A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

Size: px
Start display at page:

Download "A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract"

Transcription

1 A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA Abtract An imple ublinear algorithm i preented for two-dimenional tring matching, where occurrence of a pattern of m m character are earched for in a text of nn character in an alphabet of c character. The algorithm i baed on the Boyer-Moore idea and it examine a trip of r column at a time, m=2 r m. The hift of the pattern i baed on a tring of d character, d = dlog c (rm)e. The expected running time of the algorithm i hown to be O(n 2 dlog c m 2 e=m 2 + cm 2 ) for random text and pattern. The algorithm i eay to implement, and reult of experiment are reported to how it practical eciency. Work upported by the Academy of Finland and Finnih Cultural Foundation, and in part by Department of Energy, Oce of Energy Reearch Grant No. DE- FG03-90ER Permanent addre: Department of Computer Science, P.O. Box 26 (Teolliuukatu 23), FIN Univerity of Helinki, Finland. Electronic mail: tarhio@cs.berkeley.edu or Jorma.Tarhio@Helinki.FI. 1

2 1 Introduction The tak of two-dimenional tring matching i to nd all occurrence of a two-dimenional pattern P (m m character) in a two-dimenional tring text T (n n character) in an alphabet of c character. The trivial algorithm for two-dimenional tring matching need O(m 2 n 2 ) time in the wort cae. Baker [Bak78] and Bird [Bir77] independently gave the rt linear time algorithm working in O(n 2 + m 2 ) time. Galil and Park [GaP92] developed a linear time algorithm which i independent of the alphabet. Recently Crochemore et al. [CGR93] preented a ampling technique that work in linear time for almot all pattern. In the following we will concentrate on the expected time complexity, becaue the average cae i more important in practice. Zhu and Takaoka [ZhT89] introduced an algorithm that can a preproceed text in ublinear expected time. Baeza-Yate and Regnier [BaR90, BaR93] dicovered the rt on-line ublinear algorithm which run in O(n 2 =m+m 2 ) expected time. Karkkainen and Ukkonen [KaU93] howed that O( n2 log m 2 c m 2 ) i the lower bound for expected running time and preented an optimal algorithm which achieve thi bound with additional O(m 2 ) time for preproceing. The lower bound agree with the one for one-dimenional cae [Yao79]. Thee analye are valid for random text and pattern. The Boyer-Moore algorithm [BoM77] with it many variation i an ef- cient olution for one-dimenional tring matching. It can the pattern from right to left and i able to kip portion of the text achieving ublinear average behavior. We will preent an algorithm for two-dimenional tring with a imilar hift heuritic a in the Horpool verion of the Boyer-Moore algorithm [Hor80]. Our algorithm i imple but ecient. The algorithm examine a trip of r column at a time, r m. Intead of inpecting a ingle character for hift at each top of the pattern, the algorithm examine a d-gram, a tring of d character, at a time. A imilar approach ha been ued for one-dimenional tring matching, e.g. by Baeza-Yate [Bae89]. Becaue a d-gram i a kind of a ngerprint of the pattern, our approach iin away a combination of the Boyer-Moore idea and the ngerprint method preented by Karp and Rabin [KaR87]. We will how that the expected running time of our algorithm i O( n2 dlog m 2 c m 2 e + cm 2 ), when m=2 r m and d = dlog c (rm)e. The canning time O( n2 dlog m 2 c m 2 e) matche with the optimal bound of the Karkkainen-Ukkonen algorithm. 2

3 Recently a related but dierent method ha been (independently) developed and analyzed by Kim and Shawe-Taylor [KiS93]. Their bound for the expected running time i O(( n2 + m 2 ) log m 2 2 m 2 ). The Boyer-Moore approach i alo applied in earlier algorithm for twodimenional matching. In the Zhu-Takaoka algorithm [ZhT89] the Boyer- Moore principle i ued along column. The Baeza-Yate-Regnier algorithm [BaR93] ue the Boyer-Moore technique in two way: Every m th row of the text i inpected, and on each uch row, the row of the pattern are earched for by uing one-dimenional Boyer-Moore approach for multiple pattern. The ret of the paper i organized a follow. The baic algorithm i preented in Section 2 and analyzed in Section 3. A linear time verion and other modication are preented in Section 4. The nal ection review our experiment. 2 Algorithm The characteritic feature of the Boyer-Moore algorithm [BoM77] for onedimenional tring matching i the right-to-left can over the pattern. At each alignment of the pattern with the text, character of the text below the pattern are examined from right to left, tarting by comparing the rightmot character of the pattern with the character in the text currently below it. Between alignment, the pattern i hifted from left to right along the text. In the Horpool verion [Hor80] the hift i baed on character x in the text below the rightmot character of the pattern. If x doe not occur in the pattern, the pattern i hifted beyond x, otherwie the pattern i hifted to the right until x i below an occurrence of the ame character in the pattern. We call thi method the Boyer-Moore-Horpool algorithm or the BMH algorithm. The BMH algorithm ha a imple code and i in practice better than the original Boyer-Moore algorithm. Baed on the BMH algorithm, we will derive a new algorithm for two-dimenional tring matching. The text i plit in d(n, m)=re + 1 trip of r column, r m. Each trip i examined eparately applying the BMH approach to ltrate potential matche, which are then proceed by the trivial algorithm, which check poition of P in order until a character mimatch i found or until a matchofp i completed. Both the ltration of potential matche and the hifting of the pattern are 3

4 Figure 1: A 3-gram i covered byrm =4 6 alignment of the pattern. baed on d-gram, i.e. a tring of d character on a row, r + d m +1. Let u conider a top of the pattern. For implicity, let u aume that r + d = m + 1. According to the baic idea of Boyer and Moore [BoM77], the end of the pattern i probed rt. So d-gram x, correponding to the lower right corner of the pattern (ee Fig. 1), i read from the text and compared with the lat row ofp.ifx occur on the lat row ofp,wehave a potential match, and the correponding alignment will be further checked by the trivial algorithm except thoe poition included in x. Becaue x may occur in r poition of the lat row ofp, there can be up to r potential matche at each top. For hifting we ue a precomputed table D, which follow the hift heuritic of the BMH algorithm. Entry D[x] tell the ditance of the cloet occurrence of d-gram x in Y = P [1 : m, 1; 1:m] from the lat row ofp. (Here P [i 1 : i 2 ;j 1 : j 2 ] denote the rectangular region of P with (i 1 ;j 1 ) and (i 2 ;j 2 ) a the oppoite corner.) If x doe not occur in Y, D[x] im. After a hift, the d-gram under the lower right corner of the pattern i again inpected. Note that a d-gram probe i covered by rm alignment of P (ee Fig. 1), which mean that rm alignment can be kipped, when the probe doe not occur in P. Fig. 2 how a ituation where the pattern ha been aligned at (2; 4) and and d-gram x = T [5; 6 : 7] = ab ha been read. Becaue x occur on the lat row ofp, there i a potential match at(2; 5), which turn out to be an actual match. Becaue x appear alo on the econd row ofp, the length of hift will be m, 2 = 2 and the next d-gram to be probed will be T [7; 6 : 7]. Above we aumed that r + d = m + 1. In a general cae we have r + d m + 1 and the probe correpond to P [m; r : r + d, 1] which i not necearily in the lower right corner of P. For the ltration of potential matche we ue preproceed table M. 4

5 T P c c b c c c a b a c b b b a b c a a a b a c c b a c c b c c b c a a a a c c a b b a b a a c b b c b a c b a b c a b a b a b a c a b c b c a b b a b a b a c c a Figure 2: An example pattern and text. The entry M[x] tell the tarting column of an occurrence of d-gram x in Z = P [m; 1:r + d, 1], r + d m +1. If x doe not occur in Z, M[x] = 0. Another preproceed table N of ize m contain a linked lit of other occurrence of x in Z, awell a the correponding linked lit for other d-gram occurring in Z. So M(x) i the rt occurrence of x and N(M(x)) i the econd occurrence etc. Algorithm 1: Preproceing of P. 1. for i := 0 to c d do begin 2. D[i] :=m; 3. M[i] := 0 end; 4. for i := 1 to m do begin 5. x := P [i; 1]; 6. for k := 2 to d do x := x c + P [i; k]; 7. for j := 1 to r do begin 8. if i = m then begin 9. N[r, j +1]:=M[x]; 10. M[x] :=r, j + 1 end; 11. ele if D[x] >m, i then D[x] :=m, i; 12. if j<rthen 13. x := (x, P [i; j] c d,1 ) c + P [i; j + d] end end; Algorithm 1 decribe the computation of table D, M, and N. The 5

6 proceing of D i baed on denition D(y) = minfk j k = m or (k >0 and y = P [m,k;h : h+d,1]; 1 h r)g: We have now the following total method for two-dimenional tring matching. Algorithm 2: Two-dimenional tring matching. 1. compute D, M, and N with Algorithm 1; 2. j := r; 3. while j n, m + r do begin 4. i := m; 5. while i n do begin 6. x := T [i; j]; 7. for k := j +1toj + d, 1dox := x c + T [i; k]; 8. k := M[x]; 9. while k>0 do begin 10. Check(i, m +1;j, r + k); 11. k := N(k) end; 12. i := i + D[x] end; 13. j := j + r end Subroutine Check(a; b) on line 10 check the potential match at(a; b). 3 Analyi Let u conider the average cae complexity of Algorithm 2 without preproceing. We ue the tandard random tring model, where each character of the text and the pattern i elected uniformly and independently. The time requirement i proportional to C, the number of text character the algorithm inpect. Let u etimate C, the expected value of C. Wehave C = P (d + N E) where P i the expected number of top, N i the expected number of alignment examined at a top, and E i the expected number of character comparion for checking of an alignment. 6

7 The expected value of hift i S = c(1,(1,1=c)m ) for the BMH algorithm (ee e.g. [Bae89b]). In our approach, we need to replace c by 1=q, where q i the probability that a d-gram occur in a (r + d, 1)-gram. We will ue etimate q 1 and q 2 for q, q 1 q q 2, uch that q 1 =1, (1, 1 c d )r i the probability that a d-gram occur in rd-gram and q 2 = rc(r+d,1),d c r+d,1 = r c d i the probability that a d-gram without an overlap with itelf occur in a (r + d, 1)-gram. Now we get S = 1, (1, q)m q cd (1, (1, q) m ) r cd (1, (1, 1 ) rm ) c d : r Let u then conider the number of top. Let P1 be the expected number of top in one trip. By uing imilar reaoning a in [TaU93], we get P 1 (n, m +1)= S for large n, m +1. Thu we get P n, m +1 ( S n, m r +1) n2 r S : When etimating upward, we can ue r=c d for N, becaue r=c d i expected number of occurrence of a d-gram in rd-gram. We have E = c c, 1 (1 1, c ) m2,d at the rt top of a trip or when the previou hift i m (ee e.g. [Bae89b]). In other cae at mot d additional may bechecked. Hence we have E 2+d, becaue c 2. 7

8 Putting thee together, we get C = P (d + N E) n 2 r(d + N E) rc d (1, (1, 1 ) c d rm ) When d = dlog c (rm)e we get n2 (d + r c d (2 + d)) c d (1, (1, 1 c d ) rm ) : (1) C n2 (dlog c (rm)e(1 + r rm rm(1, (1, 1 2r )+ ) rm rm )rm ) becaue x(1, (1, 1=x) rm ) i an increaing function of x. Then becaue (1, 1 k )k < 1 for all k>1, e C n2 (dlog c (rm)e(1 + 1 m )+ 2 m ) rm(1, 1 e ) ; which i clearly O( n2 m 2 dlog c m 2 e) when r m=2. The algorithm need O(c d )=O(cm 2 ) pace. The computation of D, M, and N take time O(m 2 + c d )=O(cm 2 ), where the initialization of D and M take O(cm 2 ) time and the ret of the preproceing O(m 2 ) time. We have hown the following reult. Theorem 1 Algorithm 2 nd the occurrence of an m m pattern P in an n n text T in expected time O( n2 dlog m 2 c m 2 e+cm 2 ) and in pace O(cm 2 ) in an alphabet of c character. 4 Modication Linear time verion. Becaue the trivial algorithm i ued for checking, Algorithm 2 need O(m 2 n 2 ) time in the wort cae. There i a way to make our approach work in linear time alo in the wort cae without changing the average complexity. Let u conider how to modify Algorithm 2. Let k be a poitive contant. When kr text character have been inpected at a top of the pattern at (i; j), the proceing of Algorithm 2 at that top i ceaed and 8 ;

9 region T [i : i +2m, 1;j : j + r + m, 1] i proceed by Bird' algorithm [Bir77] (or ome other linear time algorithm), and after that Algorithm 2 i reumed with a hift of m. The preproceing for Bird' algorithm i performed during the rt call. The modied algorithm clearly work in linear time, becaue the amortized number of text poition the modied algorithm inpect for each rm region of T i at mot a contant time rm. Aymptotically, Bird' algorithm i applied very eldom, when k i large enough, and therefore it i eay to how that the average complexity will remain the ame. Rectangular hape and higher dimenion. Algorithm 2 can eaily be modied to work with pattern and text of arbitrary rectangular hape. The quare hape wa only ued to make the preentation clear. The generalization to higher dimenion i alo obviou. Shifting. In our algorithm, multiplication i ued to form the repreentation of a d-gram a an integer. Another alternative i to apply hifting. Againt common belief there i no dierence in eciency between multiplication and hifting in many computing environment. Hahing. A ueful modication i to apply hahing to ave pace and preproceing time epecially, when c i large. However, hahing make Algorithm 2 a bit lower. One may x the ize of D and M and ue ome hah function h when referencing to thee table. Note that the minimum value hould be tored in D and the link chain in M and N hould be united in the cae of a colliion. If the actual ize of the alphabet i unknown, m 2 may be ued for c. When c d i o large that i cannot repreented a integer, the mod operation hould be applied to computation of the integer repreentation of d-gram (ee [KaR87]. Bitmap picture. In many microcomputer a bitmap picture i repreented o that a byte correpond to eight conecutive pixel on a row. Our method i eay to adopt to take advantage of that. When d =8k for k =1;:::, the algorithm work for m 8+d,1 and r =8d(m+1,d)=8e. 9

10 A the only additional change, the rt trip mut be handled in a dierent way: the initial value of j hould be r 0 = r, d +1. Ue of ubpattern. If the bottom row of the pattern contain d-gram that occur frequently in the text, the checking phae i repeatedly tarted, which i not deirable for our algorithm. To avoid thi phenomenon a uitable ubpattern could be elected for the ltration phae according to ome heuritic. For example, a ubpattern with a bottom row without d-gram 0 and c d, 1 i uually advantageou for canning of a bitmap picture. The actual checking could be performed with the original pattern. Alo the canning direction of the algorithm (left-to-right, top-down) can be made optional. 5 Experience Our algorithm i ecient, conceptionally imple, and eay to implement. Experimental reult of the behavior our algorithm on random tring are hown in Table 1, where we compare Algorithm 2 with the Baeza-Yate- Regnier algorithm (BYR) [BaR93] and the trivial algorithm in the binary alphabet for n = 1000 and for 2 m 64. For Algorithm 2, we elected r = minfk j m +1, k log 2 (km)g and d = dlog 2 (rm)e. The gure in Table 1 repreent total execution time in econd containing preproceing and checking but excluding loading of the pattern and the text. The value are median time of ten repeat of the tet with a new et of pattern. The algorithm were coded in C and the experiment were carried out in a Sun4 worktation. The trivial algorithm wa the bet for m<5. Within the range 5 m< 10 Algorithm 2 and the BYR algorithm were in practice equally good. For value m 10 our algorithm wa unquetionably the bet. Algorithm 2 work alo quite well with non-optimal value of r and d. When d i xed, the mot advantageou value for r i not alway m, d +1, a one might expect, but depend on c. For example for d = 1 and m = 20, the bet value for r i 1 for c<13, grow with c and reache 20 when c = 170 according to our etimate (1) of the Section 3. Our practical experiment conrm thi phenomenon. In the ame time we made experiment in one-dimenional tring match- 10

11 Table 1: Experimental reult (in econd) for c =2and n = m Trivial BYR Alg

12 ing uing d-gram intead of ingle character (like Baeza-Yate in [Bae89]). The peed-up in the two-dimenional cae looked much better, becaue the adequate pattern are larger than in the one-dimenional cae. Acknowledgement. code of hi algorithm. We thank Ricardo Baeza-Yate for providing the Reference [Bae89] [Bae89b] [BaR90] [BaR93] [Bak78] [Bir77] [BoM77] [CGR93] R. Baeza-Yate: Improved tring earching. Software Practice & Experience 19 (1989), 257{271. R. Baeza-Yate: String earching algorithm reviited. In: Proceeding of Workhop on Algorithm and Data Structure (ed. F. Dehne et al.), Lecture Note in Computer Science 382, Springer-Verlag, Berlin, 1989, 75{96. R. Baeza-Yate and M. Regnier: Fat algorithm for two dimenional and multiple pattern matching. In: Proceeding of SWAT90, 2nd Scandinavian Workhop on Algorithm Theory (ed. J. Gilbert and R. Karlon), Lecture Note in Computer Science 447, Springer-Verlag, Berlin, 1990, 332{347. R. Baeza-Yate and M. Regnier: Fat two dimenional pattern matching. Information Proceing Letter 45 (1993), 51{57. T. Baker: A technique for extending rapid exact-match tring matching to array more than one dimenion. SIAM Journal on Computing 7 (1978), 533{541. R. Bird: Two dimenional pattern matching. Information Proceing Letter 6 (1977), 168{170. R. Boyer and S. Moore: A fat tring earching algorithm. Communication of the ACM 20 (1977), 762{772. M. Crochemore, L. Gaieniec, and W. Rytter: Two-dimenional pattern matching by ampling. Information Proceing Letter 46 (1993), 159{

13 [GaP92] [Hor80] [KaU93] [KaR87] [KiS93] [TaU93] Z. Galil and K. Park: Truly alphabet-independent two-dimenional pattern matching. In: Proceeding of the 33t IEEE Annual Sympoium on Foundation of Computer Science, IEEE, 1992, 247{256. N. Horpool: Practical fat earching in tring. Software Practice & Experience 10 (1980), 501{506. J. Karkkainen and E. Ukkonen: Two and higher dimenional pattern matching in optimal expected time. To be preented in the Fourth Sympoium on Dicrete Algorithm. R. Karp and M. Rabin: Ecient randomized pattern-matching algorithm. IBM Journal of Reearch and Development 31 (1987), 249{260. J. Kim and J. Shawe-Taylor: Fat expected two dimenional pattern matching. In: Proceeding of the Firt South American Workhop on String Proceing (ed. R. Baeza-Yate and N. Ziviani), Sept. 13{15, 1993, 77{92. J. Tarhio and E. Ukkonen: Approximate Boyer-Moore tring matching. SIAM Journal on Computing 22 (1993), 243{260. [Yao79] A. Yao: The complexity of pattern matching for a random tring. SIAM Journal on Computing 8 (1979), 368{387. [ZhT89] R. Zhu and T. Takaoka: A technique for two-dimenional pattern matching. Communication of the ACM 32 (1989), 1110{

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

arxiv: v3 [cs.cg] 1 Oct 2018

arxiv: v3 [cs.cg] 1 Oct 2018 Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar

More information

The underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat

The underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat Two Topic in Applied Algorithmic By Patrick R. Morin A thei ubmitted to the Faculty of Graduate Studie and Reearch in partial fullment of the requirement for the degree of Mater of Computer Science Ottawa-Carleton

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images 2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Analysis of slope stability

Analysis of slope stability Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Size Balanced Tree. Chen Qifeng (Farmer John) Zhongshan Memorial Middle School, Guangdong, China. December 29, 2006.

Size Balanced Tree. Chen Qifeng (Farmer John) Zhongshan Memorial Middle School, Guangdong, China. December 29, 2006. Size Balanced Tree Chen Qifeng (Farmer John) Zhonghan Memorial Middle School, Guangdong, China Email:44687@QQ.com December 9, 006 Abtract Thi paper preent a unique trategy for maintaining balance in dynamically

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

x y z Design variable positions A

x y z Design variable positions A COMMUNICATIONS IN NUMERICAL METHODS IN ENGINEERING Commun. Numer. Meth. Engng 2001 00:1{7 [Verion: 2000/03/22 v1.0] A tabilied peudo-hell approach for urface parametriation in CFD deign problem O. Soto,R.Lohner

More information

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110

More information

Parallel MATLAB at FSU: Task Computing

Parallel MATLAB at FSU: Task Computing Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Polygon Side Lengths NAME DATE TIME

Polygon Side Lengths NAME DATE TIME Home Link 5- Polygon Side Length Find any miing coordinate. Plot and label the point on the coordinate grid. Draw the polygon by connecting the point. y a. Rectangle ABCD A: (, ) B: (-, ) The length of

More information

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information