An Enhanced Keystroke Biometric System and Associated Studies

Size: px
Start display at page:

Download "An Enhanced Keystroke Biometric System and Associated Studies"

Transcription

1 Procings of Stunt-Faculty Rsarch Day, CSIS, Pac Univrsity, May 2 n, 2008 An Enhanc Kystrok Biomtric Systm an Associat Stuis Tarjani Buch, Anra Cotoranu, Eric Jsky, Florin Tihon, Mary Villani Sinbrg School of CSIS, Pac Univrsity, Nw York, U.S.A. {tb43439w, ac73135w, j01113w, ft26714w@pac.u, villanmv@famingal.u Abstract Th Kystrok Biomtric Systm at Pac Univrsity intifis subjcts bas on long-txt (about 650 kystroks) sampls. Th systm consistntly intifis subjcts using th sam kyboar typ (sktop or laptop) an ntry mo (copy task or fr txt input) with grs of accuracy ranging from 98% to 100%. Th currnt work nhancs th prviously vlop kystrok biomtric intification systm an prforms aitional stuis. Aitional intification xprimnts support prviously ocumnt accuracy finings, an nw authntication stuis inicat promis for authntication application of th systm. Th fatur xtractor componnt is moifi to facilitat ths an futur xprimnts. Aitional ata sampls ar captur for controll longituinal stuis to vrify that rasonabl accuracy can b maintain with urations of svral wks btwn ata capturs. 1. Introuction Kystrok biomtric systms masur charactristics bliv to b uniqu to an iniviual an ifficult to uplicat [3]. Th Kystrok Biomtric Systm vlop at Pac Univrsity is a faculty originat projct. Th systm has bn nhanc by grauat stunts with th purpos of supporting faculty an octoral stunt rsarch in th ara of pattrn rcognition. Th systm was vlop for long-txt input applications such as intifying prptrators of inappropriat mail or impostr onlin tst takrs [3]. 2. Historical Rviw Th Kystrok Biomtric Systm projct start in 2004 an has sinc gon through four projct itrations with iffrnt grauat stunt tams. Th systm consists of a Java applt which collcts raw kystrok ata ovr th Intrnt. Following ata collction, longtxt-input faturs ar xtract, an a pattrn classifir maks intification cisions. Th first projct was a usr intification fasibility stuy that vlop th Java applt an initiat th work in this ara, primarily using th statistical SAS softwar for th vlopmnt of th fatur xtraction an classification programs. Th scon projct gnrat a complt systm in Java, which was not usr frinly an not succssfully appli. An improv thir systm, also in Java, was us in a fasibility stuy of a copy typing task. It was thn nhanc to support a stuy involving 118 subjcts, an using two input mos (copy an fr-txt input) an two kyboar typs (sktop an laptop kyboars). Th fourth systm mphasiz fallback mols which al with missing or insufficint statistical information, such as too fw instancs of infrqunt lttr kys. Two fallback mols wr vlop: on bas on linguistic an th othr on touch-typing principls. Th formr substituts incomplt or insufficint ata with mor gnraliz grammatical ata whil th lattr substituts incomplt or insufficint ata with gnraliz ata bas on th gography of a stanar computr kyboar. Ths projct itrations an rlat rsarch rsult in svral xtrnal publications as wll as in two octoral issrtations (s [3] an rfrncs thrin). Th currnt fifth projct xtns th arlir work as scrib blow. 3. Kystrok Systm an Enhancmnts Th transition from th fourth to th fifth systm itration focuss on th nhancmnt of th fatur xtraction componnt so that fatur ata can b us not only by th pattrn classifir of this systm but also by othr classifirs. Th kystrok biomtric systm consists of thr main componnts: raw kystrok ata collction, C4.1

2 fatur xtraction, an pattrn classification. Th systm mploys a Java applt to collct kystrok ata ovr th Intrnt, long-txt input faturs ar thn xtract, an a pattrn classifir maks intification cisions. Figur 1 prsnts th procss an ata flow for th kystrok biomtric systm. Figur 1: Kystrok biomtric systm procss an ata flow iagram Raw Kystrok Data Collction A subjct participating in th ata collction procss is rquir to rgistr at his/hr first visit to th systm wb sit. Th rgistration procss capturs mographic ata incluing: subjct s first an last nam, mail, country of schooling, nationality, nativ languag, ag, lvl of ucation, th mostly us kyboar typ, hannss, computr manufacturr, how subjcts larn to typ, an typing approach. To insur that all subjcts hav submitt mographic ata, ach tim a subjct rturns to th wb sit, h/sh is ask for his/hr first an last nam. A qury is thn run looking for th subjct in th atabas. If first nam an last nam ar foun, th subjct is takn irctly to th activity slction Wb form an is ask about th kyboar styl (sktop or laptop) h/sh is using an about what ntry task h/sh woul lik to prform a ata copy task or an xtmporanous task. Howvr, th fifth systm itration now asks all subjcts to complt ata ntry sampls for ach of th following tasks: copy-laptop, copy-sktop, fr-txt laptop, fr-txt sktop. This crats a mor complt basis for comparison xprimnts. A Java applt nabls th collction of kystrok ata ovr th Intrnt (Appnix 1). A submission numbr is automatically initializ an thn incrmnt aftr ach sampl submission. Th subjct can thn start typing his/hr ata sampl. If th subjct is intrrupt uring ata ntry, th Clar button will blank all fils, xcpt nam an submission numbr, an allow th usr to ro th currnt ntry. Th application raw ata fil rcors th following information for ach ntry: ky s charactr, ky s co txt quivalnt, ky s location (1 = stanar, only on ky location; 2 = lft si of kyboar; 3 = right si of kyboar), tim th ky was prss (milliscons), tim th ky was rlas (milliscons), an th numbr of lft-mous clicks, right-mous clicks, an oubl-lft-mous click vnts uring th sssion. Upon prssing submit, a raw ata txt fil limit by th ~ charactr is gnrat [3]. Prvious stuis by Villani t al. [3] inicat that, although all subjcts wr invit to participat in all four ntry tasks (copy-laptop, copy-sktop, fr-txt laptop, fr-txt sktop), tim or quipmnt limitations l som to opt for only two whil othrs participat in thr or four ntry tasks. Ultimatly only 36 subjcts complt all four ntry tasks. Furthrmor, in ths stuis th timing of th input sampls was not controll an ovr half of ths 36 subjcts ntr thir ata sampls in on sitting. Thrfor, for th currnt an subsqunt xprimnts all subjcts ar ask to complt fiv ata ntris for ach of th four ntry tasks an submit thm within a two ay intrval. In orr to arss th n for controll timing in ata collctions, thos subjcts who woul lik to complt aitional sts of four ntry tasks ar ask to lav approximatly two wks btwn sts. For th currnt stuis aitional ata sampls wr collct to support a controll longituinal stuy to trmin whthr rasonabl accuracis can b maintain with urations of svral wks btwn ata capturs. Data collction was schul as pr Tabl 1. Th tim intrvals, T 1, an T 2, inicat two wk intrvals. C4.2

3 Entry Task Tim T 1 T 2 Copy-Laptop Copy-Dsktop Fr-Txt Laptop Fr-Txt Dsktop Total # of Sampls Tabl 1: Data collction schul - on subjct Fatur Extraction Th fatur xtraction componnt, a Java application, ras all raw kystrok ata fils from a local irctory. On string of ata is crat from raw ata fils an stor in a vctor. Th vctor is ra in ascning orr from inx zro to inx N, whr N is th numbr of raw kystrok ata fils. A scon vctor is instantiat to track th frquncy of ach fatur tct from th raw ata. Th lowr lvl faturs ar simply th kys prss. Th highr lvl faturs ar pnant on th fallback mtho us in th analysis: linguistic or touch typ. Th faturs charactriz th typist s ky-prss, uration tims, transition tims in going from on ky to th nxt, th prcntags of usag of th non-lttr kys an, or mous clicks, an th typing sp. Thr ar a total of 254 faturs (s [3] for tails). In orr to support aitional intification an nw authntication xprimnts, th fatur xtractor was moifi to output ata in a stanar format with fils in comma limit rcors as follows (Figur 2): th first rcor contains th nam an scription of th fil; th scon rcor contains th numbr of sampls or pattrn instancs; th rmaining numbr of pattrn instancs ar contain in a rcor with th following fils: ID ata (.g. nam/gnr/ag), prson s application-rlat information (.g. hannss), quipmnt rlat information (kyboar typ), task prform (copy txt or fr txt), numbr of attributs/masurmnts, an squnc of fatur valus normaliz into th rang 0-1; 3.3. Pattrn Classification Aftr all faturs hav bn xtract into a faturs fil, th ata is ray to b classifi in an attmpt to intify th author. Th intification is a masur of th sum of th Euclian istancs of all th collct faturs. Th analysis can b on using on of two mthos. With th first mtho, train-on-on or lav-onout, on faturs fil is us an classification occurs by pulling out ach ata ntry an comparing it to all th othr ata in th faturs fil. Classification is succssful if th Euclian istanc is last with rspct to anothr ata ntry by th sam author. With th scon mtho of classification, train on on an tst on th othr, th classifir is train on on faturs fil an it attmpts to match th ata from a scon faturs fil to thos in th training fil. Again, a match in this cas is succssful whn, givn th sam author, th Euclian istanc is last btwn th ata bing tst an th ata in th training fil. 4. Exprimnts Biomtric systms hav intification an authntication applications. In intification applications a usr is intifi from within a population of n usrs (on of n rsponss). In authntication (vrification) applications, a usr is ithr accpt or rjct (binary rspons, ys you ar th prson you claim to b or no you ar not). Prvious projcts approach intification rlat problms rasoning that high rcognition accuracy woul yil systm succss. Th currnt projct supports both intification an authntication xprimnts. For classification purposs, th systm must b train bfor it bcoms usabl, so ata was sparat into two sts: on st for training th systm to crat bounaris in fatur spac an on for tsting th systm to trmin its accuracy. On way to support intification an authntication xprimnts is by using ata mining tchniqus. For this purpos, th projct was split btwn front-n an back-n componnts. Th front-n componnt manag ata gathring an fatur xtraction whil th back-n componnt manag classification procssing. Figur 2: Fatur vctor ata output. C4.3

4 4.1. Intification Exprimnts Exprimnts wr conuct by Villani t al. [3] on 36 subjcts who complt all four ata ntry tasks: sktop-copy, sktop-fr, laptop-copy, laptop-fr. Exprimntal rsults vrifi that th systm intifis subjcts with a high gr of accuracy if th subjcts us th sam kyboar typ (sktop or laptop) an ntry mo (copy task or fr txt task). Ths xprimnts tst optimal conitions (subxprimnts a an b), combin conitions (subxprimnt c) an lss optimal conitions (subxprimnts an ). All th xprimnts us th linguistic fallback mol. Exprimnts for optimal an combin conitions us th lav-on-out classification mtho. Ths xprimnts rval a vry high lvl of accuracy, ranging btwn 98.3% an 100%. Exprimnts for th lss optimal conitions us th train on on an tst on th othr classification mtho. Ths xprimnts rval a lvl of accuracy ranging btwn 50.3% an 91.7%. A complt st of xprimntal rsults on ths subjcts is prsnt in Tabl 2 [3]. Exprimnt Train Tst 1. Copy Task 2. Fr Txt 3. Dsktop 4. Laptop 5. Diffrnt Mo/Kyboar 6. Diffrnt Kyboar/Mo a Dsktop Dsktop 99.4% b Laptop Laptop 100.0% c Combin Combin 99.5% Dsktop Laptop 60.8% Laptop Dsktop 60.6% a Dsktop Dsktop 98.3% b Laptop Laptop 99.5% c Combin Combin 98.1% Dsktop Laptop 59.0% Laptop Dsktop 61.0% a Copy Copy 99.4% b Fr Txt Fr Txt 98.3% c Combin Combin 99.2% Copy Fr Txt 89.3% Fr Txt Copy 91.7% a Copy Copy 100.0% b Fr Txt Fr Txt 99.5% c Combin Combin 98.9% Copy Fr Txt 86.2% Fr Txt Copy 91.0% a Lap Fr Lap Fr 99.5% b Dsk Copy Dsk Copy 99.4% c Combin Combin 98.6% Dsk Copy Lap Fr 51.6% Lap Fr Dsk Copy 58.0% a Dsk Fr Dsk Fr 98.3% b Lap Copy Lap Copy 100.0% c Combin Combin 98.9% Lap Copy Dsk Fr 50.3% Dsk Fr Lap Copy 52.1% Tabl 2: Summary of rsults for 36-subjct intification xprimnts (from [3]). For this stuy, ths xprimnts wr rprouc for a four subjct st of ata collct accoring to th nhanc procss scrib in Tabl 1. W only rprouc thos xprimnts that tst th lss optimal conitions (sub-xprimnts an ). For th nw xprimnts, subjcts complt all four ntry tasks, an ach subjct submitt fiv sampls pr task at thr istinct tim intrvals,, T 1 an T 2. A total of 12 xprimnts wr run through th train on on an tst on th othr classification mtho, using th linguistic fallback mol, as pr th xprimnt summary scrib in Figur 3. Copy Task Fr Txt 3 Dsktop Laptop 5 Figur 3: Summary of xprimntal sign [3]. Th first hypothsis was that rsults from running ths xprimnts on th ata sts from th four nw subjcts will rval similar grs of accuracy to th xprimnts run on th 36 subjcts. Th grs of accuracy might b vn highr in th four-subjct xprimnts, givn that th subjct population is vry small. Th scon hypothsis was that high grs of accuracy will b maintain ovr tim from, through T 1, an T 2. Th rsults of our xprimnts support our first hypothsis an rval, as xpct, much highr grs of accuracy as compar to th 36-subjct intification xprimnts. Ths rsults ar most likly attribut to th vry small sampl siz (4. Rsults also confirm th scon hypothsis by rvaling that high grs of accuracy can b maintain ovr tim. Th gr of accuracy i not cras significantly ovr tim, an in som of th xprimnts it i not cras at all. Out of twlv xprimnts, fiv maintain 100% accuracy from to T 1 an furthr from to T 2. In fiv of th 4 C4.4

5 xprimnts, th lvl of accuracy cras from to T 1 to incras again at T 2. In on xprimnt, th lvl of accuracy incras from to T 1 an thn cras again at T 2. Furthrmor, in on xprimnt, th lvl of accuracy incras from to T 1 an furthr from to T 2. A complt st of xprimntal rsults on ths subjcts is prsnt in Tabl 3. Exprimnt Train/Tst Dsktop Laptop 40.56% Fr Txt Laptop Dsktop 52.84% Dsktop Copy Fr Txt 47.72% Fr Txt Copy 51.11% - - T 1 - T 2 Copy Fr Txt 18.89% 1. Copy Task (4 Dsktop/Lapto p 100% 85% 100% Laptop Fr Txt Copy 57.78% 2. Fr Txt (4 Laptop/Dskto p 100% 95% 100% Dsktop/Lapto p 100% 100% 100% Diffrnt Mo/ Kyboar Dsk Copy Lap Fr Lap Fr Dsk Copy 31.67% 55.56% 3. Dsktop (4 4. Laptop (4 5. Diffrnt Mo/ Kyboar (4 6. Diffrnt Kyboar/ Mo (4 Laptop/Dskto p 100% 100% 100% Copy/Fr Txt Fr Txt/Copy Copy/Fr Txt Fr Txt/Copy Dsk Copy/ Lap Fr Lap Fr/ Dsk Copy Lap Copy/ Dsk Fr Dsk Fr/ Lap Copy 85% 95% 85% 100% 100% 100% 100% 100% 100% 100% 90% 100% 90% 75% 100% 80% 95% 100% 95% 100% 95% 100% 100% 100% Avrag 96% 95% 98% Tabl 3: Summary of rsults for 4-subjct intification xprimnts. Th 36-subjct ata st has also bn us for intification xprimnts using ata mining tchniqus. Th xprimnt us Wka, a ata mining tool, with th k-narst-nighbor (IBk) algorithm with k=1 an th lav-on-out procur. Th rsults ar comparabl to th ons prsnt in Tabl 2 [2]. On xcption was th xprimnt which involv training on a laptop with a copy task an tsting on a laptop with a fr txt task; this xprimnt rval a vry low 18.9% accuracy rat as compar to th 86.2% in Tabl 2. Exprimnt Train Tst Dsktop Laptop 83.34% Copy Task Laptop Dsktop 51.67% Diffrnt Kyboar/ Mo Lap Copy Dsk Fr 38.07% Dsk Fr Lap Copy 54.45% Tabl 4: Summary of rsults for 36-subjct intification xprimnts (from [2]). Th intification xprimnts on th 4-subjct ata st focus on trmining grs of accuracy from a longituinal prspctiv. Ths xprimnts wr ran through Wka, using th IBk algorithm with k=1 an th lav-on-out procur. In ths xprimnts ata st was us for training whil th T 1 an T 2 ata sts wr us for tsting [2]. Train (5 sampls from ach (5 sampls from ach Tst T 1 (5 sampls from ach T 2 (5 sampls from ach Typ with Data Mining (Wka) with Kystrok Biomtric Systm Copy Dsk 95% 100% Fr Dsk 100% 100% Copy Lap 100% 100% Fr Lap 85% 100% Copy Dsk 80% 90% Fr Dsk 100% 100% Copy Lap 100% 100% Fr Lap 100% 100% Tabl 5: Summary of rsults for 4-subjct intification xprimnts [2] Authntication Exprimnts Th sam two sts of ata hav also bn us for authntication xprimnts. Exprimnts on th 36- subjct ata st wr run through Wka, using th k- narst-nighbor (IBk) algorithm with k=1 on th C4.5

6 ichotomy ata [1], an th lav-on-out procur [2]. Th grs of accuracy rang from 62.3%, whn training on a laptop with copy txt an tsting on a laptop with fr txt, to 97.3% whn training on a laptop with fr txt an tsting on a laptop with copy txt. To b notic is that ths grs of accuracy, th highst an th lowst, wr both achiv for thos xprimnts involving a laptop kyboar. A complt st of xprimntal rsults on th 36-subjct ata st is prsnt in Tabl 6 [2]. Exprimnt Train Tst Train (18 Tst (18 Copy Task Fr Txt Dsktop Laptop Dsk Copy Dsk Copy 87.94% Dsk Fr Dsk Fr 90.24% Lap Copy Lap Copy 91.03% Lap Fr Lap Fr 92.06% Dsktop Laptop 94.77% Laptop Dsktop 80.81% Dsktop Laptop 62.56% Laptop Dsktop 93.10% Copy Fr Txt 82.40% Fr Txt Copy 82.44% Copy Fr Txt 62.33% Fr Txt Copy 97.33% Diffrnt Mo/ Kyboar Dsk Copy Lap Fr Lap Fr Dsk Copy 62.44% 93.37% Diffrnt Kyboar/ Mo Lap Copy Dsk Fr 76.81% Dsk Fr Lap Copy 89.77% Tabl 6: Summary of rsults for 36-subjct authntication xprimnts (from [2]). Th authntication xprimnts on th 4-subjct ata st focus on trmining grs of accuracy from a longituinal prspctiv. Ths xprimnts wr run through Wka, using th IBk algorithm with k=1 on th ichotomy ata [1]. In ths xprimnts, th ata st was us for training whil th T 1 an T 2 ata sts wr us for tsting [2]. Th rsults yil onc again high grs of accuracy ranging from 88.9% to 100%. Ths xprimnts show that high grs of accuracy can b maintain ovr tim A complt st of xprimntal rsults on th 4-subjct ata st is prsnt in Tabl 7. Train (5 sampls from ach (5 sampls from ach Tst T 1 (5 sampls from ach T 2 (5 sampls from ach Typ Copy Dsk 95.79% Fr Dsk 96.32% Copy Lap 91.58% Fr Lap 92.11% Copy Dsk 88.95% Fr Dsk 98.42% Copy Lap % Fr Lap 93.68% Tabl7: Summary of rsults for 4-subjct authntication xprimnts (from [2]). 5. Conclusions an Rcommnations Prvious xprimntal rsults hav inicat high grs of accuracy in intifying subjcts bas on long-txt input, spcially unr th conitions whn th sam kyboar typ is us or th sam ata ntry task is prform. In nw xprimnts, our kystrok biomtric systm outputs fatur vctor ata in a format that nhancs intification procssing vn furthr an shows promising for authntication procssing. Although rsults of currnt stuis support prvious xprimntal rsults, it is rcommn that mor raw ata b collct following th prviously iscuss ata collction schul involving two wk intrvals btwn ata capturs. Running xprimnts with a largr ata pool collct unr th abov conitions shoul provi strongr vinc rlativ to th succss of th kystrok biomtric systm for intifying an vntually for authnticating subjcts. It woul also provi mor insight into how accuracy volvs from on ata collction sssion to anothr ovr tim. Nvrthlss, all xprimntal rsults ar promising in that th systm has th capability of solving intification problms an th potntial for solving authntication problms. C4.6

7 7. Rfrncs [1] S. Bharati, R. Hassm, R. Khan, M. Ritzmann an A. Wong, Biomtric Authntication Systm Using th Dichotomy Mol, Proc. CSIS Rsarch Day, Pac Univ., May [2] C. Eusbi, C. Gliga, D. John, an A. Maisonav, A Data Mining Stuy of Mous Movmnt, Stylomtry, an Kystrok Biomtric Data, Proc. CSIS Rsarch Day, Pac Univ., May [3] M. Villani, C. Tapprt, G. Ngo, J. Simon, H. St. Fort, an S. Cha, Kystrok Biomtric Rcognition Stuis on Long-Txt Input unr Ial an Application-Orint Conitions, Procings of th Confrnc on Computr Vision an Pattrn Rcognition Workshop, Fbruary Appnix 1 : Java Applt import javax.swing.*; import java.applt.applt; import java.awt.*; import java.awt.vnt.*; //import java.scurity.*; //import java.rmi.*; public class KySp16_Applt xtns Applt implmnts ActionListnr { privat int APPLET_WIDTH = 700; privat int APPLET_HEIGHT = 420; privat KySp16 kysp; public voi init() { java.nt.url url = this.gtdocumntbas(); String qury = url.gtqury(); //qury = "Hug&Hort&Fabl&1&kb&pc"; // tst purposs try { String[] usr = qury.split("&"); kysp = nw KySp16(usr[0].toUpprCas(), usr[1].toupprcas(), usr[2].toupprcas(), usr[3].toupprcas(), usr[4].toupprcas()); a (kysp); stsiz (APPLET_WIDTH, APPLET_HEIGHT); catch (Excption ) { public voi actionprform (ActionEvnt vnt) { //Systm.stScurityManagr(nw RMIScurityManagr()); C4.7

Register Allocation. Register Allocation

Register Allocation. Register Allocation Rgistr Allocation Jingk Li Portlan Stat Univrsity Jingk Li (Portlan Stat Univrsity) CS322 Rgistr Allocation 1 / 28 Rgistr Allocation Assign an unboun numbr of tmporaris to a fix numbr of rgistrs. Exampl:

More information

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point.

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point. 3-5 Systms in Thr Variabls TEKS FOCUS VOCABULARY TEKS (3)(B) Solv systms of thr linar quations in thr variabls by using Gaussian limination, tchnology with matrics, and substitution. Rprsntation a way

More information

Problem Set 1 (Due: Friday, Sept. 29, 2017)

Problem Set 1 (Due: Friday, Sept. 29, 2017) Elctrical and Computr Enginring Mmorial Univrsity of Nwfoundland ENGI 9876 - Advancd Data Ntworks Fall 2017 Problm St 1 (Du: Friday, Spt. 29, 2017) Qustion 1 Considr a communications path through a packt

More information

Reimbursement Requests in WORKS

Reimbursement Requests in WORKS Rimbursmnt Rqusts in WORKS Important points about Rimbursmnts in Works Rimbursmnt Rqust is th procss by which UD mploys will b rimbursd for businss xpnss paid using prsonal funds. Rimbursmnt Rqust can

More information

A New Method For Simultaneously Measuring And Analyzing PLL Transfer Function And Noise Processes

A New Method For Simultaneously Measuring And Analyzing PLL Transfer Function And Noise Processes DsignCon00 Laing Eg Communication Dsign Confrnc A Nw Mtho For Simultanously Masuring An Analyzing PLL Transfr Function An Nois Procsss Mik Li, PhD Jan Wilstrup Wavcrst Corporation 1 Abstract Phas Lock

More information

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e LAB1: DMVPN Thory Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

2018 How to Apply. Application Guide. BrandAdvantage

2018 How to Apply. Application Guide. BrandAdvantage 2018 How to Apply Application Guid BrandAdvantag Contnts Accssing th Grant Sit... 3 Wlcom pag... 3 Logging in To Pub Charity... 4 Rgistration for Nw Applicants ( rgistr now )... 5 Organisation Rgistration...

More information

Recorder Variables. Defining Variables

Recorder Variables. Defining Variables Rcordr Variabls Dfining Variabls Simpl Typs Complx Typs List of Rsrvd Words Using Variabls Stting Action Paramtrs Parsing Lists and Tabls Gtting Valu from Lists and Tabls Using Indxs with Lists Using Indxs

More information

A Brief Summary of Draw Tools in MS Word with Examples! ( Page 1 )

A Brief Summary of Draw Tools in MS Word with Examples! ( Page 1 ) A Brif Summary of Draw Tools in MS Word with Exampls! ( Pag 1 ) Click Viw command at top of pag thn Click Toolbars thn Click Drawing! A chckmark appars in front of Drawing! A toolbar appars at bottom of

More information

Undecidability of bounded security protocols

Undecidability of bounded security protocols Unciabilit of boun scurit protocols urgin Licoln itchll Scrov FSP Trnto Ital Jul 999 /5/0 Outlin Goals an motivations Snta an smantics oun protocols Eampl LLF Conclusions Qustions /5/0 otivation Scurit

More information

Midterm 2 - Solutions 1

Midterm 2 - Solutions 1 COS 26 Gnral Computr Scinc Spring 999 Midtrm 2 - Solutions. Writ a C function int count(char s[ ]) that taks as input a \ trminatd string and outputs th numbr of charactrs in th string (not including th

More information

About Notes And Symbols

About Notes And Symbols About Nots And Symbols by Batric Wildr Contnts Sht 1 Sht 2 Sht 3 Sht 4 Sht 5 Sht 6 Sht 7 Sht 8 Sht 9 Sht 10 Sht 11 Sht 12 Sht 13 Sht 14 Sht 15 Sht 16 Sht 17 Sht 18 Sht 19 Sht 20 Sht 21 Sht 22 Sht 23 Sht

More information

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues Chaptr 24 Implmnting Lists, Stacks, Quus, and Priority Quus CS2: Data Structurs and Algorithms Colorado Stat Univrsity Original slids by Danil Liang Modifid slids by Chris Wilcox Objctivs q To dsign common

More information

CSE 272 Assignment 1

CSE 272 Assignment 1 CSE 7 Assignmnt 1 Kui-Chun Hsu Task 1: Comput th irradianc at A analytically (point light) For point light, first th nrgy rachd A was calculatd, thn th nrgy was rducd by a factor according to th angl btwn

More information

1. Trace the array for Bubble sort 34, 8, 64, 51, 32, 21. And fill in the following table

1. Trace the array for Bubble sort 34, 8, 64, 51, 32, 21. And fill in the following table 1. Trac th array for Bubbl sort 34, 8, 64, 51, 3, 1. And fill in th following tabl bubbl(intgr Array x, Intgr n) Stp 1: Intgr hold, j, pass; Stp : Boolan switchd = TRUE; Stp 3: for pass = 0 to (n - 1 &&

More information

2 Mega Pixel. HD-SDI Bullet Camera. User Manual

2 Mega Pixel. HD-SDI Bullet Camera. User Manual 2 Mga Pixl HD-SDI Bullt Camra Usr Manual Thank you for purchasing our product. This manual is only applicabl to SDI bullt camras. Thr may b svral tchnically incorrct placs or printing rrors in this manual.

More information

Group 2 Mega Crystals Usability Test Report

Group 2 Mega Crystals Usability Test Report Group 2 Mga Crystals Usability Tst Rport Rport Writtn By Katrina Ellis Tam Mmbrs Usr Exprinc Consultants Katrina Ellis Zhitao Qiu HU4628 Julia Wiss Sarah Ingold Jams Staplton CS4760 Kris Gauthir (Android)

More information

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline PS 6 Ntwork Programming Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du http://www.cs.clmson.du/~mwigl/courss/cpsc6 Th Ntwork Layr: Routing & ddrssing

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy PS Intrntworking Th Ntwork Layr: Routing & ddrssing Outlin Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du Novmbr, Ntwork layr functions Routr architctur

More information

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012 XML Publishr with connctd qury: A Primr Sssion #30459 March 19, 2012 Agnda/ Contnts Introduction Ovrviw of XMLP Gtting Startd Bst practics for building a basic XMLP rport Connctd Qury Basics Building a

More information

Clustering Algorithms

Clustering Algorithms Clustring Algoritms Hirarcical Clustring k -Mans Algoritms CURE Algoritm 1 Mtods of Clustring Hirarcical (Agglomrativ): Initially, ac point in clustr by itslf. Rpatdly combin t two narst clustrs into on.

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works.

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works. Algorithm Grdy Algorithm 5- Grdy Algorithm Grd i good. Grd i right. Grd work. Wall Strt Data Structur and Algorithm Andri Bulatov Algorithm Grdy Algorithm 5- Algorithm Grdy Algorithm 5- Intrval Schduling

More information

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8.

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8. Rviw: Shift-Rduc Parsing Bottom-up parsing uss two actions: Bottom-Up Parsing II Lctur 8 Shift ABC xyz ABCx yz Rduc Cbxy ijk CbA ijk Prof. Aikn CS 13 Lctur 8 1 Prof. Aikn CS 13 Lctur 8 2 Rcall: h Stack

More information

Spectral sensitivity and color formats

Spectral sensitivity and color formats FirWir camras Spctral snsitivity and color formats At th "input" of a camra, w hav a CCD chip. It transforms photons into lctrons. Th spctral snsitivity of this transformation is an important charactristic

More information

Watertight Trimmed NURBS

Watertight Trimmed NURBS Watrtight Trimm NURBS Thomas W. Srbrg G. Thomas Finnigan Brigham Young Univrsity Xin Li Univrsity of Scinc an Tchnology of China Hongwi Lin Zhjiang Univrsity Hathr Ipson Brigham Young Univrsity Abstract

More information

Mapping Non-trivial Network Topologies onto Chips

Mapping Non-trivial Network Topologies onto Chips 2013 IEEE 7th Intrnational Symposium on Emb Multicor/Manycor Systm-on-Chip Mapping Non-trivial Ntwork Topologis onto Chips Ikki Fujiwara an Michihiro Koibuchi National Institut of Informatics Th Grauat

More information

Maxwell s unification: From Last Time. Energy of light. Modern Physics. Unusual experimental results. The photoelectric effect

Maxwell s unification: From Last Time. Energy of light. Modern Physics. Unusual experimental results. The photoelectric effect From Last Tim Enrgy and powr in an EM wav Maxwll s unification: 1873 Intimat connction btwn lctricity and magntism Exprimntally vrifid by Hlmholtz and othrs, 1888 Polarization of an EM wav: oscillation

More information

Principles of Programming Languages Topic: Formal Languages II

Principles of Programming Languages Topic: Formal Languages II Principls of Programming Languags Topic: Formal Languags II CS 34,LS, LTM, BR: Formal Languags II Rviw A grammar can b ambiguous i.. mor than on pars tr for sam string of trminals in a PL w want to bas

More information

LAB 3: DMVPN EIGRP. EIGRP over DMVPN. Disclaimer. Pag e

LAB 3: DMVPN EIGRP. EIGRP over DMVPN. Disclaimer. Pag e LAB 3: DMVPN EIGRP Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

Vignette to package samplingdatacrt

Vignette to package samplingdatacrt Vigntt to packag samplingdatacrt Diana Trutschl Contnts 1 Introduction 1 11 Objctiv 1 1 Diffrnt study typs 1 Multivariat normal distributd data for multilvl data 1 Fixd ffcts part Random part 9 3 Manual

More information

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O.

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O. Workbook for Dsigning Distributd Control Applications using Rockwll Automation s HOLOBLOC Prototyping Softwar John Fischr and Thomas O. Bouchr Working Papr No. 05-017 Introduction A nw paradigm for crating

More information

8.3 INTEGRATION BY PARTS

8.3 INTEGRATION BY PARTS 8.3 Intgration By Parts Contmporary Calculus 8.3 INTEGRATION BY PARTS Intgration by parts is an intgration mthod which nabls us to find antidrivativs of som nw functions such as ln(x) and arctan(x) as

More information

Type & Media Page 1. January 2014 Libby Clarke

Type & Media Page 1. January 2014 Libby Clarke Nam: 1 In ordr to hlp you s your progrss at th nd of this ntir xrcis, you nd to provid som vidnc of your starting point. To start, draw th a on th lft into th box to th right, dpicting th sam siz and placmnt.

More information

" dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d

 dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d Calculus II MAT 146 Mthods of Intgration: Intgration by Parts Just as th mthod of substitution is an intgration tchniqu that rvrss th drivativ procss calld th chain rul, Intgration by parts is a mthod

More information

Managing Trust Relationships in Peer 2 Peer Systems

Managing Trust Relationships in Peer 2 Peer Systems Managing Trust Rlationships in Pr 2 Pr Systms R.S.SINJU PG STUDENT, DEPARTMENT OF COMPUTER SCIENCE, PONJESLY COLLEGE OF ENGINEERING NAGERCOIL, TAMILNADU, INDIA C.FELSY ASST.PROF, DEPARTMENT OF COMPUTER

More information

LAB 4: DMVPN OSPF. OSPF over DMVPN. Disclaimer. Pag e

LAB 4: DMVPN OSPF. OSPF over DMVPN. Disclaimer. Pag e LAB 4: DMVPN OSPF Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lctur #15: Clustring-2 Soul National Univrsity 1 In Tis Lctur Larn t motivation and advantag of BFR, an xtnsion of K-mans to vry larg data Larn t motivation and advantag of

More information

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1 Advancd Computr Graphics (Fall 200) CS 283, Lctur 5: Msh Data Structurs Ravi Ramamoorthi http://inst.cs.brkly.du/~cs283/fa0 To Do Assignmnt, Du Oct 7. Start rading and working on it now. Som parts you

More information

AV1640 ANAG VISION. 16x4 Character

AV1640 ANAG VISION. 16x4 Character AV1640 16x4 Character 5x7 dots with cursor 1/16 duty +5V single supply Controller built in (KS0066 or quivalent) B/L driven by pin1 and 2, 15 and 16 or A,K Pin Assignment No. Symbol Function 1 Vss Gnd,

More information

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison Contnts Tchnology Nwly Dvlopd Cllo Tchnology Cllo Tchnology : Improvd Absorption of Light Doubl-sidd Cll Structur Cllo Tchnology : Lss Powr Gnration Loss Extrmly Low LID Clls 3 3 4 4 4 Advantag Installation

More information

Lesson Focus: Finding Equivalent Fractions

Lesson Focus: Finding Equivalent Fractions Lsson Plans: Wk of 1-26-15 M o n Bindrs: /Math;; complt on own, thn chck togthr Basic Fact Practic Topic #10 Lsson #5 Lsson Focus: Finding Equivalnt Fractions *Intractiv Larning/Guidd Practic-togthr in

More information

RFC Java Class Library (BC-FES-AIT)

RFC Java Class Library (BC-FES-AIT) RFC Java Class Library (BC-FES-AIT) HELP.BCFESDEG Rlas 4.6C SAP AG Copyright Copyright 2001 SAP AG. All Rcht vorbhaltn. Witrgab und Vrvilfältigung disr Publikation odr von Tiln daraus sind, zu wlchm Zwck

More information

ET (mm/d), mean, SCEN-CTL

ET (mm/d), mean, SCEN-CTL a T M (K), man, SCEN-CTL 8 7 6 4 - - - -4 - -6-7 -8 T M (K), stv, SCEN-CTL..8.6.4. -. -.4 -.6 -.8 - -. SM (mm), man, SCEN-CTL 7 - - -7 - - - - SM (mm), stv, SCEN-CTL - - - - - - P (mm/), man, SCEN-CTL...7..

More information

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis Intrsction-fr Dual Contouring on Uniform Grids: An Approach Basd on Convx/Concav Analysis Charli C. L. Wang Dpartmnt of Mchanical and Automation Enginring, Th Chins Univrsity of Hong Kong E-mail: cwang@ma.cuhk.du.hk

More information

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Efficint Obstacl-Avoiding Rctilinar Stinr Tr Construction Chung-Wi Lin, Szu-Yu Chn, Chi-Fng Li, Yao-Wn Chang, and Chia-Lin Yang Graduat Institut of Elctronics Enginring Dpartmnt of Elctrical Enginring

More information

Driver for netgear wn111v2 wireless usb adapter Get file - Driver for netgear wn111v2 wireless usb adapter

Driver for netgear wn111v2 wireless usb adapter Get file - Driver for netgear wn111v2 wireless usb adapter Drivr for ntgar wn111v2 wirlss usb adaptr. Fr FILE Download My IE dosn t work. Drivr for ntgar wn111v2 wirlss usb adaptr Gt fil - Drivr for ntgar wn111v2 wirlss usb adaptr But somtims thy grow back. RAR

More information

EE 231 Fall EE 231 Homework 10 Due November 5, 2010

EE 231 Fall EE 231 Homework 10 Due November 5, 2010 EE 23 Fall 2 EE 23 Homwork Du Novmbr 5, 2. Dsign a synhronous squntial iruit whih gnrats th following squn. (Th squn should rpat itslf.) (a) Draw a stat transition diagram for th iruit. This is a systm

More information

Extending z/tpf using IBM API Management (APIM)

Extending z/tpf using IBM API Management (APIM) Extnding using API Managmnt (APIM) Mark Gambino, TPF Dvlopmnt Lab March 23, 2015 TPFUG Dallas, TX Th Big Pictur Goal Mobil Applications Cloud APIs Cloud-basd Srvics On-Prmis Entrpris APIs E n t r p r I

More information

Control of Manipulators. Instructor: Jacob Rosen Advanced Robotic - MAE 263D - Department of Mechanical & Aerospace Engineering - UCLA

Control of Manipulators. Instructor: Jacob Rosen Advanced Robotic - MAE 263D - Department of Mechanical & Aerospace Engineering - UCLA Control of Manipulators Avanc Robotic - MAE 263D - Dpartmnt of Mchanical & Arospac Enginring - UCLA Introuction Problm Dfinition Problm Givn: Joint angls snsor raings links gomtry, mass, inrtia, friction,

More information

Reducin} Migratin} secxn:laries

Reducin} Migratin} secxn:laries Rducing Migrating Scondaris Earl Wallr and Ml Parc INLEX, Inc. P.O. Box 1349 Montry, CA. 93942 If you ar lik us, you hav rad a lot rcntly about IMAGE and its 'myths', and you know that thr can b prformanc

More information

Evolutionary Clustering and Analysis of Bibliographic Networks

Evolutionary Clustering and Analysis of Bibliographic Networks Evolutionary Clustring and Analysis of Bibliographic Ntworks Manish Gupta Univrsity of Illinois at Urbana-Champaign gupta58@illinois.du Charu C. Aggarwal IBM T. J. Watson Rsarch Cntr charu@us.ibm.com Jiawi

More information

Overview of the Gifted Services Portfolio Process

Overview of the Gifted Services Portfolio Process Saint Paul Public Schools Ovrviw of th Giftd Srvics Portfolio Procss Talnt Dvlopmnt and Acclration Srvics What is th Portfolio Rviw? Th portfolio rviw offrs all studnts th opportunity to b assssd for giftd

More information

TCP Congestion Control. Congestion Avoidance

TCP Congestion Control. Congestion Avoidance TCP Congstion Control TCP sourcs chang th snding rat by modifying th window siz: Window = min {Advrtisd window, Congstion Window} Rcivr Transmittr ( cwnd ) In othr words, snd at th rat of th slowst componnt:

More information

HEAD DETECTION AND TRACKING SYSTEM

HEAD DETECTION AND TRACKING SYSTEM HEAD DETECTION AND TRACKING SYSTEM Akshay Prabhu 1, Nagacharan G Tamhankar 2,Ashutosh Tiwari 3, Rajsh N(Assistant Profssor) 4 1,2,3,4 Dpartmnt of Information Scinc and Enginring,Th National Institut of

More information

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1 Advancd Computr Graphics CSE 63 [Spring 208], Lctur 7 Ravi Ramamoorthi http://www.cs.ucsd.du/~ravir To Do Assignmnt, Du Apr 27 Any last minut issus or difficultis? Starting Gomtry Procssing Assignmnt 2

More information

How to fix your 260Z or 280Z clock.

How to fix your 260Z or 280Z clock. Sujt Fixing th Kanto Siki lok Author E. Bttio How to fix your 260Z or 280Z lok. I first wrot this up aout two yars ago. This is th sond vrsion of this produr. It is not vry muh diffrnt to my first ffort

More information

Probabilistic inference

Probabilistic inference robabilistic infrnc Suppos th agnt has to mak a dcision about th valu of an unobsrvd qury variabl X givn som obsrvd vidnc E = artially obsrvabl, stochastic, pisodic nvironmnt Eampls: X = {spam, not spam},

More information

Understanding Patterns of TCP Connection Usage with Statistical Clustering

Understanding Patterns of TCP Connection Usage with Statistical Clustering Th UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Undrstanding Pattrns of TCP Connction Usag with Statistical Clustring Félix Hrnándz-Campos Kvin Jffay Don Smith Dpartmnt of Computr Scinc Andrw Nobl Dpartmnt

More information

Graphing Calculator Activities

Graphing Calculator Activities Graphing Calculator Activitis Graphing Calculator Activitis Copyright 009, IPG Publishing IPG Publishing 86 Erin Bay Edn Prairi, innsota 47 phon: (6) 80-9090 www.iplaymathgams.com ISBN 978--948--6 IPG

More information

CC-RANSAC: Fitting Planes in the Presence of Multiple Surfaces in Range Data

CC-RANSAC: Fitting Planes in the Presence of Multiple Surfaces in Range Data CC-RANSAC: Fitting Plans in th Prsnc of Multipl Surfacs in Rang Data Orazio Gallo, Robrto Manduchi Univrsity of California, Santa Cruz Abbas Rafii Cansta, Inc. Abstract Rang snsors, in particular tim-of-flight

More information

Graph Theory & Applications. Boundaries Using Graphs. Graph Search. Find the route that minimizes. cost

Graph Theory & Applications. Boundaries Using Graphs. Graph Search. Find the route that minimizes. cost Graph Thory & Appliations Bounaris Using Graphs 3 4 3 4 5 Fin th rout that minimizs osts Fin th ritial path in a projt Fin th optimal borr aroun a rgion Fin loop an no quations or analog iruit analysis

More information

: Mesh Processing. Chapter 6

: Mesh Processing. Chapter 6 600.657: Msh Procssing Chaptr 6 Quad-Dominant Rmshing Goal: Gnrat a rmshing of th surfac that consists mostly of quads whos dgs align with th principal curvatur dirctions. [Marinov t al. 04] [Alliz t al.

More information

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol.

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol. ISSN : 2355-9365 -Procding of Enginring : Vol.5, No.1 Mart 2018 Pag 1112 Analysis of Influnc AS Path Prpnding to th Instability of BGP Routing Protocol. Hirwandi Agusnam 1, Rndy Munadi 2, Istikmal 3 1,2,3,

More information

Clustering Belief Functions using Extended Agglomerative Algorithm

Clustering Belief Functions using Extended Agglomerative Algorithm IJ Imag Graphics and Signal Procssing 0 - Publishd Onlin Fbruary 0 in MECS (http://wwwmcs-prssorg/ ing Blif Functions using Extndd Agglomrativ Algorithm Ying Png Postgraduat Collg Acadmy of Equipmnt Command

More information

Forward and Inverse Kinematic Analysis of Robotic Manipulators

Forward and Inverse Kinematic Analysis of Robotic Manipulators Forward and Invrs Kinmatic Analysis of Robotic Manipulators Tarun Pratap Singh 1, Dr. P. Sursh 2, Dr. Swt Chandan 3 1 M.TECH Scholar, School Of Mchanical Enginring, GALGOTIAS UNIVERSITY, GREATER NOIDA,

More information

From Last Time. Origin of Malus law. Circular and elliptical polarization. Energy of light. The photoelectric effect. Exam 3 is Tuesday Nov.

From Last Time. Origin of Malus law. Circular and elliptical polarization. Energy of light. The photoelectric effect. Exam 3 is Tuesday Nov. From Last Tim Enrgy and powr in an EM wav Exam 3 is Tusday Nov. 25 5:30-7 pm, 2103 Ch (hr) Studnts w / schduld acadmic conflict plas stay aftr class Tus. Nov. 18 to arrang altrnat tim. Covrs: all matrial

More information

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1 Advancd Computr Graphics CSE 63 [Spring 207], Lctur 7 Ravi Ramamoorthi http://www.cs.ucsd.du/~ravir To Do Assignmnt, Du Apr 28 Any last minut issus or difficultis? Starting Gomtry Procssing Assignmnt 2

More information

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO Prsntation for us with th txtbook, Algorithm Dsign and Applications, by M. T. Goodrich and R. Tamassia, Wily, 2015 Dirctd Graphs BOS ORD JFK SFO LAX DFW MIA 2015 Goodrich and Tamassia Dirctd Graphs 1 Digraphs

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University.

CS246: Mining Massive Datasets Jure Leskovec, Stanford University. CS246: Mining Massiv Datasts Jur Lskovc, Stanford Univrsity ttp://cs246.stanford.du 11/26/2010 Jur Lskovc, Stanford C246: Mining Massiv Datasts 2 Givn a st of points, wit a notion of distanc btwn points,

More information

The Size of the 3D Visibility Skeleton: Analysis and Application

The Size of the 3D Visibility Skeleton: Analysis and Application Th Siz of th 3D Visibility Sklton: Analysis and Application Ph.D. thsis proposal Linqiao Zhang lzhang15@cs.mcgill.ca School of Computr Scinc, McGill Univrsity March 20, 2008 thsis proposal: Th Siz of th

More information

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select Low-Powr Dsign of Pag-Basd Intllignt Mmory Mark Oskin, Frdric T. Chong, Aamir Farooqui, Timothy Shrwood, and Justin Hnsly Univrsity of California at Davis Abstract Advancs in DRAM tchnology hav ld many

More information

Government Product Accessibility Template for Information Content Services

Government Product Accessibility Template for Information Content Services Govrnmnt Product Accssibility Tmplat for Information Contnt Srvics Dfinition of Dlivrabl Srvic dlivrabls rlvant to Sction 508 considrations ar EIT Information Contnt, Custom EIT Products and EITrlatd Labor

More information

Terrain Mapping and Analysis

Terrain Mapping and Analysis Trrain Mapping and Analysis Data for Trrain Mapping and Analysis Digital Trrain Modl (DEM) DEM rprsnts an array of lvation points. Th quality of DEM influncs th accuracy of trrain masurs such as slop and

More information

Between Testing and Formal Verification

Between Testing and Formal Verification Btwn Tsting and Formal Vrification Jan Tobias Mühlbrg jantobias.muhlbrg@cs.kuluvn.b imc-distrint, KU Luvn, Clstijnnlaan 200A, B-3001 Blgium ScAppDv, Luvn, March 2017 1 /19 Jan Tobias Mühlbrg Btwn Tsting

More information

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S isto C o C or Co r op ra p a py ag yr g ri g g gh ht S S S V V K r V K r M K v M r v M rn v MW n W S r W Sa r W K af r: W K f : a H a M r T H r M rn w T H r Mo ns w T i o S ww c ig on a w c g nd af ww

More information

Linked Data meet Sensor Networks

Linked Data meet Sensor Networks Digital Entrpris Rsarch Institut www.dri.i Linkd Data mt Snsor Ntworks Myriam Lggiri DERI NUI Galway, Irland Copyright 2008 Digital Entrpris Rsarch Institut. All rights rsrvd. Linkd Data mt Snsor Ntworks

More information

Fequent Pattern Recognization From Stream Data Using Compact Data Structure

Fequent Pattern Recognization From Stream Data Using Compact Data Structure Fqunt Pattrn Rcognization From Stram Data Using Compact Data Structur Fabin M Christian 1, Narndra C.Chauhan 2, Nilsh B. Prajapati 3 1 PG Scholar, CE Dpartmnt, BVM Engg. Collg, V.V.Nagar, fabin.christian@gmail.com

More information

Formal Foundation, Approach, and Smart Tool for Software Models Comparison

Formal Foundation, Approach, and Smart Tool for Software Models Comparison Formal Foundation, Approach, and Smart Tool for Softwar Modls Comparison Olna V. Chbanyuk, Abdl-Badh M. Salm Softwar Enginring Dpartmnt, National Aviation Univrsity, Kyiv, Ukrain Computr Scinc, Faculty

More information

A Vision-based Navigation System of Mobile Tracking Robot

A Vision-based Navigation System of Mobile Tracking Robot A Vision-basd Navigation Systm of Mobil Tracking Robot Ji Wu Vac1av Snasl Dpt. Computr Scinc FCS VSB - Tchnical Univrsity of Ostrava Ostrava Czch Rpublic dfrmat2008 @hotmail.com vaclav. snasl @vsb.cz Ajith

More information

Nimsoft Monitor. ldap_response Guide. v1.3 series

Nimsoft Monitor. ldap_response Guide. v1.3 series Nimsoft Monitor ldap_rspons Guid v1.3 sris Lgal Notics Copyright 2012, Nimsoft Corporation Warranty Th matrial containd in this documnt is providd "as is," and is subjct to bing changd, without notic,

More information

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU An Auto-tund Mthod for Solving Larg Tridiagonal Systms on th GPU Andrw Davidson Univrsity of California, Davis aaldavidson@ucdavis.du Yao Zhang Univrsity of California, Davis yaozhang@ucdavis.du John D.

More information

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J'''

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J''' DO NOW Gomtry Rgnts Lomac 2014-2015 Dat. du. Similar by Transformation 6.1 (DN) Nam th thr rigid transformations and sktch an xampl that illustrats ach on. Nam Pr LO: I can dscrib a similarity transformation,

More information

Interfacing the DP8420A 21A 22A to the AN-538

Interfacing the DP8420A 21A 22A to the AN-538 Intrfacing th DP8420A 21A 22A to th 68000 008 010 INTRODUCTION This application not xplains intrfacing th DP8420A 21A 22A DRAM controllr to th 68000 Thr diffrnt dsigns ar shown and xplaind It is assumd

More information

Branching and Circular Features in High Dimensional Data

Branching and Circular Features in High Dimensional Data 1 Branching an Circular Faturs in High Dimnsional Data Bi Wang, Brian Summa, Valrio Pascucci, an Mikal Vjmo-Johansson UUSCI-2011-005 Scintific Computing an Imaging Institut Univrsity of Utah Salt Lak City,

More information

Preview. Digital Image Processing Unit 7: Image Restoration. Unit Outline. Preview (cont.)

Preview. Digital Image Processing Unit 7: Image Restoration. Unit Outline. Preview (cont.) --6 Digital Procssing Unit 7: Rstoration Prviw Goal of imag rstoration Improv an imag in som prdfind sns Diffrnc with imag nhancmnt? Faturs rstoration v.s imag nhancmnt Objctiv procss v.s. subjctiv procss

More information

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight Availabl at http://pvamudu/aam Appl Appl Math ISSN: 193-9466 Vol 6, Issu (Dcmbr 011), pp 60 619 Applications and Applid Mathmatics: An Intrnational Journal (AAM) A Nw Algorithm for Solving Shortst Path

More information

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias Robust and Fault Tolrant Clock Synchronization Nikolaus Krö, Organo Systms Anq Mahmood, ZISS Thomas Krnn, Cisco Flix Ring, ZISS Tobias Müllr, Organo Systms Thomas Biglr, ZISS Rational Common notion of

More information

Multi-hypothesis Motion Planning for Visual Object Tracking

Multi-hypothesis Motion Planning for Visual Object Tracking Multi-hypothsis Motion Planning or Visual Objct Tracking Haing Gong, Jack Sim, Maxim Likhachv, Jianbo Shi GRASP Lab, Univrsity o Pnnsylvania Robotics Institut, Carngi Mllon Univrsity hgong@sas.upnn.u,

More information

Ray Tracing. Wen-Chieh (Steve) Lin National Chiao-Tung University

Ray Tracing. Wen-Chieh (Steve) Lin National Chiao-Tung University Ra Tracing Wn-Chih (Stv Lin National Chiao-Tung Univrsit Shirl, Funamntals of Computr Graphics, Chap 15 I-Chn Lin s CG slis, Doug Jams CG slis Can W Rnr Imags Lik Ths? Raiosit imag Pictur from http://www.graphics.cornll.u/onlin/ralistic/

More information

Review and analysis of Cloud Computing Quality of Experience

Review and analysis of Cloud Computing Quality of Experience Rviw and analysis of Cloud Computing Quality of Exprinc Fash Safdari 1, Victor Chang 1 1 School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR {F.Safdari;

More information

ADC7480 SERIES. 3000W Battery Chargers and Power Supplies

ADC7480 SERIES. 3000W Battery Chargers and Power Supplies ADC748 SERIES 3W Battry Chargrs and Powr Supplis Wid output adjustmnt rang 32VDC Analog control by xtrnal -5VDC voltag Tmp.comp charging, sns as on option Powr fail rlay alarm Mastr-Slav connction Analog

More information

Lecture notes on Chi Square & SAS example demonstration

Lecture notes on Chi Square & SAS example demonstration Analysis of Enumrativ Data (p. 281) Exampls m m m m m m Many xprimnts rsult in numrativ (count) data. This is data that cannot b masurd on a continuous scal. Such data is qualitativ or catgorical data

More information

Conference and Facility Hire

Conference and Facility Hire Confrnc an Facility Hir Kp in touch with us: /GTGTraining @GTG_Training GTG Training gtg.co.uk 023056_GTG_Glasgow_Confrnc_Facility_Hir_Brochur_A4_12_07_18.in 2 28/08/2018 09:45 At GTG, w r prou to offr

More information

Parser Self-Training for Syntax-Based Machine Translation

Parser Self-Training for Syntax-Based Machine Translation arsr Slf-Training for Syntax-Basd Machin Translation Makoto Morishita, Koichi Akab, Yuto Hatakoshi Graham ubig, Koichiro Yoshino, Satoshi akamrua Graduat School of Information Scinc ara Institut of Scinc

More information

Mesh Data Structures. Geometry processing. In this course. Mesh gallery. Mesh data

Mesh Data Structures. Geometry processing. In this course. Mesh gallery. Mesh data Gomtry procssing Msh Data Structurs Msh data Gomtry Connctivity Data structur slction dpnds on Msh typ Algorithm rquirmnts 2 Msh gallry In this cours Only orintabl, triangular, manifold mshs Singl componnt,

More information

Combining Intra- and Multi-sentential Rhetorical Parsing for Document-level Discourse Analysis

Combining Intra- and Multi-sentential Rhetorical Parsing for Document-level Discourse Analysis Combining Intra- and Multi-sntntial htorical Parsing for Documnt-lvl Discours Analysis hafiq Joty Giuspp Carnini, aymond T. Ng, Yashar Mhdad sjoty@qf.org.qa {carnini, rng, mhdad}@cs.ubc.ca Qatar Computing

More information

Performance Comparison of Data Mining Algorithms for the Predictive Accuracy of Credit Card Defaulters

Performance Comparison of Data Mining Algorithms for the Predictive Accuracy of Credit Card Defaulters 178 IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.17 No.3, March 2017 Prformanc Comparison of Data Mining Algorithms for th Prdictiv Accuracy of Crdit Card Dfaultrs Dr. Maruf Pasha,

More information

Internet Technology 3/21/2016

Internet Technology 3/21/2016 Intrnt Tchnolog //6 Roting algorithm goal st hop rotr = sorc rotr last hop rotr = dstination rotr rotr Intrnt Tchnolog 8. Roting sitch rotr LAN Pal Kranoski Rtgrs Unirsit Spring 6 LAN Roting algorithm:

More information

Misbehavior in Nash Bargaining Solution Allocation

Misbehavior in Nash Bargaining Solution Allocation Misbhavior in Nash Bargaining Solution Allocation Ilya Nikolavskiy, Andry Lukyannko, Andri Gurtov Aalto Univrsity, Finland, firstnam.lastnam@aalto.fi Hlsinki Institut for Information Tchnology, Finland,

More information

TRIANGULATION OF NURBS SURFACES. Jamshid Samareh-Abolhassani. 1 Abstract

TRIANGULATION OF NURBS SURFACES. Jamshid Samareh-Abolhassani. 1 Abstract TRIANGULATION OF NURBS SURFACES Jamshid Samarh-Abolhassani 1 Abstract A tchniqu is prsntd for triangulation of NURBS surfacs. This tchniqu is built upon an advancing front tchniqu combind with grid point

More information