Abstract The retrieval of iages based

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

Hand Gesture Recognition for Human-Computer Interaction

Hand Gesture Recognition for Human-Computer Interaction Journal of Coputer Science 6 (9): 002-007, 200 ISSN 549-3636 200 Science Publications Hand Gesture Recognition for Huan-Coputer Interaction S. ohaed ansoor Rooi, R. Jyothi Priya and H. Jayalakshi Departent

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

HUMAN pose estimation is an important problem in computer

HUMAN pose estimation is an important problem in computer JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 7 Robust 3D Huan Pose Estiation fro Single Iages or Video Sequences Chunyu Wang, Student Meber, IEEE, Yizhou Wang, Meber, IEEE, Zhouchen Lin, Meber,

More information

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing 203 IEEE Conference on Coputer Vision and Pattern Recognition Copressed Hashing Yue Lin Rong Jin Deng Cai Shuicheng Yan Xuelong Li State Key Lab of CAD&CG, College of Coputer Science, Zhejiang University,

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

A Directional Space-scale Based Analysis Method for Three-dimensional Profile Detection by Fringe Projection Technique

A Directional Space-scale Based Analysis Method for Three-dimensional Profile Detection by Fringe Projection Technique International Journal of Optics and Applications 213, 3(5): 111-117 DOI: 1.5923/j.optics.21335.5 A Directional Space-scale Based Analysis Method for Three-diensional Profile Detection by Fringe Projection

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

(Geometric) Camera Calibration

(Geometric) Camera Calibration (Geoetric) Caera Calibration CS635 Spring 217 Daniel G. Aliaga Departent of Coputer Science Purdue University Caera Calibration Caeras and CCDs Aberrations Perspective Projection Calibration Caeras First

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Vision Based Mobile Robot Navigation System

Vision Based Mobile Robot Navigation System International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS

NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS I. Ernst a *, M. Hetscher a, K. Thiessenhusen a, M. Ruhé a, A. Börner b, S. Zuev a a DLR, Institute of Transportation Research,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Classification and Segmentation of Glaucomatous Image Using Probabilistic Neural Network (PNN), K-Means and Fuzzy C- Means(FCM)

Classification and Segmentation of Glaucomatous Image Using Probabilistic Neural Network (PNN), K-Means and Fuzzy C- Means(FCM) IJSRD - International Journal for Scientific Research & Developent Vol., Issue 7, 03 ISSN (online): 3-063 Classification and Segentation of Glaucoatous Iage Using Probabilistic Neural Network (PNN), K-Means

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model 1746 J. Opt. Soc. A. A/ Vol. 22, No. 9/ Septeber 2005 Y. J. Xiao and Y. F. Li Optiized stereo reconstruction of free-for space curves based on a nonunifor rational B-spline odel Yi Jun Xiao Departent of

More information

3D Human Action Recognition using Hu Moment Invariants and Euclidean Distance Classifier

3D Human Action Recognition using Hu Moment Invariants and Euclidean Distance Classifier Vol. 8, No. 4, 017 3D Huan Action Recognition using Hu oent Invariants and Euclidean Distance Classifier Fadwa Al-Azzo Syste Engineering Departent University of Arkansas at Little Rock Arkansas, USA Arwa

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

Feature-Centric Evaluation for Efficient Cascaded Object Detection

Feature-Centric Evaluation for Efficient Cascaded Object Detection IEEE Conference on Coputer Vision and Pattern (CVPR, 2004 Feature-Centric Evaluation for Efficient Cascaded Object Detection Henry Schneideran 1 Robotics Institute Carnegie Mellon University Pittsburgh,

More information

Scalable search-based image annotation

Scalable search-based image annotation Multiedia Systes DOI 17/s53-8-128-y REGULAR PAPER Scalable search-based iage annotation Changhu Wang Feng Jing Lei Zhang Hong-Jiang Zhang Received: 18 October 27 / Accepted: 15 May 28 Springer-Verlag 28

More information

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE 1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano

More information

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Heterogeneous Radial Basis Function Networks

Heterogeneous Radial Basis Function Networks Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,

More information

Computer Vision and Image Understanding

Computer Vision and Image Understanding Coputer Vision and Iage Understanding 117 (2013) 453 465 Contents lists available at SciVerse ScienceDirect Coputer Vision and Iage Understanding journal hoepage: www.elsevier.co/locate/cviu Pooling in

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information