A Method for Privacy Preserving Mining of Association Rules based. on Web Usage Mining
|
|
- Gwendolyn Holmes
- 6 years ago
- Views:
Transcription
1 200 Intenatonal onfeence on Web Infomaton Systems and Mnng A Method fo Pvacy Pesevng Mnng of Assocaton Rules based on Web Usage Mnng Wang Yan Le Jajn Huang Dongme Gloous Sun School of Busness and Management DonghuaUnvesty Shangha,hna yanwang@mal.dhu.edu.cn School of ompute Scence and Technology DonghuaUnvesty Shangha,hna lejajn@dhu.edu.cn ollege of Infomaton Technology Shangha Ocean Unvesty Shangha,hna dmhuang@shou.edu.cn Abstact:Data mnng basng on Pvacy pesevaton has become a eseach hot pont now. Web usage mnng s one nd of data mnng applcatons, and how to pevent data leaness n web usage mnng s also an mpotant ssue. In ths pape, we pesent an effectve method fo pvacy pesevng assocaton ule mnng n the web usage mnng, Seconday Random Response olumn Replacement (SRRR) to mpove the pvacy pesevaton and mnng accuacy. Then, a pvacy pesevng assocaton ule mnng algothm based on SRRR s pesented, whch can acheve sgnfcant mpovements n tems of pvacy and effcency. Fnally, we pesent expemental esults that valdate the algothms by applyng t on eal datasets. Keywods: web usage mnng; pvacy pesevaton; andomzed esponse; assocaton ules I. INTRODUTION Wth the contnuous development of data mnng technology, ts applance s moe and moe wdely. Web data mnng s an applcaton hot pont of data mnng n ecent yeas. The fast development of web maes tself to be the wold's lagest publc data souce, Web data mnng s based on publc data souces, but thee ae also pvacy leaness poblem. Fo example, on e-commece ste, all ecods of customes vsted the webste ae stoed n Web seve log wthout esevaton. These ecods eflect the consumes buyng habts and puchasng powes,but the customes do not want these data to be dsclosed, so pvacy potecton should also be consdeed n the web data mnng. Pvacy pesevng assocaton ule mnng s to dscove the fequent temsets as accuately as possble and geneate the mnmum suppot and confdence by accessng the ognal tansacton sets of condtons. Thee s a contadcton between data pvacy and data accuacy. At pesent, the pvacy potecton of data mnng methods can be dvded nto data petubaton [-] and quey estcton [-5]. In 2002, S. J. Rzv and J. R. Hatsa pesented a epesentatve assocaton ules mnng method, MASK (Mnng Assocatons wth Sececy Konstants) [] that s a data petubaton stateges. Because Wane model n statstcs s used n MASK, all the data tansfomed have the dectly elatons wth the eal aw data, whch maes the pesevng less than satsfactoy, and the selecton of andomzed paametes should devate fom 0.5 [6] s anothe lmtaton. In ths pape, we gve the geneal famewo fo mnng assocaton ules n the web usage mnng and use a use-oented and tme-oented sesson exploe method to geneate sequence sets fstly. Then we popose a method to tansfom use sesson nfomaton nto a elatonal data table, and petub data by usng Seconday Random Response olumn Replacement (SRRR) algothm. Based on the pseudoandom data set, fequent temsets and stong assocaton ules dscovey algothm ae pesented. II. THE GENERAL FRAMEWORK As e-commece, Web sevces and Web-based nfomaton system s sustanable development and gowth, thee ae a lage numbe of use data collected n web oganzatons. The pncpal data souces n web usage mnng ae web seve log fles, and othe Data souces ncludng the web ste fles and metadata, opeatonal databases, applcaton templates and doman nowledge. In ode to solve pvacy pesevaton ssues of web usage mnng, we poposed Seconday Random Response olumn Replacement (SRRR) algothm, and a pvacy potecton assocaton ule mnng methods based on t. The oveall stuctue and famewo shown as follow Fg..The famewos wee dvded nto 2 stages: data pepocessng stage and pvacy pesevng &mnng stage. The data pepocessng stage pepocessng the data by fve steps and geneate the sesson tanslate table. The pvacy pesevng stage s the ey stage ncludng the pvacy pesevaton methods and assocaton ule applcaton /0 $ IEEE DOI 0.09/WISM
2 Fg. Web usage mnng famewo III. PRIVAY PRESERVATION IN WEB APPLIATIONS MINING A. Data Pepaaton Each clc acton of web use n e-commece stes s ecoded n the web log, so the ognal web log ecods contan a lot of bowsng nfomaton. Befoe web data mnng, data should be pepocessed [8], whee the pocess ncludes flteng, despdeng, use dentfcaton, sessonzaton and path completon. B. Tme-oented use sesson explong method Afte data pepocessng, we can mne and extact elevant data n web seve logs. Fo the puposes of analyss, these data need to be conveted and aggegated n the dffeent levels. In web usage mnng, the page s the basc level of data extacton and the sesson s the basc acton n the data extacton fo uses. TABLE ORIGINAL SESSION SAMPLE ID IP URL Tme Page 0: Page2 0: Page 0: Page 0: Page 0: Page 0: Page5 0: Page2 0: Page5 0: Page2 0: Page 0: Page 0: Page 0: Page5 0:25 Table shows a sample of use s ognal sesson. In the table each ow epesents a use sesson dentfed by usng unquely ID, and IP epesents the use's IP addess, whee dffeent addesses fo dffeent uses. URL means the page accessed by uses n the sesson. The deal method of use path estong can econstuct the eal pocess of use sesson. Hee we use tme-oented use sessons exploe method. Let the vecto M{M,M 2,,M,, M N }epesent the log data set, whee M {IP, URL, Date, Tme, Method, ode, Bytes }, and N s the numbe of log fles. Web logs contan the IP addesses, vsted URLs, date and tme ecods, access methods (GET o POST), access stuctue and the sze of access nfomaton. the vecto S{S,S 2,,S,,S K } epesents the sesson data set, whee s the numbe of sessons, and S {IP,Page,t },ths stuctue contans the IP addess, vsted page and the tmestamp n each sesson. Page {Page,Page 2,,Page,,Page L}, L s the numbe of pages fo the sesson. The algothm s descbed below: Fo each M of M If Method s GET and Ul s WEBPAGE If S S and IP IP Set t 0 // set the fst tme stamp of equest n the sesson If( t t 0 <20mn) // set the lmtaton of access tme s 20 mnutes S (IP,PAGE S U PAGE S,t ) Delete S fom S Add S nto S Endf Add S nto S Endf Endf Endfo Table2 s the sesson sets geneated by the path explong algothm. TABLE2 SESSION SETS GENERATED BY PATH EXPLORING ALGORITHM SID IP Page Tme Page,page2,page 0: Page, page,page,page5 0: Page2,page5 0: Page2,page 0: Page,page,page5 0:25. Tansfomng use sessons set nto twodmensonal elaton table Fo the use sesson set n Table 2, we can use elatons table S_table to stoe the use sesson path, the table stuctue s (TID, IPID, SESSIONID, P ),
3 whee we stoe the IP addess, sesson ID, and the vsts of each page n a two-dmensonal table. The value of P column means whethe the use vsts the page and buys the poducts o not.n the column means an access to the page and 0 means no access to the page. The algothm 2 s descbed below; t tansfes the use actvty ecods nto the elaton twodmensonal table that can be handled easy. Algothm 2 Input: use sesson set S Output: two-dmensonal use sesson table S_table eate table S_table(TID,IP,SESSIONID,P ) Fo each S of S Inset nto S_table(IPID,SID) values (IP,SID ) If P of S Inset nto S_table(P )Values( ); Inset nto S_table(P )Values( 0 ); Endfo Each sesson wll be seen as a tansacton, the custome's sesson sequence can be conveted to elatonal tables whee the page numbes epesent the coespondng puchase acton. We added a new feld TID n the table, whch s the dentty column and can be assgned values automatcally by the system. Table 2D table savng the use sesson path TID IPID SID P P2 P P P D. Pvacy Potecton Algothm In the two-dmensonal table the columns whch need to pvacy potected ae P, P2 and P, P and P5, those columns ae nown as senstve attbutes n the pvacy potecton technology [7].The attbute values tself ae not to dsclose pvacy, but the attbute goup wll lea customes pvacy nfomaton. Theefoe we potect the senstve attbutes by usng the mpoved andomzed esponse method. In ode to mpove the effcency of data pesevaton, we andomze the value twce at a cetan pobablty, and ths algothm s named the seconday andom esponse column eplacement algothm (SRRR). Specfc methods ae as follows: Set andom paamete I, 0 p, p2, p, p,and p + p2 + p + p, Set andom paamete II, eate andomzaton functon R (x), the ognal column (, j) s tansfomed to hdng column F (, j), whee F(,j) {0,},(,j) {0,}. Fo x F(,j) {0,}, andom functon conventon s as follows: TABLE ONVENTION OF RANDOM FUNTION p p 2 p P x x 0 y 2 y x 0 null Let s an tem, whee π s the suppot of n, π null s the suppot of null n, λ s the suppot of n F. The tansacton T of s conveted by SRRR pocess to the tansacton T of F, and then thee s: λ π p * () null π λ ( p + ) + + (2) * p * p p * By the () and (2): π - p - π null p + π null π - p - κ φ p + γ φ () Hee κ s the top coeffcent, γ s the bottom coeffcent,and φ π null s the suppot of null value.we can see that the beneft of the algothm s the ntoducton of the adjustable factos to calculate of the suppot. In t the actual petubaton pocess, we can use a null value to futhe enhance pvacy pesevaton. TABLE 5 PROBABILITIES OF DATA MAPPING BY SRRR METHOD Assumng that suppot theshold s 0. n the M, and choosng p 0.2,p 2 0.2,p 0.,p 0.5, whle select 0., 2 0.2, 0.2, 0., accodng to SRRR algothm custome sesson set s conveted as table6:,,,,and + + +,
4 TABLE6 FAKE OLUMN DATA SET GENERATION AND FINAL FAKE OLUMN DATA SET Afte conveson algothm SRRR, fae sets nclude not only the value of 0 and, also null value. The meanng of Null can be defned by the use. Mnng assocaton ules can tae nto account the column of null value and the suppot of temset n fae set afte conveted fom SRRR algothm can matches the suppot of j n the ognal tansacton set. IV. PRIVAY PRESERVING ASSOIATION RULE MINING ALGORITHM Apo algothm s an nfluental algothm fo mnng fequent temsets and Boolean assocaton ules. Based on the Apo Algothm [9], we pesented an mpoved algothm to acheve assocaton ule mnng fo fae tansacton sets conveted by SRRR. Gven the mnsup and data set, man mplementaton actons of the algothm ae descbed as follows: Algothm. Pogessve scan assocaton ule mnng algothm.. Settng fequent temsets ϕ, and ϕ s collecton of temset M n whose tem numbe s n,whee n,and s the maxmum numbe tansactons. 2. Seachng the lagest temset pogessvely. Algothms scan the data ow by ow, and matchng each lne wth all tems set, f the ow matches wth some temsets, then plus fo each locaton of sequenceϕ.. Usng Apo punng pncple n the pocess of match the temset n the ow data. Algothm fst match -temset, then 2- temset, -temset.to educes the compute load.. culaton n tun,when the ato of the numbe n - temset of the seached ows to the numbes of all ows has eached the mnmum suppot of - temset, stop ths -temset match pocess.if the ato o f the numbe n n - temset of the seached ows to the numbes of all ows m has not eached the mnmum suppot of - temset, only eached the numbe of x, when n/m> mnsup, algothm calculate ((n-m)+x)/m, f > mnsup, contnues cculatng, stop ths temset seach. 5. Gettng all the fequent temsets whch satsfy the mnsup. Pocessng of Algothm s descbed below : Input: temset D afte conveson algothm SRRR, mnmum suppot theshold s. Output: fequent temset F of eal dataset D. Setϕ, ϕ {M,M 2,,M n } {(L ),(L 2 ),..(L ), (L,L 2 ),.. (L...L )} s the full temset fo (n; >0;--),and n set A ndex() // set the seachng matx matchngϕ () fo each tansacton t D // scan each ow R *A f R 0, then // ext matched ow f n //countng evey tem calculate template (c.count c.count 0 +, c.count c.count +. c.count n c.count n +) select_add( c.count) // functon select_add endf endf endfo F { c c. count / n mnsup} endfo etun F U F Functon select_add s to count each temset afte punng (), that s c.count c.count 0 +, c.count c.count +. c.count n c.count n +. In the countng pocess, algothm pune the fequent temsets geneated (Punng methods s n Apo pncple, no explanaton). Afte obtaned fequent temsets, based on the suppot and confdence fomula below, data povdes can fnd the assocaton ules of web log tem. Suppot (A B) Suppot_count (AUB) / all_count V. PERFORMANE ANALYSIS A. Algothm omplexty Analyss Theoetcally, Apo algothm s an exponental algothm. let N be the sze of tansacton, each tansacton ncludes n tems aveagely, and then the whole temset space wll each ο ( 2 n ).The mnng algothm we have mpoved, when <-2 * (-mnsup), the temset coesponds wth the poston of the value n sequence ϕ does not match the mnmum suppot, the last calculatons fo ths temset wll be gven up. If we do not consde ths nd of ow optmzaton, tme complexty of the algothm s 6
5 n/2 ο (N* n )ο (N*2n/2). If the pobablty pe-judgment mentoned above s taen nto account dung the ow judge, the complexty wll decease contnually. B. Expemental esults We obtaned the web seve log fles n some 2 webste n 0 days and conveted tansacton sets T by the algothm and 2. The tansact numbe s 000, the tem numbe s, and the ATL (the aveage tansacton length) s 2.8. We analyzed the pvacy potecton wth mnmum suppot of %, and the followng table shows the pvacy potecton ntensty of the mnmum suppot of % wth dffeent values of andomzed algothm paametes fo dffeent. TABLE 7 INTENSITY OF PRIVAY PROTETION The Fg.2 shows the aveage temset eo of SRRR method and MASK method, and states the elatonshps between the andom paamete, the data pvacy ntensty and the accuacy of mnng esults. Fg. 2 Aveage temsets eo of SRRR method and MASK method As can be seen, MASK method has wde eo by compason. When the P s close to 0 o, the mnng esults s moe accuate, but the ntensty of pvacy potecton s poo. When the value of P gadually appoaches 0.5, pvacy potecton ntensty has been mpoved, but the accuacy of mnng esults wll be sgnfcantly deceased. Eo changes of the method SRRR poposed n ths pape s elatvely stable, accodng to the P value, that s, when the popoton of eal data vay fom 0 to, the pvacy damage coeffcent wll nceased fom 0 to smultaneously, so t lead to the decease of the ntensty of pvacy potecton, and contnuously mpove the accuacy of mnng esults. VI. ONLUSIONS Pvacy pesevng n web data mnng has asen woldwde concens wth the pomoton of netwo technology and the demand of applcaton. But thee ae many dawbacs and open questons. In ths pape, we have pesented a method fo pvacy pesevng mnng of assocaton ules based on web usage mnng. Fst, we gave the geneal famewo fo mnng assocaton ules n the web usage mnng, geneated sesson sets by explong use sessons and tansfe sesson sets to elaton two-dmenson table. Second, we poposed seconday andom esponse column eplacement (SRRR), a smple and effectve pvacy pesevng algothm, and acheve pvacy potecton assocaton ule mnng based on SRRR. Fnally, we pesented expemental esults that valdated the algothm (SRRR) n pactce by smulaton. In the futue, we wll enhance the effcency of mnng algothm futhe by paallelzaton and othe methods, and combne SRRR wth othe pvacy pesevng ways to acheve moe sgnfcant mpovements n tems of pvacy, accuacy, effcency, and applcablty. AKNOWLEDGMENT The study s funded by ey poject of Shangha Scentfc ommttee, subject numbe: 08dz REFERENES [] Rzv SJ, Hatsa JR. Mantanng data pvacy n assocaton ule mnng. In: Bensten PA, Ioannds YE, Ramashnan R,Papadas D, eds. Poc. of the 28th Int l onf. on Vey Lage Data Bases. Hong Kong: Mogan Kaufmann Publshes, 2002, pp [2] Agawal S, Kshnan V, Hatsa JR. On addessng effcency concens n pvacy-pesevng mnng. In: Lee YJ, L JZ, Whang KY,Lee D, eds. Poc. of the 9th Int l onf. on Database Systems fo Advanced Applcatons. LNS 297, Jeju Island: Spnge-Velag,200, pp.- 2. [] Evfmevs A. Randomzaton n pvacy pesevng data mnng. SIGKDD Exploatons, 2002,(2), pp. -8. [] Saygn Y, Veyos VS, lfton. Usng unnowns to pevent dscovey of assocaton ules. AM SIGMOD Recod, 200,0(),pp [5] Olvea SRM, Zaane OR. Pvacy pesevng fequent temset mnng. In: lfton, Estvllasto V, eds. Poc. of the IEEE Int lonf. on Data Mnng Woshop on Pvacy, Secuty and Data Mnng. Maebash: IEEE ompute Socety, 2002, pp. -5. [6] Zhao JK. Theoy and Methods of Samplng Desgn n Statstcal Suvey. Bejng: hna Statstcs Pess, 2002 (n hnese). [7] Sweeney L Achevng -anonymty pvacy potecton usng genealzaton and suppesson[j]. Intenatonal Jounal off Uncetanty.Fuzzness and Knowldege-Based Systems (5), pp. 57l-588 [8] Godon S. Lnoff Mchael J.A.Bey Mnng the Web: Tansfomng ustome Data nto ustome Value[J]. Publshng House of Electoncs Industy. 200, pp. 2-7 [9] R.Agawal and R.Sant. Fast Algothms fo Mnng Assocaton Rules. In Poc.of the 20th Intl.onf.on Vey Lage Data Bases(VLDB 9),99, pp
Effectiveness evaluation of electronic warfare command and control system based on grey AHP method
Avalable onlne www.jocp.com Jounal of hemcal and Phamaceutcal Reseach, 014, 6(7):535-54 Reseach Atcle ISSN : 0975-7384 ODEN(USA) : JPR5 Effectveness evaluaton of electonc wafae command and contol system
More informationA SAS Macro for Finding Optimal k-means Clustering in One Dimension with Size Constraints
Pape SD-02 A SAS Maco fo Fndng Optmal k-means Clusteng n One Dmenson wth Sze Constants Fengao Hu, Geoga Regents Unvesty; Robet E. Johnson, Vandeblt Unvesty ABSTRACT Wang and Song (2011) poposed a k-means
More informationarxiv: v1 [math.co] 21 Jan 2016
PROOF OF BIJECTION FOR COMBINATORIAL NUMBER SYSTEM axv:60.05794v [math.co] Jan 06 ABU BAKAR SIDDIQUE, SAADIA FARID, AND MUHAMMAD TAHIR Abstact. Combnatoal numbe system epesents a non-negatve natual numbes
More informationPerformance Evaluation of Neighborhood Signature Techniques for Peer-to-Peer Search
Pefomance Evaluaton of Neghbohood gnatue Technques fo Pee-to-Pee each e L Wang-Chen Lee * Anand vasubamanam Depatment of Compute cence and Engneeng Pennsylvana tate Unvesty Unvesty Pak, PA 16802, UA E-al:
More informationConstructing Service Semantic Link Network Based on the Probabilistic Graphical Model
Intenatonal Jounal of omputatonal Intellgence ystems, Vol. 5, No. 6 (Novembe, 2012), 1040-1051 onstuctng evce emantc Lnk Netwok Based on the Pobablstc Gaphcal odel ANPING ZHAO * ollege of ompute and Infomaton
More informationRisk assessment research for power transformer based on fuzzy synthetic evaluation
Avalable onlne www.jocp.com Jounal of Chemcal and Phamaceutcal Reseach, 23, 5(2):62-68 Reseach Atcle ISSN : 975-7384 CODEN(USA) : JCPRC5 Rsk assessment eseach fo powe tansfome based on fuzzy synthetc evaluaton
More informationA Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components
A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,
More informationHadoop based Feature Selection and Decision Making Models on Big Data
Indan Jounal of Scence and Technology, Vol 9(0), DOI: 0.7485/jst/206/v90/88905, Mach 206 ISSN (Pnt) : 0974-6846 ISSN (Onlne) : 0974-5645 Hadoop based Featue Selecton and Decson Makng Models on Bg Data
More informationAn Object Based Auto Annotation Image Retrieval System
Poceedngs of the 5th WSEAS Intenatonal Confeence on Telecommuncatons and Infomatcs, Istanbul, Tukey, May 27-29, 2006 (pp509-54) An Obect Based Auto Annotaton Image Reteval System Pe-Cheng Cheng, Been-Chan
More informationPlanar Curve Representation and Matching
Plana Cuve Repesentaton and Matchng Mahe Al-Khayat and Fahad Kamanga Compute Scence and Engneeng Depatment Unvesty of Texas at Alngton Alngton, Texas 7609, USA [al-khay kamanga]@cse.uta.edu Abstact In
More informationJournal of Engineering Science and Technology Review 7 (1) (2014) Research of Anti-Noise Image Salient Region Extraction Method
Jest Jounal of Engneeng Scence and echnology Revew 7 () (04) 43 47 JOURNAL OF Engneeng Scence and echnology Revew www.jest.og Reseach of Ant-Nose Image Salent Regon Extacton Method Bng XU,*, Shy XIE and
More informationFUNDAMENTALS OF RADIOMETRY
1 FUNDAMENTALS OF RADIOMETRY Lectue 5 Radomety 2 Quanttatve measuement of the popetes of EM adaton nteacton wth matte o emsson fom t Radomety deals wth total EM adaton We extend the concept of adans n
More informationRecognition of Shapes for Object Retrieval in Image Databases by Discrete Curve Evolution and Two Consecutive Primitive Edges
Poceedngs of the Intenatonal MultConfeence of Engnees and Compute Scentsts 009 Vol I IMECS 009 Mach 8-0 009 Hong Kong Recognton of Shapes fo Object Reteval n Image Databases by Dscete Cuve Evoluton and
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We ae IntechOpen, the wold s leadng publshe of Open Access books Bult by scentsts, fo scentsts 3,900 116,000 10 Open access books avalable Intenatonal authos and edtos Downloads Ou authos ae among the
More informationSoochow University: Description and Analysis of the Chinese Word Sense Induction System for CLP2010
Soochow Unvesty: Descpton and Analyss of the Chnese Wod Sense Inducton System fo CLP2010 Hua Xu Bng Lu Longhua Qan Guodong Zhou Natual Language Pocessng Lab School of Compute Scence and Technology Soochow
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationEnhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matching
Enhance the Algnment Accuacy of Actve Shape Models Usng Elastc Gaph Matchng Sanqang Zhao 1,, Wen Gao, Shguang Shan, Baoca Yn 1 1) Multmeda and Intellgent Softwae Technology Lab, Beng Unvesty of Technology,
More informationImproved Methods on PCA Based Human Face Recognition for Distorted Images
Poceedngs of the Intenatonal MultConfeence of Engnees and Compute Scentsts 016 Vol I,, Mach 16-18, 016, Hong Kong Impoved Methods on PCA Based Human Face Recognton fo Dstoted Images Buce Poon, M. Ashaful
More informationAn Optimization Procedure In A Production Line Of Sokat Soap Industry, Ikotun, Lagos State. Adamawa State, Nigeria.
An Optmzaton Pocedue In A Poducton Lne Of Sokat Soap Industy, Ikotun, Lagos State. 1 O.S. Balogun, 2 A.A. Olatun and 3 A.A. Momoh 1 Depatment of Statstcs and Opeatons Reseach, Modbbo Adama Unvesty of Technology,
More informationVol. 4, No. 6 June 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Vol 4, No 6 June 03 ISSN 079-8407 Jounal Emegng Tends n Computng and Infomaton Scences 009-03 CIS Jounal All ghts eseved http://wwwcsjounalog Optmal Powe Dstbuton System Placement to Install the RTU wth
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationA Bayesian Approach toward Active Learning for Collaborative Filtering
A Bayesan Appoach towad Actve Leanng fo Collaboatve Flteng Rong Jn Depatment of Compute Scence and Engneeng Mchgan State Unvesty ong@cse.cmu.edu Abstact Collaboatve flteng s a useful technque fo eplotng
More informationRecognizing Facial Expressions Based on Gabor Filter Selection
Recognzng Facal Expessons Based on Gabo Flte Selecton Zang Zhang, Xaomn Mu, Le Gao School of Infomaton Engneeng Zhengzhou Unvest Zhengzhou, Chna Abstact Recognton of human emotonal state s an mpotant component
More informationVolumetric Textures. Esteban W. Gonzalez Clua 1 Marcelo Dreux 2
Volumetc Textues Esteban W. Gonzalez Clua 1 Macelo Deux 2 1 PUC-Ro - Depatment of Compute Scence Rua Maquês de São Vcente, 255, 22443-900, Ro de Janeo, RJ, Bazl esteban @nf.puc-o.b 2 PUC-RIO Mechancal
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationFuzzy Membership Function Based on Structural Information of Data Fang-Zhi ZHU a, Hui-Ru WANG b, Zhi-Jian ZHOU c,*
06 Intenatona Confeence on Sevce Scence, Technoogy and Engneeng (SSTE 06 ISBN: 978--60595-35-9 Fuzzy Membeshp Functon Based on Stuctua Infomaton of Data Fang-Zh ZHU a, Hu-Ru WANG b, Zh-Jan ZHOU c,* Coege
More informationSupervised and Unsupervised Text Classification via Generic Summarization
Intenatonal Jounal of Compute Infomaton Systems and Industal Management Applcatons. ISSN 50-7988 Volume 5 (03) pp. 509-55 MIR Labs, www.mlabs.net/jcsm/ndex.html Supevsed and Unsupevsed Text Classfcaton
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationEfficient End-to-End Communication Services for Mixed Criticality Avionics Systems
214 IEEE 22nd Intenatonal Symposum of Qualty of Sevce (IWQoS) Effcent End-to-End Communcaton Sevces fo Mxed Ctcalty Avoncs Systems Yng Fang Yu Hua Xue Lu McGll Unvesty Huazhong Unv. of Sc. and Tech. McGll
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationOne-Dimensional Linear Local Prototypes for Effective Selection of Neuro-Fuzzy Sugeno Model Initial Structure
One-Dmensonal Lnea Local Pototypes fo Effectve Selecton of euo-fuzzy Sugeno Model Intal Stuctue Jace Kabzńs Insttute of Automatc Contol, Techncal Unvesty of Lodz, Stefanowsego 8/22, 90 924 Lodz, Poland,
More informationAn Energy-Aware QoS Routing Protocol for Wireless Sensor Networks
An Enegy-Awae QoS Routng Potocol fo Weless Senso Netwoks Kemal Akkaya and Mohamed Youns Depatment of Compute Scence and Electcal Engneeng Unvesty of Mayland, Baltmoe County Baltmoe, MD 225 kemal youns@cs.umbc.edu
More informationOutlier Detection in 3D Coordinate Transformation with Fuzzy Logic
Acta Montanstca Slovaca Ročník 7 (22), číslo, -8 Outle Detecton n 3D Coodnate ansfomaton wth Fuzzy Logc Yasemn Ssman, Aslan Dlave 2 and Sebahattn Bektas Coodnate measuements nevtably contan outles that
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More information3D Head Tracking Based on Recognition and Interpolation Using a Time-Of- Flight Depth Sensor
3D Head Tacng Based on Recognton and Intepolaton Usng a Tme-Of- Flght Depth Senso Salh Bua Götü 1 and Calo Tomas 1,2 1 Canesta Inc., 2 Due Unvesty bgotu@canesta.co tomas@cs.due.edu Abstact Ths pape descbes
More informationAdjusting the Contact Surface of Forming Tools in Order to Compensate for Elastic Deformations during the Process
Adjustng the Contact Suface of Fomng Tools n Ode to Compensate fo Elastc Defomatons dung the Pocess Knut Goßmann, Hajo Weme, Andè Hadtmann, Las Pente, Sebastan Kechenbaue Insttute fo Machne Tools and Contol
More informationA LIGHT SCATTERING METHOD TO MEASURE REAL-TIME PARTICULATE EMISSIONS
A Lght Scatteng Method to Measue Real-tme Patculate Emssons Rose Gong & Keyn Wllams 6 th Austalasan Tanspot Reseach Foum Wellngton New Zealand -3 Octobe 003 A LIGHT SCATTERING METHOD TO MEASURE REAL-TIME
More informationRobust Proper Clustering Structure Fuzzy Modeling for Function Approximation
Robust Pope lusteng Stuctue Fuzzy Modelng fo Functon Appoxmaton hh-hng Hsao Depatment of Electcal Engneeng Kao Yuan Unvesty Kaohsung ounty,tawan RO hsao@ooneentustedutw Shun-Feng Su Depatment of Electcal
More informationTHE HIERARCHICAL MODEL OF INTERACTION BETWEEN INTELLIGENT AGENTS IN THE MANET CONTROL SYSTEMS
UDC 6.396.4 THE HIERARCHICAL MODEL OF INTERACTION BETWEEN INTELLIGENT AGENTS IN THE MANET CONTROL SYSTEMS Oleg Ya. Sova Valey A. Romanyuk Mltay Insttute of Telecommuncatons and Infomatzaton Kyv Ukane Dmyto
More informationCOMPARISON OF DIMENSIONALITY REDUCTION METHODS APPLIED TO ORDINAL DATA
The 7 th Intenatonal Days of tatstcs and Economcs, Pague, eptembe 19-21, 2013 COMPARION OF DIMENIONALITY REDUCTION METHOD APPLIED TO ORDINAL DATA Matn Pokop Hana Řezanková Abstact The pape deals wth the
More informationSOFT COMPUTING OPTIMIZATION TECHNIQUES FOR SOLAR PHOTOVOLTAIC ARRAYS
ARPN Jounal of Engneeng and Appled Scences 2006-20 Asan Reseach Publshng Netwok (ARPN). All ghts eseved. SOFT COMPUTING OPTIMIZATION TECHNIQUES FOR SOLAR PHOTOVOLTAIC ARRAYS Ramapabha R. and Mathu B. L.
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationResearch on Fast Reconstruction of Virtual Plant Leaves
Reseach on Fast Reconstucton of Vtual Plant Leaves Fang Ku Lu-Mng Shen 2 College of Infomaton Scence and Technology Hunan Agcultual Unvesty, Changsha, Chna fk@hunau.net Jng Song 2 College of Scence Hunan
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationA QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments
Sensos 2010, 10, 10006-10013; do:10.3390/s101110006 OPEN ACCESS sensos ISSN 1424-8220 www.mdp.com/jounal/sensos Atcle A QoS Scheme fo a Congeston Coe Netwok Based on Dssmla QoS Stuctues n Smat-Phone Envonments
More informationReal Time Face Recognition Using Polynomial Regression and Sub-region Color Component Distribution
Real Tme Face Recognton Usng Polynomal Regesson and Sub-egon Colo Component Dstbuton Manshanka Mondal, Md. Almas Hossan, Md. Matu Rahman, Kamul Hasan Talukde* Compute Scence and Engneeng Dscplne Khulna
More informationFuzzy clustering ensemble based on mutual information
Poceedngs of the 6th WSEAS Intenatonal Confeence on Smulaton, Modellng and Optmzaton, Lsbon, Potugal, Septembe 22-24, 26 476 Fuzz clusteng ensemble based on mutual nfomaton YAN GAO SHIWEN GU LIMING XIA
More informationFault Tolerant Routing For Wireless Sensor Grid Networks
Fault oleant Routng Fo Weless Senso Gd etwoks Xn-ng Huang, Jng Deng 2, Jng a and Zeyu Wu Depatment of Electcal Engneeng 2 Depatment of Compute Scence Unvesty of ew Oleans, ew Oleans, A 7048, USA Abstact
More informationSome Image Processing Algorithms on a RAP with Wider Bus Networks
Some Image Pocessng Algothms on a RAP wth Wde Bus Netwoks Shung-Shng Lee, Sh-Jnn Hong, Hong-Ren Tsa and Yu-Hua Lee Natonal Tawan Insttute of Technology Depatment of Electcal Engneeng 4, Secton 4, Kee-Lung
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationQFSRD:OrthogenesisEvolutionBasedGeneticAlgorithmforQosFitnessScopeawareRouteDiscoveryinAd Hoc Networks
Global Jounal of Compute Scence and Technology: E Netwo, Web & Secuty Volume 5 Issue 3 Veson.0 Yea 205 Type: Double Blnd Pee Revewed Intenatonal Reseach Jounal Publshe: Global Jounals Inc. (USA) Onlne
More informationAuction-based Resource Allocation for Wireless Local Area Networks in Metropolitan Areas
Aucton-based Resouce Allocaton fo Weless Local Aea Netwos n Metopoltan Aeas Bo GU*, Kyoo YAMORI** *, Sugang XU*, Yosha TANAKA* *** *Global Infomaton and Telecommuncaton Insttute, Waseda Unvesty, Toyo,
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationMultidimensional Fuzzy Association Rules for Developing Decision Support System at Petra Christian University
Multidimensional Fuzzy ssociation Rules fo eveloping ecision Suppot System at Peta histian Univesity Yulia 1, Siget Wibisono 2, Rolly Intan 1 1,2 Peta histian Univesity, Suabaya, Indonesia 1 {yulia, intan}@peta.ac.id,
More informationCost of Stable Dimensioning in Optical Packet Ring with Uniform and Symmetric Traffic
Telfo Jounal, Vol. 5, No., 03. 43 ost of Stable Dmensonng n Optcal Packet Rng th Unfom and Symmetc Taffc Bogdan Ušćumlć, Veseln Gedć, Anne Gavey, Phlppe Gavey, Mchel Movan, and Peta Matavulj Abstact Optcal
More informationDATA DIMENSIONALITY REDUCTION METHODS FOR ORDINAL DATA
DATA DIMENIONALITY REDUCTION METHOD FOR ORDINAL DATA Matn Pokop Hana Řezanková Abstact Fom questonnae suvey we fequently get data, the values ae expessed n odnal (e.g. Lket) scale. The questonnae contans
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationFUZZY ARTMAP AND NEURAL NETWORK APPROACH TO ONLINE PROCESSING OF INPUTS WITH MISSING VALUES
FUZZY ARTMAP AD EURAL ETWORK APPROACH TO OLIE PROCESSIG OF IPUTS WITH MISSIG VALUES F.V. elwamondo* and T. Mawala* * School of Electcal and Infomaton Engneeng, Unvesty of the Wtwatesand, Johannesbug, Pvate
More informationTHE MODELLING OF INVOLUTE TEETH GENERATION, WITH THE RELATIVE GENERATING TRAJECTORIES METHOD
THE MODELLING OF INVOLUTE TEETH GENERATION, WITH THE RELATIVE GENERATING TRAJECTORIES METHOD Vgl Gabel TEODOR 1, Ncuşo BAROIU 1, Flon SUSAC 1 and Ncolae OANCEA 1 ABSTRACT: The modellng of a cul of sufaces
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationRefraction Ray Normal
Ray Nomal wave cests θ Bounday θ θ θ less dense, n1 moe dense, n2 (>n1) Moe Smply: θ θ Note: (Lght) Rays bend towads the nomal when gong fom a egon of low ndex of efacton to a egon of hgh ndex of efacton
More informationQuery Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented
Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationGuaranteeing Quality of Service to Peering Traffic
Guaanteeng Qualty of Sevce to Peeng Taffc Ru Zhang-Shen Depatment of Electcal Engneeng Pnceton Unvesty Emal: z@pnceton.edu ck McKeown Compute Systems Laboatoy Stanfod Unvesty Emal: nckm@stanfod.edu Abstact
More informationA Metric for the Activeness of a Class Sachin Lakra, Deepak Kumar Sharma, Jugnesh Kumar, Ramesh Chandra Verma, T V Prasad
Metc fo the ctveness of a lass Sachn Laka, Deepak Kma Shama, Jgnesh Kma, Ramesh handa Vema, T V Pasad bstact In ths pape, the athos popose a softwae metc called lass ctveness Metc (M) whch helps to detemne
More informationInteractive Rendering of Deforming NURBS Surfaces
EUROGRAHICS 97 / D. Fellne and L. Szmay-Kalos Volume 6, (997), Numbe 3 (Guest Edtos) Inteactve Rendeng of Defomng NURBS Sufaces Fedeck W. B. L Rynson W. H. Lau Mak Geen Compute Gaphcs and Meda Laboatoy
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationSchool of Computer Science. control algorithms for use in datagram networks. rates to alleviate the congestion. In the case
WF 2 Q: Wost-case Fa Weghted Fa Queueng Jon C.R. Bennett FORE Systems Hu Zhang School of Compute Scence Canege Mellon Unvesty Abstact The Genealzed Pocesso Shang (GPS) dscplne s poven to have two desable
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationA METHODOLOGY FOR RATING AND RANKING HAZARDS IN MARITIME FORMAL SAFETY ASSESSMENT USING FUZZY
Doumas N. Geogos, Nktakos V. Nñtas, ambou A. aa A ETODOOGY FOR RATING AND RANKING AZARDS IN ARITIE FORA SAFETY ASSESSENT USING FUZZY OGIC A ETODOOGY FOR RATING AND RANKING AZARDS IN ARITIE FORA SAFETY
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationKANBAN DEVS MODELLING, SIMULATION AND VERIFICATION
KANBAN DEVS MODELLING, SIMULATION AND VERIFICATION Alex Cave and Saed Nahavand School of Engneeng and Technology, Deakn Unvesty, Geelong, Vctoa 3216, Austala nahavand@deakn.edu.au ABSTRACT Kanban Contol
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationPoint-Cloud-to-Point-Cloud Technique on Tool Calibration for Dental Implant Surgical Path Tracking
Pont-Cloud-to-Pont-Cloud Technque on Tool Calbaton fo Dental Implant Sugcal Path Tackng Auanuch Losakul, Jackt Suthakon and Chanja Snthanayothn Abstact Dental mplant s nomally used n posthetc dentsty.
More informationDual Tree Complex Wavelet Transform for Face Recognition Using PCA Algorithm
B.Dhamenda,INDIA / Intenatonal Jounal of Reseach and Computatonal echnology, Vol.5 Issue.4 ISSN: 0975-5662, Dec, 2013 www.jct.og Dual ee Complex Wavelet ansfom fo Face Recognton Usng PCA Algothm Dhamenda
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationGraph Cut-based Automatic Segmentation of Lung Nodules using Shape, Intensity, and Spatial Features
Second Intenatonal Wokshop on -103- Gaph Cut-based Automatc Segmentaton of Lung Nodules ung Shape, Intenty, and Spatal eatues Xujong Ye, Gaeth Beddoe and Geg Slabaugh Medcght PLC, London, UK Abstact. Ths
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationMulti-View Data Visualization Based Big Data Analysis Using Clustering Similarity Measure
Mult-Vew Data Vsualzaton Based Bg Data Analyss Usng Clusteng Smlaty Measue Snvasa Rao Madala #1, V N Rajavaman #2, T.Venkata Satya Vvek #3 1,3 Reseach scholos, Depatment of Compute Scence & Engneeng, D
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationFeature Extraction for Collaborative Filtering: A Genetic Programming Approach
IJCSI Intenatonal Jounal of Compute Scence Issues Vol. 9 Issue 5 No Septembe 0 www.ijcsi.og 348 Featue xtacton fo Collaboatve Flteng: A Genetc Pogammng Appoach Deepa Anand Depatment of Compute Scence Chst
More informationDynamic Optimization of Structures Subjected to Earthquake
IACSIT Intenatonal Jounal of Engneeng and Technology, Vol. 8, No. 4, August 06 Dynamc Optmzaton of Stuctues Subjected to Eathquake Aleza Lavae and Aleza Lohasb Abstact To educe the oveall tme of stuctual
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More information