International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN

Size: px
Start display at page:

Download "International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN"

Transcription

1 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN Phrase Based Doument Retrieving y Comining Suffix Tree index data struture and Boyer- Moore faster string searhing B.Ganga, Researh student, gangaalu@yahoo.om ABS TRACT Phrase has een onsidered as a more informative feature term for improving the effetiveness of doument retrieval.this paper propose an Algorithm A Phrase Based Doument Retrieval to retrieve the similar douments y omining two exiting suffix tree,index data struture and The Boyer-Moore Algorithm, faster string searhing. The suffix tree is onstruted ased on E. Ukkonen, on-line Constrution Of Suffix Trees For Strings, a most effiient string-mathing. On the onstruted suffix, The Boyer-Moore Algorithm is applied to hek the presene of pattern i.e. the input phrase in order and without order to retrieve the similar douments. Furthermore, y studying the property of suffix tree and Boyer-Moore, we onlude that suffix tree data struture store huge douments and Boyer-Moore heks the presene of pattern fastly. This onlusion suffiiently explains why the Phrase Based Doument Retrieval works muh etter than the other doument retrieval. KEYWORDS: Suffix tree, Boyer-M oore, Doument retrieval.. INTRODUCTION Phrase identifiation is an important task of Doument Retrieval. Most of the retrieval tehniques are designed and ased on words or keywords and its ourrene. Conepts are often expressed as phrases onsisting of multiple words whose meaning is sustantially different from the meaning of the individual words. For example the phrase Artifiial Intelligene is different than individually Artifiial and Intelligene, and Operating System is different than the individual words Operating and System. Composite expressions are prevalent in natural language, hene there is a need in the information retrieval systems to have a methodology that identifies phrases and do a retrieval ased on it. Doument representation is a major prolem in the information retrieval. The Phrase Based Doument retrieval omine advantages of two Ukkonen s, suffix tree, for strings and oyer-moore string searh. Suffix tree is used to represents the doument as suffix of the tree and the Boyer-Moore, string searhing is used to searh input phrase in onstruted suffix in order and without order to retrieve the similar douments together. The purpose of implementing suffix tree is, it is effiient data strutures to store the large text, faster and numer of nodes reated is less when ompared to suffix trie, the previous and The Boyer-Moore Algorithm, is faster string searhing. This paper emphasizes on phases present in douments and do a retrieval ased on it.the Phrase Based Doument Retrieval Algorithm represent eah doument as suffix trees, a data struture where phrases of the douments are stored as suffixes of tree and Boyer Moore is used to hek the presene of pattern i.e. the input phrase in order and with out order. Suffix tree is onstruted y using E.Ukkonen, on-line Constrution Of Suffix Trees For Strings and enhaned to represent suffix tree for any type of doument namely Portale Doument Format, MS Format Files like MS Word, MS PowerPoint, MS Exel and Text files. And here edges of suffix tree are suffix i.e. phrases of the douments. And one suffix tree is onstruted, several operations an e performed quikly, for instane loating a sustring in, loating mathes for a regular expression or pattern et. suffix tree retrieval performane is etter ompare to other form ased retrieval and searhing eomes faster with suffix tree onstrution. The Boyer-Moore string searh is a partiularly effiient, and has served as a standard enhmark for string searh ever sine. This s exeution time an e su-linear, as not every harater of the string to e searhed needs to e heked. Generally speaking, the gets faster as the target string eomes larger..ojetives of the work The ojetives inlude Retrieving similar douments whih has input phrase in order and without order y omining two methodogies, the suffix tree and Boyer-Moore. And enhaned to retrieve the douments of different form suh as Portale Doument Format, MS Format files and Text files. The approah was an experiment to oserve the proposed methodology s aility i.e. using phrase to improve the retrieval. The rest of this paper is organized as follows: Setion 2 disuss the literature survey. Setion 3 starts with design of Phrase Based Doument Retrieval. Setion 4 illustrates the testing and experimental results. Finally Setion 5 summarizes the ontriutions of work.

2 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN LITERATURE SURVEY 2. Doument Retrieval Doument Retrieval is defined as the mathing of some user stated query against a set of free-text reords []. These reords ould e any type of mainly unstrutured text, suh as newspaper artiles, real estate reords or paragraphs in a manual. User queries an range from multi-sentene, full desriptions of an information need to a few words. and at most one parent node. An ordered tree data struture is used to store an assoiative array where the keys are strings. It s regarded as faster than a hash tale ut less spae-effiient. 2.2 Doument Retrieval System Doument Retrieval system onsists of a dataase of douments, a lassifiation to uild a full text index, and a user interfae to aess the dataase. The system finds information to given riteria y mathing text reords (douments) against user queries, as opposed to expert systems that answer questions y inferring over a logial knowledge dataase. And two main lasses of indexing shemata for doument retrieval systems are form ased (or word ased), and ontent ased indexing. The doument lassifiation sheme (or indexing ) in use determines the nature of the doument retrieval system. Form ased doument retrieval addresses the exat syntati properties of a text, omparale to sustring mathing in string searhes. The text is generally unstrutured and not neessarily in a natural language, the system ould for example e used to proess large sets of hemial representations in moleular iology. A suffix tree is an example for form ased indexing. The ontent ased approah exploits semanti onnetions etween douments and parts thereof, and semanti onnetions etween queries and douments. Most ontent ased doument retrieval systems use an inverted index. 2.3 Index Data Strutures Searh engine arhitetures vary in the way indexing is performed and in methods of index storage to meet the various design fators. Types of indies inlude [2]: 2.3. Suffix Tree Figuratively strutured like a tree, supports linear time lookup. Built y storing the suffixes of words. The suffix tree is a type of trie. Tries support extendale hashing, whih is important for searh engine indexing. Used for searhing for patterns in DNA sequenes (Deoxyrionulei aid is a nulei aid that ontains the geneti instrutions used in the development and funtioning of all known living organisms and some viruses) and lustering Tree A tree is a widely-used data struture (way of storing and organizing data) that emulates a hierarhial tree struture with a set of linked nodes. And it is an ayli onneted graph where eah node has a set of zero or more hild nodes, Figure 2. Tree (Data Struture) Inverted index In information tehnology, an inverted index is an index data struture storing a mapping from ontent suh as words or numers, to its loation in data ase file allowing full text searh. And it stores a list of ourrenes of eah atomi searh riterion, typially in the form of a hash tale or inary tree Ngram index Stores sequenes of length of data to support other types of retrieval or text mining Term doument matrix Used in latent semanti analysis, stores the ourrenes of words in douments in a two-dimensional sparse matrix (a matrix populated primarily with zeros). 2.4 Suffix Trees 2.4. Tries and Trees A trie (from retrieval), is a multi-way tree struture useful for storing strings over an alphaet. It has een used to store large ditionaries of English (say) words in spelling-heking programs and in natural-language "understanding" programs. For example the given the data is BCABC then the orresponding trie would e as shown in Figure 2.2. The advantage of suffix trie is that if you have an input text of length n, and a searh string of length m, a traditional rute fore searh will take as many as nm harater omparison to omplete, the suffix trie demolishes this performane y requiring just m harater omparisons, regardless of the length of the text eing searhed. The disadvantage in trie is that more spae is wasted as a lot of nodes near the edge of the trie will have most su tries set to nil, numer of nodes reated is more.

3 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN a a C BCABC a a a a Fig 2.3 Suffix tree for String BCABC Three Main [4][5] used to onstrut suffix trees are Weiner,MCreight, spae effiient linear-time, onstruted in 97 and E.ukkonen, On-line onstrution of suffix trees,995. Weiner was the first to show that suffix tree an e uilt in linear time. Figure 2.2 Trie for string BCABC Suffix Trees Introdution The suffix tree for a given lok of data retains the same topology as the suffix trie, ut it eliminates nodes that have only a single desendant.the tree has the same general shape as trie just far fewer nodes. By eliminating every node with just a single desendant, the ount is redued. Suffix Tree Mehanisms Suffix Tree Mehanisms start at longest suffix and work our way down to shortest suffix. Eah suffix ends at a node whih is of 3 types. First one is Leaf nodes whih are defined as all the suffixes that are longer than the suffix defined y the ative point. Seond is expliit node whih is the non-leaf nodes where 2 or more edges part way. Third is impliit node whih is the non- leaf nodes whose prefixes all ends in the middle of the edges. MCreight introdued a more spae effiient linear-time in 97 MCreight s original for onstruting a suffix tree had a few disadvantages, priniple among them was the requirement that the tree e uilt in reverse order, and meaning haraters were added from the end of the input. This ruled the out for the on -line proessing, making it muh more diffiult to use for appliations suh as data ompression. Suffix is represented y defining its harater. As first harater starts at node 0 i.e. Suffix ojet defines the last harater in a string y starting at a speifi node then following the string of haraters in the input sequene pointed to y the first harater index and last harater index memers Ukkonen developed a simpler to understand linear-time in 995. Ukkonen s was slightly modified version of the that works from left to right [5]. For a given string of text, T, Ukkonen s starts with an empty tree, then progressively adds eah of the n suffixes of T to the suffix tree. For example, when reating the suffix tree for BANANAS, is inserted into the Tree, then BA, then BAN, and so on. When BANANAS is finally inserted, the tree is omplete. AN B BA A BAN Definitions The suffix tree for the string S of length n is defined as a tree suh that the paths from the root to the leaves have a one to one relationship with the suffixes of S and edges spell non- empty strings, And all internal nodes (exept the root ) have at least two hildren[3]. The suffix tree for the string BCABC is as follows and ompared to suffix trie the numer of nodes reated is less. Figure 2.4 Progressively Building the Suffix Tree Algorithm for Updating the Suffix [4] Build suffix tree T for string S [...m] Begin N

4 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN String Mathing Algorithm Given a pattern of length m and a ody of text of length n, return true if the pattern is found in text, or false otherwise. Inluding omputational iology, omputer siene, and mathematis []. o Appliations Ovious find text in a doument, on a In the ase of a mismath, the omputes a new alignment for the target string ased on the mismath. This is where the gains onsiderale effiieny Comparisons of Brute Fore, Horspool, Boyer-Moore String Searh - Numer of Comparisons Made x 0 Brute Fore Horspool Boyer-Moore 4 2 numer of omparisons ) Build the tree in m phases, one for eah harater. At the end of phase i, we will have tree Ti, whih is the tree representing the suffix S [...i] is an online onstrution. 2) In eah phase i, we have i extensions, one for eah harater in the urrent suffix. At the end of extension j, we will have ensured that S [j..i] is in the tree Ti. End The egins with an impliit suffix tree ontaining the first harater of the string. Then it steps through the string adding suessive haraters until the tree is omplete. This order addition of haraters gives Ukkonen's its "on-line" property, earlier s proeeded akward from the last harater Text length x 0 wepage, et Brute Fore Fig 2.5 Comparisons of Brute Fore, Horspool, BoyerMoore The rute fore onsists in heking, at all positions in the text etween 0 and n-m, whether an ourrene of the pattern starts there or not. Then, after eah attempt, it shifts the pattern y exatly one position to the right. The rute fore requires no preproessing phase, and a onstant extra spae in addition to the pattern and the text. During the searhing phase the text harater omparisons an e done in any order. The time omplexity of this searhing phase is O (mn) (when searhing for am- in an for instane). The expeted numer of text harater omparisons is 2n Horspool s Algorithm Step For a given pattern P of length m, ompute the shift tale. Step 2 - Align the pattern against the eginning of the text Step3 Starting with the last harater in the pattern, ompare text and pattern. If pattern mathes, return suess If pattern does not math, use the mismathed harater from the text as. Lookup in the shift tale, and align the pattern to that position. Repeat step 3 until the end of string (or a math is found) Boyer-Moore The B-M takes a akward approah: the target string is aligned with the start of the hek string, and the last harater of the target string is heked against the orresponding harater in the hek string [7]. In the ase of a math, then the seond-to-last harater of the target string is ompared to the orresponding hek string harater. (No gain in effiieny over rute-fore method) 3. DESIGN 3. Theoretial akground The design is onsidered to e one of the most important phases of software development. The first phase is the development of a suffix tree, data struture for storing the douments of different format suh as Portale Doument Format, MS Format files and Text files.in onstruted suffix tree, the edges are stored in hash tale. Hashing is a very effiient way to store and retrieve data [9]. The seond phase is the development of the Phrase Based Doument Retrieval. For the input, phrase either in order or without order is taken.and the last phase is the development of the proper user interfae to assist the user in using th e Phrase Based Doument retrieval appliation [0]. 3.2 Prolem Formulation The fous of work is to omine the advantages of two methodogies suffix tree and Boyer-Moore in doument retrieval. As a result the Phrase Based Doument retrieval Algorithm represent eah doument as suffix trees, where phrases of the douments are stored as suffixes of tree in hash tale for effiient storing and retrieval and Boyer Moore is used to hek the presene of pattern i.e. the input phrase in order and with out order. 3.3 Phase :Algorithm for Construting The Suffix Tree Suffix Tree is onstruted for the doument y using E.Ukkonen, On-line onstrution of suffix trees and enhaned to onstrut the suffix tree for doument of different types. The onstruted suffix tree store the edges

5 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN heese 3 in a hash map, using a hash key ased on their starting node numer and the first harater of the sentenes. This implementation ompetently handles huge amount of data. A simple suffix tree for File.pdf [8] is shown in figure 3.. File.pdf Cat ate heese.mouse ate heese too.cat ate mouse too. Root Root ate Proposed Algorithm Comines Suffix Tree and Boyer-Moore too for Douments with input phrase in order 7. The suffix tree onstruted for every doument is otained. 2. The suffixes are sorted ignoring ase. 3. Then The Boyer-Moore string searh is applied. 4. Input phrase is defined as pattern and stored suffix as text. 5. Then The Boyer-Moore string searh is applied. Figure 3. Example of a Suffix Tree with Sentenes Algorithm for Construting the Suffix Tree The general arhiteture of Phrase Based Doument retrieval. Read the Doument. retrieving input phrase in order in shown in figure3.2 The 2. Tokenize the Doument into sentenes. general desription of the is, it takes input as set of 3. Start onstruting the suffix tree for eah sentene. douments in the form of Portale Doument Format, MS i. For Every sentene, add suffix is done to add the suffix Format files and Text files and input phrase and implements to onstrut suffix tree. suffix tree whih represent doument as suffix and ii In add_suffix then Boyer-Moore is applied and output is If the node is expliit node otained as the set of douments whih ontains the input Then the suffix are added into EDGE_KEY phrase in order. Else if the node is impliit node Then The suffix are added into EDGE_KEY lass And the split edge is done. iii. A node is reated. iv. The details of the suffix are added into edge lass. v. To add the suffix an edge is inserted. vi. Canonize is done to move to next smaller suffix. 4. The onstruted suffix is displayed. 3.4 Phase 2: Algorithm for Retrieving the Douments with input phrase in order. Cat ate heese Cat ate mouse h Mouse ate heese 4 5 ate heese too heese too On the onstruted suffix, Boyer Moore is applied to hek the presene of pattern i.e. the input phrase in order. The Boyer-Moore string searh (math a pattern of length n in a text of length m) 8 ate Mouse 9 0 Mouse i. Calulate the length of pattern and Text. ii. Preproess the pattern for the right-to-left-san and adharater-shift rules y finding the right-most positions of all haraters in the pattern. iii. Align p and t, starting on index and shift p to the left, until we reah the end of t. iv. San the pattern from right to left, omparing the aligned haraters at the urrent position in the text x and at the urrent position in the pattern y. v. If the pattern is longer than the text, we have no math. vi. In the ase of a mismath, we do the shifting Retrieve the right-most index of the mismathing textharater in the pattern. If the mismathing harater in the text is not in the pattern, shift until we are aligned ehind the mismath-position. Else we shift the pattern to the right until the right-most ourrene of x in the pattern is under the mismath position in the text. vii. If the haraters are equal and the pattern has een sanned ompletely from right to left, we have a math. We store the math and shift the pattern one position to the right.

6 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN Diretor y with set of Doume Douments are Represente d Figure 3.2 General Arhiteture of Phrase Based Doument retrieval retrieves Input Phrase in Order Algorithm for Retrieving the Douments with input phrase without order The general arhiteture of Phrase Based Doument retrieval retrieving input phrase without order in shown in figure3.3.the general desription of the is, it takes input as set of douments in the form of Portale Doument Format, MS Format files and Text files and input phrase and implements suffix tree whih represent doument as suffix and then Boyer-Moore is applied where input phrase is tokenized into words, input phrase ontaining all words are heked in suffixes and output is otained as set of douments whih ontains the input phrase without order. Diretor y with set of Doumen Phrase (in order) Douments are Represente d Phrase (with out order) Otain one file Otain one file Implement Suffix Tree Boyer- Moore is applied Stringmathing Boyer- Moore is applied Stringmathing Suffix Tree Is Construted Doument Containing Phrase (with order) Suffix Tree Is Construted Figure 3.3 General Arhiteture of Phrase Based Doument retrieval retrieves Input Phrase without Order Algorithm for Retrieving the Douments with input phrase without order. The suffix tree onstruted for every doument is otained. 2. The suffixes are sorted ignoring ase. 3. The input phrase is tokenized into words and stored. 4. Eah word in the input is defined as pattern individually and stored suffix as text. 5. Then The Boyer-Moore string searh is applied as shown in for retrieving the Douments with input phrase in order. And then following steps are also implemented to searh input phrase present in any order. Begin Chek for math and store the math. Chek if input phrase is equal to store math with same suffix. If so then store the name of the doument after heking for the presene of any dupliation of doument name. Else Chek in next suffix End. 3.5 Doument Colletion Input is set of douments in form PDF files, MS Format Files suh as MS Word, MS Exel, MS PowerPoint and Text File. Implement Suffix Tree Doument Containing Phrase (with out order ) 4. TESTING AND EXPERIMENTAL RESULTS The development and deployment of The Phrase Based Doument retrieval is done in Elipse mix of Java.4 and Java 5 VMs[][2]. For reading Portale Doument Format PDF Box, java API and for reading MS Format files suh as MS Word, MS Exel, MS PowerPoint Apahe POI java API is used. Comparative study of Phrase Based Doument retrieval Algorithm and previous Suffix tree and Boyer- Moore Algorithm. Previous Suffix tree onstrut suffix tree for strings and numers of nodes reated are more as suffixes are onstruted for strings and Boyer-Moore Algorithm searh pattern inside a text where as Phrase Based Doument retrieval Algorithm Comines advantages of oth Previous s Suffix Tree, Boyer-Moore and enhaned to represent different types of douments, searhing is done in douments and retrieve them ased on input phrase in order and without order. Numers of nodes reated are less as suffixes are onstruted for sentenes in douments. 4. Performane Metris The performane of Phrase Based Doument retrieval Algorithm is evaluated using performane oeffiient suh as Numer and types of Files availale for retrieval. Size of Files availale for retrieval. Time taken to retrieve the similar douments

7 International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN The graphial representation of the performane of Phrase Based Doument retrieval Algorithm is shown in figure 4. and 4.2. testing and further improvements are required whih are given elow. 5. Limitations of the work The prolems oserved were diffiulty to retrieve the douments when input phrase is huge. The time taken to retrieve the douments also grows in diret proportion with size of douments. Figure 4.2 Size of Douments in MB with respet to Numer of Douments 5. CONCLUSION AND FUTURE WORK The projet was aout retrieving similar douments whih has input phrase in order and without order y omining two methodogies, the suffix tree and Boyer-Moore and enhaned to retrieve the douments of different form suh as Portale Doument Format, MS Format files and Text files. The approah was an experiment to oserve the proposed methodology s aility to improve the retrieval, whih partially sueeded with the given samples. Thorough 5.2 Future Enhanements The size of suffix tree is growing in diret proportion to size of the douments. And the time taken to retrieve the douments also grows in diret proportion. To provide more effiient way of retrieval suffix tree an e onverted into suffix arrays. And some page ranking an e applied to rank the retrieved douments. REFERENCES [] Fe 03, 2009 [2] Fe Figure 4. Time taken to retrieve douments in minutes with 03, respet to Numer of Douments [3]E.Ukkonen, On-Line Constrution of Suffix Trees, Algorithmia, vol.4, no.3, pp , Septemer, 995. [4] R.Giegerih and S.Kurtz, From Ukkonen to MCreight and Weiner: A Unifying View OF Linear _ Time Suffix Tree Constrution,Algorithmia,volume9, pages33 353,997. [5] Mark Nelson, Fast String searhing with suffix Trees, Dr. Do's Journal, August, 99. [] Dan Gus field, Algorithms on Strings, Sequenes and Trees, Camridge University Press, Seond Edition, 999. [7]. Moore_string_searh_, June4, [8]. Hung Chim and Xiaotie Deng, Effiient Phrase Based Doument Similarity For Clustering, IEEE Transations On knowledge And Data Engineering, vol 20, Sep 2008 [9] Her Shildt, Java programming ookook, MGraw-Hill Osorne Media, First Edition,Novemer 5, [0] Dr. Satyaraj Pantham, Pure JFC Swing, Sams, First Edition, Nov 999. [] Herert Shildt, Java Complete Referene, MGraw-Hill Osorne Media, 5th edition, [2] Marh 4, Aout The Author B.Ganga native of Tamilnadu. I have reeived my B.E degree in omputer siene and engineering from Karunya Ins titute of Tehnology, Tamilnadu and M.Teh in s oftware Engineering from M.S.Ramaiah Institute of Tehnology, Ba n g a lo r e. I have s even years of leturing experiene in engineering ollege and presently doing researh in data mining. My area of interes t helping human kind through tehnology.

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Path Sharing and Predicate Evaluation for High-Performance XML Filtering*

Path Sharing and Predicate Evaluation for High-Performance XML Filtering* Path Sharing and Prediate Evaluation for High-Performane XML Filtering Yanlei Diao, Mihael J. Franklin, Hao Zhang, Peter Fisher EECS, University of California, Berkeley {diaoyl, franklin, nhz, fisherp}@s.erkeley.edu

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Machine Vision. Laboratory Exercise Name: Student ID: S

Machine Vision. Laboratory Exercise Name: Student ID: S Mahine Vision 521466S Laoratory Eerise 2011 Name: Student D: General nformation To pass these laoratory works, you should answer all questions (Q.y) with an understandale handwriting either in English

More information

Computational Biology 6.095/6.895 Database Search Lecture 5 Prof. Piotr Indyk

Computational Biology 6.095/6.895 Database Search Lecture 5 Prof. Piotr Indyk Computational Biology 6.095/6.895 Database Searh Leture 5 Prof. Piotr Indyk Previous letures Leture -3: Global alignment in O(mn) Dynami programming Leture -2: Loal alignment, variants, in O(mn) Leture

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

A Compressed Breadth-First Search for Satisfiability

A Compressed Breadth-First Search for Satisfiability A Compressed Breadth-First Searh for Satisfiaility DoRon B. Motter and Igor L. Markov Department of EECS, University of Mihigan, 1301 Beal Ave, Ann Aror, MI 48109-2122 dmotter, imarkov @ees.umih.edu Astrat.

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage International Journal of Fuzzy Mathemat and Systems. ISSN 48-9940 Volume 4, Numer (014, pp. 193-01 Researh India Puliations http://www.ripuliation.om On Optimal Total Cost and Optimal Order Quantity for

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Data Structures in Java

Data Structures in Java Data Strutures in Java Leture 8: Trees and Tree Traversals. 10/5/2015 Daniel Bauer 1 Trees in Computer Siene A lot of data omes in a hierarhial/nested struture. Mathematial expressions. Program struture.

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

TMIX: Temporal Model for Indexing XML Documents

TMIX: Temporal Model for Indexing XML Documents TMIX: Temporal Model for Indexing XML Douments Rasha Bin-Thalab Department of Information System Faulty of omputers and Information Cairo University, Egypt azi_z30@yahoo.om Neamat El-Tazi Department of

More information

Circular Pruning for Lazy Diagnosis of Active Systems

Circular Pruning for Lazy Diagnosis of Active Systems Cirular Pruning for Lazy Diagnosis of Ative Systems Andrea Duoli, Gianfrano Lamperti, Emanuele Piantoni, Marina Zanella Dipartimento di Elettronia per l Automazione, Università di Bresia, Italy Astrat:

More information

Efficient and scalable trie-based algorithms for computing set containment relations

Efficient and scalable trie-based algorithms for computing set containment relations Effiient and salale trie-ased algorithms for omputing set ontainment relations Yongming Luo #1, George H. L. Flether #2, Jan Hidders 3, Paul De Bra #4 # Eindhoven University of Tehnology, The Netherlands

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Interconnection Styles

Interconnection Styles Interonnetion tyles oftware Design Following the Export (erver) tyle 2 M1 M4 M5 4 M3 M6 1 3 oftware Design Following the Export (Client) tyle e 2 e M1 M4 M5 4 M3 M6 1 e 3 oftware Design Following the Export

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

A Support-Based Algorithm for the Bi-Objective Pareto Constraint

A Support-Based Algorithm for the Bi-Objective Pareto Constraint A Support-Based Algorithm for the Bi-Ojetive Pareto Constraint Renaud Hartert and Pierre Shaus UCLouvain, ICTEAM, Plae Sainte Bare 2, 1348 Louvain-la-Neuve, Belgium {renaud.hartert, pierre.shaus,}@ulouvain.e

More information

A Support-Based Algorithm for the Bi-Objective Pareto Constraint

A Support-Based Algorithm for the Bi-Objective Pareto Constraint Proeedings of the Twenty-Eighth AAAI Conferene on Artifiial Intelligene A Support-Based Algorithm for the Bi-Ojetive Pareto Constraint Renaud Hartert and Pierre Shaus UCLouvain, ICTEAM, Plae Sainte Bare

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Figure 1. LBP in the field of texture analysis operators.

Figure 1. LBP in the field of texture analysis operators. L MEHODOLOGY he loal inary pattern (L) texture analysis operator is defined as a gray-sale invariant texture measure, derived from a general definition of texture in a loal neighorhood. he urrent form

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Evolutionary Feature Synthesis for Image Databases

Evolutionary Feature Synthesis for Image Databases Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

OvidSP Quick Reference Card

OvidSP Quick Reference Card OvidSP Quik Referene Card Searh in any of several dynami modes, ombine results, apply limits, use improved researh tools, develop strategies, save searhes, set automati alerts and RSS feeds, share results...

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Mining Edge-Weighted Call Graphs to Localise Software Bugs

Mining Edge-Weighted Call Graphs to Localise Software Bugs Mining Edge-Weighted Call Graphs to Loalise Software Bugs Frank Eihinger, Klemens Böhm, and Matthias Huer Institute for Program Strutures and Data Organisation (IPD), Universität Karlsruhe (TH), Germany

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications British Journal of Mathematis & Computer Siene 1(4): 228-241, 2011 SCIENCEDOMAIN international www.sienedomain.org Traking Tale Tennis Balls in Real Math Senes for Umpiring Appliations K. C. P. Wong 1*

More information

Constrained Extreme Learning Machines: A Study on Classification Cases

Constrained Extreme Learning Machines: A Study on Classification Cases > REPLACE HIS LINE IH YOUR PAPER IDENIFICAION NUMBER (DOUBLE-CLICK HERE O EDI) < Constrained Extreme Learning Mahines: A Study on Classifiation Cases entao Zhu, Jun Miao, and Laiyun Qing Astrat Extreme

More information

Weak Dependence on Initialization in Mixture of Linear Regressions

Weak Dependence on Initialization in Mixture of Linear Regressions Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff Outline CS38 Introdution to Algorithms Leture 1 April 1, 2014 administrative stuff motivation and overview of the ourse stale mathings example graphs, representing graphs graph traversals (BFS, DFS) onnetivity,

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Query Optimization for Structured Documents Based on Knowledge. on the Document Type Denition. Institute of Inf. Systems. ETH Zentrum Dolivostr.

Query Optimization for Structured Documents Based on Knowledge. on the Document Type Denition. Institute of Inf. Systems. ETH Zentrum Dolivostr. Query Optimization for Strutured Douments Based on Knowledge on the Doument Type Denition Klemens Bohm Karl Aberer Institute of Inf. Systems GMD{IPSI ETH Zentrum Dolivostr. 15 8092 Zurih, Switzerland 64293

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Multi-Level Modeling of Concurrent and Distributed Systems

Multi-Level Modeling of Concurrent and Distributed Systems Multi-Level Modeling of Conurrent and Distriuted Systems Peter Taeling Hasso-Plattner-Institute for Software Systems Engineering P.O. Box 90 04 60, 14440 Potsdam, Germany taeling@hpi.uni-potsdam.de strat

More information

A Practical Tool for Visualizing and Data Mining Medical Time Series

A Practical Tool for Visualizing and Data Mining Medical Time Series A Pratial Tool for Visualizing and Data Mining Medial Time Series Astrat The inreasing interest in time series data mining in the last deade has had surprisingly little impat on real world medial appliations.

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3 Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Exploiting Longer Cycles for Link Prediction in Signed Networks

Exploiting Longer Cycles for Link Prediction in Signed Networks Exploiting Longer Cyles for Link Predition in Signed Networks Kai-Yang Chiang kyhiang@s.utexas.edu Nagarajan Natarajan naga86@s.utexas.edu Inderjit S. Dhillon inderjit@s.utexas.edu Amuj Tewari amuj@s.utexas.edu

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

Performance Enhancement Techniques for InfiniBand TM Architecture

Performance Enhancement Techniques for InfiniBand TM Architecture Performane Enhanement Tehniques for InfiniBand TM Arhiteture Eun Jung Kim? Ki Hwan Yum y Chita R. Das? Mazin Yousif z JoséDuato x? Department of Computer Siene and Engineering The Pennsylvania State University

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert Loria Université Nany 2 Campus Sientifique, BP 239 F-54506 Vandoeuvre lès Nany edex Dirk.Seifert@Loria.fr inria-00268864, version 2-23 Apr 2008

More information

PERSISTENT NAMING FOR PARAMETRIC MODELS

PERSISTENT NAMING FOR PARAMETRIC MODELS PERSISTENT NAMING FOR PARAMETRIC MODELS Dago AGBODAN, David MARCHEIX and Guy PIERRA Laboratory of Applied Computer Siene (LISI) National Shool of Engineers in Mehanis and Aeronautis (ENSMA) Téléport 2

More information