A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks

Size: px
Start display at page:

Download "A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks"

Transcription

1 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) RESEARCH ARTICLE OPEN ACCESS A Comprehensive Revie of Overlapping Community Detetion Algorithms for Soial Netorks Ashish Kumar Singh 1, Sapna Gambhir 2 1 (YMCA University of Siene and Tehnology ashebdeveloper@gmail.om) 2 (YMCA University of Siene and Tehnology sapnagambhir@gmail.om) Abstrat Community struture is an interesting feature found in many soial netorks hih signifies that there is intense interation beteen some individuals. These ommunities have a tendeny to overlap ith eah other as there are nodes that an belong to multiple ommunities simultaneously. Detetion of suh overlapping ommunities is a hallenging task; it still remains a topi of interest for the researhers as it ansers many questions about the behavior of the netork and its operation as a funtion of its struture. This paper revies overlapping ommunity detetion tehniques proposed so far and points out their strengths and eaknesses. The paper also presents insightful harateristis and limitations of the existing state of art algorithms to solve the problem of overlapping ommunity detetion. Keyords Overlapping Community detetion, Online Soial Netorks, Complex Netorks, Community Struture. I. INTRODUCTION Online soial netorks have beome a primary means of ommuniation noadays; they attrat a ide variety of audiene. Nearly every person has a profile on Faebook, Google plus, Orkut, Titter et hih are olletively termed as Soial Netorking Sites (SNS). People usually ommuniate to others via these SNS and this ommuniation has attrated a lot of researh fous in reent years under the domain named Soial Netork Analysis. A soial netork is a graphial representation of the ommuniation among people, here people are represented as nodes and the edges beteen a pair of nodes represent some kind of ommuniation beteen them. A very interesting feature in soial netorks is the formation of Communities. A ommunity is a group of individuals in a soial netork ho ommuniate more frequently ith eah other than ith others outside the group. When a the soial netork is represented as a graph G (V, E), here V representing the individuals and E representing the onnetions among them, then a ommunity C G suh that the number of edges going outside from the verties in C is far less than the number of edges ith both verties inside C. The detetion of suh ommunities is not trivial and is quite hallenging as it is ompletely different from to similar and ell studied problems in omputer siene namely Clustering and Graph Partitioning. The first most hallenge in the domain of ommunity detetion is that there is no generally aepted definition of a ommunity; still there are a large number of ommunity detetion algorithms available hih produe effetive results. Most of the ommunity detetion algorithms do not take in to aount the overlapping beteen ommunities, hih is a serious ase in SNSs. Communities in soial netorks, tends to overlap ith eah other hih means that a vertex hih is a member of one ommunity an also be a member of another ommunity as shon in Fig 1. The idea of overlapping ommunities makes the problem of ommunity detetion tougher as the result of the algorithms ould no be a Cover, a set of ommunities of hih a vertex is a member. Most of the ommunity detetion algorithms start resulting in bad assignments of ommunities to verties in the overlapping ase as they generally merge to ommunities ith dense overlaps into a single ommunity. Fig 1: Illustration of overlapping ommunities, nodes shon in red olor 5 P a g e

2 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) This paper presents a systemati and organized study of overlapping ommunity detetion tehniques. The strengths and eaknesses of eah tehnique is also a matter of fous in this paper. The major ontributions of this paper ill be: To serve as a base for those starting researh in this diretion. To provide them ith the existing state of art algorithms for the researh problem. To make them aare of the hallenges in the diretion and the solutions proposed so far. The paper is organized in to setions namely Problem Formulation hih learly states the problem of overlapping ommunity detetion, Tehniques hih explains the tehniques used so far to solve the problem and their orresponding strengths and eaknesses, and at last Conlusion hih sums up the ork onduted and the future diretions for ork. II. PROBLEM FORMULATION Given a graph G (V, E ), here V is the set of Verties and E is the set of edges assign to eah vertex v V a over C here C represents the set of ommunities of hih v is a member. V =n, E =m For dense graphs m= O (n 2 ) and for sparse graphs m=o (n). III. TECHNIQUES The algorithms for overlapping ommunity detetion an be broadly lassified into folloing ategories: a) Link Partitioning Algorithms b) Clique Based Algorithms ) Agent Based and Dynami Algorithms d) Fuzzy Algorithms e) Loal Expansion and Optimization Algorithms We ill explore eah of them one by one, and ill point out their relative strengths and eaknesses. a) Link Partitioning Algorithms The basi idea of link partitioning algorithms is to partition links to disover the ommunities. To steps of every link partitioning algorithms are: Step 1: Construt the Dendrogram. Step 2: Partition the Dendrogram at some threshold. A node ill be identified as overlapping if the links to the node are present in more than one luster. Links are partitioned by hierarhial lustering in [1] on the basis of edge similarity. If e are given a pair of links eik and e jk, the edge similarity beteen these to links is alulated by Jaard index as: S( jk, ik) i j i j e e N N N N N i is the set of nodes hih are in the neighborhood of node i inluding node i. After alulating edge similarities linkage lustering is done to find hierarhial ommunities. Generally single linkage hierarhial lustering is done beause of its simpliity and effiieny hih enables us to apply it on large netorks. Other lustering methods inlude average and omplete hierarhial lustering. Initially every node belongs to its on ommunity, and then links ith highest similarities are merged into a single ommunity, this proess is repeated until all the links belong to a single ommunity. This hole merging proess is stored in a Dendrogram hih reords the hierarhial ommunity organization. Fig 2: Illustration of a Dendrogram; y axis represents similarity (linkage distane) and x axis denotes node indies. This Dendrogram is then ut at a threshold value of partition density to reveal ommunities as shon in Fig 2. Partition density attains a global maximum at some level in the Dendrogram; it is average at the top of Dendrogram and attains the loest value at the leaves of the Dendrogram. The idea of link partitioning is quite natural and intuitive but it an t guarantee better results than node partitioning algorithms as it is also based on the ambiguous definition of ommunity [2]. The omplexity is O (nk 2 max), here k max is the maximum degree of any node in the netork. b) Clique Based Algorithms A lique is a maximal subgraph in hih all nodes are adjaent to eah other. The input to Clique based algorithms is a netork graph G and an integer k. Clique based algorithms have folloing steps in general: Step 1: Find all liques of size k in the given netork. Step 2: Construt a lique graph. Any to k-liques are adjaent if they share k-1 nodes. Step 3: Eah onneted omponents in the lique graph form a ommunity. CPM (Clique Perolation Method) is based on the assumption that a netork is omposed of liques hih overlap ith eah other. CPM finds overlapping 6 P a g e

3 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) ommunities by searhing for adjaent liques. As a vertex an be a member of more than one lique, so overlap is possible beteen ommunities. The parameter k is of utmost importane in finding ommunities via CPM, Empirially small values of k have shon effetive results [3] [4]. An effiient implementation of the CPM method is CFinder. CPM is suitable for dense graphs here liques are present. In ase there are fe liques only CPM fails to produe meaningful overs. Example 1: shoing the orking of lique perolation as shon in Fig 3. Fig 3: A netork ith 6 k-liques here k=3 Clearly the netork has 6 liques of size 3, first of all these are identified by the CPM as {1, 2, 3}, {1,3,4}, {4,5,6}, {5,6,7}, {5,6,8}, {6,7,8}. After finding the liques, a lique graph is formed in hih to liques are adjaent if they share k-1 nodes as shon in Fig 4. Fig 4: shoing the lique graph for the netork in Fig 3 To ommunities ill be shon as result and they are: {1,2,3,4} and {4,5,6,7,8} The major disadvantage of CPM is that it fails to terminate for large netorks. Some argue that CPM is more like a pattern mathing algorithm as it searhes for a partiular pattern in the given netork on the basis of input parameter k. To other Clique based algorithms are CPM [5] and SCPM[6]. CPM is for eighted netorks, it introdues the onept of intensity threshold. Only the liques ith subgraph intensity greater than the threshold are inluded in the ommunity. CPM produes ommunities ith smoother ontours as ompared to CPM. SCPM is faster than CPM as it doesn t proess the netork for all values of k, instead it proesses only for a given value of k. SCPM suits for eighted netorks having hierarhial ommunity struture. ) Agent Based and Dynami Algorithms Three famous algorithms that ome under this ategory are SLPA [7], COPRA [8], and Label Propagation algorithm [9]. SLPA is Speaker-Listener label propagation algorithm, in hih a node is alled speaker if it is spreading information and is alled a listener if it is onsuming information. Labels are spread aording to pair ise interation rules. In SLPA a node an have many labels depending upon the underlying information it has learned from the netork. The time omplexity of SLPA is O(tm) here t is the number of iterations and m is number of edges. The best part of SLPA is that it doesn t require any prior knoledge about the number of ommunities in the netork. In other to algorithms the node forgets the information it has learned in previous iterations but in SLPA eah node has a stored memory in hih it stores all the information it has learned about the netork in form of labels. Whenever a node observes more labels in surrounding, it is more likely that it ill spread those labels to other nodes. The Label Propagation algorithm desribed in [9] is extended to overlapping ase by alloing a node to have multiple labels. Initially all nodes have their on unique label, labels are updated upon iterations depending upon the labels oupied by the maximum neighbors. Nodes ith same labels form a ommunity. LPA as modified by Gregory [8], he introdued Community Overlap Propagation Algorithm (COPRA). In COPRA eah label onsists of a belonging oeffiient and a ommunity identifier. The sum of belonging oeffiients of ommunities over all neighbors is normalized. A node updates its belonging oeffiient in a synhronous fashion by averaging the belonging oeffiients of all its neighbors at eah step. The parameter v ontrols the number of ommunities of hih a node an be a member. The time omplexity of COPRA is O (vmlog(vm/n)). Aording to benhmarks in [10] COPRA provides the best results for overlapping ommunities. An important optimization in LPA an be to avoid unneessary updates, hih ill redue the exeution time. d) Fuzzy Algorithms The overlap beteen ommunities an be of to types, one is the risp overlap in hih eah node either belongs to a ommunity or doesn t, the belonging fator is 1 for all the ommunities a node is a member. The other type of overlap is the fuzzy overlap in hih eah node an be a member of ommunities ith belonging fator in the range 0 to 1.The membership strength of a node to a ommunity is denoted by b n and if e sum the belonging oeffiients 7 P a g e

4 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) of a vertex for all the ommunities of hih it is a member the result ill be 1. C b n =1 here C The major drabak of fuzzy based overlapping ommunity detetion methods is the need to alulate the dimensionality k of the membership vetor; this value is generally passed as a parameter to the algorithms, hile some algorithms alulate it from the data. Only a fe fuzzy methods have shon good results. In [10], authors proposed an algorithm ith the ombination of spetral lustering, fuzzy means and optimization of a quality funtion. They propose a method to detet up to k ommunities by using the fuzzy means lustering algorithm after onverting the input netork to a k- dimensional Eulidean spae. The auray and omputational effiieny of the algorithm is heavily dependent upon the parameter k. Nepsuz [11] model the problem of overlapping ommunity detetion as an optimization problem onstrained nonlinearly hih an be solved by simulated annealing methods. The objetive funtion required to be minimized in this method is: f n i 1 j 1 ij( xij x ij) n Where ij denotes a predefined eight and denotes prior similarity beteen nodes i and j. Similarity xij is defined as: x ij i j a a Where ai is the fuzzy membership of node i in ommunity, subjeted to onstraints of total membership and non empty ommunity. To determine the value of k, it is inreased repeatedly until the value of ommunity struture doesn t improve as measured by modified fuzzy modularity funtion, Q defined as: 1 kk i j Q [ Aij ]ai aj 2m 2m i, j A hybrid approah [18] based on Bayesian Non-negative Matrix Fatorization to ahieve soft partitioning of the netork in omputationally effetive manner is proposed. The advantage of this approah is that it doesn t suffer from the problem of resolution limit. This approah is a mix of dimensionality redution and feature extration in mahine learning. The problem ith NMF approah is that it is omputationally ineffiient beause of large matrix multipliations. e) Loal Expansion and Optimization Algorithms These algorithms rely on a loal benefit funtion hih enodes the quality of densely onneted subgraphs. The goal of these algorithms is to expand partial or natural ommunities so as to maximize the 2 x ij loal benefit funtion. The quality of disovered ommunities heavily depends upon the quality of seed ommunities. A lique serves as a better seed than a single node. EAGLE [12] reates a Dendrogram by using agglomerative frameork. First of all maximal liques are identified, and initialized as seed ommunities, then similarity values are omputed and ommunities ith maximum similarity are merged. The optimal ut of the Dendrogram is alulated using extended modularity funtion defined in [13]. EAGLE is omputationally expensive even ithout taking into aount the time required for finding maximal liques. GCE [14] also uses liques as seed ommunities and expands them using a loal fitness funtion. Communities are merged if they are found similar to previously deteted ommunities. The similarity is omputed using the distane funtion defined as: min( 1, 2 ) If the distane is smaller than the value speified by parameter then ommunities 1 and 2 are merged. The time omplexity of GCE is O (mh) here m is number of edges and h is the number of liques. In [15], author proposed another to step tehnique in hih nodes are first of all ranked aording to some riterion, and then highly ranked nodes are removed until small disjoint luster ores are formed. In the seond step i.e Iterative San (IS) these ores at as seed ommunities hih are expanded by adding or removing nodes until a loal density funtion annot be improved further. The density funtion used is given as: f () in in out in is total internal eight and out is the total external eight of ommunity. The orst ase omplexity of this tehnique is O(n 2 ). IS sometimes results in disonneted omponents as the algorithm allos removal of nodes during expansion, so CIS [16] as introdued in hih onnetedness is heked after eah iteration. OSLOM [17] orks by omparing the statistial signifiane of a luster ith the global null model (i.e. the random graph onfiguration model) during the expansion phase. To gro the ommunity r value is omputed for eah neighbor, hih is the umulative probability of having more internal edges in the ommunity than the number of edges from neighbors in the null model. If the umulative distribution of smallest r value is lesser than a tolerane value, the node is onsidered signifiant and is added to the ommunity otherise seond smallest r value is onsidered. The average time omplexity is O (n 2), it is dependent upon the underlying ommunity struture of the input netork. The main problem ith OSLOM is 8 P a g e

5 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) that it results in signifiant number of singleton ommunities or outliers. To detet both stati and temporal ommunities ilcd [18] intrinsi longitudinal ommunity detetion as proposed hih updates ommunities by adding nodes depending upon hether the number of their first, seond robust neighbors is greater than an expeted value or not. The algorithm depends upon to parameters one for adding nodes to the ommunity and another for merging to ommunities. Reently there have been many improvements in the loal optimization and expansion algorithms. IV. CONCLUSION Overlapping ommunity detetion approahes have attrated a lot of attention of researhers in reent years and there is a onsiderable inrease in the number of algorithms published for solving the issue as it has appliations in various domains like mirobiology, soial siene and physis. Analyzing ommunity struture in soial netork has emerged as a topi of groing interest as it shos the interplay beteen the strutures of the netork and its funtioning. This paper tries to revie all popular algorithms for overlapping ommunity detetion ith their strengths and eaknesses. We have tried our best to revie all popular algorithms, but the study is by no means omplete as there are neer algorithms disovered at a fast rate beause of the groing interest of researhers in this domain. REFERENCES [1] Ahn, Y.-Y., Bagro, J. P., and S. Lehmann, Link ommunities reveal multisale omplexity in netorks, Nature -466, 2010, [2] S.Fortunato, Community detetion in graphs, Physis Report, 486(3), 2010, [3] Palla, G., Derenyi,Farkas, I., and Visek, T., Unovering the overlapping ommunity struture of omplex netorks in nature and soiety, Nature-435, 2005, [4] Lanihinetti, A., Fortunato, S., and Kertesz, J., Deteting the overlapping and hierarhial ommunity struture of omplex netorks, Ne Journal Physis, Cornell University, U.S.A., 11, 2009, [5] Farkas, I., Abel,D., Palla, G., and Visek, T. Weighted netork modules, Ne Journal Physis, Cornell University, U.S.A., 9(6), 2007, [6] Kumpula, J. M., Kivela Sequential algorithm for fast lique perolation. Physis Revie, Cornell University, U.S.A., 78( 2), 1-8. [7] Xie, J., Szymanski, B. K., and Liu, X., SLPA: Unovering overlapping ommunities in soial netorks via a speaker-listener interation dynami proess, Proeeding of ICDM Workshop, IEEE, 2011, [8] S.Gregory, Finding overlapping ommunities in netorks by label propagation, Ne Journal Physis, Cornell University, U.S.A., 12, 2010, [9] Raghavan, U. N., Albert, R., and Kumara, S., Near linear time algorithm to detet ommunity strutures in large-sale netorks. Physis Revie, Cornell University, U.S.A., 76, 2007, [10] Zhang S., Wang R.S., Zhang X.S, Identifiation of overlapping ommunity struture in omplex netorks using fuzzy -means lustering, Elsevier, 374(1),2007, [11] Nepusz Y., Petroz A., Negyessy L., and Bazso F,Fuzzy, Communities and the onept of bridgeness in omplex netorks, Physis Revie, Cornell University, 77, 2008, [12] Shen, H., Cheng, X., Cai, K., and Hu, M.-B. Detet overlapping and hierarhial ommunity struture, Physia A, 388, 2009, 1-7. [13] Shen, H., Cheng, X., and Guo, J., Quantifying and identifying the overlapping ommunity struture in netorks, J. Stat. Meh., 07, 2009, [14] Lee, C., Reid, F., MDaid, A., and Hurley, N., Deteting highly overlapping ommunity struture by greedy lique expansion, Proeeding of SNAKDD Workshop, 2010, [15] Baumes, J., Goldberg, M., Krishnamoorthy, M., Magdon-Ismail, M., and Preston, N., Finding ommunities by lustering a graph into overlapping subgraphs, Proeeding of IADIS, 5(1), 2005, [16] S.Kelley, The existene and disovery of overlapping ommunities in large-sale netorks, Ph.D. thesis, Rensselaer Polytehni Institute, Troy, NY, [17] Cazabet R., Amblard F., and Hanahi C, Detetion of overlapping ommunities in dynamial soial netorks, Proeedings of SOCIALCOM, 2010, [18] Psorakis I., Roberts S. and Ebden Mark, Overlapping ommunity detetion using Bayesian non-negative matrix fatorization, Physis Revie E, 83, 2011, P a g e

A Review on Overlapping Community Detection Algorithms

A Review on Overlapping Community Detection Algorithms Review Paper A Review on Overlapping Community Detection Algorithms Authors 1 G.T.Prabavathi*, 2 Dr. V. Thiagarasu Address For correspondence: 1 Asst Professor in Computer Science, Gobi Arts & Science

More information

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Self-Location of a Mobile Robot with uncertainty by cooperation of an heading sensor and a CCD TV camera

Self-Location of a Mobile Robot with uncertainty by cooperation of an heading sensor and a CCD TV camera Self-oation of a Mobile Robot ith unertainty by ooperation of an heading sensor and a CCD TV amera E. Stella, G. Ciirelli, A. Distante Istituto Elaborazione Segnali ed Immagini - C.N.R. Via Amendola, 66/5-706

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

SLPA: Uncovering Overlapping Communities in Social Networks via A Speaker-listener Interaction Dynamic Process

SLPA: Uncovering Overlapping Communities in Social Networks via A Speaker-listener Interaction Dynamic Process SLPA: Uncovering Overlapping Cmunities in Social Networks via A Speaker-listener Interaction Dynamic Process Jierui Xie and Boleslaw K. Szymanski Department of Cputer Science Rensselaer Polytechnic Institute

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM

TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Multi-modal Clustering for Multimedia Collections

Multi-modal Clustering for Multimedia Collections Multi-modal Clustering for Multimedia Colletions Ron Bekkerman and Jiwoon Jeon Center for Intelligent Information Retrieval University of Massahusetts at Amherst, USA {ronb jeon}@s.umass.edu Abstrat Most

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

Segmentation of brain MR image using fuzzy local Gaussian mixture model with bias field correction

Segmentation of brain MR image using fuzzy local Gaussian mixture model with bias field correction IOSR Journal of VLSI and Signal Proessing (IOSR-JVSP) Volume 2, Issue 2 (Mar. Apr. 2013), PP 35-41 e-issn: 2319 4200, p-issn No. : 2319 4197 Segmentation of brain MR image using fuzzy loal Gaussian mixture

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW

FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,

More information

An Automatic Laser Scanning System for Accurate 3D Reconstruction of Indoor Scenes

An Automatic Laser Scanning System for Accurate 3D Reconstruction of Indoor Scenes An Automati Laser Sanning System for Aurate 3D Reonstrution of Indoor Senes Danrong Li, Honglong Zhang, and Zhan Song Shenzhen Institutes of Advaned Tehnology Chinese Aademy of Sienes Shenzhen, Guangdong

More information

Adaptive Implicit Surface Polygonization using Marching Triangles

Adaptive Implicit Surface Polygonization using Marching Triangles Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Chromaticity-matched Superimposition of Foreground Objects in Different Environments

Chromaticity-matched Superimposition of Foreground Objects in Different Environments FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

A Method for Measuring Co-authorship Relationships in MediaWiki Libby Veng-Sam Tang Department of Computer and Information Siene Faulty of Siene and Tehnology University of Maau Maau S.A.R., China Tel:

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Coprocessors, multi-scale modeling, fluid models and global warming. Chris Hill, MIT

Coprocessors, multi-scale modeling, fluid models and global warming. Chris Hill, MIT Coproessors, multi-sale modeling, luid models and global warming. Chris Hill, MIT Outline Some motivation or high-resolution modeling o Earth oean system. the modeling hallenge An approah Sotware triks

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Brief description of the base clustering algorithms

Brief description of the base clustering algorithms Brief description of the base clustering algorithms Le Ou-Yang, Dao-Qing Dai, and Xiao-Fei Zhang In this paper, we choose ten state-of-the-art protein complex identification algorithms as base clustering

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION

IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology

More information

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Shape Outlier Detection Using Pose Preserving Dynamic Shape Models

Shape Outlier Detection Using Pose Preserving Dynamic Shape Models Shape Outlier Detetion Using Pose Preserving Dynami Shape Models Chan-Su Lee Ahmed Elgammal Department of Computer Siene, Rutgers University, Pisataway, NJ 8854 USA CHANSU@CS.RUTGERS.EDU ELGAMMAL@CS.RUTGERS.EDU

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

A Real Time Hybrid Pattern Matching Scheme for Stock Time Series

A Real Time Hybrid Pattern Matching Scheme for Stock Time Series A Real Time Hybrid Pattern Mathing Sheme for Stok Time Series Zhe Zhang 1, Jian Jiang 2, Xiaoyan Liu 3, Riky Lau 4, Huaiqing Wang 4, Rui Zhang 3 1,4 Department of Information Systems, City University of

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information