Optimum Reversible Information Hiding Based on Adaptive Joint Processing

Size: px
Start display at page:

Download "Optimum Reversible Information Hiding Based on Adaptive Joint Processing"

Transcription

1 Internatonal Forum on Energy, Envronment and Sustanable Development (IFEESD 2016 Optmum Reversble Informaton Hdng Based on Adaptve Jont Processng Zhe Mao1,a, Ynfa Zhang1, Ln Zhou1, and Tnglong Du2 1 Department of Informaton Transmsson, X an Communcatons Insttute, Shaanx,710106, Chna 2 Department of Informaton Securty, X an Communcatons Insttute, Shaanx,710106, Chna a @qq.com Keywords: Informaton Hdng, Stego-nformaton, Integer Wavelet Transform (IWT, Assgnment Algorthm, Peak Sgnal to Nose Rato (PSNR. Abstract. Ths paper presents a novel reversble nformaton hdng method for dgtal mages by a ont wth nteger wavelet transform and assgnment algorthm. Ths scheme takes advantage of Gaussan-lke dstrbuton hstogram for utlzng nteger wavelet coeffcents n frequency and assgnment algorthm for best matchng between the secret mage and the orgnal one. Expermental results show that orgnal mage and extracted marked mage could have hgh vsual qualty and they are perceptually smlar to ther orgnal versons. In addton, results show that ths scheme outperforms peak sgnal to nose rato (PSNR than other methods. Introducton The securty of data problem, also known as the maxmum weghted bpartte reversble processng problem, s a wdely-studed problem applcable to many domans. Secure nformaton means to hde the secret data nto another data. The man targets of nformaton securty are to hde the secret data and avod unauthorzed attackers usng the secret. The secure communcaton s man purpose of the securty of data, n such a way that the stego-nformaton (modfed data whch contans secret data should not devate much from orgnal data (data not contanng any secret nformaton and the observer could not be able to dstngush any sense between them wth respectng to reman the real message nvsble for the observer. Several effcent data embeddng methods have been proposed. They nclude set parttonng n herarchcal trees n [1], embedded block based codng wth optmzed truncaton and set parttonng embedded block n [2,3]. These algorthms are effcent based on the dscrete wavelet transform (DWT. However, the mage coeffcents decomposed by the DWT are floatng-pont numbers, whch ncreases the computatonal complexty and s not well suted for effcent lossless codng applcaton. To solve the above problems, Daubeches and Sweldens presented the lftng scheme (LS [4]. Based on the LS, a knd of new transforms called nteger wavelet transforms (IWT are proposed, whch s a low complexty and effcent mplementaton of the DWT and can support the lossless data codng [5-8]. It s a basc modfcaton of lnear transforms, where each flter output s rounded to the nearest nteger. IWT can be used to have a unfed lossy and lossless codec. It s also of nterest for hardware mplementatons, where the use of floatng pont s stll a costly operaton. In software mplementatons, many processors now offers multmeda nstructons whch can execute multple nteger operatons n parallel, lke the MMX nstructon set n the Pentum processor [9]. The use of IWT s also a means to reduce the memory demands of the compresson algorthm as ntegers are used nstead of real numbers. We present an nformaton hdng method based on IWT oned wth the use of assgnment algorthm [10-13]. We hde secret mage nto the nteger wavelet coeffcents of the orgnal mage n order to provde hgher data mperceptblty and ncrease the robustness of our steganography method. IWT avods the floatng pont precson problems of the wavelet flter. Also, we also used an assgnment algorthm to select the best embeddng locatons of the nteger wavelet coeffcents to ncrease the system securty and stego-nformaton can have hgh vsual qualty The authors - Publshed by Atlants Press 564

2 The remander of ths paper s organzed as follows. IWT and the Hungaran's assgnment algorthm are presented n Secton II. The proposed method s detaled presented n Secton III. Expermental results and performance evaluaton are presented n Secton IV. The concluson s drawn n Secton V. Integer Wavelet Transform and Hungaran Algorthm A. Integer Wavelet Transform For the forward transform, typcally the data s splt nto the even and odd samples have been replaced by low pass and hgh pass coeffcents, respectvely. The nverse transform s calculated by reversng the order of the lftng steps and flppng the sgns. But reversble nteger wavelet transforms can be constructed by roundng or truncatng the output of the lftng step pror to addng. The lftng scheme s a spatal doman constructon of borthogonal wavelets developed by Sweldens [5]. Lftng allows a wavelet transform to be computed quckly through a seres of ndvdual lftng steps. Several reversble nteger wavelet transforms based on the lftng scheme have been used extensvely n the lterature and are descrbed n the remander of ths secton. In each case, one dmensonal sgnal{ x }, the lftng steps are descrbed as follows. sl = x dl = dl + α sl + sl, dl = x + 1 sl = sl + β dl + dl ( + 1 ( 1 ( 1 ( 1 ( 1 ( 1 ( + 1 ( 1 ( 2 ( 1 ( 1 ( 1 ( 2 dl = dl + γ sl + sl sl = ζsl ( 2 ( 1 ( 2 ( 2, ( 2 sl = sl + δ dl + d d l l = dl ζ (2 α = , β = , γ = , δ = , ζ = (3 where s l and d l are generally referred to as lower frequency and detal coeffcents, respectvely. ( ( sl, dl ( = 012,, are md-output. Accordng to nteger wavelet theory [7], we construct nteger wavelet transform based on the framework mentoned above. That s: sl = x ( 1 dl = dl + nt ( α( sl + sl+ 1, (4 dl = x ( 1 ( 1 ( sl = sl + nt ( β( dl + dl 1 ( γ ( + 1 δ ( 1 (( ( 2 ( 1 ( 1 ( 1 dl = dl + nt sl + sl ( 3 ( 2 2 ( 2 dl = dl + nt ζ ζ sl, (5 ( 2 ( 1 ( 2 ( 2 ( 3 ( 2 ( 3 sl = sl + nt ( dl + dl sl = sl + nt( ( 1 ζ d l ( 4 ( 3 (( 1 ( 3 ( 4 dl = dl + nt ζ sl sl = sl, ( 4 ( 3 ( 4 ( 4 (6 sl = sl + d d l l = dl where means nteger part of x. The values of parameters α, βγ,, δζare, gven n formula (3. Equaton (5 s an extra lftng step dfferent from Equaton (2. We adopt t here because t can acheve reversble transform accordng to [7] whle Equaton (2 cannot. Wavelet transform decomposes an mage nto a set of band lmted components whch can be reassembled to reconstruct the orgnal data wthout error. In general most of the mage energy s concentrated at the lower frequency coeffcent sets (approxmaton coeffcents and therefore embeddng secret data n these coeffcent sets may degrade the mage sgnfcantly. Embeddng n the low frequency coeffcent sets, however, could ncrease robustness sgnfcantly. On the other hand, the hgh frequency coeffcent sets (dagonal detal coeffcents nclude the edges and textures of the mage and the human eye s not generally senstve to changes n such coeffcent sets. Ths allows the secret mage to be embedded wthout beng perceved by the human eye. The agreement adopted by many wavelet-based mage hdng methods, s to embed the secret mage n the 565 l l Z (1

3 mddle frequency coeffcent sets (horzontal detal coeffcents and vertcal detal coeffcents s better n perspectve of mperceptblty and robustness. Lftng schemes whch we have used n ths paper s one of many technques that can be used to perform nteger wavelet transform. The wavelet lftng scheme s a method for decomposng wavelet transform nto a set of stages. An advantage of lftng schemes s that they do not requre temporary storage n the calculaton steps and have requred less no of computaton steps. B. Hungaran Algorthm The Hungaran algorthm assumes the exstence of a bpartte graph G = { VU,, E} as llustrated n Fgure 1, where V and U are the sets of nodes n each partton of the graph, and E s the set of edges. The edge weghts may be stored n a matrx C ost.the method mantans feasble values for all theδ and γ from ntalzaton through termnaton. An edge n the bpartte graph s called admssble δ + γ c. when Algorthm nput: Fg.1 Bpartte graph showng matched and unmatched edges An assgnment problem comprsng a bpartte graph G { VU,, E} = (where V = U = n and an n n matrx of edge costs C ost. An optmal soluton to the above assgnment problem, comprsng a complete matchng M, and the fnal values of all dual varablesδ and γ. Each of whch can be a row c *, a column c * or a sngle entryc of the cost matrx C ost. Algorthm output: A new complete matchng M, representng an optmal soluton to the problem wth the changed edge costs. The hungaran algorthm steps are descrbed as follows. Step.1 Begn wth an empty matchng M 0 = φ. Assgn feasble values to the dual varablesδ and γ as follows: v V, δ = 0 ( u U, γ = mn c Step.2 Desgnate each exposed (unmatched node n V as the root of a Hungaran tree. Step.3 Grow the Hungaran trees rooted at the exposed nodes n the equalty subgraph. Desgnate the ndces of nodes v encountered n the Hungaran tree by the set I,and the ndces of nodes u encountered n the Hungaran tree by the set J. If an augmentng path s found, go to step 5. If not, and the Hungaran trees cannot be grown further, proceed to step 4. Step.4 Modfy the dual varablesδ and γ as follows to add new edges to the equalty subgraph. Then go to step 3 to contnue the search for an augmentng path. 566 (7

4 1 θ = mn δ γ 2 I, J ( c δ+ θ, I δ δ θ, I (8 γ + θ, J γ γ θ, J Step.5 Augment the current matchng by flppng matched and unmatched edges along the selected augmentng path. That s, M k (the new matchng at stage k s gven by ( Mk 1 P U ( P Mk 1, where M k 1 s the matchng from the prevous stage and P s the set of edges on the selected augmentng path. Step.6 Output the matchng after the n th stage: M = M. n Adaptve Reversble Jont Processng In the adaptve reversble ont processng method, the orgnal and secret mages are decomposed nto 4 sub-mages such as approxmaton coeffcents (WC, horzontal detal coeffcents (WH, vertcal detal coeffcents (WV and dagonal detal coeffcents (WD usng nteger wavelet transform. These sub-mages are dvded nto non-overlappng blocks. The blocks of approxmaton coeffcents of orgnal mage are subtracted from approxmaton coeffcents of secret mage. The dfferences of these coeffcents are called error blocks. By applyng assgnment algorthm, matchng and dstrbuton could be optmzed. Thus, by usng Hungaran's assgnment algorthm, we fnd the best matched blocks between resulted error blocks and the 3 3 non-overlappng blocks that belong to WH sub-mage of orgnal mage. We fnd best embeddng locatons of orgnal mage and then replace these error blocks wth related matched blocks of orgnal mage. In addton, n ths scheme we have two secret keys that we have made them n two dfferent ways. Therefore, we have partly ncreased the securty. Also, n ths method matchng and dstrbuton have been optmzed. Fgure 2 shows the block dagram of the adaptve reversble ont processng method, left: data embeddng, rght: data extracton. A. Embeddng Procedure The steps of embeddng procedure are as follows. Step.1 Usng nteger wavelet transform, decompose the orgnal mage C and the secret mage S nto nne sub-mages C 2 2and S 2 2,respectvely. CWC CWH C2 2= CWV CWD, SWC SWH S 2 = 2 SWV SWD (9 Step.2 Each of SWC, CWC, and CWH are parttoned nto blocks of 3 3 pxels and can be represented by: SWC = SS, { } {, 1 9} CWC = CC {, 1 9} CWH = HH k k where SS, CC and HH k represent the th block n SWC, the th block n CWC and the k th block n CWH, respectvely. Step.3 For each block SS n SWC, the best matched block CC of mnmum error n CWC s searched by usng the root mean squared error (RMSE. Calculate the error block RMSE between SS and CC as follows: SC (10 567

5 { } RMSE = E SS CC (11 SC The frst secret key K conssts of the addresses of the best matched blocks n CWC. Step.4 After fndng all of the error blocks n step3, then for each error block RMSE SC, the best matched block HHk n CWH s searched by Hungaran's algorthm. So, we frst create 3 3 matrx, called the cost matrx. In whch each element represents the RMSE between each of RMSE blocks and HH k blocks. In fact, the mnmal cost perfect matchng s the set of HH k blocks correspondng to these RMSESC blocks. In ths way, we can fnd the best blocks of HH k that have best matchng wth RMSE blocks, the second secret key K k conssts of the addresses k of the best matched blocks n SC CWH. Therefore, now we have the best opton for embeddng. So, we replace these matched RMSE blocks. SC Step.5 After embeddng all of RMSE SC SC HH k blocks wth blocks n step 4, apply the nverse IWT to the CWC, CWV, CWD, and the modfed sub-mage CWH to obtan the stego-data D. B. Extracton Procedure The steps of secret mage extracton procedure are as follows. Step.1 Decompose the stego-data D nto four sub-mages [DWC, DWH; DWV, DWD] usng nteger wavelet transform. Step.2 Extract the block CC from the sub-mage DWC by usng frst secret key K.Use the second secret key k K to extract the error block. The secret block SS can be obtaned by: { } SS = E CC RMSE (12 SC Repeat step 2 untl all secret blocks are extracted and form the sub-mage CWC. Step.3 Usng detal coeffcents from sender such as CWD,CWV,CWH and extracted CWC from above step, apply the nverse IWT to obtan the embedded secret mage whch s vsually smlar to the orgnal data Fg.2 Block dagram of the presented method, Fg.3 Hstogram of one detal subband Left: data ofembeddng, Rght:data extracton Expermental Results grayscale mage Lena Expermental results of a wde range of natural mages show that hstogram of IWT detal subband has approxmate shape of dscrete Gaussan dstrbuton functon lkewse. Moreover, study on human 568

6 vsual system n dgtal wavelet transform doman ndcates that modfcaton on wavelet coeffcents under detecton threshold can t be detected by human eyes. Fgure 3 shows hstogram of a detal subband of grayscale mage Lena. Ths work presented a partcular property of wavelet detal coeffcents of almost every natural textured mage that they have a hstogram correspondng to a Generalzed Gaussan Densty (GGD. 48 adaptve reversble ont processng dfference expanson method PSNR Fg. 4 Vsual mpact of the presented method n Lena, Payload (bpp Fg.5 Comparson results on Lena (a PSNR = 44.3dB, 0.121bpp (b PSNR = 41.6dB, 0.306bpp We appled the presented reversble nformaton hdng algorthm to a grayscale level mages of Lena of sze shown n Fgure 4. For an mage of sze of , a payload 1 bpp (bts per pxel means that 262,144 (namely bts are embedded n the mage. The results ndcate that the adaptve reversble ont processng algorthm can hdden a large payload, whle mantan the hgh peak sgnal-to-nose-rato (PSNR of the marked mage versus the orgnal mage. In Fgure 5, the comparson results between the dfference expanson method [6] and our proposed method are shown. It s observed that our proposed method can obtan better vsual qualty n the same payload. More than 2dB mprovement n PSNR has been acheved. Conclusons Ths paper presents an adaptve reversble nformaton hdng method based on nteger wavelet transform and assgnment algorthm. Expermental results and the comparson wth the dfference expanson method demonstrate that ths ont processng method can obtan a better vsual qualty of the marked mage at the same payload. It s expected that ths reversble data hdng technque wll be deployed for a wde range of applcatons n secure data system. Acknowledgement The authors deeply thank several colleagues who helped them at dfferent stages durng the preparaton of ths paper. In partcular, the authors thank the anonymous revewers for ther helpful comments and suggestons. The proect supported n part by Natural Scence Basc Research Plan n Shaanx Provnce of Chna (Program No.2014JM2-6101, 2015JM6325. References [1] Sad, W.A.Pearlman, New fast andeffcent mage codec based on set parttonng n herarchcal trees. IEEE Transacton on Crcut System Vdeo Technology, Vol.6,pp ,1996. [2] D.Taubman, Hgh performance scalable mage compresson wth EBCOT. Proceedng of IEEE, IEEE Internatonal Conference on Image Processng, pp.24-28,

7 [3] W.A.Pearlman,A.Islam,N.Nagara, and A.Sad, Effcent, low-complexty mage codng wth a set-parttonng embedded block coder. IEEE Transacton on Crcut and Systems for Vdeo Technology, Vol.14,pp ,2014. [4] Daubeches, W.Sweldens, Factorng wavelet transforms nto lftng steps. Journal of Fourer Analyss Applcaton, Vol.4(3,pp ,1998. [5] W.Sweldens, The lftng scheme: A custom-desgn constructon of borthogonal wavelets, Appl. Comput.Harmon. Anal., Vol.3(2, pp ,1996. [6] S.Mallat, A theory of multresoluton sgnal decomposton: the wavelet representaton. IEEE Transactons Pattern Analyss and Machne Intellgence, pp ,2013. [7] R.Calderbank, I.Daubeches, W.Sweldens, and B. L.Yeo, Lossless mage compresson usng nteger to nteger wavelet transforms, n Internatonal Conference on Image Processng (ICIP, Vol.(I.1997, pp ,ieee Press. [8] R.Calderbank, I.Daubeches, W.Sweldens, and B. L.Yeo, Wavelet transforms that mapn tegers to ntegers, Appl. Comput. Harmon. Anal., Vol.5(3, pp ,1998. [9] Intel-Corporaton, Intel archtecture MMX(TM technology, programmer s reference manual, Tech. Rep.,Intel Corporaton, March [10] M.Z.Spvey, W.B.Powll, The dynamc assgnment problem. Transportaton Scence Vol38(4, pp ,2014. [11] J.Munkres, Algorthms for the assgnment and transportaton problems. Journal of the Socety for Industral and Appled Mathematcs Vol.5(1,pp.32 38,1957. [12] E.L.Lawler, Combnatoral Optmzaton: Networks and Matrods. Holt, Renehart and Wnston, New York,1976. [13] R.E.Burkard, C.E.Ela, Handbook of combnatoral optmzaton, Supplement Volume A.Kluwer Academc Publshers, ch. Lnear assgnment problems and extensons,pp ,

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms Reversble Data Hdng Based on Two-level HDWT Coeffcent Hstograms Xu-Ren Luo 1, Chen-Hu Jerry Ln 2 and Te-Lung Y 3 1 Department of Electrcal and Electronc Engneerng, Chung Cheng Insttute of Technology, Natonal

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection

A Self-embedding Robust Digital Watermarking Algorithm with Blind Detection Sensors & Transducers Vol 77 Issue 8 August 04 pp 50-55 Sensors & Transducers 04 by IFSA Publshng S L http://wwwsensorsportalcom A Self-embeddng Robust Dgtal Watermarkng Algorthm wth Blnd Detecton Gong

More information

A Novel Quality Measure for Information Hiding in Images

A Novel Quality Measure for Information Hiding in Images A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Impulse Noise Removal Technique Based on Fuzzy Logic

Impulse Noise Removal Technique Based on Fuzzy Logic Impulse Nose Removal Technque Based on Fuzzy Logc 1 Mthlesh Atulkar, 2 A.S. Zadgaonkar and 3 Sanjay Kumar C V Raman Unversty, Kota, Blaspur, Inda 1 m.atulkar@gmal.com, 2 arunzad28@hotmal.com, 3 sanrapur@redffmal.com

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS The 3 rd Internatonal Conference on Mathematcs and Statstcs (ICoMS-3) Insttut Pertanan Bogor, Indonesa, 5-6 August 28 MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS 1 Deky Adzkya and 2 Subono

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering, COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Introduction to information theory and data compression

Introduction to information theory and data compression Introducton to nformaton theory and data compresson Adel Magra, Emma Gouné, Irène Woo March 8, 207 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on March 9th 207 for a Data Structures

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information Thrd Chnese-German Jont Symposum on Coastal and Ocean Engneerng Natonal Cheng Kung Unversty, Tanan November 8-16, 2006 Modal Stran Energy Decomposton Method for Damage Detecton of an Offshore Structure

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

De-noising Method Based on Kernel Adaptive Filtering for Telemetry Vibration Signal of the Vehicle Test Kejun ZENG

De-noising Method Based on Kernel Adaptive Filtering for Telemetry Vibration Signal of the Vehicle Test Kejun ZENG 6th Internatonal Conference on Mechatroncs, Materals, Botechnology and Envronment (ICMMBE 6) De-nosng Method Based on Kernel Adaptve Flterng for elemetry Vbraton Sgnal of the Vehcle est Kejun ZEG PLA 955

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Integrating Neural Networks and PCA for Fast Covert Surveillance

Integrating Neural Networks and PCA for Fast Covert Surveillance Integratng Neural Networks and PCA for Fast Covert Survellance Hazem M. El-Bakry, and Mamoon H. Mamoon Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT E-mal: helbakry0@yahoo.com

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Application of Dynamic Time Warping on Kalman Filtering Framework for Abnormal ECG Filtering

Application of Dynamic Time Warping on Kalman Filtering Framework for Abnormal ECG Filtering Applcaton of Dynamc Tme Warpng on Kalman Flterng Framework for Abnormal ECG Flterng Abstract. Mohammad Nknazar, Bertrand Rvet, and Chrstan Jutten GIPSA-lab (UMR CNRS 5216) - Unversty of Grenoble Grenoble,

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Second Order Analysis

Second Order Analysis Second Order Analyss In the prevous classes we looked at a method that determnes the load correspondng to a state of bfurcaton equlbrum of a perfect frame by egenvalye analyss The system was assumed to

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI

More information

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule:

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule: 15-745 Lecture 6 Data Dependence n Loops Copyrght Seth Goldsten, 2008 Based on sldes from Allen&Kennedy Lecture 6 15-745 2005-8 1 Common loop optmzatons Hostng of loop-nvarant computatons pre-compute before

More information

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA 14 th Internatonal Users Conference Sesson: ALE-FSI Statstcal Energy Analyss for Hgh Frequency Acoustc Analyss wth Zhe Cu 1, Yun Huang 1, Mhamed Soul 2, Tayeb Zeguar 3 1 Lvermore Software Technology Corporaton

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS

COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS COMPARING NOISE REMOVAL IN THE WAVELET AND FOURIER DOMAINS Robert J. Barsant, and Jordon Glmore Department of Electrcal and Computer Engneerng The Ctadel Charleston, SC, 29407 e-mal: robert.barsant@ctadel.edu

More information

Multi-Scale Weighted Nuclear Norm Image Restoration: Supplementary Material

Multi-Scale Weighted Nuclear Norm Image Restoration: Supplementary Material Mult-Scale Weghted Nuclear Norm Image Restoraton: Supplementary Materal 1. We provde a detaled dervaton of the z-update step (Equatons (9)-(11)).. We report the deblurrng results for the ndvdual mages

More information

A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS

A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS Shervn Haamn A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS INTRODUCTION Increasng computatons n applcatons has led to faster processng. o Use more cores n a chp

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information