Coupling Web Usage Mining with Content Mining for Recommendation Systems

Size: px
Start display at page:

Download "Coupling Web Usage Mining with Content Mining for Recommendation Systems"

Transcription

1 Couping Web Usage Mining with Content Mining for Recommendation Systems Rehab Duwairi Department of Computer Science and Engineering Qatar Uniersity Qatar Ebraheem Ehaddad Department of Computer Science, Jordan Uni. of Sc. & Tech. Jordan Mohammed A-Towaiq, Department of Math. & Stat, Jordan Uni. of Sc. & Tech Jordan ABSTRACT In this paper, we introduce a noe approach for combining web usage mining and content mining. The approach is based on generating recommendations that tae into consideration users' naigation history as we as contents of pages isited. The integration of usage and content data can be performed at the offine phase or at the onine phase of the recommendation system. The former is referred to as pre-mining integration; whie the atter is caed post-mining integration. The current wor is concerned with pre-mining integration. The main rationaes of the combination are to improe the quaity of recommendations generated; oercome the new item probem and to improe the custering of users naigation patterns. In our experiments, the quaity of custering of user sessions is improed by 35% when compared with quaity of custers generated using usage patterns ony. Aso, the recommendations generated using the proposed approach are improed by 4% and 8% for the reca and precision respectiey and when compared with reca and precision obtained by using usage data ony. Keywords: recommender systems, coaboratie fitering, web usage mining, web content mining, and web personaization.. INTRODUCTION Web personaization is any action done by the web sites' administrator through computer based techniques to customize the web site for specific user or users. The personaization can be represented as recommended ins, products or targeted adertisements appearing to the users [8]. There are at east three approaches for buiding web personaization and recommendation systems, content-based, coaboratie fitering and web usage mining []. The content-based approach tries to accuratey anticipate the next user request, based on the content anaysis of the recenty isited pages by the user. These predictions are based on cacuating the simiarity of the current isited pages and the user's profie or mode. Pages that refect the user's interests and had neer been isited by the user can then be recommended [3]. The coaboratie fitering approach, by comparison, is one of the most popuar web personaization and recommendation technoogies and it uses peer opinions to predict the interests of others [9]. Here, instead of using the web pages content itsef, the web pages' ratings are used to generate recommendations. One of the we nown coaboratie fitering techniques is the K-Nearest-Neighbor (KNN). Gien the target user transaction, KNN compares this transaction with a transaction history of other users in order to find the K most simiar users. The simiarity can be based on ratings of items, access to simiar pages, or purchase of simiar items []. Neighborhood items are then used in the recommendation for the target user. Coaboratie fitering oercomes some content based imitations. The recommendations of items for users are based on user expicit ratings, instead of the items' content. The adantage of this approach, when compared with pure content based approaches is that it can capture pragmatic reationships among items based on their intended use []. Howeer, coaboratie fitering suffers from some probems such as: The cod start probem: initiay, there wi not be enough ratings and it competey denies any information that can be extracted from the content [7]. Web usage mining is concerned with the appication of data mining toos to web ogs in order to discoer users usage patterns; this heps in understanding and better sering the needs of web-based appications []. Web usage mining is diided into offine and onine components. The data preparation and the data mining techniques are appied at the offine component whereas the onine component inoes the recommendations to the actie users; these recommendations are based on the information extracted from the offine component. Hybrid approaches of content-based and coaboratie fitering, content-based and web usage mining are aso addressed. The combination is done to improe the oera system performance by combining the adantages of each technique. A noe approach is introduced in this paper. It is basicay based on a combination between the usage-mining of serer og fie and content mining for the corresponding web pages. The proposed approach consists of two components, namey, the onine and offine components. The offine component consists of three major tass, data preparation and preprocessing, generating simiarity matrixes and custering. The onine component consists of two tass, cassification and recommendation set generation. This paper is organized as foows: section proides an oeriew of the proposed framewor. Section 3 describes the dataset that was used. Section 4, on the other hand, describes the preprocessing and transformations that were appied to the dataset to mae it suitabe for the wor at hand. Section 5 describes the process of generating the session simiarity matrices (in usage, content, and usage-content spaces). Section 6, by comparison, describes the framewor that was used to custer users' sessions based on their simiarity. Section 7, describes the process of assigning a new session to the most simiar custer to that session. Section 8 describes the recommendation process where a set of pages is recommended to the user. Finay, section draws the concusions of this wor.

2 . COUPLING WEB USAGE AND CONTENT MINING 4. PREPROCESSING The dataset, which was used in this wor, is spit into training and testing subsets. The training sessions are the input to the offine component and the testing sessions are the input to the onine component. At the offine component, seera processing tass were appied on the training sessions to extract users' patterns. These patterns are used, by the onine component, to produce the recommendation set. The recommendation set is a group of web pages (URLs) that is predicted for the user to isit within her/his current session. The dataset preprocessing, generating simiarity matrixes and custering tass are performed at the offine component, whereas cassification and recommendation tass are performed at the onine component. The dataset reformatting and irreeant information eimination are done at the preprocessing tas. We buid three matrices, namey, content, usage and usage-content simiarity matrices. The content simiarity matrix hods the simiarity between eery two sessions in content, whereas the usage simiarity matrix hods the simiarity in usage. The usage-content simiarity matrix is buit by adding eery eement in the usage simiarity matrix to its corresponding eement in the content simiarity matrix. The usage-content simiarity matrix is used in the custering tas. After that, we custer the users sessions to custers using the -means custering agorithm. A new session is cassified to the most appropriate custer at the cassification tas which is the first tas of the onine component. The custer s mean is used by the recommendation tas to generate recommendations to the new actie session. 3. DATASET DESCRIPTION In our wor, we used msnbc.com anonymous web data [5]. The dataset describes users' isits to the msnbc website for the entire day of September, 8, 999. Each ine in the dataset corresponds to a user access session to the website. Page requests are at the ee of page category rather than URL ee. A the pages are cassified by a site administrator to seenteen topics which are "frontpage", "news", "tech", "oca", "opinion", "on-air", "misc", "weather", "heath", "iing", "business", "sports", "summary", "bbs" (buetin board serice), "trae", "msn-news", and "msn-sports". These topics are assigned the numbers from to 7 in the dataset, so corresponds to "frontpage", to "news", 3 to "tech" and so on. The number of URLs per category aries from to 5,. The dataset size is.9 MB and it contains 989,88 sessions. Tabe presents a sampe of the dataset hoding different sessions, the first session s represents one singe session containing two web page isits, both isits correspond to topic frontpage, whie session s contains 7 webpage isits, six of them correspond to topic frontpage and one of them corresponds to topic business. The space is used as a separator between any two consecutie web page isits in any session throughout the entire dataset. Tabe: A sampe of user sessions in the dataset Session Number S Sessions web isits S Irreeant and outier sessions are remoed from the dataset. Irreeant sessions are sessions of ength (i.e. consist of a isit to one page ony). Outier sessions are sessions which consist of isits to 3 or more pages (such sessions are usuay generated by automated programs) [4]. In tota, 365,435 irreeant sessions were eiminated and this eft 64,383 in the dataset. The tota number of outier sessions eiminated is 9,83 distinct sessions. This eaes 63,698 sessions from the row dataset. User sessions are of different engths and the same topics which are isited by seera users do not hae to agree on the order of their appearance. To faciitate the automatic extraction of sessions that hae common interests, eery session is represented as a ector of ength 7 (Reca 7 is the number of topics in the dataset). The first coumn represents topic ("frontpage"), and the second coumn represents topic "news" and so on. The Content-Matrix has the foowing definition: n C( i, j) if session i has isited topic j if session i did not isit topic j Where i is the session number, j is the topic number (from to 7) and n is the number of isits performed by session i to topic j. In usage preprocessing, we need to reformat the dataset in an appropriate format for capturing automatic usage behaior and comparing the site users based on their site naigation rather than their content interests. Anaogues to the content-space, we project each user session in a usage-space. With n web pages identified uniquey by their URLs, U {ur, ur ur (n-) }; and a set of m user sessions S {s, s s (m-) }, where m is the tota number of sessions and each s i S is a non-empty subset of U. The foowing formua iustrates the representation of any session s i in the usage-space. s i (ur, t), (ur, t),, (ur (n-), t) t is the time a user spent iewing a gien webpage. We used binary weights in our wor because the dataset doesn't inoe information a bout the page iew duration information []. This means that if a session refers to a page, then is paced in the corresponding ce in the ector; is paced otherwise. Unfortunatey, the dataset is recorded by the ee of webpage category (topics) instead of the ee of web page's URLs. To oercome this probem, we assume that the tota number of URLs for a the 7 site's topics, is, distinct URL and we wi refer to each web page by an id number instead of the page URL and to aoid dupicate ids we dedicate a unique range of ids for each topic. These ranges are proportiona to the distribution of eery topic in the dataset. 5. GENERATING SIMILARITY MATRIXES We generated three simiarity matrixes between a sessions, namey, content, usage and usage-content simiarity matrixes. We gae these three matrixes the foowing symbos C (m, m), U (m, m) and UC (m, m) respectiey, where m is the number of sessions in the dataset. We used the cosine simiarity measure to determine the simiarity between any two sessions. These matrixes were used in the next step to custer users' access sessions according to their simiarity in usage and content.

3 Generating Content Simiarity Matrix: This matrix is a two dimensiona matrix where eery ce contains a measure of the simiarity between two sessions, here the content simiarity between two sessions gies us an indicator to which ee the content of the two sessions are simiar. We appy the cosine simiarity measure between eery two sessions in the dataset using the content ectors representation. Equation presents the mathematica expression of the cosine simiarity between two ectors in the same space. sim (, ) i j i j i Where: i, j: are the ectors of the sessions number i and j and : is the ength of the ectors. As an exampe, eery coumn in the row C (, m) of the matrix records the simiarity between session number and sessions from to (m-). Generating Usage Simiarity Matrix: This matrix is a two dimensiona matrix where eery ce contains a measure of the simiarity between two sessions. The usage simiarity between two sessions gies us an indicator on the simiarity in browsing the website between two sessions. With the users' sessions represented in the usage-space, we now exacty what URLs a user isited in eery session. As much as two sessions isit the same web pages, the usage simiarity between them increases. Here aso we use the cosine simiarity as a simiarity measure but the ectors now in the usage-space. Generating Usage-Content Simiarity Matrix: The goa behind integrating usage and content simiarity matrixes is to hae a measure of the simiarity between users' sessions in both usage and pages' content. This matrix wi be the input for the custering tas where simiar sessions are grouped together in the same custer. We generate the usage-content simiarity matrix by adding eery ce of the usage simiarity matrix to the corresponding ce of the content simiarity matrix. Note that the simiarity aues may be greater than because in the Usage-Content Matrix, we are just adding corresponding simiarity aues from the Usage Matrix and the Content Matrix. j 6. CLUSTERING In this step, we group simiar sessions based on their webpage content and based on their website usage. We hae used the we nown -means custering agorithm. This agorithm has three main issues, namey, choosing initia custers' means, conergence criteria and determining the best aue of. We wi describe how we impemented them in the foowing subsections. Sessions custering resuts in a set of custers, C {c, c... c i }, in which each c i ( i ) is a subset of the set of user access sessions S, and is the number of custers. Choosing Initia Custers Means: To start the custering agorithm, we need initia means to be used in the first custering iteration. We used the Jaa random cass to generate a random number in the range from to the number of sessions to be custered. Then we use this number as an index to the seection of the initia mean session. We hae used this procedure to choose the initia means for the custers. () Conergence Criteria: After choosing the initia means, the Eucidian Distance is cacuated between the candidate sessions to be custered and the means of a custers. The candidate session is paced in the custer where the distance between this session and the custer mean is the smaest. This operation is performed on a users' sessions unti a of them are custered in custers. Custering a sessions is repeated seera times unti a conergence criterion is met. We assumed that conergence is achieed if the sessions stop shuffing between the custers. This criterion wors as foows: after each iteration, custers' means are recacuated. The means of iteration i are compared with the means of iteration (i -). The conergence criterion is met when a the means of iteration i are equa to their corresponding means of iteration (i -); otherwise, the custering continues for another iteration. Determining the Best Vaue of : Lie other partitioning custering agorithms, the number of custers is necessary to be specified in adance as an input for the -means custering agorithm. The best number of custers here means that partitioning of users sessions wi gie us the best groups of simiar users. Our approach is to appy the -means agorithm to the access sessions using aues arying from up to 5. For each, we cacuate custering quaity measure caed custer compactness (C mp ) and custer separation (S ep ) proposed in [6] to measure the quaity of the resuting custers. Equations and 4 gie the mathematica expressions of (C mp ) and (S ep ) respectiey. Equation 5 presents a measure that combines the two measures which is caed oera custer quaity (O cq ). Where is the number of custers generated on the data set D, ( Ci ) is the standard deiation of the custer c i, and (D) is the standard deiation of the data set D. Equation 3 presents the mathematica expression of the standard deiation for any set Q. N ( Q ) N i d i, ( mean ) Q Where d( i, (mean)q ) is the Eucidean distance between two ectors i and (mean)q, N is the number of members in Q, and (mean)q is the mean of Q. The smaer the C mp aue, the higher the aerage compactness in the output custers: S ep C mp ( ) i j j i i (, ) d ( mean) ci ( mean) cj exp where is the standard deiation of the data set D, c is the number of custers, exp() is the function that returns an exponentia aue, (mean)ci is the centroid of the custer c i, (mean)cj is the centroid of the custer c j, d() is the distance measure used by the custering agorithm, and, is the Eucidian Distance between the ( ) d ( mean ) ci ( mean ) cj ( c i ) ( D ) centroid of custer c i and the centroid of custer c j. Simiar to C mp, the smaer the S ep aue, the arger the oera dissimiarity among the output custers. (3) () (4)

4 O cq ( ) β C + ( β ) S, β (5) Where [,] mp ep β is the weight that baances the measures C mp and S ep. We used O cq (.5) to gie equa weights to the two measures. Therefore, the ower the O cq aue, the better quaity of the oera output custers. Naturay, the most satisfying quaity score indicates the best partition of access sessions, whie the corresponding suggests the best number of custers on the access sessions. 7. CLASSIFICATION Cassification is the first step in the onine component of the recommendation system. We use testing sessions seected randomy from the dataset to simuate actie user sessions. The testing sessions are diided into two parts, namey, cassification part and recommendation part. The first part is used to stimuate an actie user session and the second part is used to stimuate the future isits. The two parts are represented in the content-space. We cacuated the mean ector of eery custer and used this mean as a representatie of the custers' members. The mean ector of a custer is cacuated by counting the tota number of isits for eery topic, in the content-space, in a custer's sessions. With custer representaties, we compute the simiarity S im (s i, P ), where s i is the testing session to be cassified and P is the representatie of custer. The testing session is cassified to the custer with the highest S im. Here we use the cosine simiarity measure. Certainy, it's the we nown K Nearest Neighbors (KNN) cassification method, with K. So now eery testing session is cassified to the nearest custer based on web page s content and usage. The second part, recommendation part, represents the users' predicted future isits and it is used to eauate the recommendations of the system. 8. RECOMMENDATION The custers' means represent the patterns of their custers' members. Now, we need to choose from these patterns the recommendation set for the new actie user. In a specific custer mean, not a topics hae the same importance; some of the topics are isited more than others. We use a threshod to fiter out the east significant topics in eery custer mean. The threshod is a specific percentage of the tota number of pages isited in a the custers sessions. A % threshod means that any topic which was isited in ess than % of the tota number of custer's sessions wi be excuded from the custer's mean. To choose the best threshod aue, we tried aues from % up to 5%. 9. EXPERIMENTATION AND RESULT ANALYSIS Assessment Methodoogy: We use precision and reca to assess the prediction capabiities of our recommendation system. Our assessment strategy is based on comparing our recommendation system that coupes the usage and content to generate recommendations for an actie user to a recommendation system that uses ony usage data to generate recommendations. The comparison is carried out using the reca and precision parameters. The two systems are assessed using the same training and testing data in a case studies. out these sessions into 49,3 sessions (two thirds of data) for training and 4,566 sessions (one third of data) for testing. We too the training part starting from session number up to session number 49,3 and the testing part from session number 49,3 up to 63,697. In this paper, we are going to discuss the resuts for the first case study which consists of the first 3, sessions (from session number up to session 9,999) from the training data and the first, sessions from the testing sessions. Experiments: The number of custers () was determined experimentay, we hae tried different aues of from to 5. 5 was chosen as a maximum aue for due to the sma size of resuting custers which hods ess than % of the tota number of sessions using aues arger than 5. Figure shows the custers' quaity when the number of custers ranges from to 5 for both usage and content based recommendation and pure usage based recommendation. Reca that the measure for custer quaity used here is a minimization function. It is cear from the figure that the quaity of custers generated using usage and content data is better than the quaity of custers generated using content data ony. This impacts the quaity of the recommendations as we. Custers Quaity Choosing Best K Case Study Number of Custers Usage&Content Pure Usage Figure : Custer quaity for both usage & content and pure usage We experimented with seera aues for threshods to determine the interestingness of topics within a gien custer. These threshods range from % to 5%. n% means that a topic is considered uninteresting to a custer if ess than n% of that custer's sessions accessed a topic. The precision and reca aues are potted against seera aues of threshods as shown in figure. The aues of precision and reca are the aerage precision and reca for a testing sessions. We obsere that, with the increase of the threshod aue, the precision increases, whereas the reca decreases. This continues unti the two cures intersect at threshod6, then the cures amost sette. Figure 3 shows the precision aues for the recommender system that combines usage and content data and the recommender system that uses usage data ony. It is cear that combining usage and content data increases the precision. Figure 4 shows the reca aues for the two cases. Reca aues for the usage ony case are higher than the reca aues of usage and content case for threshod aues ess than. Howeer, this behaior is reersed for threshod aues greater than. Case Study: After a the preprocessing steps hae been performed, we hae 63,698 different sessions. We spit

5 Custers' Mean Threshod Case Study Threshod Vaue % Reca Precision REFERENCES [] M. Caypoo, A. Gohae, T. Miranda, P. Murnio, D. Netes, M. Sartin. Combining Content-Based and Coaboratie Fiters in an Onine Newspaper, Proceedings of ACM SIGIR Worshop on Recommender Systems, Aug [] H. Dai, B. and Mobasher, A road map to more effectie web personaization: Integrating domain nowedge with web usage mining. Proceedings of the Internationa Conference on Internet Computing; 3, pp ; Las Vegas, Neada. Figure : Choosing custers' mean threshod for case study.. CONCLUSION This paper has presented a noe approach for couping content and usage data in order to generate recommendations to users. The recommendations are in the form of suggesting web pages to the user to isit based on comparing that user's interests with simiar users who hae isited the website earier. The current user's interests are discoered by mining the content and usage properties of the few pages she/he has isited. The experiments that were conducted showed that couping the usage and content data when generating recommendations improes the quaity of custers and the quaity of recommended pages. The quaity of custers is computed using custer compactness and separations; both are minimizations functions. The quaity of the recommended web pages is determined using precision and reca. [3] B. D. Daison. Predicting web actions from htm content. Proceedings of the Thirteenth ACM Conference on Hypertext and Hypermedia (HT ), : pp ; Coege Par, MD. [4] L. Haibin, K. Vado: Combined mining of Web serer ogs and web contents for cassifying user naigation patterns and predicting users' future requests. Data & Knowedge Engineering, Vo. 6, No., 7, pp [5] S. Hettich, S. D. Bay. The UCI KDD Archie [ Irine, CA: Uniersity of Caifornia, Department of Information and Computer Science. [6] J. He, T. Ah-Hwee, L. T. Chew, Y. S. Sam. On quantitatie eauation of custering systems, Custering and Information Retriea, Kuwer Academic Pubishers, 3: pp [7] B. M. Kim, Q. Li, C. S. Par, S. Kim. A New Approach for Combining Content-based and Coaboratie Fiters, Journa of Inteigence Information Systems, Vo. 7, 6; pp Precision Precision Case Study Custers Mean Threshod Figure 3: Precision for case study. Reca Case Study U & C Pure [8] B. Mobasher, H. Dai, T. Luo, Y. Sun, J. Zhu, Integrating web usage and content mining for more effectie personaization. Proceedings of the First Internationa Conference on Eectronic Commerce and Web Technoogies, : pp ; Springer-Verag. [9] Q. Li, M. K. Byeong, An approach for combining contentbased and coaboratie fiters. Proceedings of the 6 th Internationa Worshop on Information Retriea with Asian Languages, 3; pp. 7-4 Sappro, Japan. [] J. Striastraa, R. Cooey, M. Deshpande, and P. N. Tan. Web usage mining: discoery and appications of usage patterns from web data. SIGKDD Exporations, Vo., ; pp Custers Mean Threshod Figure 4: Reca for case study. U & C Pure Usage

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Particle Swarm Extension to LOLIMOT

Particle Swarm Extension to LOLIMOT Partice Swarm Extension to LOLIMOT Ramin Mehran K.N.Toosi Uniersity of Technoogy RMehran@ee.kntu.ac.ir Aireza Fatehi K.N.Toosi Uniersity of Technoogy Fatehi@kntu.ac.ir Caro Lucas Uniersity of Tehran Lucas@ipm.ir

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

< >, c i < >, h( c )

< >, c i < >, h( c ) ACQ: An Automatic Custering and Querying Approach for Large Image Databases Dantong Yu and Aidong Zhang Department of Computer Science & Engineering State Uniersity of New York at Buao Buao, NY 4260 Abstract

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points. Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Minmax Regret 1-Center on a Path/Cycle/Tree

Minmax Regret 1-Center on a Path/Cycle/Tree ADVCOMP 2012 : The Sixth Internationa Conference on Adanced Engineering Computing and Appications in Sciences Minmax Regret 1-Center on a Path/Cyce/Tree Binay Bhattacharya, Tsunehiko Kameda, and Zhao Song

More information

Rough Sets Clustering and Markov model for Web Access Prediction

Rough Sets Clustering and Markov model for Web Access Prediction Proceedings of the Postgraduate Annua Research Seminar 006 470 Rough Sets Custering and Marov mode for Web Access Prediction Siriporn Chimphee 1, Naomie Saim, Mohd Saihin Bin Ngadiman, Witcha Chimphee

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Modifier-Adaptation methodology for RTO applied to Distillation Columns

Modifier-Adaptation methodology for RTO applied to Distillation Columns Preprints of the 9th Internationa Symposium on Adanced Contro of Chemica Processes The Internationa Federation of Automatic Contro MoA.5 Modifier-Adaptation methodoogy for RTO appied to Distiation Coumns

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Location Aided Hybrid Routing Algorithm for MANET

Location Aided Hybrid Routing Algorithm for MANET Internationa Journa of Engineering & Technoogy IJET-IJENS Vo: No: 0 30 Location Aided Hybrid Routing Agorithm for MANET Mamoun Hussein Mamoun Facuty of Computer and Information Sciences Mansoura University,

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Application of the pseudoinverse computation in reconstruction of blurred images

Application of the pseudoinverse computation in reconstruction of blurred images Fiomat 26:3 (22), 453 465 DOI 2298/FIL23453M Pubished by Facuty of Sciences and Mathematics, University of Niš, Serbia Avaiabe at: http://wwwpmfniacrs/fiomat Appication of the pseudoinverse computation

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines Eighth Annua ACM-SIAM Symposium on Discrete Agorithm January 997, pp. 777{786 Partia Matching of Panar Poyines Under Simiarity Transformations Scott D. Cohen Leonidas J. Guibas fscohen,guibasg@cs.stanford.edu

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

IEEE Intelligent Vehicles Symposium, Parma, Italy, June 2004 Vehicle Wheel Detector using 2D Filter Banks

IEEE Intelligent Vehicles Symposium, Parma, Italy, June 2004 Vehicle Wheel Detector using 2D Filter Banks IEEE Inteigent Vehices Symposium, Parma, Itay, June 2004 Vehice Whee Detector using 2D Fiter Banks Ofer Acher, Mohan M. Triedi Computer Vision and Robotics Research Laboratory Uniersity of Caifornia, San

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A Robust Method for Shape-based 3D Model Retrieval

A Robust Method for Shape-based 3D Model Retrieval A Robust Method for Shape-based 3D Mode Retrieva Yi Liu, Jiantao Pu, Guyu Xin, Hongbin Zha Weibin Liu 1, Yusue Uehara ationa Laboratory on Machine Perception Internet Appication Lab, Fujitsu R&D Center

More information

Distinct Sampling on Streaming Data with Near-Duplicates*

Distinct Sampling on Streaming Data with Near-Duplicates* Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Evolving Role Definitions Through Permission Invocation Patterns

Evolving Role Definitions Through Permission Invocation Patterns Evoving Roe Definitions Through Permission Invocation Patterns Wen Zhang EECS Dept. Vanderbit University Nashvie, TN, USA wen.zhang.1@vanderbit.edu David Liebovitz Dept. of Medicine Northwestern University

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India Internationa Journa of Advancements in Research & Technoogy, Voume, Issue 6, June-04 ISSN 78-7763 89 Pattern assification for andwritten Marathi haracters using Gradient Descent of Distributed error with

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Grating cell operator features for oriented texture segmentation

Grating cell operator features for oriented texture segmentation Appeared in in: Proc. of the 14th Int. Conf. on Pattern Recognition, Brisbane, Austraia, August 16-20, 1998, pp.1010-1014. Grating ce operator features for oriented texture segmentation P. Kruizinga and

More information

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication 6th Asia-Pacific Conference on Communications Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication Xu Huang Facuty of Information Sciences and Engineering

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

17.3 Surface Area of Pyramids and Cones

17.3 Surface Area of Pyramids and Cones Name Cass Date 17.3 Surface Area of Pyramids and Cones Essentia Question: How is the formua for the atera area of a reguar pyramid simiar to the formua for the atera area of a right cone? Expore G.11.C

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Versatile Size-l Object Summaries for Relational Keyword Search

Versatile Size-l Object Summaries for Relational Keyword Search IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. Y, XXXX, YYYY Versatie Size- Object Summaries for Reationa Keyword Search Georgios J. Fakas, Zhi Cai and Nikos Mamouis Abstract The Object

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Exploiting Caching and Cross-Layer Transitions for Content Delivery in Wireless Multihop Networks

Exploiting Caching and Cross-Layer Transitions for Content Delivery in Wireless Multihop Networks 2017 The 2nd Content Caching and Deiery in Wireess Networks Workshop (CCDWN) Expoiting Caching and Cross-Layer Transitions for Content Deiery in Wireess Mutihop Networks Mousie Fasi, Sabrina Müer, Hussein

More information