A Method for Privacy Preserving Mining of Association Rules based. on Web Usage Mining

Size: px
Start display at page:

Download "A Method for Privacy Preserving Mining of Association Rules based. on Web Usage Mining"

Transcription

1 200 Intenatonal onfeence on Web Infomaton Systems and Mnng A Method fo Pvacy Pesevng Mnng of Assocaton Rules based on Web Usage Mnng Wang Yan Le Jajn Huang Dongme Gloous Sun School of Busness and Management DonghuaUnvesty Shangha,hna yanwang@mal.dhu.edu.cn School of ompute Scence and Technology DonghuaUnvesty Shangha,hna lejajn@dhu.edu.cn ollege of Infomaton Technology Shangha Ocean Unvesty Shangha,hna dmhuang@shou.edu.cn Abstact:Data mnng basng on Pvacy pesevaton has become a eseach hot pont now. Web usage mnng s one nd of data mnng applcatons, and how to pevent data leaness n web usage mnng s also an mpotant ssue. In ths pape, we pesent an effectve method fo pvacy pesevng assocaton ule mnng n the web usage mnng, Seconday Random Response olumn Replacement (SRRR) to mpove the pvacy pesevaton and mnng accuacy. Then, a pvacy pesevng assocaton ule mnng algothm based on SRRR s pesented, whch can acheve sgnfcant mpovements n tems of pvacy and effcency. Fnally, we pesent expemental esults that valdate the algothms by applyng t on eal datasets. Keywods: web usage mnng; pvacy pesevaton; andomzed esponse; assocaton ules I. INTRODUTION Wth the contnuous development of data mnng technology, ts applance s moe and moe wdely. Web data mnng s an applcaton hot pont of data mnng n ecent yeas. The fast development of web maes tself to be the wold's lagest publc data souce, Web data mnng s based on publc data souces, but thee ae also pvacy leaness poblem. Fo example, on e-commece ste, all ecods of customes vsted the webste ae stoed n Web seve log wthout esevaton. These ecods eflect the consumes buyng habts and puchasng powes,but the customes do not want these data to be dsclosed, so pvacy potecton should also be consdeed n the web data mnng. Pvacy pesevng assocaton ule mnng s to dscove the fequent temsets as accuately as possble and geneate the mnmum suppot and confdence by accessng the ognal tansacton sets of condtons. Thee s a contadcton between data pvacy and data accuacy. At pesent, the pvacy potecton of data mnng methods can be dvded nto data petubaton [-] and quey estcton [-5]. In 2002, S. J. Rzv and J. R. Hatsa pesented a epesentatve assocaton ules mnng method, MASK (Mnng Assocatons wth Sececy Konstants) [] that s a data petubaton stateges. Because Wane model n statstcs s used n MASK, all the data tansfomed have the dectly elatons wth the eal aw data, whch maes the pesevng less than satsfactoy, and the selecton of andomzed paametes should devate fom 0.5 [6] s anothe lmtaton. In ths pape, we gve the geneal famewo fo mnng assocaton ules n the web usage mnng and use a use-oented and tme-oented sesson exploe method to geneate sequence sets fstly. Then we popose a method to tansfom use sesson nfomaton nto a elatonal data table, and petub data by usng Seconday Random Response olumn Replacement (SRRR) algothm. Based on the pseudoandom data set, fequent temsets and stong assocaton ules dscovey algothm ae pesented. II. THE GENERAL FRAMEWORK As e-commece, Web sevces and Web-based nfomaton system s sustanable development and gowth, thee ae a lage numbe of use data collected n web oganzatons. The pncpal data souces n web usage mnng ae web seve log fles, and othe Data souces ncludng the web ste fles and metadata, opeatonal databases, applcaton templates and doman nowledge. In ode to solve pvacy pesevaton ssues of web usage mnng, we poposed Seconday Random Response olumn Replacement (SRRR) algothm, and a pvacy potecton assocaton ule mnng methods based on t. The oveall stuctue and famewo shown as follow Fg..The famewos wee dvded nto 2 stages: data pepocessng stage and pvacy pesevng &mnng stage. The data pepocessng stage pepocessng the data by fve steps and geneate the sesson tanslate table. The pvacy pesevng stage s the ey stage ncludng the pvacy pesevaton methods and assocaton ule applcaton /0 $ IEEE DOI 0.09/WISM

2 Fg. Web usage mnng famewo III. PRIVAY PRESERVATION IN WEB APPLIATIONS MINING A. Data Pepaaton Each clc acton of web use n e-commece stes s ecoded n the web log, so the ognal web log ecods contan a lot of bowsng nfomaton. Befoe web data mnng, data should be pepocessed [8], whee the pocess ncludes flteng, despdeng, use dentfcaton, sessonzaton and path completon. B. Tme-oented use sesson explong method Afte data pepocessng, we can mne and extact elevant data n web seve logs. Fo the puposes of analyss, these data need to be conveted and aggegated n the dffeent levels. In web usage mnng, the page s the basc level of data extacton and the sesson s the basc acton n the data extacton fo uses. TABLE ORIGINAL SESSION SAMPLE ID IP URL Tme Page 0: Page2 0: Page 0: Page 0: Page 0: Page 0: Page5 0: Page2 0: Page5 0: Page2 0: Page 0: Page 0: Page 0: Page5 0:25 Table shows a sample of use s ognal sesson. In the table each ow epesents a use sesson dentfed by usng unquely ID, and IP epesents the use's IP addess, whee dffeent addesses fo dffeent uses. URL means the page accessed by uses n the sesson. The deal method of use path estong can econstuct the eal pocess of use sesson. Hee we use tme-oented use sessons exploe method. Let the vecto M{M,M 2,,M,, M N }epesent the log data set, whee M {IP, URL, Date, Tme, Method, ode, Bytes }, and N s the numbe of log fles. Web logs contan the IP addesses, vsted URLs, date and tme ecods, access methods (GET o POST), access stuctue and the sze of access nfomaton. the vecto S{S,S 2,,S,,S K } epesents the sesson data set, whee s the numbe of sessons, and S {IP,Page,t },ths stuctue contans the IP addess, vsted page and the tmestamp n each sesson. Page {Page,Page 2,,Page,,Page L}, L s the numbe of pages fo the sesson. The algothm s descbed below: Fo each M of M If Method s GET and Ul s WEBPAGE If S S and IP IP Set t 0 // set the fst tme stamp of equest n the sesson If( t t 0 <20mn) // set the lmtaton of access tme s 20 mnutes S (IP,PAGE S U PAGE S,t ) Delete S fom S Add S nto S Endf Add S nto S Endf Endf Endfo Table2 s the sesson sets geneated by the path explong algothm. TABLE2 SESSION SETS GENERATED BY PATH EXPLORING ALGORITHM SID IP Page Tme Page,page2,page 0: Page, page,page,page5 0: Page2,page5 0: Page2,page 0: Page,page,page5 0:25. Tansfomng use sessons set nto twodmensonal elaton table Fo the use sesson set n Table 2, we can use elatons table S_table to stoe the use sesson path, the table stuctue s (TID, IPID, SESSIONID, P ),

3 whee we stoe the IP addess, sesson ID, and the vsts of each page n a two-dmensonal table. The value of P column means whethe the use vsts the page and buys the poducts o not.n the column means an access to the page and 0 means no access to the page. The algothm 2 s descbed below; t tansfes the use actvty ecods nto the elaton twodmensonal table that can be handled easy. Algothm 2 Input: use sesson set S Output: two-dmensonal use sesson table S_table eate table S_table(TID,IP,SESSIONID,P ) Fo each S of S Inset nto S_table(IPID,SID) values (IP,SID ) If P of S Inset nto S_table(P )Values( ); Inset nto S_table(P )Values( 0 ); Endfo Each sesson wll be seen as a tansacton, the custome's sesson sequence can be conveted to elatonal tables whee the page numbes epesent the coespondng puchase acton. We added a new feld TID n the table, whch s the dentty column and can be assgned values automatcally by the system. Table 2D table savng the use sesson path TID IPID SID P P2 P P P D. Pvacy Potecton Algothm In the two-dmensonal table the columns whch need to pvacy potected ae P, P2 and P, P and P5, those columns ae nown as senstve attbutes n the pvacy potecton technology [7].The attbute values tself ae not to dsclose pvacy, but the attbute goup wll lea customes pvacy nfomaton. Theefoe we potect the senstve attbutes by usng the mpoved andomzed esponse method. In ode to mpove the effcency of data pesevaton, we andomze the value twce at a cetan pobablty, and ths algothm s named the seconday andom esponse column eplacement algothm (SRRR). Specfc methods ae as follows: Set andom paamete I, 0 p, p2, p, p,and p + p2 + p + p, Set andom paamete II, eate andomzaton functon R (x), the ognal column (, j) s tansfomed to hdng column F (, j), whee F(,j) {0,},(,j) {0,}. Fo x F(,j) {0,}, andom functon conventon s as follows: TABLE ONVENTION OF RANDOM FUNTION p p 2 p P x x 0 y 2 y x 0 null Let s an tem, whee π s the suppot of n, π null s the suppot of null n, λ s the suppot of n F. The tansacton T of s conveted by SRRR pocess to the tansacton T of F, and then thee s: λ π p * () null π λ ( p + ) + + (2) * p * p p * By the () and (2): π - p - π null p + π null π - p - κ φ p + γ φ () Hee κ s the top coeffcent, γ s the bottom coeffcent,and φ π null s the suppot of null value.we can see that the beneft of the algothm s the ntoducton of the adjustable factos to calculate of the suppot. In t the actual petubaton pocess, we can use a null value to futhe enhance pvacy pesevaton. TABLE 5 PROBABILITIES OF DATA MAPPING BY SRRR METHOD Assumng that suppot theshold s 0. n the M, and choosng p 0.2,p 2 0.2,p 0.,p 0.5, whle select 0., 2 0.2, 0.2, 0., accodng to SRRR algothm custome sesson set s conveted as table6:,,,,and + + +,

4 TABLE6 FAKE OLUMN DATA SET GENERATION AND FINAL FAKE OLUMN DATA SET Afte conveson algothm SRRR, fae sets nclude not only the value of 0 and, also null value. The meanng of Null can be defned by the use. Mnng assocaton ules can tae nto account the column of null value and the suppot of temset n fae set afte conveted fom SRRR algothm can matches the suppot of j n the ognal tansacton set. IV. PRIVAY PRESERVING ASSOIATION RULE MINING ALGORITHM Apo algothm s an nfluental algothm fo mnng fequent temsets and Boolean assocaton ules. Based on the Apo Algothm [9], we pesented an mpoved algothm to acheve assocaton ule mnng fo fae tansacton sets conveted by SRRR. Gven the mnsup and data set, man mplementaton actons of the algothm ae descbed as follows: Algothm. Pogessve scan assocaton ule mnng algothm.. Settng fequent temsets ϕ, and ϕ s collecton of temset M n whose tem numbe s n,whee n,and s the maxmum numbe tansactons. 2. Seachng the lagest temset pogessvely. Algothms scan the data ow by ow, and matchng each lne wth all tems set, f the ow matches wth some temsets, then plus fo each locaton of sequenceϕ.. Usng Apo punng pncple n the pocess of match the temset n the ow data. Algothm fst match -temset, then 2- temset, -temset.to educes the compute load.. culaton n tun,when the ato of the numbe n - temset of the seached ows to the numbes of all ows has eached the mnmum suppot of - temset, stop ths -temset match pocess.if the ato o f the numbe n n - temset of the seached ows to the numbes of all ows m has not eached the mnmum suppot of - temset, only eached the numbe of x, when n/m> mnsup, algothm calculate ((n-m)+x)/m, f > mnsup, contnues cculatng, stop ths temset seach. 5. Gettng all the fequent temsets whch satsfy the mnsup. Pocessng of Algothm s descbed below : Input: temset D afte conveson algothm SRRR, mnmum suppot theshold s. Output: fequent temset F of eal dataset D. Setϕ, ϕ {M,M 2,,M n } {(L ),(L 2 ),..(L ), (L,L 2 ),.. (L...L )} s the full temset fo (n; >0;--),and n set A ndex() // set the seachng matx matchngϕ () fo each tansacton t D // scan each ow R *A f R 0, then // ext matched ow f n //countng evey tem calculate template (c.count c.count 0 +, c.count c.count +. c.count n c.count n +) select_add( c.count) // functon select_add endf endf endfo F { c c. count / n mnsup} endfo etun F U F Functon select_add s to count each temset afte punng (), that s c.count c.count 0 +, c.count c.count +. c.count n c.count n +. In the countng pocess, algothm pune the fequent temsets geneated (Punng methods s n Apo pncple, no explanaton). Afte obtaned fequent temsets, based on the suppot and confdence fomula below, data povdes can fnd the assocaton ules of web log tem. Suppot (A B) Suppot_count (AUB) / all_count V. PERFORMANE ANALYSIS A. Algothm omplexty Analyss Theoetcally, Apo algothm s an exponental algothm. let N be the sze of tansacton, each tansacton ncludes n tems aveagely, and then the whole temset space wll each ο ( 2 n ).The mnng algothm we have mpoved, when <-2 * (-mnsup), the temset coesponds wth the poston of the value n sequence ϕ does not match the mnmum suppot, the last calculatons fo ths temset wll be gven up. If we do not consde ths nd of ow optmzaton, tme complexty of the algothm s 6

5 n/2 ο (N* n )ο (N*2n/2). If the pobablty pe-judgment mentoned above s taen nto account dung the ow judge, the complexty wll decease contnually. B. Expemental esults We obtaned the web seve log fles n some 2 webste n 0 days and conveted tansacton sets T by the algothm and 2. The tansact numbe s 000, the tem numbe s, and the ATL (the aveage tansacton length) s 2.8. We analyzed the pvacy potecton wth mnmum suppot of %, and the followng table shows the pvacy potecton ntensty of the mnmum suppot of % wth dffeent values of andomzed algothm paametes fo dffeent. TABLE 7 INTENSITY OF PRIVAY PROTETION The Fg.2 shows the aveage temset eo of SRRR method and MASK method, and states the elatonshps between the andom paamete, the data pvacy ntensty and the accuacy of mnng esults. Fg. 2 Aveage temsets eo of SRRR method and MASK method As can be seen, MASK method has wde eo by compason. When the P s close to 0 o, the mnng esults s moe accuate, but the ntensty of pvacy potecton s poo. When the value of P gadually appoaches 0.5, pvacy potecton ntensty has been mpoved, but the accuacy of mnng esults wll be sgnfcantly deceased. Eo changes of the method SRRR poposed n ths pape s elatvely stable, accodng to the P value, that s, when the popoton of eal data vay fom 0 to, the pvacy damage coeffcent wll nceased fom 0 to smultaneously, so t lead to the decease of the ntensty of pvacy potecton, and contnuously mpove the accuacy of mnng esults. VI. ONLUSIONS Pvacy pesevng n web data mnng has asen woldwde concens wth the pomoton of netwo technology and the demand of applcaton. But thee ae many dawbacs and open questons. In ths pape, we have pesented a method fo pvacy pesevng mnng of assocaton ules based on web usage mnng. Fst, we gave the geneal famewo fo mnng assocaton ules n the web usage mnng, geneated sesson sets by explong use sessons and tansfe sesson sets to elaton two-dmenson table. Second, we poposed seconday andom esponse column eplacement (SRRR), a smple and effectve pvacy pesevng algothm, and acheve pvacy potecton assocaton ule mnng based on SRRR. Fnally, we pesented expemental esults that valdated the algothm (SRRR) n pactce by smulaton. In the futue, we wll enhance the effcency of mnng algothm futhe by paallelzaton and othe methods, and combne SRRR wth othe pvacy pesevng ways to acheve moe sgnfcant mpovements n tems of pvacy, accuacy, effcency, and applcablty. AKNOWLEDGMENT The study s funded by ey poject of Shangha Scentfc ommttee, subject numbe: 08dz REFERENES [] Rzv SJ, Hatsa JR. Mantanng data pvacy n assocaton ule mnng. In: Bensten PA, Ioannds YE, Ramashnan R,Papadas D, eds. Poc. of the 28th Int l onf. on Vey Lage Data Bases. Hong Kong: Mogan Kaufmann Publshes, 2002, pp [2] Agawal S, Kshnan V, Hatsa JR. On addessng effcency concens n pvacy-pesevng mnng. In: Lee YJ, L JZ, Whang KY,Lee D, eds. Poc. of the 9th Int l onf. on Database Systems fo Advanced Applcatons. LNS 297, Jeju Island: Spnge-Velag,200, pp.- 2. [] Evfmevs A. Randomzaton n pvacy pesevng data mnng. SIGKDD Exploatons, 2002,(2), pp. -8. [] Saygn Y, Veyos VS, lfton. Usng unnowns to pevent dscovey of assocaton ules. AM SIGMOD Recod, 200,0(),pp [5] Olvea SRM, Zaane OR. Pvacy pesevng fequent temset mnng. In: lfton, Estvllasto V, eds. Poc. of the IEEE Int lonf. on Data Mnng Woshop on Pvacy, Secuty and Data Mnng. Maebash: IEEE ompute Socety, 2002, pp. -5. [6] Zhao JK. Theoy and Methods of Samplng Desgn n Statstcal Suvey. Bejng: hna Statstcs Pess, 2002 (n hnese). [7] Sweeney L Achevng -anonymty pvacy potecton usng genealzaton and suppesson[j]. Intenatonal Jounal off Uncetanty.Fuzzness and Knowldege-Based Systems (5), pp. 57l-588 [8] Godon S. Lnoff Mchael J.A.Bey Mnng the Web: Tansfomng ustome Data nto ustome Value[J]. Publshng House of Electoncs Industy. 200, pp. 2-7 [9] R.Agawal and R.Sant. Fast Algothms fo Mnng Assocaton Rules. In Poc.of the 20th Intl.onf.on Vey Lage Data Bases(VLDB 9),99, pp

Effectiveness evaluation of electronic warfare command and control system based on grey AHP method

Effectiveness evaluation of electronic warfare command and control system based on grey AHP method Avalable onlne www.jocp.com Jounal of hemcal and Phamaceutcal Reseach, 014, 6(7):535-54 Reseach Atcle ISSN : 0975-7384 ODEN(USA) : JPR5 Effectveness evaluaton of electonc wafae command and contol system

More information

A SAS Macro for Finding Optimal k-means Clustering in One Dimension with Size Constraints

A SAS Macro for Finding Optimal k-means Clustering in One Dimension with Size Constraints Pape SD-02 A SAS Maco fo Fndng Optmal k-means Clusteng n One Dmenson wth Sze Constants Fengao Hu, Geoga Regents Unvesty; Robet E. Johnson, Vandeblt Unvesty ABSTRACT Wang and Song (2011) poposed a k-means

More information

arxiv: v1 [math.co] 21 Jan 2016

arxiv: v1 [math.co] 21 Jan 2016 PROOF OF BIJECTION FOR COMBINATORIAL NUMBER SYSTEM axv:60.05794v [math.co] Jan 06 ABU BAKAR SIDDIQUE, SAADIA FARID, AND MUHAMMAD TAHIR Abstact. Combnatoal numbe system epesents a non-negatve natual numbes

More information

Performance Evaluation of Neighborhood Signature Techniques for Peer-to-Peer Search

Performance Evaluation of Neighborhood Signature Techniques for Peer-to-Peer Search Pefomance Evaluaton of Neghbohood gnatue Technques fo Pee-to-Pee each e L Wang-Chen Lee * Anand vasubamanam Depatment of Compute cence and Engneeng Pennsylvana tate Unvesty Unvesty Pak, PA 16802, UA E-al:

More information

Constructing Service Semantic Link Network Based on the Probabilistic Graphical Model

Constructing Service Semantic Link Network Based on the Probabilistic Graphical Model Intenatonal Jounal of omputatonal Intellgence ystems, Vol. 5, No. 6 (Novembe, 2012), 1040-1051 onstuctng evce emantc Lnk Netwok Based on the Pobablstc Gaphcal odel ANPING ZHAO * ollege of ompute and Infomaton

More information

Risk assessment research for power transformer based on fuzzy synthetic evaluation

Risk assessment research for power transformer based on fuzzy synthetic evaluation Avalable onlne www.jocp.com Jounal of Chemcal and Phamaceutcal Reseach, 23, 5(2):62-68 Reseach Atcle ISSN : 975-7384 CODEN(USA) : JCPRC5 Rsk assessment eseach fo powe tansfome based on fuzzy synthetc evaluaton

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

Hadoop based Feature Selection and Decision Making Models on Big Data

Hadoop based Feature Selection and Decision Making Models on Big Data Indan Jounal of Scence and Technology, Vol 9(0), DOI: 0.7485/jst/206/v90/88905, Mach 206 ISSN (Pnt) : 0974-6846 ISSN (Onlne) : 0974-5645 Hadoop based Featue Selecton and Decson Makng Models on Bg Data

More information

An Object Based Auto Annotation Image Retrieval System

An Object Based Auto Annotation Image Retrieval System Poceedngs of the 5th WSEAS Intenatonal Confeence on Telecommuncatons and Infomatcs, Istanbul, Tukey, May 27-29, 2006 (pp509-54) An Obect Based Auto Annotaton Image Reteval System Pe-Cheng Cheng, Been-Chan

More information

Planar Curve Representation and Matching

Planar Curve Representation and Matching Plana Cuve Repesentaton and Matchng Mahe Al-Khayat and Fahad Kamanga Compute Scence and Engneeng Depatment Unvesty of Texas at Alngton Alngton, Texas 7609, USA [al-khay kamanga]@cse.uta.edu Abstact In

More information

Journal of Engineering Science and Technology Review 7 (1) (2014) Research of Anti-Noise Image Salient Region Extraction Method

Journal of Engineering Science and Technology Review 7 (1) (2014) Research of Anti-Noise Image Salient Region Extraction Method Jest Jounal of Engneeng Scence and echnology Revew 7 () (04) 43 47 JOURNAL OF Engneeng Scence and echnology Revew www.jest.og Reseach of Ant-Nose Image Salent Regon Extacton Method Bng XU,*, Shy XIE and

More information

FUNDAMENTALS OF RADIOMETRY

FUNDAMENTALS OF RADIOMETRY 1 FUNDAMENTALS OF RADIOMETRY Lectue 5 Radomety 2 Quanttatve measuement of the popetes of EM adaton nteacton wth matte o emsson fom t Radomety deals wth total EM adaton We extend the concept of adans n

More information

Recognition of Shapes for Object Retrieval in Image Databases by Discrete Curve Evolution and Two Consecutive Primitive Edges

Recognition of Shapes for Object Retrieval in Image Databases by Discrete Curve Evolution and Two Consecutive Primitive Edges Poceedngs of the Intenatonal MultConfeence of Engnees and Compute Scentsts 009 Vol I IMECS 009 Mach 8-0 009 Hong Kong Recognton of Shapes fo Object Reteval n Image Databases by Dscete Cuve Evoluton and

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We ae IntechOpen, the wold s leadng publshe of Open Access books Bult by scentsts, fo scentsts 3,900 116,000 10 Open access books avalable Intenatonal authos and edtos Downloads Ou authos ae among the

More information

Soochow University: Description and Analysis of the Chinese Word Sense Induction System for CLP2010

Soochow University: Description and Analysis of the Chinese Word Sense Induction System for CLP2010 Soochow Unvesty: Descpton and Analyss of the Chnese Wod Sense Inducton System fo CLP2010 Hua Xu Bng Lu Longhua Qan Guodong Zhou Natual Language Pocessng Lab School of Compute Scence and Technology Soochow

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Enhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matching

Enhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matching Enhance the Algnment Accuacy of Actve Shape Models Usng Elastc Gaph Matchng Sanqang Zhao 1,, Wen Gao, Shguang Shan, Baoca Yn 1 1) Multmeda and Intellgent Softwae Technology Lab, Beng Unvesty of Technology,

More information

Improved Methods on PCA Based Human Face Recognition for Distorted Images

Improved Methods on PCA Based Human Face Recognition for Distorted Images Poceedngs of the Intenatonal MultConfeence of Engnees and Compute Scentsts 016 Vol I,, Mach 16-18, 016, Hong Kong Impoved Methods on PCA Based Human Face Recognton fo Dstoted Images Buce Poon, M. Ashaful

More information

An Optimization Procedure In A Production Line Of Sokat Soap Industry, Ikotun, Lagos State. Adamawa State, Nigeria.

An Optimization Procedure In A Production Line Of Sokat Soap Industry, Ikotun, Lagos State. Adamawa State, Nigeria. An Optmzaton Pocedue In A Poducton Lne Of Sokat Soap Industy, Ikotun, Lagos State. 1 O.S. Balogun, 2 A.A. Olatun and 3 A.A. Momoh 1 Depatment of Statstcs and Opeatons Reseach, Modbbo Adama Unvesty of Technology,

More information

Vol. 4, No. 6 June 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 4, No. 6 June 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Vol 4, No 6 June 03 ISSN 079-8407 Jounal Emegng Tends n Computng and Infomaton Scences 009-03 CIS Jounal All ghts eseved http://wwwcsjounalog Optmal Powe Dstbuton System Placement to Install the RTU wth

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A Bayesian Approach toward Active Learning for Collaborative Filtering

A Bayesian Approach toward Active Learning for Collaborative Filtering A Bayesan Appoach towad Actve Leanng fo Collaboatve Flteng Rong Jn Depatment of Compute Scence and Engneeng Mchgan State Unvesty ong@cse.cmu.edu Abstact Collaboatve flteng s a useful technque fo eplotng

More information

Recognizing Facial Expressions Based on Gabor Filter Selection

Recognizing Facial Expressions Based on Gabor Filter Selection Recognzng Facal Expessons Based on Gabo Flte Selecton Zang Zhang, Xaomn Mu, Le Gao School of Infomaton Engneeng Zhengzhou Unvest Zhengzhou, Chna Abstact Recognton of human emotonal state s an mpotant component

More information

Volumetric Textures. Esteban W. Gonzalez Clua 1 Marcelo Dreux 2

Volumetric Textures. Esteban W. Gonzalez Clua 1 Marcelo Dreux 2 Volumetc Textues Esteban W. Gonzalez Clua 1 Macelo Deux 2 1 PUC-Ro - Depatment of Compute Scence Rua Maquês de São Vcente, 255, 22443-900, Ro de Janeo, RJ, Bazl esteban @nf.puc-o.b 2 PUC-RIO Mechancal

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Fuzzy Membership Function Based on Structural Information of Data Fang-Zhi ZHU a, Hui-Ru WANG b, Zhi-Jian ZHOU c,*

Fuzzy Membership Function Based on Structural Information of Data Fang-Zhi ZHU a, Hui-Ru WANG b, Zhi-Jian ZHOU c,* 06 Intenatona Confeence on Sevce Scence, Technoogy and Engneeng (SSTE 06 ISBN: 978--60595-35-9 Fuzzy Membeshp Functon Based on Stuctua Infomaton of Data Fang-Zh ZHU a, Hu-Ru WANG b, Zh-Jan ZHOU c,* Coege

More information

Supervised and Unsupervised Text Classification via Generic Summarization

Supervised and Unsupervised Text Classification via Generic Summarization Intenatonal Jounal of Compute Infomaton Systems and Industal Management Applcatons. ISSN 50-7988 Volume 5 (03) pp. 509-55 MIR Labs, www.mlabs.net/jcsm/ndex.html Supevsed and Unsupevsed Text Classfcaton

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Efficient End-to-End Communication Services for Mixed Criticality Avionics Systems

Efficient End-to-End Communication Services for Mixed Criticality Avionics Systems 214 IEEE 22nd Intenatonal Symposum of Qualty of Sevce (IWQoS) Effcent End-to-End Communcaton Sevces fo Mxed Ctcalty Avoncs Systems Yng Fang Yu Hua Xue Lu McGll Unvesty Huazhong Unv. of Sc. and Tech. McGll

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

One-Dimensional Linear Local Prototypes for Effective Selection of Neuro-Fuzzy Sugeno Model Initial Structure

One-Dimensional Linear Local Prototypes for Effective Selection of Neuro-Fuzzy Sugeno Model Initial Structure One-Dmensonal Lnea Local Pototypes fo Effectve Selecton of euo-fuzzy Sugeno Model Intal Stuctue Jace Kabzńs Insttute of Automatc Contol, Techncal Unvesty of Lodz, Stefanowsego 8/22, 90 924 Lodz, Poland,

More information

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks An Enegy-Awae QoS Routng Potocol fo Weless Senso Netwoks Kemal Akkaya and Mohamed Youns Depatment of Compute Scence and Electcal Engneeng Unvesty of Mayland, Baltmoe County Baltmoe, MD 225 kemal youns@cs.umbc.edu

More information

Outlier Detection in 3D Coordinate Transformation with Fuzzy Logic

Outlier Detection in 3D Coordinate Transformation with Fuzzy Logic Acta Montanstca Slovaca Ročník 7 (22), číslo, -8 Outle Detecton n 3D Coodnate ansfomaton wth Fuzzy Logc Yasemn Ssman, Aslan Dlave 2 and Sebahattn Bektas Coodnate measuements nevtably contan outles that

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

3D Head Tracking Based on Recognition and Interpolation Using a Time-Of- Flight Depth Sensor

3D Head Tracking Based on Recognition and Interpolation Using a Time-Of- Flight Depth Sensor 3D Head Tacng Based on Recognton and Intepolaton Usng a Tme-Of- Flght Depth Senso Salh Bua Götü 1 and Calo Tomas 1,2 1 Canesta Inc., 2 Due Unvesty bgotu@canesta.co tomas@cs.due.edu Abstact Ths pape descbes

More information

Adjusting the Contact Surface of Forming Tools in Order to Compensate for Elastic Deformations during the Process

Adjusting the Contact Surface of Forming Tools in Order to Compensate for Elastic Deformations during the Process Adjustng the Contact Suface of Fomng Tools n Ode to Compensate fo Elastc Defomatons dung the Pocess Knut Goßmann, Hajo Weme, Andè Hadtmann, Las Pente, Sebastan Kechenbaue Insttute fo Machne Tools and Contol

More information

A LIGHT SCATTERING METHOD TO MEASURE REAL-TIME PARTICULATE EMISSIONS

A LIGHT SCATTERING METHOD TO MEASURE REAL-TIME PARTICULATE EMISSIONS A Lght Scatteng Method to Measue Real-tme Patculate Emssons Rose Gong & Keyn Wllams 6 th Austalasan Tanspot Reseach Foum Wellngton New Zealand -3 Octobe 003 A LIGHT SCATTERING METHOD TO MEASURE REAL-TIME

More information

Robust Proper Clustering Structure Fuzzy Modeling for Function Approximation

Robust Proper Clustering Structure Fuzzy Modeling for Function Approximation Robust Pope lusteng Stuctue Fuzzy Modelng fo Functon Appoxmaton hh-hng Hsao Depatment of Electcal Engneeng Kao Yuan Unvesty Kaohsung ounty,tawan RO hsao@ooneentustedutw Shun-Feng Su Depatment of Electcal

More information

THE HIERARCHICAL MODEL OF INTERACTION BETWEEN INTELLIGENT AGENTS IN THE MANET CONTROL SYSTEMS

THE HIERARCHICAL MODEL OF INTERACTION BETWEEN INTELLIGENT AGENTS IN THE MANET CONTROL SYSTEMS UDC 6.396.4 THE HIERARCHICAL MODEL OF INTERACTION BETWEEN INTELLIGENT AGENTS IN THE MANET CONTROL SYSTEMS Oleg Ya. Sova Valey A. Romanyuk Mltay Insttute of Telecommuncatons and Infomatzaton Kyv Ukane Dmyto

More information

COMPARISON OF DIMENSIONALITY REDUCTION METHODS APPLIED TO ORDINAL DATA

COMPARISON OF DIMENSIONALITY REDUCTION METHODS APPLIED TO ORDINAL DATA The 7 th Intenatonal Days of tatstcs and Economcs, Pague, eptembe 19-21, 2013 COMPARION OF DIMENIONALITY REDUCTION METHOD APPLIED TO ORDINAL DATA Matn Pokop Hana Řezanková Abstact The pape deals wth the

More information

SOFT COMPUTING OPTIMIZATION TECHNIQUES FOR SOLAR PHOTOVOLTAIC ARRAYS

SOFT COMPUTING OPTIMIZATION TECHNIQUES FOR SOLAR PHOTOVOLTAIC ARRAYS ARPN Jounal of Engneeng and Appled Scences 2006-20 Asan Reseach Publshng Netwok (ARPN). All ghts eseved. SOFT COMPUTING OPTIMIZATION TECHNIQUES FOR SOLAR PHOTOVOLTAIC ARRAYS Ramapabha R. and Mathu B. L.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Research on Fast Reconstruction of Virtual Plant Leaves

Research on Fast Reconstruction of Virtual Plant Leaves Reseach on Fast Reconstucton of Vtual Plant Leaves Fang Ku Lu-Mng Shen 2 College of Infomaton Scence and Technology Hunan Agcultual Unvesty, Changsha, Chna fk@hunau.net Jng Song 2 College of Scence Hunan

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments

A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments Sensos 2010, 10, 10006-10013; do:10.3390/s101110006 OPEN ACCESS sensos ISSN 1424-8220 www.mdp.com/jounal/sensos Atcle A QoS Scheme fo a Congeston Coe Netwok Based on Dssmla QoS Stuctues n Smat-Phone Envonments

More information

Real Time Face Recognition Using Polynomial Regression and Sub-region Color Component Distribution

Real Time Face Recognition Using Polynomial Regression and Sub-region Color Component Distribution Real Tme Face Recognton Usng Polynomal Regesson and Sub-egon Colo Component Dstbuton Manshanka Mondal, Md. Almas Hossan, Md. Matu Rahman, Kamul Hasan Talukde* Compute Scence and Engneeng Dscplne Khulna

More information

Fuzzy clustering ensemble based on mutual information

Fuzzy clustering ensemble based on mutual information Poceedngs of the 6th WSEAS Intenatonal Confeence on Smulaton, Modellng and Optmzaton, Lsbon, Potugal, Septembe 22-24, 26 476 Fuzz clusteng ensemble based on mutual nfomaton YAN GAO SHIWEN GU LIMING XIA

More information

Fault Tolerant Routing For Wireless Sensor Grid Networks

Fault Tolerant Routing For Wireless Sensor Grid Networks Fault oleant Routng Fo Weless Senso Gd etwoks Xn-ng Huang, Jng Deng 2, Jng a and Zeyu Wu Depatment of Electcal Engneeng 2 Depatment of Compute Scence Unvesty of ew Oleans, ew Oleans, A 7048, USA Abstact

More information

Some Image Processing Algorithms on a RAP with Wider Bus Networks

Some Image Processing Algorithms on a RAP with Wider Bus Networks Some Image Pocessng Algothms on a RAP wth Wde Bus Netwoks Shung-Shng Lee, Sh-Jnn Hong, Hong-Ren Tsa and Yu-Hua Lee Natonal Tawan Insttute of Technology Depatment of Electcal Engneeng 4, Secton 4, Kee-Lung

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

QFSRD:OrthogenesisEvolutionBasedGeneticAlgorithmforQosFitnessScopeawareRouteDiscoveryinAd Hoc Networks

QFSRD:OrthogenesisEvolutionBasedGeneticAlgorithmforQosFitnessScopeawareRouteDiscoveryinAd Hoc Networks Global Jounal of Compute Scence and Technology: E Netwo, Web & Secuty Volume 5 Issue 3 Veson.0 Yea 205 Type: Double Blnd Pee Revewed Intenatonal Reseach Jounal Publshe: Global Jounals Inc. (USA) Onlne

More information

Auction-based Resource Allocation for Wireless Local Area Networks in Metropolitan Areas

Auction-based Resource Allocation for Wireless Local Area Networks in Metropolitan Areas Aucton-based Resouce Allocaton fo Weless Local Aea Netwos n Metopoltan Aeas Bo GU*, Kyoo YAMORI** *, Sugang XU*, Yosha TANAKA* *** *Global Infomaton and Telecommuncaton Insttute, Waseda Unvesty, Toyo,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Multidimensional Fuzzy Association Rules for Developing Decision Support System at Petra Christian University

Multidimensional Fuzzy Association Rules for Developing Decision Support System at Petra Christian University Multidimensional Fuzzy ssociation Rules fo eveloping ecision Suppot System at Peta histian Univesity Yulia 1, Siget Wibisono 2, Rolly Intan 1 1,2 Peta histian Univesity, Suabaya, Indonesia 1 {yulia, intan}@peta.ac.id,

More information

Cost of Stable Dimensioning in Optical Packet Ring with Uniform and Symmetric Traffic

Cost of Stable Dimensioning in Optical Packet Ring with Uniform and Symmetric Traffic Telfo Jounal, Vol. 5, No., 03. 43 ost of Stable Dmensonng n Optcal Packet Rng th Unfom and Symmetc Taffc Bogdan Ušćumlć, Veseln Gedć, Anne Gavey, Phlppe Gavey, Mchel Movan, and Peta Matavulj Abstact Optcal

More information

DATA DIMENSIONALITY REDUCTION METHODS FOR ORDINAL DATA

DATA DIMENSIONALITY REDUCTION METHODS FOR ORDINAL DATA DATA DIMENIONALITY REDUCTION METHOD FOR ORDINAL DATA Matn Pokop Hana Řezanková Abstact Fom questonnae suvey we fequently get data, the values ae expessed n odnal (e.g. Lket) scale. The questonnae contans

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

FUZZY ARTMAP AND NEURAL NETWORK APPROACH TO ONLINE PROCESSING OF INPUTS WITH MISSING VALUES

FUZZY ARTMAP AND NEURAL NETWORK APPROACH TO ONLINE PROCESSING OF INPUTS WITH MISSING VALUES FUZZY ARTMAP AD EURAL ETWORK APPROACH TO OLIE PROCESSIG OF IPUTS WITH MISSIG VALUES F.V. elwamondo* and T. Mawala* * School of Electcal and Infomaton Engneeng, Unvesty of the Wtwatesand, Johannesbug, Pvate

More information

THE MODELLING OF INVOLUTE TEETH GENERATION, WITH THE RELATIVE GENERATING TRAJECTORIES METHOD

THE MODELLING OF INVOLUTE TEETH GENERATION, WITH THE RELATIVE GENERATING TRAJECTORIES METHOD THE MODELLING OF INVOLUTE TEETH GENERATION, WITH THE RELATIVE GENERATING TRAJECTORIES METHOD Vgl Gabel TEODOR 1, Ncuşo BAROIU 1, Flon SUSAC 1 and Ncolae OANCEA 1 ABSTRACT: The modellng of a cul of sufaces

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Refraction Ray Normal

Refraction Ray Normal Ray Nomal wave cests θ Bounday θ θ θ less dense, n1 moe dense, n2 (>n1) Moe Smply: θ θ Note: (Lght) Rays bend towads the nomal when gong fom a egon of low ndex of efacton to a egon of hgh ndex of efacton

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Guaranteeing Quality of Service to Peering Traffic

Guaranteeing Quality of Service to Peering Traffic Guaanteeng Qualty of Sevce to Peeng Taffc Ru Zhang-Shen Depatment of Electcal Engneeng Pnceton Unvesty Emal: z@pnceton.edu ck McKeown Compute Systems Laboatoy Stanfod Unvesty Emal: nckm@stanfod.edu Abstact

More information

A Metric for the Activeness of a Class Sachin Lakra, Deepak Kumar Sharma, Jugnesh Kumar, Ramesh Chandra Verma, T V Prasad

A Metric for the Activeness of a Class Sachin Lakra, Deepak Kumar Sharma, Jugnesh Kumar, Ramesh Chandra Verma, T V Prasad Metc fo the ctveness of a lass Sachn Laka, Deepak Kma Shama, Jgnesh Kma, Ramesh handa Vema, T V Pasad bstact In ths pape, the athos popose a softwae metc called lass ctveness Metc (M) whch helps to detemne

More information

Interactive Rendering of Deforming NURBS Surfaces

Interactive Rendering of Deforming NURBS Surfaces EUROGRAHICS 97 / D. Fellne and L. Szmay-Kalos Volume 6, (997), Numbe 3 (Guest Edtos) Inteactve Rendeng of Defomng NURBS Sufaces Fedeck W. B. L Rynson W. H. Lau Mak Geen Compute Gaphcs and Meda Laboatoy

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

School of Computer Science. control algorithms for use in datagram networks. rates to alleviate the congestion. In the case

School of Computer Science. control algorithms for use in datagram networks. rates to alleviate the congestion. In the case WF 2 Q: Wost-case Fa Weghted Fa Queueng Jon C.R. Bennett FORE Systems Hu Zhang School of Compute Scence Canege Mellon Unvesty Abstact The Genealzed Pocesso Shang (GPS) dscplne s poven to have two desable

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

A METHODOLOGY FOR RATING AND RANKING HAZARDS IN MARITIME FORMAL SAFETY ASSESSMENT USING FUZZY

A METHODOLOGY FOR RATING AND RANKING HAZARDS IN MARITIME FORMAL SAFETY ASSESSMENT USING FUZZY Doumas N. Geogos, Nktakos V. Nñtas, ambou A. aa A ETODOOGY FOR RATING AND RANKING AZARDS IN ARITIE FORA SAFETY ASSESSENT USING FUZZY OGIC A ETODOOGY FOR RATING AND RANKING AZARDS IN ARITIE FORA SAFETY

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

KANBAN DEVS MODELLING, SIMULATION AND VERIFICATION

KANBAN DEVS MODELLING, SIMULATION AND VERIFICATION KANBAN DEVS MODELLING, SIMULATION AND VERIFICATION Alex Cave and Saed Nahavand School of Engneeng and Technology, Deakn Unvesty, Geelong, Vctoa 3216, Austala nahavand@deakn.edu.au ABSTRACT Kanban Contol

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Point-Cloud-to-Point-Cloud Technique on Tool Calibration for Dental Implant Surgical Path Tracking

Point-Cloud-to-Point-Cloud Technique on Tool Calibration for Dental Implant Surgical Path Tracking Pont-Cloud-to-Pont-Cloud Technque on Tool Calbaton fo Dental Implant Sugcal Path Tackng Auanuch Losakul, Jackt Suthakon and Chanja Snthanayothn Abstact Dental mplant s nomally used n posthetc dentsty.

More information

Dual Tree Complex Wavelet Transform for Face Recognition Using PCA Algorithm

Dual Tree Complex Wavelet Transform for Face Recognition Using PCA Algorithm B.Dhamenda,INDIA / Intenatonal Jounal of Reseach and Computatonal echnology, Vol.5 Issue.4 ISSN: 0975-5662, Dec, 2013 www.jct.og Dual ee Complex Wavelet ansfom fo Face Recognton Usng PCA Algothm Dhamenda

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Graph Cut-based Automatic Segmentation of Lung Nodules using Shape, Intensity, and Spatial Features

Graph Cut-based Automatic Segmentation of Lung Nodules using Shape, Intensity, and Spatial Features Second Intenatonal Wokshop on -103- Gaph Cut-based Automatc Segmentaton of Lung Nodules ung Shape, Intenty, and Spatal eatues Xujong Ye, Gaeth Beddoe and Geg Slabaugh Medcght PLC, London, UK Abstact. Ths

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Multi-View Data Visualization Based Big Data Analysis Using Clustering Similarity Measure

Multi-View Data Visualization Based Big Data Analysis Using Clustering Similarity Measure Mult-Vew Data Vsualzaton Based Bg Data Analyss Usng Clusteng Smlaty Measue Snvasa Rao Madala #1, V N Rajavaman #2, T.Venkata Satya Vvek #3 1,3 Reseach scholos, Depatment of Compute Scence & Engneeng, D

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Feature Extraction for Collaborative Filtering: A Genetic Programming Approach

Feature Extraction for Collaborative Filtering: A Genetic Programming Approach IJCSI Intenatonal Jounal of Compute Scence Issues Vol. 9 Issue 5 No Septembe 0 www.ijcsi.og 348 Featue xtacton fo Collaboatve Flteng: A Genetc Pogammng Appoach Deepa Anand Depatment of Compute Scence Chst

More information

Dynamic Optimization of Structures Subjected to Earthquake

Dynamic Optimization of Structures Subjected to Earthquake IACSIT Intenatonal Jounal of Engneeng and Technology, Vol. 8, No. 4, August 06 Dynamc Optmzaton of Stuctues Subjected to Eathquake Aleza Lavae and Aleza Lohasb Abstact To educe the oveall tme of stuctual

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information