JCS&T Vol. 11 No. 1 April 2011
|
|
- Louise Garrison
- 8 years ago
- Views:
Transcription
1 Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan, Republc of Cna. and Te-Lung Yn Department of Computer Scence and Informaton Engneerng, Cna Unversty of Tecnology, Hukou, Hsncu 303, Tawan, Republc of Cna. ABSTRACT In ts paper, we present a new reversble data dng sceme tat utlzes te wavelet transform and better explots te large wavelet coeffcent varance to aceve g capacty and mperceptble embeddng. Our sceme dffers from tose of prevous studes n tat te wavelet coeffcents stogram rater tan te gray-level stogram s manpulated. In addton, we desgn ntellgent stogram-sftng rules to avod te decmal problem n grayscale pxel values after recovery process to aceve reversblty. Small canges n te wavelet coeffcents after embeddng process are mportant factors contrbutng to low vsual dstorton n te marked mage. Furtermore, an mportant property of our sceme s tat te use of tresold dffers greatly from prevous scemes. Te expermental results sow tat our sceme outperforms oter reversble data dng scemes. Keywords: reversblty, marked meda, wavelet transform, wavelet coeffcent, dstorton, stogram.. Introducton Reversble data dng, or so-called nvertble, dstortonfree data dng, s a branc of fragle tecnque manly used for qualty-senstve applcatons suc as multmeda content autentcaton, medcal magng systems, law enforcement, and mltary magery, etc. One of te most mportant requrements n tese felds s to recover te orgnal meda exactly durng analyss to enable te rgt decsons. Te oter sgnfcant necesstes of reversble data dng are te embeddng capacty and vsual qualty of te marked meda, snce tey are crtcally essental to acevng satsfactory performance n varous applcatons. [][2] Te sceme we present n ts paper s an attempt to aceve g-performance reversble data dng, n wc te embeddng and recoverng processes are devsed n te frequency doman. Te partculartes of large varance n wavelet coeffcents and mnor canges n wavelet coeffcents followng from te embeddng process n wavelet coeffcents are exploted to aceve g capacty and mperceptblty. Te rest of ts paper s organzed as follows. In Secton 2, prevous reversble data dng scemes and ter caracterstcs wll be brefly revewed n terms of embeddng capacty and vsual qualty. Our proposed sceme s ntroduced n Secton 3. Expermental results and comparatve analyses are presented n Secton 4. Fnally, some conclusons are drawn n Secton Related studes Nowadays, a number of researc works n ts feld can be classfed nto two major categores accordng to te embeddng strateges. Category-I reversble data dng scemes work on te transform doman. In 2002, Frdrc et al. [3][4] proposed a novel paradgm of lossless data embeddng. Te payload of ts so-called RS sceme s gly dependent on te compresson algortm and nsuffcent for some applcatons. Subsequently, Xuan et al. [5] presented a new sceme carred out n te nteger wavelet transform (IWT) doman. In ts sceme, one or multple mddle bt-plan(s) n te g-frequency subbands s(are) cosen to embed data bts. In 2003, Tan [6] proposed a dfference expanson (DE) sceme, wc exploted te DE tecnque to embed data bts nto te g-frequency coeffcents. However, ts sceme suffers from te locaton map problem tat t s dffcult to aceve capacty control. Alattar [7][8] extended Tan s sceme by generalzng te DE tecnque to te trplets and quads of adjacent pxels. Kamstra et al. [9][0] mproved te DE sceme by predctng te expandable locatons n te g-pass band. Ts sceme mproves te effcency of lossless compresson, altoug te embeddng capacty s small. In 2007, Tod et al. [] proposed a new sceme combnng stogram sftng and predcton-error expanson approaces to remedy te problems of Tan s sceme. In category-ii, scemes are performed n te spatal doman. Frdrc et al. [2] presented te jont b-level mage experts group (JBIG) lossless compresson tecnque to save space for data embeddng. However, te payload s gly dependent on te lossless compresson algortm. Celk et al. [3][4] employed te generalzed least-sgnfcant-bt (G-LSB) tecnque and te contextbased adaptve lossless mage codng (CALIC) to aceve lossless data dng. In 2006, N et al. [5] utlzed te pars of maxmum and mnmum ponts of a gven mage stogram to aceve reversblty. In ts sceme, te pxels between eac par are modfed for data embeddng and extracton. However, suc a strategy may lead to sgnfcant overead and nsuffcent vsual qualty. In [6][7], Hwang et al. and Kuo et al. extend N s sceme by usng a locaton map to aceve reversblty. Altoug te sceme s smple, te sgnfcant overead and nsuffcent vsual qualty are crtcal problems. In 2009, Km et al. [8] exploted te feature of g spatal correlaton between negborng pxels to aceve g- 27
2 performance data dng. Te embeddng capacty n te paper ranges from 6 to 20 k. For all of te above reversble data dng scemes, te requrement of addtonal overead s one of te tornest problems n te restore process. Ts paper presents a novel metod and enances te embeddng performance recently proposed by Luo et al. [9] n te frequency doman to aceve g-performance lossless data dng Data embeddng algortm We assume tat te embedded message s a random bnary sequence. Te stograms of te sub-band dfferences between te reference sub-band and te oter destnaton sub-bands are sfted to embed te secret message. Fg. 3 depcts te overall data embeddng process, wc s descrbed n detal below. 3. Proposed sceme Te proposed sceme combnes te two-level Haar dscrete wavelet transform (HDWT) algortm and a new stogram sftng tecnque to aceve reversble data dng. In our sceme, a gven mage s frst transformed nto a frequency doman and sub-bands n te mddle- and g-frequency ranges are ten used to create sub-band dfferences. Eac stogram of tese sub-band dfferences s ten sfted accordng to a selected tresold. Message bts can ten be embedded n te empty space of te sfted stograms. Fnally, te marked mage s reconstructed wt te sub-bands carryng and noncarryng dden message by performng te nverse HDWT algortm to complete te embeddng process. As to te extractng process, te correspondng nverse operatons can be performed to recover te dden nformaton and te orgnal mage. Te new sceme dffers from our prevous study [9] n tat sx rater tan four of te wavelet sub-bands are manpulated. 3.. Segmentaton algortm Te two-level HDWT algortm utlzes te four-band sub-band codng system to decompose an mage nto a set of dfferent frequency sub-bands. As llustrated n Fgs. and 2, te sze of eac sub-band s one egt of te orgnal mage n te spatal doman. Te egt dfferent sub-bands can be classfed nto te low-, mddle-, and g-frequency sub-bands. Snce te low-frequency subband of an mage ncorporates more energy tan te oter sub-bands, ts coeffcents are te most fragle tat f any of tem are manpulated, a suspect can vsbly detect te canges on te spatal doman mage. In contrast, f te coeffcents n te mddle- and/or g-frequency subbands are altered, canges n te spatal doman mage are mperceptble to uman eyes. As a result, ts feature s generally exploted to conceal secret messages. Fg.. Te two-level segmentaton process. Fg. 2. A tow-level HDWT four-band splt of Lena. Fg. 3. Flowcart of data embeddng process. Embeddng_process, T, Input:, te orgnal mage; T, te tresold accordng to wc te empty bns n eac stogram are prepared;, te secret message. Output:, te marked mage, f, te mark of embeddng status. Advan Proceedngs: Step : Create sub-bands by performng two-level HDWT four-band sub-band codng system on an nput mage. Sx of te sub-bands to be utlzed are denoted by L H ( x, y ), H L( x, y ), H H ( x, y ), L H 2( x, y ), H H 2 and H L2( x, y ), were ndcates te coordnate of te coeffcents n eac sub-band. Step 2: Create sub-band dfferences D, D, 2 D and 3 D between te reference sub-bands L H, L H 2 and 4 te oter destnaton sub-bands HL, HH, HL2 and HH 2 by te followng formulas: x y LH x y HL x y, () 2 x y LH x y HH x y, (2) D3 HL2, (3) D4 HH 2. (4) Step 3: Denote te stograms of D as, were 28
3 , 2, 3 and 4. Step 4: Sft stogram accordng to te tresold T selected. Te sfted can be calculated as follows: j 8, f j T, j 8, f j ( T ), (5) were, 2, 3, 4 and j ndcates te value of eac bn. Tese can also be obtaned by te followng formulas: x y LH x y HL x y, (6) 2 x y LH x y HH x y, (7) 3 x y LH x y HL x y, (8) 4 x y LH x y HH x y. (9) were HL (, x y), HH (, xy), HL (, ) 2 xy and HH (, ) 2 xy can be expressed as: HL( x, y ) 8, f j T, HL HL( x, y ) 8, f j T. (0) HH( x, y ) 8, f 2 j T, HH HH( x, y ) 8, f 2 j T. () HL2( x, y ) 8, f 3 j T, HL2( x, y) HL2( x, y ) 8, f 3 j T. (2) HH2( x, y ) 8, f 4 j T, HH2( x, y) HH2( x, y ) 8, f 4 j T. (3) Embeddng Data: Step 5: We frst set an nteraton ndex to T and ten embed message bts sequentally by modfyng. Eac s sfted to become, were, 2, 3 and 4 by te followng rules: j 8, f j, ( 0, j 4, f j, (, j j for 0. 8, 4, f f j j,, ( 0, (, (4) j 8, f j 0, ( 0, j 4, f j 0, (, (5) for 0. Te canges n te dfference stograms above result n canges n te coeffcents. Ts mples tat D( xy, ) s scanned and modfed agan. Once te value of D( xy, ) s equal to, te message bt s embedded. Ts process s repeated untl tere are no D ( xy, ) wt te value of. We ten decrease by and repeat te step untl 0. Tese steps can be formulated as follows: x y LH x y HL x y, (6) 2 x y LH x y HH x y, (7) 3 x y LH x y HL x y, (8) 4 x y LH x y HH x y. (9) f 0, HL( x, y ) 4, f j, (, HL( x, y ) 4, f j, (, HL HL( x, y ) 8, f j, ( 0, HL( x, y ) 8, f j, ( 0. HH ( x, y ) 4, f 2 j, (, HH ( x, y ) 4, f 2 j, (, HH HH ( x, y ) 8, f 2 j, ( 0, HH ( x, y ) 8, f 2 j, ( 0. HL2 ( x, y ) 4, f 3 j, (, HL2 ( x, y ) 4, f 3 j, (, HL2( x, y) HL2 ( x, y ) 8, f 3 j, ( 0, HL2 ( x, y ) 8, f 3 j, ( 0. HH 2 ( x, y ) 4, f 4 j, (, HH 2 ( x, y ) 4, f 4 j, (, HH 2( x, y) HH 2 ( x, y ) 8, f 4 j, ( 0, HH 2 ( x, y ) 8, f 4 j, ( 0. f 0, HL(, x y) HH(, x y) HL2( x, y) (20) (2) (22) (23) HL( x, y ) 4, f j = 0, ( =, HL( x, y ) 8, f j = 0, ( = 0. (24) HH( x, y ) 4, f 2 j = 0, ( =, HH( x, y ) 8, f 2j = 0, ( = 0. (25) HL2( x, y ) 4, f 3 j = 0, ( =, HL2( x, y ) 8, f 3j = 0, ( = 0. (26) 4 4 HH2( x, y ) 4, f j = 0, ( =, HH2( x, y) HH2( x, y ) 8, f j = 0, ( = 0. (27) Centralzng Hstogram Step 6: Wen all te bns n te dfference stogram are exausted, egt bns, valued from 4 to 3, wll become empty. In ts case, te mark f s set to be and all bns on te rgt sde wll be moved left 4 bns, and tose on te left wll be moved rgt 4 bns n order to mprove te vsual qualty by decreasng te varance of te dfferences n te coeffcents. Oterwse, te mark f s set to be 0. Eac s sfted to become by te followng rules: ( j ) 4, f ( j) 0, j ( j ) 4, f ( j) 0, (28) were, 2, 3 and 4. Sftng stograms as above creates coeffcent canges, wc can be formulated as follows: x y LH x y HL x y, (29) 2 x y LH x y HH x y, (30) 29
4 3 x y LH x y HL x y, (3) 4 x y LH x y HH x y, (32) were HL (, xy), HH (, x y), HL (, x y) 2 and HH (, x y) 2 can be expressed as: HL( x, y ) 4, f j 0, HL HL( x, y ) 4, f j 0. (33) HH( x, y ) 4, f 2 j 0, HH(, x y) HH( x, y ) 4, f 2 j 0. HL2 HH 2(, x y) (34) HL2 ( x, y ) 4, f 3 j 0, HL2 ( x, y ) 4, f 3 j 0. (35) HH 2 ( x, y ) 4, f 4 j 0, HH 2 ( x, y ) 4, f 4 j 0. (36) Step 7: Usng te sub-bands HL and HL2 wt te dden message as te reference sub-bands, and ten fft and sxt dfference stogram s created wt te orgnal sub-bands LH and LH2. Te secret message s ten dden nto tese dfference stograms accordng to steps to 6; as a result, LH x, yand LH2 x, y wll be created. Ts completes te embeddng process. Obtanng Marked Image: Step 8: Reconstruct te marked mage by utlzng te nverse of te two-level HDWT four-band sub-band codng on tese sub-bands. We frst reconstruct te LL sub-band and ten reconstruct te marked mage. Ts procedure can be formulated as follows: LL IDWT ( LL2,, HL2, HH 2 ), (37) IDWT ( LL, L H, H L, H H ). (38) Preventon of overlap and over/underflow A flag-bt s used to ndcate weter te bn n te dfferent stograms s overlap or not. Te flag-bt s set to f a bn value sfted by 8 overlaps wt one sfted by 4. Te flag-bt s set to 0 f no overlap occurs. Tese flag-bts and te values of T and f n te btmap wll ultmately all be compressed wt an effcent compresson tool based on te LZMA algortm. Te compressed result s ten dden nto te reserved nonoverlappng bns. Accordng to expermental results, ts process results n less tan 2.92% overead n entre embeddng capacty for many dfferent types of mages. Toug te generated pxel values n te marked mage may be outsde te allowable range, te metod n [2][8] could be used to deal wt te problem. Te nterval range s dynamcally selected wt te mage caracterstcs tat t wll reduce dstortons to mnmum. 3.3 Data extractng and recoverng algortm Before extractng te dden message, recever needs to verfy weter or not te marked mage as been modfed. If tere s more tan one occurrence at j, we can conclude tat te marked mage as been tampered wt. Te proposed sceme ten stops te followng extracton steps mmedately. Te extracton and recovery process s scematzed n Fg. 4. Fg. 4. Flowcart of extracton and recovery process. Te detaled extracton and recovery process ncludes te followng steps: Extractng_process, T, f Input:, te marked mage; T, te tresold; f, te mark, accordng to wc te embeddng status s determned. Output:, te secret message;, te orgnal mage. Advan Proceedngs: Step : Create sub-bands by performng two-level HDWT four-band codng on te marked mage. Sx of te sub-bands to be utlzed are denoted by ( x LH, y ), HL ( x, y), HL ( x, y), (, ) x y, (, ) HL2 x y and (, ) HH 2 x y, were x, y ndcates te coordnate of te coeffcents n eac sub-band. Recoverng LL Sub-band Step 2: Create sub-band dfference D (, x y) between te reference sub-band and te destnaton sub-band HL2 accordng to te followng formulas: D HL2. (39) Step 3: Denote te stogram of D as j, were j ndcates te value of eac bn. Step 4: Ceck te dstrbuton of te stogram j. If tere s more tan one occurrence at j, te 30
5 subsequent steps wll be stopped mmedately. Step 5: Ceck te embeddng status. Once te value of f s equal to, t can be concluded tat te sub-band s completely flled wt dden message bts. Subsequently, restore te orgnal dfference stogram. Te bns greater tan or equal to zero wll be sfted to te rgt by 4 and tose less tan zero to te left by 4. Te restored j can be calculated as follows: j 4, f j 0, j j4, f j 0. (40) Tese can also be obtaned by te followng formulas: D HL2 LH 2, (4) were (, ) LH 2 x y can be expressed as: ( xy, ) 4, f ( j) 0, LH 2 (42) ( xy, ) 4, f ( j) < 0. Extractng Data: Step 6: Extract te dden message (, were n denotes te ndex of a message bt, by sftng j wt reference to te btmap and nvertng te embeddng process. Frst, te teraton ndex s set to 0. Once a j wt a value of ( 4) s encountered, a bnary bt s retreved. On te oter and, a bnary bt 0 s retreved f j as a value of ( 8). Ts procedure s repeated untl tere are no j values of ( 4) or ( 8). Subsequently, s ncreased by. Te same procedures as descrbed above are repeated untl reaces T+. Te retrevng rule s as follows: j 8, f j = 8, j 4, f j = 4, (43) for 0. j 8, f j 8, j 4, f j 4, j j 8, f j ( 8), j 4, f j ( 4), for T. (44) Step 7: At te same tme, te modfed sub-band dfference D s also scanned and modfed. Te extractng operaton can be expressed as te followng formula: ( 0, f D ( 8 ),, f (, ) ( 4 ). D x y Ts procedure s executed untl = T+. (45) Step 8: Remove te dden message bts ( 0, from te sub-band dfference. Te removng rule s gven by D HL2 LH 2, (46) were (, ) LH 2 x y can be expressed as LH 2( xy, ) 8, f j8, n0, (47) LH 2( xy, ) 4, f j4, n, for = 0, and LH 2( xy, ) 8 f j 8, n0, LH 2( xy, ) 4 f j 4, n, (48) LH 2( xy, ) LH 2( xy, ) 8 f j( 8), n0, LH 2( xy, ) 4 f j( 4), n, for T. Step 9: Restore te orgnal stogram. Te orgnal stogram can be calculated accordng to te followng rules: j 8 f j T, j j 8 f j ( T). (4) for L. Te restoraton of te stogram as descrbed above results n canges n te coeffcents. Ts can be descrbed by te followng formula: D ( xy, ) HL2( xy, ) LH 2( xy, ). (42) Here, (, ) 2 x y can be expressed as: LH LH ( xy, ) 8, f j T, LH 2(, xy) LH 2( xy, ) 8, f j ( T). 2 (43) Step 0: After recoverng te LH2 sub-band, steps to 9 are repeated to recover te rest of HL2 and HH2 subbands as (, ) 2 x y and (, ) 2 x y. HL HH Obtanng te LL Sub-band: Step : Recover te orgnal Sub-band LL troug te nverse operaton of te HDWT algortm wt (, ) 2 x y, (, ) LH 2 x y, (, ) HL 2 x y, and (, ) HH 2 x y. Ts procedure can be formulated as follows: LL IDWT ( LL2, LH 2, HL 2, HH 2). (44) Recoverng LH, HL and HH Sub-bands: Step 2: After recoverng te LL sub-band, steps to 9 are also repeated to recover te LH, HL and HH subbands. Obtanng Orgnal Image: Step 3: Recover te orgnal mage troug te nverse operaton of te HDWT algortm wt te LH, HL and HH sub-bands. Ts procedure can be formulated as follows: IDWT ( LL, LH, HL, HH). (45) Tese steps fns te extracton and recoverng process. LL 3
6 4. Expermental results and comparson In ts secton, a seres of experments are performed to evaluate of our sceme. For tese experments, we used many dfferent types of mages, ncludng some commonly used ones and two medcal mages (Fg. 5). Te message bts to be embedded n our experments are randomly generated by a pseudo-random bnary generator. Te tresold ranges from 0 to 00. wavelet transform. Gven tat te mddle/g-frequency sub-bands ncorporate less energy, te test mages wt larger varance between mddle and g-wavelet coeffcents suc as MRI and MRI 2 can aceve ger vsual qualty tan Baboon at te tresold 0. Fg bt mages(a)lena, (b)baboon, (c)boat, (d)arplane, (e)aeral, (f)tank, (g)trucks, ()Medcal mage, () Medcal mage2. Capacty versus Tresold Te relatonsp between te capacty (n bpp) and te tresold s presented n Fg. 6. Te embeddng rate almost reaces 0.8 bpp at tresold 00 for most te test mages. As expected te capacty s nearly proportonal to te tresold at te begnnng and saturates wen te tresold s suffcently g. Fg. 7. PSNR at varous tresolds. Comparson of vsual qualty wt oter scemes To address te great contrbuton of our sceme, analyses n terms of actual embeddng capacty and vsual qualty were performed. Te proposed sceme was compared wt te DE sceme [4], G-LSB sceme [5], Km et al. s sceme [9], and N et al. s sceme [6] for te Lena, Baboon, Boat, and Arplane mages as sown n Fg. 8. Te embeddng capacty s te amount of embedded bts wt overead subtracted. It s observed tat our proposed tecnque as aceved te gest PSNR at te same bpp. Fg. 6. Embeddng capacty at varous tresolds. Vsual Qualty versus Tresold Fg. 7 depcts te vsual qualty n PSNR of te marked mage versus tresold varyng from 0 to 00 for test mages on te premse tat maxmal bts are embedded. Te expermental result ndcates tat te PSNR rses as te tresold ncreases and ts s not te case for te prevous studes. Te marked mage can aceve 43 db at te tresold 0, and above 46 db at te tresold of 00 for most test mages. It s noteworty tat larger values of tresold contrbute less varaton to te stogram of te 32
7 Fg. 8. Comparson of embeddng capacty n bpp versus dstorton wt exstng reversble scemes: DE sceme, G-LSB sceme, Km et al. s sceme, and N et al s sceme: (A) Baboon; (B) Lena; (C) Boat; (D) Arplane. 5. Concluson In ts paper, a reversble data dng sceme explotng te large varance of wavelet coeffcents and clever stogram sftng rules s presented. Te proposed sceme, compared wt prevous ones, can obtan better vsual qualty of te marked mage gven te same payload. Te man reason s tat te vsual qualty of our sceme does not decay wt ncreasng tresold as n te oter scemes. In addton, our sceme provdes te greatest embeddng capacty and s even better tan te one publsed recently [9]. It may be of nterest for future researc tat te tresold predctons, mult-round scemes, and fast algortms wll be explored to meet real-tme applcaton requrements. References [] W. Bender, D. Grul, N. Mormoto, and A. Lu, Tecnques for data dng, IBM Systems Journal, vol.35, no.3, pp , 996. [2] M. Awrangjeb, An overvew of reversble data dng, Proc. Sxt Internatonal Conf. on Computer and Informaton Tecnology, Jaangrnagar Unversty, Banglades, pp , December [3] J. Frdrc, M. Goljan, and R. Du, Dstorton-free data embeddng, Proc. 4t Informaton Hdng Worksop, New York, vol.237, pp.27 4, Lecture Notes n Computer Scence, 200. [4] J. Frdrc, M. Goljan, and R. Du, Lossless data embeddng new paradgm n dgtal watermarkng, EURASIP J. Appl. Sgnal Process. vol.2, pp.85 96, [5] G.. Xuan, Y.Q. S, J. Cen, J. Zu, and Z. N, W. Su, Lossless data dng based on nteger wavelet transform, IEEE Internatonal Worksop on Multmeda Sgnal Processng, St. Tomas, Vrgn Islands, USA, December 9-, [6] J. Tan, Reversble data embeddng usng a dfference expanson, IEEE Trans. on Crcuts and Systems for Vdeo Tecnology vol.3, no.8, pp , [7] A.M. Alattar, Reversble watermark usng dfference expanson of trplets, Proc. IEEE Internatonal Conference on Image Processng, vol., Barcelona, Span, pp , September [8] A.M. Alattar, Reversble watermark usng dfference expanson of quads, Proc. IEEE Internatonal Conference on Acoustcs, Speec, and Sgnal Processng, Montreal, Canada, vol.3, pp , May [9] L. Kamstra and H.J.A.M. Hejmans, Wavelet tecnques for reversble data embeddng nto mages, Centrum voorwskunde en Informatca Rep. August [0] L. Kamstra and H.J.A.M. Hejmans, Reversble data embeddng nto mages usng wavelet tecnques and sortng, IEEE Trans. on Image Processng vol.4, no.2, pp , December [] D.M. Tod, J.J. Rodrguez, Expanson embeddng tecnques for reversble watermarkng, IEEE Trans. on Image Processng vol.6, no.3, pp , [2] J. Frdrc, M. Goljan, and R. Du, Invertble autentcaton, Proc. of te SPIE, Securty and Watermarkng of Multmeda Contents, vol.434, San Jose, CA, pp , January 200. [3] M.U. Celk, G. Sarma, and A.M. Tekalp, Reversble data dng, Proc. IEEE Internatonal Conf. on Image Processng, Rocester, NY, pp.57 60, [4] M.U. Celk, G. Sarma, A.M. Tekalp, and E. Saber, Lossless generalzed-lsb data embeddng, IEEE Trans. on Image Proc. vol.4, no.2, pp , February [5] Z. N, Y.Q. S, N. Ansar, and W. Su, Reversble data dng, IEEE Transactons on Crcuts and Systems for Vdeo Tecnology vol.6, no.3, pp , Marc [6] J. Hwang, J.W. Km, and J.U. Co, A reversble watermarkng based on stogram sftng, Internatonal Worksop on Dgtal Watermarkng, Lecture Notes n Computer Scence, Sprnger-Verlag, Jeju Island, Korea, vol.4283, pp , [7] W.-C. Kuo, D.-J. Jang, and Y.-C. Huang, Reversble data dng based on stogram, Internatonal Conf. on Intellgent Computng, Lecture Notes n Artfcal Intellgence, Sprnger- Verlag, Qng Dao, Cna, vol.4682, pp.52 6, [8] K.-S. Km, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, Reversble data dng explotng spatal correlaton between subsampled mages, Pattern Recognton, vol.42, pp , [9] X.-R. Luo, C.-H. Jerry Ln, and T.-L. Yn, Reversble data dng based on two-level HDWT coeffcent stograms, Advanced Computng: An Internatonal Journal, vol.2, no., pp.-6, January
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAdaptive Fractal Image Coding in the Frequency Domain
PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL
More informationAuthenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 47 Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: sdx86@uow.edu.au
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationThe Cox-Ross-Rubinstein Option Pricing Model
Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationA Suspect Vehicle Tracking System Based on Video
3rd Internatonal Conference on Multmeda Technology ICMT 2013) A Suspect Vehcle Trackng System Based on Vdeo Yad Chen 1, Tuo Wang Abstract. Vdeo survellance systems are wdely used n securty feld. The large
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationEffective wavelet-based compression method with adaptive quantization threshold and zerotree coding
Effectve wavelet-based compresson method wth adaptve quantzaton threshold and zerotree codng Artur Przelaskowsk, Maran Kazubek, Tomasz Jamrógewcz Insttute of Radoelectroncs, Warsaw Unversty of Technology,
More informationImage Compression of MRI Image using Planar Coding
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Image Compresson of MRI Image usng Planar Codng Laltha Y. S Department of Electroncs & Communcaton Engg. Appa Insttute of Engneerng
More informationLaddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationVehicle Detection and Tracking in Video from Moving Airborne Platform
Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationTexture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs
Texture Analyss and Modfed Level Set Method for Automatc Detecton of Bone Boundares n Hand Radographs Syaful Anam Graduate School of Scence and Engneerng Yamaguch Unversty Yamaguch, Japan Department of
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationDocument image template matching based on component block list
Pattern Recognton Letters 22 2001) 1033±1042 www.elsever.nl/locate/patrec Document mage template matchng based on component block lst Hanchuan Peng a,b,c, *, Fuhu Long b, Zheru Ch b, Wan-Ch Su b a Department
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationE-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationTechniques for multi-resolution image registration in the presence of occlusions 1
Technques for mult-resoluton mage regstraton n the presence of occlusons organ cgure Harold S. Stone morganm@mt.edu, hstone@research.n.nec.com Abstract Ths paper descrbes and compares technques for regsterng
More informationLAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks
LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationBUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr
Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo
More informationECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble
1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, szhang12@llnos.edu Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In
More informationAn interactive system for structure-based ASCII art creation
An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationForensic Handwritten Document Retrieval System
Forensc Handwrtten Document Retreval System Sargur N SRIHARI and Zhxn SHI + Center of Excellence for Document Analyss and Recognton (CEDAR), Unversty at Buffalo, State Unversty of New York, Buffalo, USA
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationA system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings
A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas
More informationSPATIO-FREQUENCY BASED IMAGE WATERMARKING
STANBUL UNVERSTY JOURNAL OF ELECTRCAL & ELECTRONCS ENGNEERNG YEAR VOLUME NUMBER : 29 : 9 : (93-92) SPATO-FREQUENCY BASED MAGE WATERMARKNG Mahmut ÖZTÜRK Aydın AKAN 2 Yalçın ÇEKĐÇ Eletr-Eletron Mühendslğ
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationVEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM
IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal
More informationEfficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ
Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationCONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM
Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE
More informationA Fuzzy Group Decision Making Approach to Construction Project Risk Management
Internatonal Journal of Industral Engneerng & Producton Researc Marc 03, Volume 4, Number pp. 7-80 ISSN: 008-4889 ttp://ijiepr.ust.ac.r/ A Fuzzy Group Decson Makng Approac to Constructon Project Rsk Management
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationFast degree elevation and knot insertion for B-spline curves
Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationUsing Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationNetwork Aware Load-Balancing via Parallel VM Migration for Data Centers
Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung
More informationQoS-Aware Active Queue Management for Multimedia Services over the Internet
QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference
More informationSMOOTH TRAJECTORY PLANNING ALGORITHMS FOR INDUSTRIAL ROBOTS: AN EXPERIMENTAL EVALUATION
1. Albano LANZUTTI SMOOTH TRAJECTORY PLANNING ALGORITHMS FOR INDUSTRIAL ROBOTS: AN EXPERIMENTAL EVALUATION 1. DIPARTIMENTO DI INGEGNERIA ELETTRICA, GESTIONALE E MECCANICA UNIVERSITA' DI UDINE, UDINE ITALY
More informationAn ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures
An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationAN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationMACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION
MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationAutomated Mobile ph Reader on a Camera Phone
Automated Moble ph Reader on a Camera Phone B.Y. Loh, N.K. Vuong, S. Chan and C.. Lau AbstractA robust classfcaton algorthm that apples color scence and mage processng technques s developed to automatcally
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationSearch Efficient Representation of Healthcare Data based on the HL7 RIM
181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of
More informationInvoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow
Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationA Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationSTANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.
STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationIntelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security
Journal of Computer Scence 3 (5): 274-280, 2007 ISSN 1549-3636 2007 Scence Publcatons Intellgent Voce-Based Door Access Control System Usng Adaptve-Network-based Fuzzy Inference Systems (ANFIS) for Buldng
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT
M USHA AND K MADHANA: ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT M.
More informationEye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns
Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationHigh Correlation between Net Promoter Score and the Development of Consumers' Willingness to Pay (Empirical Evidence from European Mobile Markets)
Hgh Correlaton between et Promoter Score and the Development of Consumers' Wllngness to Pay (Emprcal Evdence from European Moble Marets Ths paper shows that the correlaton between the et Promoter Score
More informationA Novel Auction Mechanism for Selling Time-Sensitive E-Services
A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,
More informationResponse Coordination of Distributed Generation and Tap Changers for Voltage Support
Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,
More information