|
|
- Sara Kelley
- 8 years ago
- Views:
Transcription
1 Motion detection, labeling, data aociation and tracking, in real-time on RISC computer Lionel Lacaagne ;, Maurice Milgram, Patrick Garda Laboratoire de Intrument et Sytµeme Univerit e Pierre et Marie Curie BC place Juieu, 7 Pari - FRANCE lionel j garda@li.juieu.fr maum@ccr.juieu.fr IMASYS Le quadral bi rue E. Nieuport 9 Surene - FRANCE lionel@imay.fr Abtract - Thi article introduce ome algorithm for motion detection and tracking. To be able to track moving ob ject, the analyi rate mut be fat enough in order to keep the conidered movement low (and the feature of the ob ject not changing too fat). We are preenting a Markov Random Field baed motion detection algorithm running in real time on Pentium II and DSP C6x. For the medium level, we have developed a fat labeling algorithm, a benchmark i provided. The high level i fat becaue the previou proceing tep are running at a fater rate than the video rate. I. Motion Detection The motion detection (MD) i the bae of all ytem for tracking ob ject and image compreion. The MD algorithm are mainly belonging to two clae: optical ow and correlation. Thee method have been widely explored, everyone of them ha ome advantage and drawback. The implet method i an image di erence, where a igni cant variation of the grey level i aociated to a movement. At the ame time, Markov Random Field baed algorithm have aert themelve in a lot of image proceing area for regulariing ill poed problem( edge detection, region egmentation, retoration)[6]. If their main advantage i the robutne, their main drawback i their CPU conumming due to the huge amount of calculation. Thi lead reearcher to tudy a lot of olution to peed their execution up, a Parallel Machine, or dedicated architecture [][][]. We decribe the ue of MRF for enhancing an image di erence. After explaining the di erent kind of optimization, we how how to reach real time on RISC and DSP. A. A MRF approach The aim of the markovian proce i to improve the quality of the image di erence with a relaxation algorithm. Becaue of change of illumination, thi image i very noiy: a lot of pixel are labelled a in motion and the region are not lled. The energy model ha been introduced by the Li-Grenoble lab [][]. Let I t, be the grey level image at the moment t, and O t the obervation (O t = ji t I t j). Then threholding O t initialize the etimated eld of label ^E t : The background/movement ite are labeled =. The Iterated Conditional Mode (ICM g) i then applied to nd the relaxed label eld E t from ^E t, ^E t and E t. Relaxation being determinitic, the algorithm converge in few iteration ( xed to four), to the rt local minimum, o the initialization i very important. The traight forward image difference may be enhanced by a maximum likelihood [7], with or without con dence (CPU expenive).
2 Buffer I t- I t- I t O t - O t Binariation Binariation E t- Ê t- Ê t E t- ICM Figure { Relaxation algorithm V p e t ; e t V f e t ; e t+ p if e t = = e t + p if e t 6= et = f if e t = et+ + f if e t 6= et+ With the Iing model (pin up/pin down : +/- ): P u m = cc xt xt r pxt xt f x t xt+ with x t, the pin of the ite x, at t. In order to make the trace of I t to diappear, and to ll the overlapping, area due to the image di erence, it i convenient to repect the inequality: p < < f Experimental tet demontrate that the required parameter ( p ; ; f ; ) do not have to be tuned according to the image equence. They are et to the value: p = ; = ; f = ; = B. Energy function, clique. The energy model u ued i the um of two energie: u m model energy that i a regulation term which enure a patiotemporal homogeneity and which alo expree the relation with the neighboring ite, and u a adequation energy which prevent the model to drift too far from the initialization. u (o ; e ) = u m (e ) + u a (o ; e ) u m (e ) = P cc V c (e ;e r ) u a (o ; e ) = [o ¾ ª (e )] if background ª (e ) = > if mouvement homogeneou overlapping area I t- trace Figure { O t = ji t I t j I t C. Optimization t- t t+ Figure { patio-temporal clique Clique aociated to u m energy i a patiotemporal and econd order clique (Fig ). The patial potential function V i: V c (e ; e r ) = V (e ; e r )+V p (e t ; e t )+V f (e t ; e t+ ) V (e ; e r ) = if e = e r + if e 6= e r The temporal potential V p and V f, aociated to the pat and future clique are:. The optimization technique The mot common ued technique i the 'loopunrolling' (LU). It conit in the duplication of the loop body, but alo, when it i poible to make ome computation in 'parallel'. Even o, the C6x pipeline i not alway full. The oftware pipelining (SP) can olve thi problem by maximizing the ue of the di erent unit.. Algorithm characteritic Two conecutive mak overlap on two column. So the computation of the patial energy i then plitup in three column, and only one new column i computed intead of the three previouly required. The entire computation i performed by Look-Up
3 claical loop loop begin loop unrolling oftware pipelinig on a C6x (the indexe correpond to the delay with the current index t). loop end A B C = t + t = t + t a =A[j] c =C[j] b = B[j] t=a+c += t += b empty pace p = P[j-] up = (-p )beta p u = (8- )beta um =up +uf Figure { loop-unrolling, oftware pipelining f = F[j-] uf = (-f )beta f um += u Table (LUT) to avoid CPU intenive multiplication. The background/movement ite are labeled = rather than =. Intead of comparing the tate of each ite to the central ite e, we jut take into account ite which tate are (p, and f for the pat, preent and future image). So if the central ite tate i the patial energy i: u m = (8 ) + ( p ) p + ( f ) f, ele u m = u m If u m + u a < u m + u a, the tate i et to otherwie it i et to. The change i performed whatever the previou tate i. The tet can be impli ed by factoring the model and adequation term: u m < u a u a = ¾ (o ). Thi a priori minor modi cation can ave cycle on a total of 6 on DSP C6x, that i to ay 7%!. Implemented optimization The algorithm ha been implemented on a Pentium II MHz, and ha been etimated (from the number of cycle of the loop) for the TI-C6 at MHz. On the Pentium the number of available regiter i inu±cient to perform the Loop-Unrolling. So thi i the 8-accee-per-point verion, but with a LUT, that ha been implemented. On the C6x there are enough regiter. A Loop-Unrolling of order i performed. Becaue the model energy i computed fater with multiplication ( cyle) than with LUT ( cycle) we ue multiplication for u m and LUT for u a. The gure give the cheduling o = O[j-] delta_ua =DUa [o ] tet Figure { C6x cheduling B[j-] = b Per point, and on a C6, the etimated time, depending on the performed optimization (none, Loop-Unrolling, or Software Pipelining) are: optimization technique none LU SP intruction cycle ipc.7.6. % charge 6 MIPS A comparion of the di erent architecture implementing the ICM relaxation i given in the gure 6. Standard RISC proceor, programmed in C, achieve real time execution for image ize larger than 6 (up to ), and xed point DSP, in aembly language for image ize larger than (up to 7 ). II. Light Speed Labeling: a fat and new algorithm Thi paragraph introduce a fat algorithm for labelling binary image.it peed i almot independant from data. Moreover it tructure make the 8-connected verion a fat a the -connected ver-
4 Lab Architechture # chip f(mhz) image ize rate ² a cyclic implementation of equivalence intead of a \ at" implementation. Li Grenoble Li Grenoble Lamea Li Pari CNAPS 6 M 96 Tranviion (T9) C ~6 (x88) 6 8 Here are the di erent tep of the algorithm. The explanation will be illutrated by the example of the gure 8. Li Pari Li Pari Pentium II C6 (imulation) 6 7 j Figure 6 { di erent implementation L i- L i ion. The propoed algorithm i optimum with the number of created label, and it can be eaily and e±ciently parallelized. A. Claic labeling, RLC-baed labeling Figure 8 { Line L i, L i. Computation of ER i and RLC i B A C X B A X D ER i- j ER i Figure 7 { and 8-connected neighbor labeling Standard algorithm ue either the pixel approach (Fig 7: comparion of the current label, with the neighboring pixel) or the Run Length Coding (earch for an adjacent egment in order to nd out the connectivity). Both of them involve a great amount of tet, and, at the CPU level thi lead to many pipeline tall (waite of time) becaue the tet reult i, of coure, unpredictible. Latly and it i not it leat drawback, the pixel labeling produce many uele label. B. LSL algorithm The main idea in LSL i to replace all the tet (label comparion, fuion ort for egment interection) by a et of imple intruction without (or with much le) tet. Thee intruction are fat becaue pipelinable. The peed of LSL i baed on key point: ² intenive ue of RLC ² introduction of \relative" and \abolute" label for a direct acce (LUT) to the label of the interected egment Figure 9 { table ER The ER i table hold, for each line L i, the aociated relative label e r of each egment (object with an odd number) and each non-egment (background with an even number). RLC i- RLC i Figure { table RLC The RLC i table hold the \begin" and \end" indexe of each egment [a::b]. The j th egment of relative label e r = j + ha the boundarie a = RLC i [j], b = RLC i [j + ]. The current egment ha an interection with the egment numbered e r = ER i [a] e r = ER i [b]. The label e r / e r are enventually adjuted to point to the next / previou egment and not to the background: To perform a 8-connected labeling, which i equivalent to tet the diagonal label (NW, NE), it i enough to increment a by and to decrement b by, jut before looking up the ER i table. That make
5 the 8-connected verion a fat a the -connected verion.. Computation of ERA i L i- L i abolute label relative label Figure { abolute and relative label The ERA i aociate the relative and abolute label of a line. The table i calculated during the topdown label propagation. The relative label i aociated with the abolute label of the rt interected egment: e r = a = RLCi [] = ) a = b = RLC i [] = 9 ) b = 9 e a = ERA i (e r ) =, ERA i (e r ) = e a er = e r = 6 ) e r =. Computation of EQ To olve equivalence problem (computing the tranitive cloing of a graph i a complex problem) like adding an item to a cla, or more generally to fuion two clae, the equivalence clae have been implemented with cyclic graph in the EQ table. ++ Figure { equivalence cycle During the fuion, e a,mut be aociated with the other abolute label e ak of the interected label. e r k [e r + ::e r ], e ak = ERA i [e rk ] fuion(e a ; e ak ) with the example of the previou ection: e r k [e r + ::e r ] e r k f; g, e ak f; g for the abolute label, we have the equivalence. The equivalence of the label will be proceed like in gure.. Computation of EA i The abolute label of Li are obtained by LUT: EA i = ERA i (ER i ). Packing label and relabeling At the end, label are packed (to get continuou number) from EQ to A. The whole image i then updated: EA i = A(EA i ) C. Benchmark of LSL The algorithm ha been compare to claic pixel baed algorithm, eventually enhanced by cyclic equivalence. All verion ue 6-bit label. LSL i alo implemented in 8-bit becaue ometime the number of label i inferior to 6. We teted the algorithm on cae of labeling : mall/big region few/many character. We give the reult in m for -connected and 8-connected verion. The image ize i. bolt logo cap7 cap8 bolt logo C 8C C 8C pixel 6 6 pixel+cycle 68 LSL 6bit LSL 8bit LSL v pixel gain cap 7 cap 8 C 8C C 8C pixel pixel+cycle 9 LSL 6bit LSL 8bit - - LSL v pixel gain Our algorithm outperform by a factor from. to. pixel-labeling for the type of image ued in real motion detection. Even for OCR, LSL i a bit fater.
6 III. Region matching The matching ytem remain imple. It can not track neither two croing region, nor manage an object plitted into many region. But it i fat and it will be the bae to compare to clever ytem uing arti cial intelligence [8]. E E IV. Concluion I t For two conecutive image (I t ; I t ), the interection area i computed (in grey on the Fig I t ). for each region thee urface are orted into decending numerical order. Aociating label i then equivalent to earch the bet matching all over the tree. In thi tree a node correpond to a peci c matching between two region of two conecutive image, and a branch correpond to a et of matching. The choen ub-tree i thi which maximize the um of the interected urface. Thank to the ort, the bet ub-tree i located on the left of the tree, even it i the leftiet ub-tree of the tree. The following image are extracted from the famou \taxi" equence. Figure I and I are the original image, gure ^E ; ^E are the abolute difference O t binarized with a threhold value of, and gure E ; E are the ICM relaxed image. I t I I ^E ^E In thi article, we have hown how to get a real time and a robut motion detection baed on MRF on a RISC and DSP. We have propoed an new labeling algorithm, fater than the claical one. Then, becaue thee algorithm are fat and becaue we get good reult, it remain enough time to perform a region matching and a tracking. Becaue all of thee algoritm have been optimized, the whole proceing i running in real time, at the video rate for 6 6 image. Reference [] R. Azencott \Simulated annealing: parallelization technique" John Whiley 99 [] A. Bellon \D etection et uivi de v ehicule en mouvement, impl ementation parallµele ur un ytµeme exp erimental µa m emoire ditribu ee", thµee LAS- MEA, Clermont Ferrand, Oct 997. [] A. Caplier \Modµele markovien de d etection de mouvement dan le equence d'image: approche patio-temporelle, mie en oeuvre temp r eel" thµee INPG, Grenoble 99. [] A. Caplier, F. Luthon, C. Dumontier \Algorithme markovien de d etection de mouvement, mie en oeuvre temp r eel" GRETSI 99. [] J.P. Cocquerez, S. Philipp \Analye d'image: ltrage et egmentation", Maon 99. Temp de calcul ur Sparc et CM (INRIA-Sophia), p. [6] F. Heitz, P. Bouth emy \Multimodal etimation of dicontinuou optical ow uing MRF" IEEE, Tran. on PAMI-, N-, Dec 99. [7] Y.Z. Hu, H.H. Nagel, G. Reker \New likelihood tet method for change detection in image equence" CVGIP 6, 7-6, 98 [8] P.H. Winton \Arti cial Intelligence" Adion- Weley, 98 6
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationDespeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units
Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationMSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents
MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationRedesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring
Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June
More informationSimulation of Sensorless Speed Control of Induction Motor Using APFO Technique
International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationTracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robots
Tracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robot Alexander Mojaev Andrea Zell Univerity of Tuebingen, Computer Science Dept., Computer Architecture, Sand, D - 776 Tuebingen,
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationCHAPTER 5 BROADBAND CLASS-E AMPLIFIER
CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationCLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationSolution of the Heat Equation for transient conduction by LaPlace Transform
Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame
More informationIn this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods
Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More informationSimulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland
X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL
More informationGrowing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds
Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More information! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model
Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationMODELLING HIGH TEMPERATURE FLOW STRESS CURVES OF TITANIUM ALLOYS
MODELLING HIGH TEMPERATURE FLOW STRESS CURVES OF TITANIUM ALLOYS Z. Guo, N. Saunder, J.P. Schillé, A.P. Miodownik Sente Software Ltd, Surrey Technology Centre, Guildford, GU2 7YG, U.K. Keyword: Titanium
More informationSector Concentration in Loan Portfolios and Economic Capital. Abstract
Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationA COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS
A COMPARATIE STUDY OF THREEPHASE AND SINGLEPHASE PLL ALGORITHMS FOR GRIDCONNECTED SYSTEMS Ruben Marco do Santo Filho Centro Federal de Educação Tecnológica CEFETMG Coord. Eletrônica Av. Amazona 553 Belo
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationDesign of Compound Hyperchaotic System with Application in Secure Data Transmission Systems
Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi
More information12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES
HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationMorningstar Fixed Income Style Box TM Methodology
Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction
More informationEXPERIMENT 11 CONSOLIDATION TEST
119 EXPERIMENT 11 CONSOLIDATION TEST Purpoe: Thi tet i performed to determine the magnitude and rate of volume decreae that a laterally confined oil pecimen undergoe when ubjected to different vertical
More informationEmpirical correlations of overconsolidation ratio, coefficient of earth pressure at rest and undrained strength
Second Conference of Jnior Reearcher in Civil Engineering 88 Empirical correlation of overconolidation ratio, coefficient of earth prere at ret and ndrained trength Vendel Józa BME Department of Geotechnic,
More informationLinear Momentum and Collisions
Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.
More informationAbstract parsing: static analysis of dynamically generated string output using LR-parsing technology
Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science
aachuett Intitute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric achinery Cla Note 10: Induction achine Control and Simulation c 2003 Jame L. Kirtley Jr. 1 Introduction
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationResearch Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
More informationGraph Analyi I Network Meaure of the Networked Adaptive Agents
Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of
More informationExposure Metering Relating Subject Lighting to Film Exposure
Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More informationAdaptive Window Size Image De-Noiizing Baed on Interection of Confidence Interval
Journal of Mathematical Imaging and Viion 16: 223±235, 2002 # 2002 Kluwer Academic Publiher. Manufactured in The Netherland. Adaptive Window Size Image De-noiing Baed on Interection of Confidence Interval
More informationBundled Discounts: Strategic Substitutes or Complements?
Bundled Dicount: Strategic Subtitute or Complement? Duarte Brito y Univeridade Nova de Liboa and CEFGE-UE Helder Vaconcelo z Faculdade de Economia, Univeridade do Porto, CEF.UP and CEPR June 2, 24 btract
More informationσ m using Equation 8.1 given that σ
8. Etimate the theoretical fracture trength of a brittle material if it i known that fracture occur by the propagation of an elliptically haped urface crack of length 0.8 mm and having a tip radiu of curvature
More informationFigure 2.1. a. Block diagram representation of a system; b. block diagram representation of an interconnection of subsystems
Figure. a. Block diagram repreentation o a ytem; b. block diagram repreentation o an interconnection o ubytem REVIEW OF THE LAPLACE TRANSFORM Table. Laplace tranorm table Table. Laplace tranorm theorem
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationQUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationDouglas W. Clark. Aiken Computation Lab. Cambridge, MA 02138. look only at performance, and in fact only at performance. architecture.
Performance from Architecture: Comparing a RISC and a CISC with Similar Hardware Organization Dileep Bhandarkar Digital Equipment Corp. 146 Main Street (MLO5-2/G1) Maynard, MA 01754 Dougla W. Clark Aiken
More information1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3
Proceeding of the 3 rd International Conference on Information Sytem, Logitic and Supply Chain Creating value through green upply chain ILS 2010 Caablanca (Morocco), April 14-16 The right information to
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationGabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow
Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant
More informationOn Reference RIAA Networks by Jim Hagerman
On eference IAA Network by Jim Hagerman You d think there would be nothing left to ay. Everything you need to know about IAA network ha already been publihed. However, a few year back I came acro an intereting
More informationManaging Customer Arrivals in Service Systems with Multiple Servers
Managing Cutomer Arrival in Service Sytem with Multiple Server Chrito Zacharia Department of Management Science, School of Buine Adminitration, Univerity of Miami, Coral Gable, FL 3346. czacharia@bu.miami.edu
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationTOWARDS AUTOMATED LIDAR BORESIGHT SELF-CALIBRATION
TOWARDS AUTOMATED LIDAR BORESIGHT SELF-CALIBRATION J. Skaloud a, *, P. Schaer a a TOPO Lab, Ecole Polytechnique Fédérale de Lauanne (EPFL), Station 18, 1015 Lauanne, Switzerland KEY WORDS: airborne laer
More informationEfficient Pricing and Insurance Coverage in Pharmaceutical Industry when the Ability to Pay Matters
ömmföäfläafaäflaflafla fffffffffffffffffffffffffffffffffff Dicuion Paper Efficient Pricing and Inurance Coverage in Pharmaceutical Indutry when the Ability to Pay Matter Vea Kanniainen Univerity of Helinki,
More informationOnline story scheduling in web advertising
Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where
More informationA family of chaotic pure analog coding schemes based on baker s map function
Liu et al. EURASIP Journal on Advance in Signal Proceing 5 5:58 DOI.86/3634-5-43-9 RESEARCH Open Acce A family of chaotic pure analog coding cheme baed on baker map function Yang Liu * JingLi Xuanxuan
More informationSolutions to Sample Problems for Test 3
22 Differential Equation Intructor: Petronela Radu November 8 25 Solution to Sample Problem for Tet 3 For each of the linear ytem below find an interval in which the general olution i defined (a) x = x
More informationThree Phase Theory - Professor J R Lucas
Three Phae Theory - Profeor J Luca A you are aware, to tranit power with ingle phae alternating current, we need two wire live wire and neutral. However you would have een that ditribution line uually
More informationStochasticity in Transcriptional Regulation: Origins, Consequences, and Mathematical Representations
36 Biophyical Journal Volume 8 December 200 36 336 Stochaticity in Trancriptional Regulation: Origin, Conequence, and Mathematical Repreentation Thoma B. Kepler* and Timothy C. Elton *Santa Fe Intitute,
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationGet Here Jeffrey M. Kurtz Client Feedback Evaluation Implementation Extenion/Termination Solution Development Analyi Data Collection Problem Definition Entry & Contracting CORE to all Problem Solving Equilibrium
More information