A new way to build Oblique Decision Trees using Linear Programming

Size: px
Start display at page:

Download "A new way to build Oblique Decision Trees using Linear Programming"

Transcription

1 A new way to build Oblique Decision Trees using Linear Programming Guy Micel, Jean Luc Lambert Bruno Cremilleux & Micel Henry-Amar GREYC, CNRS UPRESA GRECAN, CNRS UPRES 772 Eslanade de la aix - Université de Caen F Caen Cedex, France Summary : Adding linear combination slits to decision trees allows multivariate relations to be exressed more accurately and succinctly tan univariate slits alone. In order to determine an oblique yerlane wic distinguises two sets, linear rogramming is roosed to be used. Tis formulation yields a straigtforward way to treat missing values. Comutational comarison of tat linear rogramming aroac algoritm wit classical univariate slit algoritms roofs te interest of tis metod. Key words : Oblique decision tree, missing values, linear rogramming. Introduction Classification and decision trees already belong to te way of current researc and many metods still ave to be exlored [5]. Unlike classical decision trees wic roduce univariate trees, linear rogramming is roosed to be used to generate oblique decision trees. For many years, many metods ave been sown to create ODT but finding best multivariate yerlane is a NP comlete roblem. Murty, Kasif and Salzberg [6] ave roosed OC, a solution based on imurity measures and erturbation algoritm. Oter metods roosed by Mangasarian, Setiono and Wolberg [4] or Bennet [] induce ODT using linear rogramming but tese metods find te otimal linear discriminates by otimising secific goodness measures given by te autors. Instead of aving an analytic aroac, geometrical results of linear rogramming is used and no secial measures are needed. Only data set containing two classes can be treated for te moment but an original solution to solve te roblem of missing values is roosed. Tat gives te ossibility to work wit a medical data set and to comare te erformances of tis algoritm to C4.5 [7], a standard univariate decision trees builder. {gmicel,lambert,cremilleux}@info.unicaen.fr amar@baclesse.fr Trees using oblique yerlanes to artition data are called oblique decision trees and noted ODT.

2 Linear Programming : geometrical aroac Two rincial results of linear rogramming are essentially used in tis work : te Simlex Algoritm and te Duality Teorem. Linear rogramming is an algebraic tool and so te data set as to be translated into an algebraic form. Assume, for te moment, tat data set contains two classes, tat all data are numeric and tat tere is no missing value.. Global aroac Te data set can be roected in an Figure : Duality teorem Euclidean sace, noted E, of dimension n ( n is te number of caracteristics describing eac data and one data becomes one oint in E ) and eac class is reresented by a cloud of oints. Te aim of learning, in tis case, is to searate two classes ( or two clouds of oints ) : in te case of te Figure, te yerlane D divides x-class and y-class and allows to decide in wic classes belong new oints. As linear rogramming roducts linear borderline, dividing two clouds of oints or teir convex covers is equivalent. Let be C = { E,...E } and C 2 = { F,...F q } wit E i in R n for all i in [ ] Convex cover of C and C 2 is obtained by introducing convex notions ( Tey are noted Con(C ) and q Con(C 2 ) ). Te intersection of Con(C λiei F = 0 ) and i= = Con(C 2 ) is null ( and a i [.. ] λ i 0 linear borderline can be λi = wit found ) if and only if i= [.. q] 0 q System as no solution. i = In te oter case, an oter = result of te linear System : Intersection of convex covers. rogramming gives a metod for aving good results..2 Tools and metods Te Simlex Algoritm and te Duality Teorem [3] are mainly used in tese twice situations..2. A borderline exists [ ] [ ] n a R, b R : i..,.. q System 2 : System dual t a Ei t a F < b > b Firstly, studying te case in wic a borderline dividing convex covers exists ( e.g. te situation look like at te Figure ).

3 A linear borderline exists ( e.g. a vector a ) if and only if te system 2 is verified. By noticing tat te System 2 is te dual of te System and using te Duality Teorem, following result can be roved : if te System as no solution, te base of te dual is solution of te System 2. Tis base, easily extractable from te System, gives, for eac dimension, te coefficient of te vector a ( and, of course, te equation of te yerlane D )..2.2 No borderline exists But, most of te time, it not exists yerlanes dividing classes and te dual as no solution. See te Figure 2 for aving an examle of tis kind of situation. Figure 2 : Simlex Algoritm Te Simlex Algoritm return a roof of te non existence of yerlanes by giving a small set of oints belonging to te bot classes. Te Figure 2 sows easily tat : Con(C ) Con(C 2 ) and one roof can be given by te following oints : {x 2,x 3,y,y 2 } ( because [x 2,x 3 ] [y,y 2 ] ). In tis case, te idea is to take out one oint from tis set and to consider new convex covers again. Logically, after m iterations, two distinct convex covers ave to be obtained and results of.2. may be alied. Tose twice remarks allow to roose te following algoritm :.3 A trivial algoritm Let C and C 2, two sets of oint in R n. Te rocedure used to induce a slit tat divides two sets of oints can be defined : Algoritm. Te function tat cooses one oint in te intersection s set is very imortant and not easy to define. For examle, in Figure 2, it is more interesting to extract x 2 tan x 3,y or y 2. For te moment, te coice function is trivial and cooses a oint randomly. It is certainly easy to find a better solution and tis oint sould be studied in te future. 2 Missing values treatment Algoritm : Alication Build system Wile Indivisible do Find intersection Coose oint Extract oint from system end wile Extract yerlane from system In tis reresentation of data set, tere is no lace for missing value wereas it is very imortant to consider tis kind of trouble igly resent in real word data extracted.

4 2. Linear Programming interretation of missing values Algoritms usually roose [2][8] to relace missing values by values extracted from te data set ( e.g. median value of te argument ) or to ave a robabilistic aroac [7]. Te linear rogramming aroac allows us to aly an oter treatment. Instead of fixing missing values, tey are relaced by variables. Limits are given to tose variables to be sure tat tey ave logical values. Tat means an exert as to define a maximum value and a minimum value for all dimensions in wic tere exists missing values. Sometimes, tose values could be extracted from te data base by finding real maximum and minimum if tis data base is reresentative enoug. 2.2 Geometric interretation of missing values For understanding te aroac, it is interesting to ave a geometrical Figure 3 : Missing values treatment interretation of tis oeration. In fact, A data aving missing values is relaced by an yercube of dimension ( e.g. an yercube wit 2 vertices ). Studying, in R 2, te following case : A=(?,α) and B=(β,?) and ave a look to te Figure 3. Constraints given by te linear rogramming aroac are stronger tan tose given by te classical aroaces and te coice for finding yerlanes is more limited. It is even ossible to ave situations in wic tere exists yerlanes in te first case wereas te intersection between te two yercubes is not emty ( it can not exist yerlane in tis condition ). Tat roves tose aroaces are not equivalent. Te algoritm given in.3 finds an elegant solution for tis trouble because bad oints are eliminated. 2.3 Generalisation Te algebraic form is generalised for C and C 2, two sets of R n. Let be Ω=(Ω,,Ω n ) and Θ=(Θ,,Θ n ), two sets of n sets. For all i in [..n], let Ω i ( res. Θ i ) te set of indices of variables of C ( res. C 2 ) for wic te i t comonent is unknown. For examle, r is in Ω i if and only if x r is in C and x i is a missing value. Let, for all i in [..n], m i and M i as te limits for te i t comonent of te data base ( read in te data base or given by an exert of te domain ). Te system obtained ( System 3 ) is linear and linear rogramming algoritms may be alied to resolve it.

5 [.. n] i=, i Ω i i, System 3 : Generalised system λ E i k + [.. n] [.. ] λ 0 ; [.. q] [.. n] m λr X r Ω X M λr i 0 m s Ys, k s Θ k Ys, k M s q λ = ; = i= rω i X = k=, k Θ k k, F rθ K Y k = 0 Notice tat if all comonents are not numeric, it is always ossible to transform tem. For examle, [Small,Medium,Big] becomes [,2,3] and [Yellow,Blue,Red] is relaced wit tree binary comonents : [0,] for Yellow, [0,] for Blue and [0,] for Red. Tis treatment is imortant and, at a roug estimate, can reresent a negative oint of tis metod because it could not be done automatically by algoritms and knowledge of exerts is needed. But, wit te view to ave a semantic interretation of attributes, only uman users can be efficient. 3 Comutational results Before giving results of exeriments tat comare te erformances of tose algoritm to C4.5, te data set used as to be described. 3. Te Hodgkin s disease In tis ae reorted results are issued from a data set collected by te Lymoma Cooerative Grou of te Euroean Organisation for Researc and Treatment of Cancer ( EORTC ) and rovided by Dr. M. Henry-Amar. Te data set describes more tan 3000 atients treated wit various rotocols. After treatment 2, te data set currently as 824 entries for te learning data and 70 entries for te test data 3. Te atients, groued as Favourable ( 369 cases ) nor Unfavourable ( 455 cases ), are described troug 6 continuous attributes and tree binaries attributes. Te learning data set contains 330 missing values concentrated on five attributes. 3.2 Comments about results form In tis exerience, extrema were extracted from te data base as described in 2. and were suervised by Dr. M. Henry-Amar. Hyerlanes are given 2 Different rotocols roducts different descritors for atients and coices ave to be done. 3 Tose data sets are fixed like tat for temoral reasons.

6 under te form exlain in Table : for eac attribute of te data base, te value obtained in te dual is te coefficient of te vector a described in.2.. Table : Results form Coef. for age : Coef. for sexe : Coef. for cbdfus : Coef. for cbgfus : Coef. for axdfus : Coef. for axgfus : Coef. for medfus : Coef. for ext : Coef. for sg : Coef. for vs : Coef. for b : Coef. for gb : e-05 Coef. for olfus : 0 Coef. for lymfus : 0 Coef. for monfus : 0 Coef. for laq : 0 Coef. for a : Coef. for ld : e-06 Coef. for istforus : Coef. for lambda_dua : Coef. for mu_dua : In te case of te Table, te vector a is : ( , ,, e - 06, ) a = and let be b = 2 ( ) A oint x belongs to Favourable if ax > b; oterwise, it belongs to Unfavourable. Results are given under a form tat allowed a semantic interretation. For examle, te attribute olfus is unneeded to classify because its coefficient is null and te imortant value of te age s coefficient means tat te youngest are more concerned by te disease tan te oldest. Tose information are well known from medical exerts but oters yoteses are confirmed by tis way. 3.3 Results of te linear rogramming classifier For aving results, ust tree oblique yerlanes are extracted ( Tat means tat te work sace is Learning Class Class 2 Total devised in four regions wit Linear Prog. 88.% 89.2% 88.7% tree linear borderline ) C4.5 ( Rules ) 90.8% 99.3% 94.3% wereas C4.5 use more tan 20 rules. Te results obtained are under tose obtained by C4.5 but tey are very interesting. Wit few yerlanes ( Tree ), results obtained on te test data base rove tat te metod described bellow is valid even on a real world Test Class Class 2 Total Linear Prog. 85.3% 8% 82.8% C4.5 ( Rules ) 87.4% 9.% 89.6% extracted data base ( C4.5 results sow te nontrivial artition of te Hodgkin s disease data base ). Notice tat seed of linear rogramming algoritm, articularly adated for tis kind of situation, allows to obtain results very easily on common comuter.

7 4 Conclusions Tis aer as described a linear rogramming metod to construct linear borderline seedily and easily. A new way to exloit linear rogramming in classification as been resented and an original treatment of missing values as been introduced. Te imlementation roosed was tested on a consistent data set extracted from te medical domain and interesting results were obtained : good yerlanes tat generalise very well were got. But better results may be obtained by trying tose following ideas : build a comlete decision trees wit linear borderline, define a clever coice function (.3 ), introduce te extracted elements in an oter orde generate comlete decision trees, use some runing metods, test te algoritm wit cross validation and oter data sets, generalise to multi classes decision trees. Tese extensions are currently exlored. References []. Bennet ( 992 ). Decision tree construction via linear rogramming, Comuter Sciences Tecnical reort 067. [2]. Celeux ( 988 ). Le traitement des valeurs manquantes dans le logiciel SICLA. [3]. Cvátal ( 993 ). Linear Programming, W.H. Freman and Comagny. [4]. Mangasarian, Setiono & Wolberg ( 990 ). Pattern recognition via linear rogramming : Teory and alication to medical diagnosis, in : S.I.A.M. Workso on otimisation. [5]. Micie, Siegelalter & Taylor ( 994 ). Macine learning, neural and statistical classification. Ellis Herwood Series in Artificial Intelligence. [6]. Murty, Kasif & Salzberg ( 994 ). A system for induction of oblique decision trees in : Journal of Artificial Intelligence Researc 2, -32. [7]. Quinlan ( 993 ). C4.5 : Programs for macine learning. Morgan Kaufmann. [8]. Quinlan ( 989 ). Unknown attribute values in induction in Segre. Proceedings of te sixt International Workso on Macine Learning,

A Parallel Processing Engine for Motion Estimation in MPEG-4 Multimedia Applications

A Parallel Processing Engine for Motion Estimation in MPEG-4 Multimedia Applications A Parallel Processing Engine for Motion Estimation in MG-4 Multimedia Alications RUI GAO, DOGLAI XU and JOH P. BETLEY Scool of Science and Tecnology Uniersity of Teesside Boroug Road, Middlesbroug, TS1

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Computer Vision and Image Understanding

Computer Vision and Image Understanding Comuter Vision and Image Understanding 113 (009) 73 90 Contents lists available at ScienceDirect Comuter Vision and Image Understanding journal omeage: wwwelseviercom/locate/cviu A motion observable reresentation

More information

2.5 Evaluating Limits Algebraically

2.5 Evaluating Limits Algebraically SECTION.5 Evaluating Limits Algebraically 3.5 Evaluating Limits Algebraically Preinary Questions. Wic of te following is indeterminate at x? x C x ; x x C ; x x C 3 ; x C x C 3 At x, x isofteform 0 xc3

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Support Vector Machines for Face Authentication

Support Vector Machines for Face Authentication Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas 1 2 1 CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

NAG Fortran Library Routine Document D05BYF.1

NAG Fortran Library Routine Document D05BYF.1 NAG Fortran Library Routine Document Note: before using tis routine, lease read te Users Note for your imlementation to ceck te interretation of bold italicised terms and oter imlementation-deendent details.

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

CONGESTION CONTROL OF TCP-WESTWOOD USING AQM-PI CONTROLLER

CONGESTION CONTROL OF TCP-WESTWOOD USING AQM-PI CONTROLLER International Journal of Comuter Networks & Communications (IJCNC) Vol.3, No., Marc CONGESTION CONTOL OF TCP-WESTWOOD USING AQM-PI CONTOLLE Amirossein Abolmasoumi, Sale Sayyad Delsad and Moammadtagi Hamidi

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Implementation of Integral based Digital Curvature Estimators in DGtal

Implementation of Integral based Digital Curvature Estimators in DGtal Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE SEMI-AUOMAIC ROAD EXRACION FROM HIGH-RESOLUION SAELLIE IMAGE Commission III KEY WORDS: Road Extraction, High-Resolution Satellite Image, Urban area, Semi-automatic ABSRAC: In this research, a method is

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

Computers & Fluids 80 (2013) Contents lists available at SciVerse ScienceDirect. Computers & Fluids

Computers & Fluids 80 (2013) Contents lists available at SciVerse ScienceDirect. Computers & Fluids Comuters & Fluids 80 (2013) 423 428 Contents lists available at SciVerse ScienceDirect Comuters & Fluids ournal omeage: www.elsevier.com/locate/comfluid Parallel comutations on GPU in 3D using te vortex

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Development of a Modelica Base Library for Modeling of Thermo-Hydraulic Systems

Development of a Modelica Base Library for Modeling of Thermo-Hydraulic Systems Develoment of a Modelica Base Library for Modeling of Termo-Hydraulic Systems Tummesceit, Hubertus; Eborn, Jonas; Wagner, Falko Publised in: Modelica Workso 2000 Proceedings 2000 Link to ublication Citation

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

An Incremental Design of Compact Radial Basis Function Networks

An Incremental Design of Compact Radial Basis Function Networks An Incremental Design of Comact Radial Basis Function Networks Hao Yu, Pili D. Reiner, Tiantian Xie, Tomasz Bartczak, and Bogdan Wilamowski, Fellow, IEEE Abstract Tis aer rooses an offline algoritm for

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information