A New Method for Eye Detection in Color Images

Size: px
Start display at page:

Download "A New Method for Eye Detection in Color Images"

Transcription

1 Journal of Comuter Engineering 1 (009) 3-11 A New Method for Eye Detection in Color Images Mohammadreza Ramezanour Deartment of Comuter Science & Research Branch Azad University, Arak.Iran Mr.ramezanoor@gmail.com Mohamad Ali Azimi Deartment of Comuter Science & Research Branch Azad University Dezful,.Iran Azimi.kashani@gmail.com Mohammad Rahmati Comuter Engineering Amirkabir University of Technology, Tehran, Iran rahmati@aut.ac.ir Abstract The roblem of eye detection in face images is very imortant for a large number of alications ranging from face recognition to gaze tracking. In this aer we roose a new algorithm for eyes detection. First, the face region is extracted from the image by skin-color information. Second, horizontal roection in image is used to aroximate region of the eye be obtained. At last, the eye center is located by a corner detection algorithm. Part of the FACE94 Database has been used for exeriments and benchmarking. Exerimental results show that a correct eye detection rate of 94% can be achieved on 300 FACE94 images with different facial exressions and lighting conditions. Keywords: Eye detection, face region, Eigen value. 1. Introduction Automatic tracking of eyes and gaze direction is an interesting toic in comuter vision with its alication in biometric, security, intelligent human-comuter interfaces, and driver s drowsiness detection system[1]. Localization and extraction of eyes are oerations requisite for solving roblem. In [] eye localization methods have been classified into five main categories: 1) temlate matching methods in which first construct an eye temlate, and then comare it with sub-images in the areas to be detected. The sub-image with the highest matching score is considered to be the eye centre. ) characteristic detection methods which use edges, corners, intensity or other characteristics of the face to locate eyes. 3) machine learning methods which set otimal classify lane to distinguish eye and non-eye regions. 4) active IR based methods in which use near infrared camera to generate images with bright uil to hel detecting eyes. 5) image rocessing methods which locate eyes by dealing with intensity and color information. In [3], skin-color filter is used to extract face. The eye osition is gained by gradient characteristic roection and corresonding conditions setting. In [4] use the Haar-like features to detect the eye. This method trains classifiers with a few thousands of samle view images of obect and construct a cascade of classifiers to detect eye raidly. 55

2 A New Method for Eye Detection in M. Ramezanour, M. A. Azimi, M. Rahmati. Skin Color Segmentation Figure 1. Algorithm of eye detection Skin color model is the mathematical model that describes the distribution of skin colors. A roer color sace should be selected before constructing skin color models. There are many color saces. The RGB exression we often use is not roer for skin model, because in RGB sace, three-based color (r, g,b) resents not only color but also luminance. In this aer we choose a imroved GLHS sace [6] as maing sace because this color model is robust against different tyes of skin. GLSH color sace has a non-linear relationshi with the RGB sace, so it is a comlex rocess from RGB color sace to GLHS color sace. If min( = min( R, G, B) / 55, mid( = mid( R, G, B) / 55, max( = max( R, G, B) / 55 (1) and the lightness, hue and saturation can be calculated as follows: Hue: h ( = k( + f ( () where k( denotes the sequence number of the subsace c belongs to and f( is used to calculate the angle of c in the subsace. 0 : R > G B (3) 1: G R > B : G > B R k ( = 3 : B G > R 4 : B > R G 5 : R B > G 56

3 Journal of Advances in Comuter Research (010) mid( min( : k( max( min( f ( = max( mid( : k( max( min( is even is odd Lightness: l( = (max( mid( ) ( mid( min( ) (4) (5) Saturation: 1 1 s( = (max( min( ) + ( mid( min( ) 3 3 Good clustering erformance can be achieved when the following criteria are satisfied S( 0.5 (7) 0.15 l( 0.7 h( 6 R > Corner Detection The Corner Detection finds corners in an image using the Harris corner detection, minimum eigenvalue, or local intensity comarison method. The Corner Detection finds the corners in the image based on the ixels that have the largest corner metric values. For the most accurate results, use the minimum eigenvalue method. For the fastest comutation, use the Local Intensity Comarison. For the trade-off between accuracy and comutation, use the Harris Corner Detection Method Minimum Eigenvalue Method This method is more comutationally exensive than the Harris corner detection algorithm because it directly calculates the eigenvalues of the sum of the squared difference matrix, M. The sum of the squared difference matrix, M, is defined as follows: (6) M A = C C B The revious equation is based on the following values: A= B= C = ( I ) x w ( I y) w ( I I ) w x y where I x and I y are the gradients of the inut image, I, in the x and y direction, resectively. The symbol denotes a convolution oeration. Use the Coefficients for 57

4 A New Method for Eye Detection in M. Ramezanour, M. A. Azimi, M. Rahmati searable smoothing filter arameter to define a vector of filter coefficients. This vector of coefficients is multilied by its transose to create a matrix of filter coefficients, w. Smaller eigenvalue calculates the sum of the squared difference matrix. This minimum eigenvalue corresonds to the corner metric matrix. 3. Harris Corner Detection Method The Harris corner detection method avoids the exlicit comutation of the eigenvalues of the sum of squared differences matrix by solving for the following corner metric matrix, R: R = AB C K A+ ( B) (8) A, B, C are defined in the revious section, Minimum Eigen value Method. The variable K corresonds to the sensitivity factor. Its value can be secified by using the Sensitivity factor (0<K<0.5) arameter. The smaller the value of k, the more likely it is that the algorithm can detect shar corners. Use the Coefficients for searable smoothing filter arameter to define a vector of filter coefficients. This vector of coefficients is multilied by its transose to create a matrix of filter coefficients, w. 3.3 Local Intensity Comarison This method determines that a ixel is a ossible corner if it has either, N contiguous valid bright surrounding ixels, or N contiguous dark surrounding ixels. Secifying the value of N is discussed later in this section. The next section exlains how these surrounding ixels are found. We suose that is the ixel under consideration and is one of the ixels surrounding. The locations of the other surrounding ixels are denoted by the shaded areas in fig. Figure. Locations of the other surrounding ixels are denoted by the shaded areas I and I are the intensities of ixels and, resectively. Pixel is a valid bright surrounding ixel if I I T. Similarly, ixel is a valid dark surrounding ixel if I I T. In these equations, T is the value you secified for the Intensity comarison threshold arameter. This rocess reeats to determine whether it has N contiguous valid surrounding ixels. The value of N is related to the value you secify for the Maximum angle to be considered a corner (in degrees), as shown in Table 1. 58

5 Journal of Advances in Comuter Research (010) Table 1. The value of N is related to the value you secify for the maximum angle. After that a ixel determines is a ossible corner, it comutes its corner metric using the following equation: R = max : Ii I T I I : Ii I T I I T, T (9) Figure 3. Original image Figure 4. Face detection 4. Eye Region Detection As exlained in section,the face region is extracted from the original image (fig 3) by skin-color information in GLHS color sace (fig 4).To obtain the exact location of the eye, therefore aroximate region of the eye should be obtained by horizontal roection. The sum of each row is then horizontally lotted (fig5). Due to the fact that the iris has lower intensity than the eye white, it can be claimed that the minimum oint on the diagram is related to iris region. But the above hyothesis will not work correctly 59

6 A New Method for Eye Detection in M. Ramezanour, M. A. Azimi, M. Rahmati Figure 5. Horizonal roection of face region This rule that the to eye region and low region around the eyes are brighter than the eye itself and local maximum oints on this diagram are related to these two region. Now it can be claimed that the eye is between these two maximum oints in diagram. Based on the above mentioned, the eye region could be croed from the face region (Fig 6).Now we use Harris corner detection to detect corners in outut image of the revious stage. Due to the fact that the iris is darker than the eye white, it detects irises as corners(fig 7). Thus the lace of iris is diagnosed in the image. Figure 6. Eye region croed from the face region 5. Exerimental Result Figure 7. Iris detect with Harris corner detection Color images downloaded from[6] are chosen to evaluate this algorithm. Secify the sensitivity factor, k. The smaller the value of k the more likely the algorithm is to detect shar corners. K has selected 0.01 for this exeriment. In fig 8 and fig 9 some results of correct detection are shown, in articular fig 8 shown the eye detection on image of eole wearing glasses. Figure 8. Some result with eole wearing glasses 60

7 Journal of Advances in Comuter Research (010) Conclusions Figure 9. Some result In this aer a new algorithm for eye detection is roosed.first, face is detected in image. Then aroximate region of the eye should be obtained by horizontal roection. The eye center is located by Harris corner detection algorithm. Due to using of GLHS color sace, lighting condition don t affect on algorithm outut. Different exeriments, carried out on images of subects with different facial exressions, some of them wearing glasses, demonstrate the effectiveness and robustness of the roosed algorithm. The eyes could be correctly located in 94% of the images. References [1] Xiaoyun Deng, Chi-Hong Chang,Erwin A New Method for Eye Extraction from Facial Image, IEEE International Worksho on Electronic Design, Test and Alications 004 [] Wen-Tao Wang, Chao Xu, Hong-Wei Shen, EYE LOCALIZATION BASED ON HUE IMAGE PROCESSING, IEEE International Symosium on Intelligent Signal Processing and Communication Systems, Nov.8-Dec.1, 007. [3] Xiaoyun Deng, Chi-Hong Chang, Erwin Brandle, A new method for eye extraction from facial image, IEEE International Worksho on Electronic Design, Test and Alications,. 9-34,Jan 004. [4] Ba Linh NGUYEN, Eye Gaze Tracking, IEEE, vol., 009. [5] Wei-Min Zheng, Zhe-Ming Lu, Xiu-Na Xu, A Novel Skin Clustering Method for Face Detection, First International Conference on Innovative Comuting, Information and Control, 006 Page(s): Vol. [6] htt://cswww.essex.ac.uk/mv/allfaces/faces94.html. 61

8 A New Method for Eye Detection in M. Ramezanour, M. A. Azimi, M. Rahmati 6

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

Alpha Channel Estimation in High Resolution Images and Image Sequences

Alpha Channel Estimation in High Resolution Images and Image Sequences In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters

Stability Improvements of Robot Control by Periodic Variation of the Gain Parameters Proceedings of the th World Congress in Mechanism and Machine Science ril ~4, 4, ianin, China China Machinery Press, edited by ian Huang. 86-8 Stability Imrovements of Robot Control by Periodic Variation

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

MODEL OF THE PNEUMATIC DOUBLE ACTING CYLINDER COMPILED BY RHD RESISTANCES

MODEL OF THE PNEUMATIC DOUBLE ACTING CYLINDER COMPILED BY RHD RESISTANCES Journal of alied science in the thermodynamics and fluid mechanics Vol. 3, No. 1/009, ISSN 180-9388 MODEL OF THE PNEUMATIC DOUBLE ACTING CYLINDER COMPILED BY RHD RESISTANCES *Lukáš DVOŘÁK * Deartment of

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives 10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA

NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA F. Mojžíš, J. Švihlík Detartment of Comuting and Control Engineering, ICT Prague Abstract This aer is devoted to statistical analysis of Nikon D40 digital

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Mean shift-based clustering

Mean shift-based clustering Pattern Recognition (7) www.elsevier.com/locate/r Mean shift-based clustering Kuo-Lung Wu a, Miin-Shen Yang b, a Deartment of Information Management, Kun Shan University of Technology, Yung-Kang, Tainan

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Factoring Variations in Natural Images with Deep Gaussian Mixture Models Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Pythagorean Triples and Rational Points on the Unit Circle

Pythagorean Triples and Rational Points on the Unit Circle Pythagorean Triles and Rational Points on the Unit Circle Solutions Below are samle solutions to the roblems osed. You may find that your solutions are different in form and you may have found atterns

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Forensic Science International

Forensic Science International Forensic Science International 207 (2011) 135 144 Contents lists available at ScienceDirect Forensic Science International journal homeage: www.elsevier.com/locate/forsciint Analysis and alication of relationshi

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane

United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane United Arab Emirates University College of Sciences Deartment of Mathematical Sciences HOMEWORK 1 SOLUTION Section 10.1 Vectors in the Plane Calculus II for Engineering MATH 110 SECTION 0 CRN 510 :00 :00

More information

Chapter 2 - Porosity PIA NMR BET

Chapter 2 - Porosity PIA NMR BET 2.5 Pore tructure Measurement Alication of the Carmen-Kozeny model requires recise measurements of ore level arameters; e.g., secific surface area and tortuosity. Numerous methods have been develoed to

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

The predictability of security returns with simple technical trading rules

The predictability of security returns with simple technical trading rules Journal of Emirical Finance 5 1998 347 359 The redictability of security returns with simle technical trading rules Ramazan Gençay Deartment of Economics, UniÕersity of Windsor, 401 Sunset, Windsor, Ont.,

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

A Certification Authority for Elliptic Curve X.509v3 Certificates

A Certification Authority for Elliptic Curve X.509v3 Certificates A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

Theoretical and Experimental Study for Queueing System with Walking Distance

Theoretical and Experimental Study for Queueing System with Walking Distance Theoretical and Exerimental Study for Queueing System with Walking Distance 371 22 1 Theoretical and Exerimental Study for Queueing System with Walking Distance Daichi Yanagisawa 1,2, Yushi Suma 1, Akiyasu

More information

An effective multi-objective approach to prioritisation of sewer pipe inspection

An effective multi-objective approach to prioritisation of sewer pipe inspection An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Improved Algorithms for Data Visualization in Forensic DNA Analysis

Improved Algorithms for Data Visualization in Forensic DNA Analysis Imroved Algorithms for Data Visualization in Forensic DNA Analysis Noor Maizura Mohamad Noor, Senior Member IACSIT, Mohd Iqbal akim arun, and Ahmad Faiz Ghazali Abstract DNA rofiles from forensic evidence

More information

FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES

FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES AVNER ASH, LAURA BELTIS, ROBERT GROSS, AND WARREN SINNOTT Abstract. We consider statistical roerties of the sequence of ordered airs obtained by taking

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Free Software Development. 2. Chemical Database Management

Free Software Development. 2. Chemical Database Management Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Robust portfolio choice with CVaR and VaR under distribution and mean return ambiguity

Robust portfolio choice with CVaR and VaR under distribution and mean return ambiguity TOP DOI 10.1007/s11750-013-0303-y ORIGINAL PAPER Robust ortfolio choice with CVaR and VaR under distribution and mean return ambiguity A. Burak Paç Mustafa Ç. Pınar Received: 8 July 013 / Acceted: 16 October

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING

LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING Ranjan Kumar 1 and G Sahoo 2 1 Deartment of Comuter Science & Engineering, C.I.T Tatisilwai, Ranchi, India 2 Deartment of Information Technology, B.I.T

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

type The annotations of the 62 samples with respect to the cancer types FL, CLL, DLBCL-A, DLBCL-G.

type The annotations of the 62 samples with respect to the cancer types FL, CLL, DLBCL-A, DLBCL-G. alizadeh Samle a from a lymhoma/leukemia gene exression study Samle a for the ISIS method Format x A 2000 x 62 gene exression a matrix of log-ratio values. 2,000 genes with the highest variance across

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Measuring relative phase between two waveforms using an oscilloscope

Measuring relative phase between two waveforms using an oscilloscope Measuring relative hase between two waveforms using an oscilloscoe Overview There are a number of ways to measure the hase difference between two voltage waveforms using an oscilloscoe. This document covers

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Expert Systems with Applications

Expert Systems with Applications Exert Systems with Alications 38 (2011) 11984 11997 Contents lists available at ScienceDirect Exert Systems with Alications journal homeage: www.elsevier.com/locate/eswa Review On the alication of genetic

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Automatic Traffic Estimation Using Image Processing

Automatic Traffic Estimation Using Image Processing Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran Pezhman_1366@yahoo.com Abstract As we know the population of city and number of

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Efficient Training of Kalman Algorithm for MIMO Channel Tracking

Efficient Training of Kalman Algorithm for MIMO Channel Tracking Efficient Training of Kalman Algorithm for MIMO Channel Tracking Emna Eitel and Joachim Seidel Institute of Telecommunications, University of Stuttgart Stuttgart, Germany Abstract In this aer, a Kalman

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm The Oen Alied Mathematics Journal, 2008, 2, 95-03 95 Oen Access Multistage Human Resource Allocation for Software Develoment by Multiobjective Genetic Algorithm Feng Wen a,b and Chi-Ming Lin*,a,c a Graduate

More information

VERIFICATION AND VALIDATION OF CFD SIMULATIONS

VERIFICATION AND VALIDATION OF CFD SIMULATIONS ERFATON AND ALDATON OF FD SLATONS by Fred Stern, Robert. Wilson, Hugh W. oleman*, and Eric. Paterson of owa nstitute of Hydraulic Research and * Proulsion Research enter echanical and Aerosace Engineering

More information