FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy
|
|
- Darren Gallagher
- 7 years ago
- Views:
Transcription
1 FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger, Norway, E-mai: ABSTRACT In this paper we briefy describe the Frame Texture Cassification Method (FTCM) and the tied-foor texture mode on which it is based. For a test image pixe a feature vector is formed based on a sma spatia neighborhood, and FTCM cacuate its distance to the frames, i.e. the dictionaries, one frame for each texture cass under consideration. The frame where the distance is smaest gives the texture cass the pixe is assumed to beong to. The texture mode gives some guidance to how the feature vectors shoud be formed, many different ways to do this are described, a being in accordance with the texture mode. In the experiments we investigate many different sizes and shapes for the neighborhood used when forming the feature vectors. The experiments are done on some commony used test images of natura textures. FTCM is fexibe when seecting a neighborhood and many patterns give exceent cassification resuts. 1. INTRODUCTION Cassification and segmentation of texture content in digita images is an important part of many image anaysis methods. Tuceryan and Jain [1] give a comprehensive overview of texture cassification. Possibe appications can be grouped into: 1) texture anaysis, i.e. find some appropriate properties for a texture, 2) texture cassification, i.e. identify the texture cass in a homogeneous region, 3) texture segmentation, i.e. find a boundary map between different texture regions of an image. The boundary map may be used for object recognition and scene interpretation in areas such as medica diagnostics, geophysica interpretation, industria automation and image indexing. Finay, 4) texture synthesis, i.e. generate artificia textures to be used for exampe in computer graphics or image compression. Some exampes of appications are presented in [2, 3, 4, 5, 6]. For human beings it is quite easy to recognize different textures in images. We ook at the whoe image at once and find the texture features at the same time as we do image segmentation. Both these tasks are highy knowedge dependent, we know a ot of common textures and know in which shapes and contexts they usuay occur. Computer based agorithms do not (yet) have this arge amount of knowedge avaiabe and typicay do texture cassification and image segmentation in two ceary separated parts. Aso, texture cassification agorithms typicay have two main parts: A oca feature vector is found, which is subsequenty used for texture cassification or segmentation. The feature vector is generated, a ot of different methods can be used, from the pixes in a spatia neighborhood of a center pixe. The methods for feature extraction may be oosey grouped as statistica, geometrica, mode-based, and signa processing (fitering) methods [1]. For the fitering methods the feature vectors are often buit as variance estimates, oca energy measures, for each of the sub-bands of a fiter bank. Aso, there are numerous cassification or pattern recognition methods avaiabe: The Bayes cassifier is probaby the most common one [7, 8]. The minor max-seector is a simpe one that can be used if each entry in the feature vector measures the simiarity to, or corresponds to, a texture cass. Nearest neighbor cassifier, vector quantization (codebook vectors represent each cass) [9] and earning vector quantization (LVQ) (codebook vectors define the decision borders) [10, 11, 12], neura networks, watershed-based agorithm [13], and support vector machines (SVM) [14] are other methods. In this paper Frame Texture Cassification Method (FTCM) shoud be regarded as a supervised vector cassification method. As wi be expained in Section 2 FTCM is particuary we suited under the assumption that the vectors within each cass are a sparse inear combination of eements from a frame, i.e a dictionary, of finite (moderate) size. This assumption wi be true for feature vectors generated from a texture synthesized by the tied-foor texture mode. FTCM is thus reated to other texture cassification methods which depend on cassification of the feature vectors. It is possibe that the resuts presented in this paper may be usefu aso when other vector cassification methods are used for texture cassification.
2 We wi particuary mention the reationship between FTCM and the SVM scheme as used in [15]. SVM finds a set of support vectors for each texture and this set identifies a hyperpane which separates the given texture from the rest of the textures, whie FTCM finds a set of frame vectors for each texture and this set is trained to efficienty represent the given texture by a sparse inear combination and thus identifying the texture. 2. FRAME TEXTURE CLASSIFICATION METHOD The FTCM is a supervised texture cassification method. It was first introduced in [16], and is aso presented in [17] and [18]. Here foows a brief presentation of the underaying deterministic texture mode, foowed by the two parts of FTCM The tied-foor texture mode The main resut of this subsection is that it is reasonabe to mode a sma texture image bock as a sparse inear combination of frame eements. In the proposed texture mode a texture is modeed as a tied foor, where a ties are identica. We et the coordinate system be aigned to match a tie, such that the center of the first tie is given by (x, y) = ( 1 2, 1 2 ), and the corners are (0, 0), (1, 0), (0, 1), and (1, 1). The coor, or gray-eve, at a given position on the foor is given by a continuous periodic two-dimensiona function which we denote c(x, y) = c(x x, y y ). A finite number, denoted M, of contro points, denoted c i, are paced on each tie. The function is defined as a biinear interpoation of four of the (cosest) contro points, i.e. c(x, y) = a 1 c i1 + a 2 c i2 + a 3 c i3 + a 4 c i4. The biinear interpoation is actuay a convex combination, with a 1 +a 2 +a 3 +a 4 = 1 and 0 a k 1. Sampes of c(x, y) on a rectanguar samping grid, not necessariy aigned with the coordinate system impied by the first tie, constitute the digita texture image. By choosing 1) the number and positions of contro points in a tie, 2) the gray-eve vaue (coor) of each of the contro points, 3) the orientation of the samping grid reative to the coordinate system aigned with the ties, denoted by ange α, and finay, 4) the distance between neighboring samping points, denoted by δ, in the samping grid, we obtain a digita texture image. We wi now ook coser on a sma bock of pixes from the texture image. This bock is arranged into a size N vector, x = [x(1), x(2),..., x(n)] T, x(1) is the upper eft pixe and the rest are numbered coumnwise. Remember that each entry of x, i.e. each pixe, is a convex combination of four contro points taken from a finite set of M contro points. Given the mode above, it was shown in [18] that the vector x is a convex combination of four frame vectors taken from a finite set of at most MN 2 frame vectors Frame design For a particuar texture image, specified by the mode above, i.e. by contro points and by a samping grid, we coud find the correct frame. But in FTCM a more genera method is used to design the frame, the frame is not designed based on knowedge on how the texture image was made, but ony based on a set of training vectors generated from an exampe image. Each training vector is approximated by a inear combination of (three or) four frame vectors. The frame is designed to achieve the best tota sparse representation for a the training vectors. How the training vectors are formed is discussed in Section 3. The parameters used during design are N, K, L and s. The ength of the training (and frame) vectors is N. The number of vectors in the frame is denoted K. For practica reasons it shoud be quite sma, we may use N K 10N MN 2. To avoid overtraining the number of training vectors L shoud be much arger than K, K L. The sparseness to use in the approximation is denoted s, here we use the vaues s = 3 and s = 4. For each texture cass the training vectors are arranged into a N L matrix, X = [x 1 x 2... x L ]. We want to find a frame with K frame vectors, F = [f 1 f 2... f K ], such that each of the training vectors can be approximated by a sparse combination of the frame vectors, x Fw where w has at most s non-zero entries. Having W = [w 1 w 2... w L ] the objective function to be minimized, with a sparseness constraint on W, is J = J(F, W) = X FW 2. (1) Finding the optima soution to this probem is difficut if not impossibe. We spit the probem into two parts to make it more tractabe, simiar to what is done in the GLA design agorithm for VQ codebooks [19]. The iterative soution strategy presented beow resuts in good, but in genera suboptima, soutions to the probem. The agorithm starts with a user suppied initia frame F 0, usuay K arbitrary vectors from the set of training vectors, and then improves it by iterativey repeating two main steps: 1. W t is found by vector seection using frame F t. The objective function is J(W) = X F t W 2, and a sparseness constraint is imposed on W. 2. F t+1 is found from X and W t, where the objective function is J(F) = X FW t 2. This
3 gives: F t+1 = XWt T ( Wt Wt T ) 1 (2) Then we increment t and go to step 1. t is the iteration number. The first step is suboptima due to the use of practica vector seection agorithms, whie the second step finds the F that minimizes the objective function Cassification Texture cassification of a test image, containing regions of different textures, is the task of cassifying each pixe of the test image to beong to a certain texture. This is done by generating test vectors from the test image using the same method as when the training vectors were generated. A test vector is represented in a sparse way using each of the different frames that were trained for the textures under consideration, the set of C frames {F (i) }. The distance between test vector x and frame F (i) is the 2-norm (ength) of the representation error for the best sparse representation of the test vector, d (i) = r (i) and r (i) = x F (i) w (i). Each test vector x corresponds to a pixe of the test image. Cassification consists of seecting the index i for which the norm, or norm squared, of the representation error, r (i) 2 = r (i)t r (i), is minimized. Direct cassification based on the norm squared of the representation error for each test vector (pixe) gives quite arge cassification errors, but the resuts can be substantiay improved by smoothing the error images. Smoothing is reasonabe since it is ikey that neighboring pixes beong to the same texture. For smoothing we have used the separabe Gaussian ow-pass fiter. The effect of smoothing is mainy that more smoothing gives better cassification within the texture regions but ower resoution, i.e. often more cassification errors aong the borders between different texture regions. To improve texture segmentation a noninearity may be incuded before the smoothing fiter is appied, [20]. We have found that the ogarithmic noninearity often gives the best resuts, [16]. 3. SELECTING PIXELS IN LOCAL NEIGHBORHOOD We wi here show that the training and test vectors (feature vectors) can be made in many different ways and sti be in accordance with the mode in subsection 2.1. Let us assume that the bock around each pixe is of size 13 13, giving N = 169 as the ength of vector x. The perfect frame is F of size N K where K = MN 2, M is the number of contro points on one tie. In accordance with the mode we have x = Fw, where w is a sparse vector with ony four non-zero entries. Let another feature vector x be formed as x = Ax where A is a N N matrix, N N. Keeping w the same as above, i.e. sti sparse, this gives x = A(Fw) = (AF)w = F w, and we see that aso x can be represented by a inear combination of four frame vectors taken from a finite set of frame vectors, F = AF. Suppose each row in A has ony one non-zero entry. This gives the case where the feature vectors are formed by a pattern of pixes around the center pixe. Some exampes are iustrated in patterns 1-9 in Figure 1. The non-zeros entries of A are here assumed to be 1, but it is aso possibe to form a weighted pattern. Without restrictions on the entries of A each eement of x is a inear combination of the eements in x. This is the same as the output of different FIR-fiters appied on the pixes in the oca neighborhood of the centra pixe, each row of A gives the coefficients of each fiter. The patterns in Figure 2 are formed this way. In the mode a vector is formed by a biinear interpoation of frame vectors, i.e. a sparse convex combination where each coefficient 0 a k 1 and ak = 1. In vector seection, and the equation x = Fw, a sparse inear combination is used. The coefficients, a k, are the non-zero entries of w. It is not trivia to incude the convex constraint into the vector seection agorithm, but an affine constraint, i.e. ak = 1, can be impemented without any changes to the inear vector seection agorithm. Let x = [ b x ] [ and F b b b = f 1 f 2 f K ]. (3) where b 0. Then the inear combination x = F w must aso be an affine combination. Patterns 10-13, 15, 16 and 18 in Figure 2 a have an extra fixed eement added. Pattern 10 is ike pattern 1 except for the fixed eement, 11 is ike 5, 12 is ike 3, 13 is ike 6, 15 is ike 14, and 18 is ike 17. Here we have argued that the feature vectors may be generated in many different ways from the pixes in a spatia neighborhood of the centra pixe. Neither the mode nor the theory give any cear guidance to which is better. Obviousy each vector shoud contain the necessary texture information for this particuar center pixe, but it does not need to contain information on the neighboring pixes (smoothing). For the compexity of the methods, the smaer feature vectors shoud be preferred. In the next section extensive experiments are presented, a the 18 different methods shown in Figure 1 and Figure 2 are tested.
4 Pattern 1, N=9 Pattern 2, N=16 Pattern 3, N=25 (a) (b) Pattern 4, N=49 Pattern 5, N=13 Pattern 6, N=21 Figure 3: Two of the nine test images used. 4. EXPERIMENTS Pattern 7, N=21 Pattern 8, N=49 Pattern 9, N=39 Figure 1: Pixes around the center pixe, marked by a square, used to form the oca feature vector for the 9 simpe cases. N is the number entries in the feature vector, here it the same as the number of pixes in each pattern. Pattern 10, N=10 Pattern 11, N=14 Pattern 12, N=26 Pattern 13, N=22 Pattern 14, N=25 Pattern 15, N=26 Pattern 16, N=25 Pattern 17, N=17 Pattern 18, N=18 Figure 2: More patterns, here an extra fixed vaue eement is added to each feature vector, except for pattern 14 and 17. Feature vectors for patterns 14 to 18 are formed by fitering over the pixes indicated by pus sign, for pattern 17 and 18 the Daubechies 7-9 waveet fiters are used. N is the number entries in the feature vector. FTCM and the 18 different patterns for the feature vectors, described in Section 3, were tested both for synthesized texture images made based on the mode and for natura rea textures. It turned out that a patterns achieved very we on the synthesized test images, and the differences between them were margina. Thus, this section presents the resuts for the natura textures. As in [18] we choose to use the nine test images of Randen and Husøy [11] for natura rea textures. These consist of 77 different natura textures, taken from three different and commony used texture sources: The Brodatz abum, the MIT Vision Texture database, and the MeasTex Image Texture Database. The test images are denoted (a) to (i). (a) and (b) are shown in Figure 3, a are shown in Figure 11 in [11], where aso a more detaied description of the test images can be found 1. The same test images were aso used in other papers [21, 8, 13, 15, 22]. The exceent performance of FTCM compared to the other methods was reported in [18], the purpose here is to compare the different patterns to each other. The experiments started by designing the frames to be used, one frame for each kind of training vector and texture under consideration. The frame parameters, see Subsection 2.2, used were: N as given by the pattern, K = 6N but minimum 100 and maximum 200, s = 3 for N < 30 and s = 4 for N 30, and L = iterations were done. During cassification of each test image we use ony the frames corresponding to the textures that are present in the test image. A ogarithmic noninearity and a separabe Gaussian ow-pass fiter were used. The standard deviation σ in the fiter varied, but here we present the compete resuts ony for σ = 10, the size of this ow pass fiter was cut at approximatey 2σ at each end, giving the fiter size pixes. These resuts are shown in Tabe 1. 1 The training images and the test images are avaiabe at tranden/
5 Pattern (parameters: N K, s) a b c d e f g h i Mean 1 (9 100, 3) (16 100, 3) (25 150, 3) (49 200, 4) (13 100, 3) (21 126, 3) (21 126, 3) (49 200, 4) (39 200, 4) (10 100, 3) (14 100, 3) (26 156, 3) (22 132, 3) (25 150, 3) (26 156, 3) (25 150, 3) (17 102, 3) (18 108, 3) , see text Tabe 1: Cassification errors, given as percentage wrongy cassified pixes, for different methods and natura test images. Let us ook coser at the average resuts for the 9 test images. These are presented in Figure 4, on the eft side for σ = 1, here ow-pass fitering is done using a sma 3 3 and narrow fiter, and on the right side for σ = 10. We note that with itte ow-pass fitering the onger feature vectors perform best, whie using more appropriate ow-pass fitering it seems that onger feature vectors do not improve the resuts. The most probabe expanation is that the onger feature vectors aso contain some of the smoothing information. We aso concude that amost a methods seems to capture the essentia texture information quite we. Methods 11, 15, and 18 do a very we. To see how an extra constant eement added to the feature vector infuence on the resuts we compare the resuts, taken from Tabe 1, of the six patterns, 1, 5, 3, 6, 14 and 17 to the six simiar patterns, 10, 11, 12, 13, 15 and 18. We note that adding an extra eement give better resuts amost aways, the means (of the means) are 14.6 and 12.7 percent wrongy cassified pixes. The concusion seems to be cear, adding the extra eement improves the resuts. This is in ine with the mode where an affine combination is preferred to a inear combination. Looking at the detais the concusion is not that cear, three of the test images, c, e and g, are best cassified using method 14. Generay, the detais give more scattered resuts, indicating that the choice of pattern is dependent on the test image. Aso, training has a random eement both in seection of the training vectors, the initia frame, and the training process, resuting in sighty different frames each time a frame is trained. This random effect obviousy has an impact on the resuts, and can expain some of the scattering. More work is needed to understand this better. To get even better resuts it is possibe to do averaging without smoothing. This is possibe since severa representation errors for each pixe, one for each of the patterns, are avaiabe. Averaging these for patterns 11, 15, and 18 before smoothing (and before the ogarithmic noninearity is appied) gives the resuts presented in ast ine of Tabe CONCLUSION Many of the different sizes and shapes for the neighborhood used to form the feature vectors gave exceent resuts when FTCM was used for vector cassification. It seems that the sma 3 3 pattern, used in method 1 and 10, is too sma. Adding just a few more pixes, as in pattern 2, 5 and 11, seems to capture the texture information we and gives very good resuts. Pattern 11 seems best, considering both simpicity and resuts. To get optima cassification resuts severa patterns can be combined. 6. REFERENCES [1] M. Tuceryan and A. K. Jain, Texture anaysis, in Handbook of Pattern Recognition and Computer Vision, C. H. Chen, L. F. Pau, and P. S. P. Wang, Eds. Singapore: Word Scientific Pubishing Co, 1998, ch. 2.1, pp
6 65 1 Mean for the 9 test images, σ = Mean for the 9 test images, σ = Percentage wrongy cassified pixes Percentage wrongy cassified pixes Length of feature vectors, N Length of feature vectors, N. Figure 4: The average percentage wrongy cassified pixes for the 9 test image, here with σ = 1 in ow-pass fiter to the eft and σ = 10 to the right. [2] R. J. Dekker, Texture anaysis and cassification of ERS SAR images for map updating of urban areas in the Netherands, IEEE Trans. Geosci. Remote Sensing, vo. 41, no. 9, pp , Sept [3] M. K. Kundu and M. Acharyya, M-band waveets: Appication to texture segmentation for rea ife image anaysis, Internationa Journa of Waveets, Mutiresoution and Information Processing, vo. 1, no. 1, pp , [4] F. Mendoza and J. M. Aguiera, Appication of image anaysis for cassification of ripening bananas, Journa of Food Science, vo. 69, no. 9, pp , Nov [5] S. Arivazhagan and L. Ganesan, Automatic target detection using waveet transform, EURASIP Journa on Appied Signa Processing, vo. 2004, no. 17, pp , [6] S. Singh and M. Singh, A dynamic cassifier seection and combination approach to image region abeing, Signa Processing Image Communication, vo. 30, no. 3, pp , Mar [7] M. Unser, Texture cassification and segmentation using waveet frames, IEEE Trans. Image Processing, vo. 4, no. 11, pp , Nov [8] S. Liapis, E. Sifakis, and G. Tziritas, Coour and texture segmentation using waveet frame anaysis, deterministic reaxation, and fast marching agorithms, Journa of Visua Communication and Image Representation, vo. 15, no. 1, pp. 1 26, Mar [9] G. F. McLean, Vector quantization for texture cassification, IEEE Trans. Syst., Man, Cybern., vo. 23, no. 3, pp , May/June [10] T. Kohonen, The sef-organizing map, Proc. IEEE, vo. 78, no. 9, pp , Sept [11] T. Randen and J. H. Husøy, Fitering for texture cassification: A comparative study, IEEE Trans. Pattern Ana. Machine Inte., vo. 21, no. 4, pp , Apri [12] C. Diamantini and A. Spavieri, Quantizing for minimum average miscassification risk, IEEE Trans. Neura Networks, vo. 9, no. 1, pp , Jan [13] N. Mapica, J. E. Ortuño, and A. Santos, A mutichanne watershed-based agorithm for supervised texture segmentation, Pattern Recognition Letters, vo. 24, no. 9-10, pp , June [14] S. Li, J. T. Kwok, H. Zhu, and Y. Wang, Texture cassification using the support vector machines, Pattern Recognition, vo. 36, no. 12, pp , Dec [15] K. I. Kim, K. Jung, S. H. Park, and H. J. Kim, Support vector machines for texture cassification, IEEE Trans. Pattern Ana. Machine Inte., vo. 24, no. 11, pp , Nov [16] K. Skretting, Sparse signa representation using overapping frames, Ph.D. dissertation, NTNU Trondheim and Høgskoen i Stavanger, Oct. 2002, avaiabe at karsk/. [17] K. Skretting and J. H. Husøy, Texture cassification using sparse frame based representations, in NORSIG-02, Tromsø/Trondheim, Norway, Oct. 2002, aso avaiabe at karsk/. [18], Texture cassification using sparse frame based representations, EURASIP Journa on Appied Signa Processing, 2005, accepted for pubiction, to be printed autumn [19] A. Gersho and R. M. Gray, Vector Quantization and Signa Compression. Norwe, Mass., USA: Kuwer Academic Pubishers, [20] M. Unser and M. Eden, Noninear operators for improving texture segmentation based on features extracted by spatia fitering, IEEE Trans. Syst., Man, Cybern., vo. 20, pp , [21] M. Acharyya, R. K. De, and M. K. Kundu, Extraction of features using M-band waveet packet frame and their neuro-fuzzy evauation for mutitexture segmentation, IEEE Trans. Pattern Ana. Machine Inte., vo. 44, no. 12, pp , Dec [22] T. Ojaa, K. Vakeaahti, E. Oja, and M. Pietikäinen, Texture discrimination with mutidimensiona distributions of signed gray-eve differences, Pattern Recognition, vo. 34, no. 3, pp , Mar
Face Hallucination and Recognition
Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationONE of the most challenging problems addressed by the
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,
More information3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68
68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected
More informationAn Idiot s guide to Support vector machines (SVMs)
An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning
More informationA New Statistical Approach to Network Anomaly Detection
A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit
More informationArt of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks
More informationSimultaneous Routing and Power Allocation in CDMA Wireless Data Networks
Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,
More informationFigure 1. A Simple Centrifugal Speed Governor.
ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems
More informationPricing Internet Services With Multiple Providers
Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu
More information7. Dry Lab III: Molecular Symmetry
0 7. Dry Lab III: Moecuar Symmetry Topics: 1. Motivation. Symmetry Eements and Operations. Symmetry Groups 4. Physica Impications of Symmetry 1. Motivation Finite symmetries are usefu in the study of moecues.
More informationA Latent Variable Pairwise Classification Model of a Clustering Ensemble
A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.
More informationRestoration of blue scratches in digital image sequences
Avaiabe onine at www.sciencedirect.com Image and Vision Computing 26 (2008) 1314 1326 www.esevier.com/ocate/imavis Restoration of bue scratches in digita image sequences Lucia Maddaena a, *, Afredo Petrosino
More informationTraffic classification-based spam filter
Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,
More informationDiscounted Cash Flow Analysis (aka Engineering Economy)
Discounted Cash Fow Anaysis (aka Engineering Economy) Objective: To provide economic comparison of benefits and costs that occur over time Assumptions: Future benefits and costs can be predicted A Benefits,
More informationCOMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION
COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More informationSELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationABSTRACT. Categories and Subject Descriptors. General Terms. Keywords 1. INTRODUCTION. Jun Yin, Ye Wang and David Hsu
Jun Yin, Ye Wang and David Hsu ABSTRACT Prompt feedback is essentia for beginning vioin earners; however, most amateur earners can ony meet with teachers and receive feedback once or twice a week. To hep
More informationHow To Restore A Bue Scratch In Digita Image Sequences
Consigio Nazionae dee Ricerche Istituto di Cacoo e Reti ad Ate Prestazioni Restoration of bue scratches in digita image sequences Lucia Maddaena, Afredo Petrosino RT-ICAR-NA-05-2 December 2005 Consigio
More informationHigh-order balanced M-band multiwavelet packet transform-based remote sensing image denoising
Wang et a. EURASIP Journa on Advances in Signa Processing (2016) 2016:10 DOI 10.1186/s13634-015-0298-7 RESEARCH High-order baanced M-band mutiwaveet packet transform-based remote sensing image denoising
More informationBetting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing
More informationAPPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC
Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages
More informationA 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Applications
Internationa Journa of esearch Studies in Science, Engineering and Technoogy Voume 2, Issue 7, Juy 2015, PP 102-110 ISSN 2349-4751 (Print) & ISSN 2349-476X (Onine) A 3D Motion Trajectory Signature Identification
More informationA Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
More informationInternational classification of financial reporting
3 Internationa cassification of financia reporting Christopher Nobes CONTENTS 3.1 Introduction 3.2 The nature of cassification 3.3 Cassifications by socia scientists 3.4 Cassifications in accounting 3.5
More informationLADDER SAFETY Table of Contents
Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3
More informationCI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass
CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity
More informationBite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
More informationLet s get usable! Usability studies for indexes. Susan C. Olason. Study plan
Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these
More informationPacket Classification with Network Traffic Statistics
Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on
More informationInterpreting Individual Classifications of Hierarchical Networks
Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker Michae D. Thomure Luís M. A. Bettencourt Meanie Mitche Garrett T. Kenyon SFI WORKING PAPER: 2013-02-007 SFI Working Papers contain
More informationCONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,
More informationA Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
More informationWHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons
Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationSpherical Correlation of Visual Representations for 3D Model Retrieval
Noname manuscript No. (wi be inserted by the editor) Spherica Correation of Visua Representations for 3D Mode Retrieva Ameesh Makadia Kostas Daniiidis the date of receipt and acceptance shoud be inserted
More informationVendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
More informationMeasuring operational risk in financial institutions
Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and
More informationIEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1
IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan
More informationBetting Strategies, Market Selection, and the Wisdom of Crowds
Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com
More informationGWPD 4 Measuring water levels by use of an electric tape
GWPD 4 Measuring water eves by use of an eectric tape VERSION: 2010.1 PURPOSE: To measure the depth to the water surface beow and-surface datum using the eectric tape method. Materias and Instruments 1.
More informationChapter 1 Structural Mechanics
Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however
More informationFixed income managers: evolution or revolution
Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate
More information3.3 SOFTWARE RISK MANAGEMENT (SRM)
93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce
More informationAssignment of Multiplicative Mixtures in Natural Images
Assignment of Mutipicative Mixtures in Natura Images Odeia Schwartz HHMI and Sak Institute La Joa, CA 94 odeia@sak.edu Terrence J. Sejnowski HHMI and Sak Institute La Joa, CA 94 terry@sak.edu Abstract
More informationGREEN: An Active Queue Management Algorithm for a Self Managed Internet
: An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of
More informationWeek 3: Consumer and Firm Behaviour: The Work-Leisure Decision and Profit Maximization
AROEOOIS 2006 Week 3: onsumer and Firm Behaviour: The Work-Leisure Decision and Profit aximization Questions for Review 1. How are a consumer s preferences over goods represented? By utiity functions:
More informationElectronic Commerce Research and Applications
Eectronic Commerce Research and Appications 8 (2009) 63 77 Contents ists avaiabe at ScienceDirect Eectronic Commerce Research and Appications journa homepage: www.esevier.com/ocate/ecra Forecasting market
More informationBreakeven analysis and short-term decision making
Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationPresented at the 107th Convention 1999 September 24-27 New York
Room Simuation for Mutichanne Fim and Music 4993 (B-2) Knud Bank Christensen and Thomas Lund TC Eectronic A/S DK-8240 Risskov, Denmark Presented at the 107th Convention 1999 September 24-27 New York This
More informationIntroduction to XSL. Max Froumentin - W3C
Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?
More informationEarly access to FAS payments for members in poor health
Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection
More informationUnderstanding. nystagmus. RCOphth
Understanding nystagmus RCOphth RNIB s understanding series The understanding series is designed to hep you, your friends and famiy understand a itte bit more about your eye condition. Other tites in the
More informationComparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time
Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen
More informationEnhanced continuous, real-time detection, alarming and analysis of partial discharge events
DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set
More informationChapter 2 Traditional Software Development
Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,
More informationLearning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning
Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations
More informationCERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society
CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationThe Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers
he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder
More informationResearch on Risk of Supply Chain Finance of Small and Medium-Sized Enterprises Based on Fuzzy Ordinal Regression Support Vector Machine
www.ccsenet.org/ibm Internationa Journa of Business and Management Vo. 7, No. 8; Apri 202 Research on Risk of Suppy Chain Finance of Sma and Medium-Sized Enterprises Based on Fuzzy Ordina Regression Support
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationNetwork/Communicational Vulnerability
Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security
More informationWith the arrival of Java 2 Micro Edition (J2ME) and its industry
Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting
More informationLeakage detection in water pipe networks using a Bayesian probabilistic framework
Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*
More informationFast Image Acquisition in Pulse-Echo Ultrasound Imaging Using Compressed Sensing
Fast Image Acquisition in Puse-Echo Utrasound Imaging Using Compressed Sensing Martin F. Schiffner and Georg Schmitz Chair of Medica Engineering, Ruhr-Universität Bochum, D-4481 Bochum, Germany Copyright
More informationOligopoly in Insurance Markets
Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.
More informationMarket Design & Analysis for a P2P Backup System
Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft
More informationMaintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
More informationBest Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1
SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for
More informationLarge-Scale Optimization of Hierarchical Features for Saliency Prediction in Natural Images
Large-Scae Optimization of Hierarchica Features for Saiency Prediction in Natura Images Eeonora Vig Harvard University vig@fas.harvard.edu Michae Dorr Harvard Medica Schoo michae.dorr@schepens.harvard.edu
More information25 Indirect taxes, subsidies, and price controls
5 Indirect taxes, subsidies, and price contros By the end of this chapter, you shoud be abe to: define and give exampes of an indirect tax expain the difference between a specific tax and a percentage
More information1B11 Operating Systems. Input/Output and Devices
University Coege London 1B11 Operating Systems Input/Output and s Prof. Steve R Wibur s.wibur@cs.uc.ac.uk Lecture Objectives How do the bits of the I/O story fit together? What is a device driver? 1B11-5
More informationTCP/IP Gateways and Firewalls
Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and
More informationEnergy Performance Certificate
Energy Performance Certificate Sampe EPC TheDomesticEnergyAssessorcom Dweing type: Date of assessment: Date of certificate: Reference number: Tota foor area: Mid-terrace house 09 June 2007 31 August 2007
More informationOverview of Health and Safety in China
Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca
More information(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006
(19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE
More informationUS 20080120174A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008
US 20080120174A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008 (54) METHOD AND SYSTEM FOR FLEXIBLE Pubication Cassi?cation PRODUCT
More informationKey Features of Life Insurance
Key Features of Life Insurance Life Insurance Key Features The Financia Conduct Authority is a financia services reguator. It requires us, Aviva, to give you this important information to hep you to decide
More informationThe width of single glazing. The warmth of double glazing.
Therma Insuation CI/SfB (31) Ro5 (M5) September 2012 The width of singe gazing. The warmth of doube gazing. Pikington Spacia Revoutionary vacuum gazing. Image courtesy of Lumen Roofight Ltd. Pikington
More informationHuman Capital & Human Resources Certificate Programs
MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J
More informationCLOUD service providers manage an enterprise-class
IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With
More informationeg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No
More informationPROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE
Advances in Eectrica and Eectronic Engineering 98 PROPAGATION OF SRGE WAVES ON NON-HOMOGENEOS TRANSMISSION LINES INDCED BY LIGHTNING STROKE Z. Benešová, V. Kotan WB Pisen, Facuty of Eectrica Engineering,
More informationEnergy Density / Energy Flux / Total Energy in 3D
Lecture 5 Phys 75 Energy Density / Energy Fux / Tota Energy in D Overview and Motivation: In this ecture we extend the discussion of the energy associated with wave otion to waves described by the D wave
More informationThe Comparison and Selection of Programming Languages for High Energy Physics Applications
The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309
More informationAn Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
More informationChapter 6 Signal Data Mining from Wearable Systems
Chapter 6 Signa Data Mining from Wearabe Systems Francois G. Meyer 6.1 Definition of the Subject 6.1.1 Introduction Sensors from wearabe systems can be anayzed in rea-time on-site, or can be transmitted
More informationThe Basel II Risk Parameters. Second edition
The Base II Risk Parameters Second edition . Bernd Engemann Editors Robert Rauhmeier The Base II Risk Parameters Estimation, Vaidation, Stress Testing with Appications to Loan Risk Management Editors Dr.
More informationAutomatic Structure Discovery for Large Source Code
Automatic Structure Discovery for Large Source Code By Sarge Rogatch Master Thesis Universiteit van Amsterdam, Artificia Inteigence, 2010 Automatic Structure Discovery for Large Source Code Page 1 of 130
More informationThis paper considers an inventory system with an assembly structure. In addition to uncertain customer
MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product
More informationDesign and Analysis of a Hidden Peer-to-peer Backup Market
Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present
More informationAN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE
AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory
More informationA Comparison of Software Packages for X-Ray Fluorescence Analysis of Silicates on Fusion Disks
743 A Comparison of Software Packages for X-Ray Fuorescence Anaysis of Siicates on Fusion Disks HCC Coete Counci for Geoscience, Private Bag X 12, Pretoria, 0001, South Africa Abstract A fixed set of corrected
More information