Creating Adaptive Web Sites Through Usage-Based Clustering of URLs

Size: px
Start display at page:

Download "Creating Adaptive Web Sites Through Usage-Based Clustering of URLs"

Transcription

1 Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL Robert Cooley, Jaideep Srivastava Dept. of Computer Siene, University of Minnesota, Minneapolis, MN 1 Introdution Web personalization has quikly moved from an added value feature to a neessity, partiularly for large information servies and sites that generate revenue by selling produts. Web personalization an be viewed as using user preferenes profiles to dynamially serve ustomized ontent to partiular users. User preferenes may be obtained expliitly, or by passive observation of users over time as they interat with the system. Prinipal elements of Web personalization inlude modeling of Web objets (pages, et.) and subjets (users), mathing between and aross objets and/or subjets, and determination of the set of ations to be reommended for personalization. Existing approahes used by many Web-based ompanies, as well as approahes based on ollaborative filtering (e.g., GroupLens [HKBR99] and Firefly [SM95]), rely heavily on human input for determining the personalization ations. This type of input is often a subjetive desription of the users by the users themselves, and thus prone to biases. Furthermore, the profile is stati, and its performane degrades over time as the profile ages. Reently, a number of approahes have been developed dealing with speifi aspets of Web usage mining for the purpose of automatially disovering user profiles. For example, Perkowitz and Etzioni [PE98] proposed the idea of optimizing the struture of Web sites based o-ourrene patterns of pages within usage data for the site. Shehter et al [SKS98] have developed tehniques for using path profiles of users to predit future HTTP requests, whih an be used for network and proxy ahing. Spiliopoulou et al [SF99], Cooley et al [CMS99], and Buhner and Mulvenna [BM99] have applied data mining tehniques to extrat usage patterns from Web logs, for the purpose of deriving marketing intelligene. Shahabi et al [SZA97], Yan et al [YJGD96], and Nasraoui et al [NFJK99] have proposed lustering of user sessions to predit future user behavior. In this paper we desribe an approah to usage-based Web personalization taking into aount both the offline tasks related to the mining of usage data, and the online proess of automati Web page ustomization based on the mined knowledge. Speifially, we propose an effetive tehnique for apturing ommon user profiles based on assoiation-rule disovery and usage-based lustering. We also propose tehniques for ombining this knowledge with the urrent status of an ongoing Web ativity to perform realtime personalization. Finally, we provide an experimental evaluation of the proposed tehniques using real Web usage data. 2 Mining Usage Data for Web Personalization The overall proess of usage-based Web personalization an be divided into two omponents. The offline omponent is omprised of the data preparation tasks resulting in a user transation file, and the speifi usage mining tasks, whih in our ase inlude the disovery of assoiation rules and the derivation of URL lusters based on user aess patterns. One the mining tasks are aomplished, the frequent itemsets and the URL lusters are used by the online omponent of the arhiteture to provide dynami reommendations to users based on their urrent navigational ativity. The Web server keeps trak of the ative user session as the user browser makes HTTP requests. The reommendation engine onsiders the ative user session in onjuntion with the URL lusters to ompute a set of reommended URLs. The reommendation set is then added to the last requested page as a set of links before the page is sent to the lient browser. A generalized arhiteture for 1

2 Figure 1. General Arhiteture for Usage-Based Web Personalization usage-based personalization is depited in Figure 1. In this setion, we disuss the offline omponents of this arhiteture. The online ustomization proess is presented in the next setion. 2.1 Data Preparation Tasks A ritial step in effetively mining usage data for Web personalization is the leaning and transformation of aess log data, and the identifiation of a set of user sessions. Cleaning the server logs involves removing redundant referenes (e.g., image and sound files, multiple frames, and dynami pages that have the same template), leaving only one entry per page view. It is also neessary to filter the log files by mapping the referenes to the site topology indued by physial links between pages. Client-side and proxy level ahing often reate impediments to the identifiation of unique user sessions. For example, in a Web server log, all requests from a proxy server have the same identifier, even though the requests potentially represent more than one user. Tehniques suh as the use of lient-side ookies for user identifiation are not always pratial due to privay onerns of the users, or limitations of the apabilities of the Web server. In [CMS99] we proposed several simple heuristis using the referrer and agent fields of a Server log to identify user sessions and infer missing referenes with relative auray in the absene of additional information suh as ookies. The goal of transation identifiation is to dynamially reate meaningful lusters of referenes for eah user. Based on an underlying model of the user's browsing behavior, eah page referene an be ategorized as a ontent referene, auxiliary (or navigational) referene, or hybrid. In this way different types of transations an be obtained from the user session file, inluding ontent-only transations involving referenes to ontent pages, and navigation-ontent transations involving a mix of pages types. The details of 2

3 methods for transation identifiation are disussed in [CMS99]. Finally, the session file may be filtered to remove small transations and low support referenes (i.e., URL referenes that are not supported by a speified number of user transations). This type of support filtering is important in removing noise from the data, suh as transations orresponding to users who do not traverse the site. Given the preproessing steps outlined above, for the rest of this paper we assume that there is a set of n unique URLs U = {url 1, url 2,, url n }, appearing in the preproessed log, and a set of m user transations T = {t 1, t 2,, t m }, where eah t i T is a non-empty subset of U. 2.2 Usage Clustering Based on Frequent Itemsets Traditional ollaborative filtering tehniques are often based on mathing the urrent user's profile against lusters of similar profiles obtained by the system over time. Similar tehniques have been proposed for obtaining user profiles from Web usage data by lustering user sessions [SZAS97, YJGD96]. However, session lusters by themselves are not an effetive means of apturing an aggregated view of ommon user aess patterns. Eah session luster may potentially ontain thousands of user sessions involving hundreds of URL referenes. Furthermore, the omputation of similarity or distane between user session vetors in the ontext of Web usage mining is not a trivial task, sine feature weights based on the amount of time spent by a partiular user on a page, or the number of referenes to a page within a session, are generally not good behavioral indiators in Web transations. In ontrast to lustering user sessions, we diretly ompute overlapping lusters of URL referenes based on their o-ourrene patterns aross user transations. We all the URL lusters obtained in this way, usage lusters. Our experiments suggest that usage lusters tend to group together related items (based on user aess patterns) aross transations, even if these transations are themselves not deemed to be similar. This allows us to obtain lusters that potentially apture overlapping interests of different types of users. However, traditional lustering tehniques, suh as distane-based methods generally annot handle this type lustering. The reason is that instead of using URLs as features, the transations must be used as features, whose number is in tens to hundreds of thousands in a typial appliation. Furthermore, dimensionality redution in this ontext may not be appropriate, as removing a signifiant number of transations as features will result in losing too muh information. Assoiation Rule Hypergraph Partitioning (ARHP) tehnique [HKKM97, HKKM98] is well-suited for this task, sine it provides automati filtering apabilities, does not require distane omputations, and an be used in high-dimensional data sets without requiring dimensionality redution. The ARHP tehnique has been used suessfully in a variety of domains, suh as ontent-based ategorization of Web douments [HBG+99]. Assoiation rules apture the relationships among items based on their patterns of o-ourrene aross transations. In Web transations, assoiation rules apture relationships among URL referenes based on the navigational patterns of users. The assoiation rule disovery methods, suh as the Apriori algorithm [AS94], initially find groups of items (whih in this ase are the URLs appearing in the preproessed log) ourring frequently together in many transations. Suh groups of items are referred to as frequent item sets. Given a set I = {I 1, I 2,, I k } of frequent itemsets, the support of I i is the fration of transations ontaining I i, and is denoted by σ(i i ). Generally, a support threshold is speified before mining and is used by the algorithm for pruning the searh spae. An assoiation rule r is an expression of the form <X Y, σ r, α r >, where X and Y are sets of items, σ r is the support of X Y, and α r is the onfidene for the rule r given by σ(x Y) / σ(x). The frequent itemsets are used as hyperedges to form a hypergraph H = <V, E>, where V U and E I. A hypergraph is an extension of a graph where eah hyperedge an onnet more than two verties. The weights for hyperedges are omputed based on the onfidene of the assoiation rules involving the items in the frequent itemset. The hypergraph H is then partitioned into a set of lusters C = { 1, 2,, h }. The similarity among items is aptured impliitly by the assoiation rules. Eah luster is examined to filter out verties that are not highly onneted to the rest of the verties of the partition. The onnetivity of vertex v (a URL appearing in the frequent itemset) with respet to a luster is defined as follows: onn( v, ) = { e e, v e} { e e } 3

4 Connetivity measures the perentage of edges with whih a vertex is assoiated. A high onnetivity value suggests that the vertex has many edges, onneting a good proportion of the verties in the partition. The verties with onnetivity measure greater than a given threshold value are onsidered to belong to the luster. Additional filtering of non-relevant items an be ahieved using the support riteria in the assoiation rule disovery omponents of the algorithm. One the URL lusters have been omputed, a partial session for the urrent user an be assigned to a mathing luster. The onnetivity value of an item (URL) defined above is important beause it is used as the weight assoiated with that item for the luster. These weights are used as part of the reommendation proess when lusters are mathed against an ative user session. The details of the mathing and reommendation proess are disussed in the next setion. 3 Automati Customization Based on Usage Clusters The online omponent of the Web personalization system involves the omputation of a reommendation set for the urrent session, onsisting of links to pages that the user may want to visit based on similar usage patterns. The reommendation set essentially represents a "short-term" view of potentially useful links based on the user's navigational ativity through the site. These reommended links are then added to the last page in the session aessed by the user before that page is sent to the browser. We use a fixed-size sliding window over the ative session to apture the urrent user s history depth. A sliding window of size n over the ative session allows only the last n visited pages to influene the omputation of the reommendation set. This makes sense in the ontext of personalization sine most users go bak and forth while navigating a site to find independent piees of information. In many ases these subsessions have a length of no more than 2 or 3 referenes. The notion of a sliding session window is similar to the notion of N-grammars disussed in [Cha96]. We an determine the optimum window size based on the average user transation length identified during the preproessing stage. We also want to weight a URL reommendation higher, if it is farther away form the urrent ative session. To apture this notion, we maintain a direted graph, G, representing the topology of the site. The physial link distane between two URLs u 1 and u 2 is the length of a minimal path from u 1 to u 2 in this site graph. Now, the physial link distane between the ative session s and a URL u s is denoted by dist(u,s,g), whih is defined as the smallest physial link distane between u and any of the URLs in s. The link distane fator of u with respet to s is defined as ldf(u,s) = log(dist(u,s,g))+1. If the URL u is in the ative session, then ldf(u,s) is taken to be 0. We take the log of the link distane so that it does not ount too heavily ompared to item weights within lusters. Eah URL luster an be viewed as virtual user profile representing ommon aess patterns. One a new user starts a session, our goal is to math, at eah step, the partial user session with the usage lusters, and provide dynami reommendations to the user. Reall that the weight of URL u in a luster is the onnetivity value of the item within the luster, denoted by onn(u, ), as defined in the previous setion. We an therefore represent eah luster C, as a vetor G u, u,!, u, where > = 1 2 onn( urli, ), if urli u i = 0, otherwise The urrent ative session s is also represented as a (binary) vetor <s 1, s 2,, s n >, where s i = 1, if the user has aessed URL i in this session, and s i = 0, otherwise. The luster mathing sore is now omputed as follows: uk sk k math( s, ) = s ( u ) 2 k k Note that the mathing sore is normalized for the size of the lusters and the ative session. This orresponds to the intuitive notion that we should see more of the user's ative session before obtaining a better math with a larger luster representing a user profile. Given a luster and an ative session s, a reommendation sore, Re(s,u), is omputed for eah URL u in as follows: n 4

5 Re( s, u) = onn( u, ) math( s, ) ldf 0s, u5. If the URL u is in the urrent ative session, then its reommendation value is zero beause of the link distane fator. Finally, we an ompute the reommendation set, Reommend(s), for urrent ative session s by olleting from eah luster all URLs whose reommendation sore satisfies a minimum reommendation threshold ρ, i.e., Reommend ( s) = { u C, and Re( s, u ) ρ }. For eah URL that is ontributed i i by several lusters, we use its maximal reommendation sore from all of the ontributing lusters. 4 Experimental Results We used the aess logs from the University of Minnesota Computer Siene Web server to evaluate our personalization tehnique. The preproessed log (for February of 1999) was onverted into a session file omprising user transations and a total of 4001 unique URLs (before support filtering). We used the hypergraph partitioning algorithm as modified in [CC99] in order to take frequent itemsets as the input, and performed the lustering of URLs. The frequent itemsets were found using the tree projetion algorithm desribed in [AAP99]. Eah URL serves as a vertex in the hypergraph, and eah edge represents a frequent itemset with the weight of the edge taken as the interest for the set. Sine interest inreases dramatially with the number of items in a rule, the log of the interest is taken in order to prevent the larger rules from ompletely dominating the lustering proess. For the reommendation proess we hose a session window size of 2, sine the average session size was 2.4. The reommendation results are given for the sample path /researh=>/grad-info=>/registration-info. A summary of the results are given in Figure 2; additional experimental results and a demonstration site using the tehniques disussed in this paper an be found at Eah table in Figure 2 orresponds to one step in the user navigation through the path. In eah ase the urrent ative session window is given along with the top reommendations. A ut-off value of 0.30 was used for the reommendation sore. Eah row shows two onseutive reommendations. Note that in many ases the obvious reommendations assoiated with the URLs in the ative session window rank lower than URLs for pages that are farther away in the site graph. This variation is mainly due to the link distane fator disussed earlier. In eah ase the reommendation set is omposed of URLs from a number of mathing lusters. When /researh page is requested, the URLs for a number of popular researh groups are inluded. But, note that pages from graduate information and registrations setions are also inluded, sine many users (mainly graduate students) often have overlapping interests aross these setions. When /grad-info is requested, some of the frequently visited URLs assoiated with that page as well as related lass registration pages rank higher. Finally, when /registration-info is requested, a more foused set of reommendations results, not involving researh related pages. 5 Conlusions The ability to ollet detailed usage data at the level of individual mouse liks, provides Web-based ompanies with a tremendous opportunity for personalizing the Web experiene of lients. In e-ommere parlane this is being termed mass ustomization. Most urrent approahes to personalization by various Webbased ompanies rely heavily on human partiipation to ollet profile information about users. This suffers from the problems of the profile data being subjetive, as well getting out of date as the user preferenes hange over time. In this paper we have presented an arhiteture for automati Web personalization based on Web usage data. We introdued an effetive lustering tehnique using assoiation rule mining to learn overlapping user profiles, and disussed how the extrated knowledge an be used in real-time to provide navigational pointers for users. Our experimental results indiate that the tehniques disussed here are promising, and bear further investigation and development. Our future work in this area involves onduting experiments with various types of transations derived from user sessions, for example, to isolate speifi types of "ontent" pages in the reommendation proess. We also plan on inorporating lient-side agents to provide an additional level of personalization based on user preferenes. 5

6 Session Window: /researh Reommendation Sore Reommendation Sore /newsletter/newfaulty.html 0.73 /newsletter 0.65 /faulty 0.55 /researh/nmrg 0.55 /researh/softeng 0.55 /researh/airvl 0.51 /researh/mmdbms 0.48 /researh/agassiz 0.47 /personal-pages 0.37 /registration-info 0.35 /registration-info/spring99.html 0.32 /grad-info 0.30 /registration-info/sh99-00.html 0.30 /grad-researh 0.30 Session Window: /researh => /grad-info Reommendation Sore Reommendation Sore /faulty 0.59 /personal-pages 0.52 /newsletter/newfa.html 0.52 /newsletter 0.46 /grad-info/grad-handbook.html 0.45 /grad-info/ourse-guide.html 0.45 /grad-info/prospetive-grads.html 0.40 /registration-info 0.39 /researh/nmrg 0.39 /researh/softeng 0.39 /researh/airvl 0.36 /registration-info/spring99.html 0.35 /researh/mmdbms 0.34 /researh/agassiz 0.33 Session Window: /grad-info => /registration-info Reommendation Sore Reommendation Sore /faulty 0.51 /personal-pages 0.45 /grad-info/grad-handbook.html 0.45 /grad-info/ourse-guide.html 0.45 /grad-info/prospetive-grads.html 0.40 /registration-info/spring99.html 0.36 /registration-info/sh99-00.html 0.34 Figure 2. Reommendation Results for a Typial User Navigation Path Referenes [AAP99] [AS94] [BM99] Agarwal, R., Aggarwal, C., and Prasad, V., A tree projetion algorithm for generation of frequent itemsets. In Proeedings of High Performane Data Mining Workshop, Puerto Rio, Agrawal, R. and Srikant, R., Fast algorithms for mining assoiation rules. In Proeedings of the 20 th VLDB onferene, pp , Santiago, Chile, Buhner, A. and Mulvenna, M. D., Disovering internet marketing intelligene through online analytial Web usage mining. SIGMOD Reord, (4) 27, [Cha96] Charniak, E., Statistial language learning. MIT Press, [CC99] [CMS99] [CPY96] [HBG+99] [HKBR99] Clifton, C. and Cooley, R., TopCat: data mining for topi identifiation in a text orpus. In Proeedings of the 3rd European Conferene of Priniples and Pratie of Knowledge Disovery in Databases, Prague, Czeh Republi, Cooley, R., Mobasher, B., and Srivastava, J., Data preparation for mining World Wide Web browsing patterns. Journal of Knowledge and Information Systems, (1) 1, Chen, M. S., Park, J. S., and Yu, P. S., Data mining for path traversal patterns in a Web environment. In Proeedings of 16th International Conferene on Distributed Computing Systems, Han, E-H, Boley, D., Gini, M., Gross, R., Hastings, K., Karypis, G., Kumar, V., and Mobasher, B., More, J., Doument ategorization and query generation on the World Wide Web using WebACE. Journal of Artifiial Intelligene Review, January Herloker, J., Konstan, J., Borhers, A., Riedl, J.. An algorithmi framework for performing ollaborative filtering. To appear in Proeedings of the 1999 Conferene on Researh and Development in Information Retrieval, August

7 [HKKM97] [HKKM98] [NFJK99] [PE98] [SF99] [SKS98] [SM95] [SZAS97] [YJGD96] Han, E-H, Karypis, G., Kumar, V., and Mobasher, B., Clustering based on assoiation rule hypergraphs. In Proedings of SIGMOD 97 Workshop on Researh Issues in Data Mining and Knowledge Disovery (DMKD 97), May Han, E-H, Karypis, G., Kumar, V., and Mobasher, B., Hypergraph based lustering in highdimensional data sets: a summary of results. IEEE Bulletin of the Tehnial Committee on Data Engineering, (21) 1, Marh Nasraoui, O., Frigui, H., Joshi, A., Krishnapuram, R., Mining Web aess logs using relational ompetitive fuzzy lustering. To appear in the Proeedings of the Eight International Fuzzy Systems Assoiation World Congress, August Perkowitz, M. and Etzioni, O., Adaptive Web sites: automatilly synthesizing Web pages. In Proeedings of Fifteenth National Conferene on Artifiial Intelligene, Madison, WI, Spiliopoulou, M. and Faulstih, L. C., WUM: A Web Utilization Miner. In Proeedings of EDBT Workshop WebDB98, Valenia, Spain, LNCS 1590, Springer Verlag, Shehter, S., Krishnan, M., and Smith, M. D., Using path profiles to predit HTTP requests. In Proeedings of 7th International World Wide Web Conferene, Brisbane, Australia, Shardanand, U., Maes, P., Soial information filtering: algorithms for automating "word of mouth." In Proeedings of the ACM CHI Conferene, Shahabi, C., Zarkesh, A. M., Adibi, J., and Shah, V., Knowledge disovery from users Web-page navigation. In Proeedings of Workshop on Researh Issues in Data Engineering, Birmingham, England, Yan, T., Jaobsen, M., Garia-Molina, H., Dayal, U., From user aess patterns to dynami hypertext linking. In Proeedings of the 5 th International WWW Conferene, Paris,

Automatic Personalization Based on Web Usage Mining

Automatic Personalization Based on Web Usage Mining Automatic Personalization Based on Web Usage Mining Bamshad Mobasher Dept. of Computer Science, DePaul University, Chicago, IL mobasher@cs.depaul.edu Robert Cooley, Jaideep Srivastava Dept. of Computer

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

OvidSP Quick Reference Card

OvidSP Quick Reference Card OvidSP Quik Referene Card Searh in any of several dynami modes, ombine results, apply limits, use improved researh tools, develop strategies, save searhes, set automati alerts and RSS feeds, share results...

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization

Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization Bamshad Mobasher 1, Honghua Dai, Tao Luo, Miki Nakagawa School of Computer Science, Telecommunications, and Information Systems

More information

Semantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management

Semantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management Semanti Conept Detetion Using Weighted Disretization Multiple Correspondene Analysis for Disaster Information Management Samira Pouyanfar and Shu-Ching Chen Shool of Computing and Information Sienes Florida

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

SEGMENTATION OF IMAGERY USING NETWORK SNAKES

SEGMENTATION OF IMAGERY USING NETWORK SNAKES SEGMENTATION OF IMAGERY USING NETWORK SNAKES Matthias Butenuth Institute of Photogrammetry and GeoInformation, Leibniz Universität Hannover Nienburger Str. 1, 30167 Hannover, Germany butenuth@ipi.uni-hannover.de

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Ciso Collaborative Knowledge Ciso on Ciso: How Ciso Servies Upskilled 14,400 Employees and Transformed into a Consultative, Solutions-Selling Organization. It is estimated that by 2020, roughly four out

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0 Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

A Survey in Web Page Clustering Techniques

A Survey in Web Page Clustering Techniques A Survey in Web Page Clustering Techniques Antonio LaTorre, José M. Peña, Víctor Robles, María S. Pérez Department of Computer Architecture and Technology, Technical University of Madrid, Madrid, Spain,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1 Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

A Subtractive Relational Fuzzy C-Medoids Clustering Approach To Cluster Web User Sessions from Web Server Logs

A Subtractive Relational Fuzzy C-Medoids Clustering Approach To Cluster Web User Sessions from Web Server Logs International Journal of Applied Engineering Researh ISSN 0973-456 Volume 1, Number 7 (017) pp. 114-1150 A Subtrative Relational Fuzzy C-Medoids Clustering Approah To Cluster Web User Sessions from Web

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Visualization of patent analysis for emerging technology

Visualization of patent analysis for emerging technology Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1 Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

A radiometric analysis of projected sinusoidal illumination for opaque surfaces

A radiometric analysis of projected sinusoidal illumination for opaque surfaces University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information

More information

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For

More information

PROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS

PROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS Proeedings of ASE Turbo Expo 2 Power for Land, Sea, and Air June 16 19, 2, Atlanta, Georgia, USA GT2-871 PROBABILISTIC SURFACE DAAGE TOLERANCE ASSESSENT OF AIRCRAFT TURBINE ROTORS ihael P. Enright R. Craig

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

Memorandum. The report also includes appendices that include the information used to create the usability test and the artifacts generated from it.

Memorandum. The report also includes appendices that include the information used to create the usability test and the artifacts generated from it. Memorandum Date: April 28, 2013 To: : From: Subjet: Stephanie Coleman, Southern Polytehni State University Dr. Carol Barnum, Southern Polytehni State University 900ers Projet Team: Ann Beebe, Niole MLaughlin,

More information

A Descriptive Framework for the Multidimensional Medical Data Mining and Representation

A Descriptive Framework for the Multidimensional Medical Data Mining and Representation Journal of Computer Siene 7 (4): 519-55, 011 ISSN 1549-3636 011 Siene Publiations A Desriptive Framework for the Multidimensional Medial Data Mining and Representation Veeramalai Sankaradass and Kannan

More information

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs? One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information