{webb, cc.gatech.edu. {yorke3, ece.gatech.edu

Size: px
Start display at page:

Download "{webb, cc.gatech.edu. {yorke3, ece.gatech.edu"

Transcription

1 A Dscrmnatve Classfer Learnng Approach to Image Modelng and Identfcaton Byungk Byun, Chn-Hu Lee, 2 Steve Webb, and 2 Calton Pu School of Electrcal & Computer Engr. Georga Insttute of Technology Atlanta, GA , USA {yorke3, ece.gatech.edu 2 College of Computng Georga Insttute of Technology Atlanta, GA , USA {webb, cc.gatech.edu ABSTRACT We propose a dscrmnatve classfer learnng approach to mage modelng for spam mage dentfcaton. We analyze a large number of mages extracted from the SpamArchve spam corpora and dentfy four key spam mage propertes: color moment, color heterogenety, conspcuousness, and self-smlarty. These propertes emerge from a large varety of spam mages and are more robust than smply usng vsual content to model mages. We apply mult-class characterzaton to model mages sent wth emals. A maxmal fgure-of-mert (MFoM) learnng algorthm s then proposed to desgn classfers for spam mage dentfcaton. Expermental results on about 240 spam and legtmate mages show that mult-class characterzaton s more sutable than sngleclass characterzaton for spam mage dentfcaton. Our proposed framework classfes 8.5% of spam mages correctly and msclassfes only 5.6% of legtmate mages. We also demonstrate the generalzaton capabltes of our proposed framework on the TREC 2005 emal corpus. Mult-class characterzaton agan outperforms sngle-class characterzaton for the TREC 2005 emal corpus. Our results show that the technque operates robustly, even when the mages n the testng set are very dfferent from the tranng mages.. INTRODUCTION Text-based learnng flters have grown n sophstcaton and effectveness n flterng emal spam [3, 5, 7]. In response, spammers have adopted a number of countermeasures to crcumvent these text-based flters. Currently, one of the most popular spam constructon technques nvolves embeddng text messages nto mages and sendng ether pure mage-based spam or a combnaton of mages and text (typcally legtmate-lookng text wth legtmate content). Ths strategy, usually called magespam, has been successful n bypassng text-based spam flters, posng a new challenge for spam researchers [24]. Attempts to use optcal character recognton (OCR) technques to convert spam mages back to text for processng by text-based flters have been foled [5]. An effectve response by spammers s the applcaton of CAPTCHA (Completely Automated Publc Turng test to tell Computers and Humans Apart) technques, whch are desgned to preserve readablty by humans but capable of effectvely confusng the OCR algorthms [7, 20]. In ths paper, we explore a dfferent mage analyss approach that s capable of dscernng more physcal propertes. Our hypothess s that these dstnctve propertes can help mage flters separate spam mages from legtmate mages. Several approaches that extract spam mages propertes have been proposed. In [24], the exstence of text-regons, the number of banners and graphc mages, and the locaton of mages were extracted as spam mages dstnctve propertes. In [], the exstence of text-regons, saturaton of color, and the heterogenety of color were dentfed. In both papers, good results were reported for detectng spam mages. Despte the success of these prevous studes, the most ndcatve propertes of spam mages stll need to be found to enhance model dscrmnaton performance and robustness aganst mage varaton. In the two approaches dscussed above, the exstence of text-regons was assumed to be the most ndcatve property. In ths study, we analyze a number of spam mages and defne four specfc propertes: color moments, color heterogenety, conspcuousness, and self-smlarty. We use several mage and sgnal processng technques, such as extractng color nformaton, clusterng, and evaluatng the outputs of log-gabor flter banks, to perform feature extracton. We also explot mult-class characterzaton of spam and legtmate mages to account for the dversty n mages that covers a wde range of vsual content. In [, 24], spam mages are modeled wthn a sngle class. However, as mentoned above, mages that are transmtted n emals are dffcult to model. Due to these dffcultes, t s desrable to adopt mult-class characterzaton technques that characterze spam and legtmate mages wth multple models. These models are defned as sub-classes, and n our expermental framework, spam and legtmate mages are further dvded nto three sub-classes, respectvely. Snce we use more than one model to descrbe spam and legtmate mages, we need to defne a decson rule. We propose usng three decson rules: selectng the maxmum score, takng an arthmetc average, and takng a geometrc average. Then, an MFoM-based dscrmnatve learnng algorthm s proposed to dentfy spam mages. Wth the decson rule that selects maxmum scores, experments show that our framework works better than an approach explotng sngle-class characterzaton. Specfcally, our framework yelds a spam mage dentfcaton CEAS 2007 Fourth Conference on Emal and Ant-Spam, August 2-3, 2007, Mountan Vew, Calforna USA

2 rate of 8.5% and a false postve rate of only 5.6%. We also test our framework on a dfferent dataset to prove that our framework has strong generalzaton capabltes. Concretely, we used our framework to evaluate a test set of mages that were extracted from the TREC 2005 emal corpus. Although these mages are qute dstnct from the mages used n the tranng set, our framework was able to mantan a hgh level of performance. These postve results are consstent wth our hypothess, and they also encourage further nvestgaton nto the spam mages as an effectve component technology for separatng complex spam emals (e.g., those contanng text and multmeda nformaton) from legtmate emals. The remander of ths paper s organzed as follows. In Secton 2, we defne mult-class characterzaton n detal. In secton 3, we descrbe dstnctve propertes for feature extracton. Secton 4 proposes decson rules for mult-class characterzaton, and Secton 5 explans our MFoM-based learnng algorthm. Wth Secton 6, we conclude ths paper. 2. MULTI-CLASS CHARACTERIZATION In most mage modelng technques rangng from content-based to concept-based, a sngle class model s learned for a sngle mage class. For example, n mage categorzaton problems, a sngle classfer s constructed to model each ndvdual mage class [4, 2, 2]. Smlarly, n a concept model mplementaton problem, each concept wll be modeled by a sngle classfer that characterzes the concept [2, 8]. In many other cases, ths sngle class characterzaton scheme has been adopted as well. However, n spam mage dentfcaton, the above scheme may not be sutable because the varety of mages that are transmtted n emals s too large to capture n a sngle model. A spam mage mght contan text messages wth a unform background; t mght contan a complex background wthout any text messages, or t mght contan any number of other varatons. The dversty of legtmate mages s also ggantc. Snce mult-class characterzaton uses multple models to characterze a sngle class, we beleve t should be appled to help cover the wde varety of mages found n emals. Thus, n our proposed framework, a spam mage class and a legtmate mage class are descrbed wth several models, whch are called sub-classes. In [], they defned four categores ( photos, baby, graphcs, and screenshot ) to represent legtmate mages. However, mult-class characterzaton was not appled n ther study. Each category was regarded as a separate mage class not a sub-class. Thus, nstead of unfed spam mage dentfcaton results (.e., spam vs. legtmate), four separate classfcaton results (.e., spam vs. each legtmate category) were reported. Mult-class characterzaton s extremely advantageous n spam mage categorzaton because t mproves both effectveness and robustness. Wth a sngle-class characterzaton method, more sophstcated class models (e.g., support vector machnes) must be used to reflect the complexty of the problem. However, usng a mult-class characterzaton method, smple classfers can effectvely descrbe complcated mage classes. Addtonally, robustness can be acheved through mult-class characterzaton. Robustness s a very mportant ssue n spam mage dentfcaton because the mages found n emal can consst of vrtually anythng. Mult-class characterzaton s ntended to cover as many varatons as possble by ntroducng sub-classes, and as a result, t provdes more robustness than sngle-class characterzaton. To mplement mult-class characterzaton, two ssues must be addressed: () groupng mages nto several sub-classes and (2) desgnng decson rules and classfers. In the followng secton, we apply mult-class characterzaton to spam and legtmate mages. We explan how to desgn decson rules and classfers n Sectons 4 and Mult-Class Characterzaton of s For mult-class characterzaton, we prepared spam mages from SpamArchve and grouped them nto two groups: synthetc and non-synthetc mages. Synthetc mages are mages made wth any artfcal technques, whereas non-synthetc mages are mages wth no artfcal modfcatons. Typcal non-synthetc mages are sexual or female mages, and most synthetc mages are advertsng pctures. Synthetc mages can be parttoned nto two regons: message regons and background regons. However, some of the mages do not contan message regons. Addtonally, background regons are extremely dverse. For example, both unform and complex backgrounds are represented. Therefore, synthetc mages are characterzed further based on two crtera: complexty of background and exstence of text messages. Non-synthetc mages can be characterzed by ther content. In partcular, nonsynthetc mages can be grouped nto sexual and non-sexual mages. Based on these observatons, 5 sub-classes were generated. Table summarzes the mult-class characterzaton results for spam mages. Table. Mult-class Characterzaton of s Synthetc Text Content Text_Smple Yes Yes N/A Text_Complex Yes Yes N/A No_Text Yes No N/A Non_Synthetc_Se xual No No Sexual Non_Synthetc_Ot hers No No Others We can characterze spam mages n many dfferent ways. In partcular, n our experments, the bottom three sub-classes are combned and an Other sub-class s defned. Fgure shows examples for every sub-class except Non_Synthetc_Sexual because that sub-class contans pornographc content. 2.2 Mult-Class Characterzaton of Legtmate Images Unfortunately, a standardzed legtmate emal mage data set has not been made publcly avalable. Moreover, t s dffcult to obtan enough legtmate emal mage data due to several reasons ncludng copyrght ssues. The Enron Corpus (the largest publcly avalable legtmate emal corpus) does not contan any attachments, and we were only able to extract 288 legtmate mages from the TREC 2005 emal corpus. Thus, we utlzed mages across the 20 dfferent classes from Corel CDs, nstead. As mentoned earler, the goal of mult-class characterzaton s to

3 cover as many varatons as possble. Therefore, we also added more mages from Google Image Search 2 by searchng for four keywords: sports, baby, maps and drectons, and cartoons, to emulate more realstc stuatons. The keywords are chosen based on our observatons that mages belongng to such keywords are most frequently seen n legtmate emals. The characterzaton of legtmate mages s qute smple because metadata s avalable. In partcular, predefned class names are the metadata for CorelCDs, and keywords are used for Google Image Search. All mages from CorelCDs wth sports and baby mages from Google Image Search are ntegrated nto one subclass: photos. The rest of the mages are characterzed based on ther metadata: maps and drectons and cartoons. Fgure 2 shows examples of each legtmate mage s sub-class. (a) 3. DISTINCTIVE PROPERTIES OF SPAM IMAGES Extractng dstnctve propertes from spam mages s a crucal part of a spam mage dentfcaton task. Well-extracted features provde dscrmnaton and robustness. In ths secton, we dentfy four key propertes of spam mages: color moments, color heterogenety, conspcuousness, and self-smlarty. We descrbe the characterstcs of these propertes and explan feature extracton procedures. 3. Color Moments The frst dstnctve property of spam mages s color moments. Color s one of the most wdely used vsual features n mage retreval problems, and t s relatvely robust to background complcaton and nvarant to mage sze or orentaton [6]. In spam mages, several notable color characterstcs can be found such as dscontnuous dstrbutons, hgh ntensty, domnant peaks, etc. Fgure 3 llustrates such color characterstcs, comparng color dstrbutons of a spam mage (the upper mages), wth those of a legtmate mage (the lower mages). In the upperrght mage, t s easly notceable that the dstrbuton s not contnuous and that domnant peaks exst all over the channels, whle the lower-rght mage does not have these characterstcs. (b) (c) (d) Fgure. Spam mage examples; (a) Text_Smple, (b) Text_Complex, (c) No_Text, (d) Non_Synthetc (b) (a) (c) Fgure 2. Legtmate mage examples; (a) photos, (b) maps and drectons, (c) cartoons Fgure 3. Color dstrbutons of a spam mage and a legtmate mage n the HSV color space; focus on dscontnuty and domnant peaks n the upper-rght mage. The smplest way to extract these color characterstcs s to use color hstograms [9]. However, snce most of the nformaton s embedded n low-order moments, color moments can be used nstead [8]. In our framework, the frst and second central moments are computed. Frst, all mages are transformed to the HSV color space. HSV s a color representaton method that s smlar to the way humans perceve color [0, ]. Then, n the HSV color space, the frst and second central moments are computed for every channel. 2

4 3.2 Color Heterogenety Legtmate mages typcally convey a much larger number of colors than spam mages. Even n a person s face, large varatons can be observed, whch account for shades or llumnatons n the face. In contrast wth legtmate mages, color n spam mages usually stays constant. The background s generally flled wth the same colors, and a sngle sentence usually conssts of the same fonts and colors. In [], ths property was defned as a color heterogenety feature. They frst dentfed text regons and non-text regons, quantzng each regon wth at most N colors through a mnmum varance quantzaton algorthm. Then, RMS errors between the orgnal mages and the quantzed mages were calculated. We compute the RMS errors between the orgnal mages and the quantzed mages as well, but we do not make any separaton between the text-regon and non-text regons because we assume that color heterogenety s a global feature. Fgure 4 shows four legtmate mages and four spam mages: ()- (4) are legtmate, and (5)-(8) are spam. ()-(3) are n the photo sub-class, and (4) s n cartoon sub-class. (5) and (6) are n Text_Complex, and (7) and (8) are n Text_Smple. () (2) (3) (4) (5) (6) (7) (8) Fgure 4. Legtmate and spam mage examples; ()-(4) legtmate mages, (5)-(8) spam mages dfferent color heterogenety values so sngle-class characterzaton would blur the dscrmnatve characterstcs of spam mages. Fgure 6 plots the dstrbutons of RMS errors of spam mages and legtmate mages. Ths fgure clearly shows that most of the spam mages have fewer RMS errors than most of the legtmate mages. Fgure 6. Dstrbutons of color heterogenety feature; N s set to 8. X-axs corresponds to heterogenety values. Y-axs represents probabltes. 3.3 Conspcuousness Spammers want spam messages to be easly notceable to recevers so that desred actons can be generated (e.g., readng the message, clckng a lnk, etc.). Thus, t s natural for spam mages to use hghly contrasted colors. We defne ths property as conspcuousness, whch means obvous to the eye. In practce, we can dentfy many spam mages that use hghly saturated colors wth contrastng whte or black or whte contrastng black. In Fgure 4, mage (7) uses a hghly saturated yellow background color. In Fgure 4, mage (8) uses pure blue and red n text messages, whch s contrasted wth a whte-lke background. Ths property wll become manfest lookng from the SV plane, whch s a subspace of an HSV color space. If an mage s hghly conspcuous, hgh densty s expected to be seen at whte, black, and saturated colors. In the SV plane, such colors corresponded to three ponts: (0,), (0,0), and (,), respectvely. Based on ths dea, translatng the conspcuousness of mages nto a feature vector s done as follows. Frst, we represent an mage n the SV plane. Then, usng a k- means algorthm, we learn M centrods of the mage s SV dstrbutons. Wth the M centrods, we compute average dstances between the centrods and the above three ponts. In partcular, we search for the closest pont for each centrod and add the dstance up. Fnally, we average the total sum, and the average s the extracted conspcuousness. Fgure 5. Color heterogenetes of mages n Fgure 4; N s set to 8. X-axs corresponds to the mage numbers n Fgure 4. Y-axs represents the computed color heterogenetes. Fgure 5 shows the above mages resultng color heterogenety feature values. As the fgure shows, all of the four legtmate mages have larger values than the four spam mages. Addtonally, the mages n the Text_Complex sub-class ((5) and (6)) have larger values than mages n the Text_Smple subclass ((7) and (8)). Ths observaton llustrates the need for multclass characterzaton. Those two sub-classes exhbt consderably Fgure 7. Dstrbutons of conspcuousness feature; M s set to 8. X-axs represents the values of conspcuousness feature and y-axs represents probabltes.

5 Fgure 7 shows dstrbutons of the extracted conspcuousness feature for spam and legtmate mages. Ths fgure shows that for about half of the spam mages, the extracted feature values are less than 0.3, whereas the feature values are greater than 0.3 for over 97% of the legtmate mages. 3.4 Self-Smlarty In spam mages, some characterstc patterns can be found from text messages or the background. These patterns produce another dstnctve property of spam mages called self-smlarty. The reason why ths feature s called self-smlarty s because a smlarty between macroblocks of mages s measured. The term macroblock usually refers to a square block of MxM pxels, where M s small. The unform background of spam mages would be the smplest example that hgh self-smlarty s measured. In spam mages, the background s much more unform than legtmate mages. If the unform background s segmented nto macroblocks, only one type of macroblock wll be seen, and n turn, hgh selfsmlarty wll be measured. Text messages n spam mages also present hgh self-smlarty. In text-embedded spam mages, the fonts and szes that are used are typcally dfferent from sentence to sentence. However, n a sngle sentence, font and sze are constant. Therefore, smlar macroblocks wll be generated, and n turn, hgh self-smlarty would be expected. Based on our experments, text messages n dfferent fonts and szes create smlar macroblocks as well. To extract self-smlarty, we need to learn representatve patterns from data frst. We expect that nosy varatons n the data would be removed whle emphaszng self-smlarty through ths learnng process. Frst, we segment a whole mage nto several macro blocks. The sze of a macroblock s globally set to 32x32. When the sze of an mage s smaller than the sze of our macroblock, the sze s set to the mnmum of the two. Smlarty between macroblocks s computed usng a log-gabor flter bank [6, 3, 4]. Unlke a typcal Gabor flter bank, log-gabor flters can desgn arbtrarly large bandwdth whle keepng a DC component at zero [3]. We apply a log-gabor flter bank to each macroblock and compute a mean and a varance of each flter bank s output. We then explot an unsupervsed clusterng algorthm such as a k-means clusterng algorthm. Centrods of the resultng clusters become the representatve patterns. Now, mages are ndexed wth these patterns. Frst, the patterns are numbered wth to N, where N s the number of centrods, and each of the macroblocks s ndexed wth the closest pattern. We then count how often each pattern has appeared n an mage. Ths wll generate N dmensonal vectors. We fnally normalze these vectors as the sum of each element equals to. These become the extracted self-smlarty vectors. 4. MULTI-CLASS DECISION RULES In a typcal spam mage dentfcaton problem, for whch sngleclass characterzaton s used, the decson rule s farly smple: choose a class that maxmzes certan scores. Let X be a test vector, and let C and C represent a spam mage class and a legtmate mage class, respectvely. Moreover, let Λ and Λ be the correspondng parameter sets for C and C. Then, the decson rule can be descrbed n Eq () Choose C f g ( X, Λ ) > g( X, Λ ), Choose C otherwse, where g ( X, Λ ) and g ( X, Λ ) are class score functons for postve and negatve classes, respectvely. Mult-class characterzaton broadens the choces of decson rules n spam mage dentfcaton. Eq. () stll functons as an overall decson rule; however, snce multple sub-classes are used to descrbe an mage class, class score functons for a spam and legtmate class, g ( X, Λ ) and g ( X, Λ ) can be computed dfferently. The frst method s to assgn the maxmum scores between subclasses to g X, Λ ) and g X, Λ ). ( ( Here, we let X, Λ ) and g X, Λ ) be the sub-class s score g ( ( functons, where Λ andλ are the parameter sets for sub-class C and C. C s the th sub-class of a spam mage class C, and C s the th sub-class of a legtmate mage class C. Another way s to compute arthmetc averages of the sub-classes, whch s defned as: M g( X, Λ ) = g( X, Λ ), M = N (3) g( X, Λ ) = g( X, Λ ), N where M and N are the numbers of sub-classes for spam mages and legtmate mages, respectvely. The thrd approach s to compute geometrc averages of the subclasses. As an example, the equaton to compute a geometrc average for a spam mage class s shown n Eq. (4) where η s a postve constant. g ( X, Λ ) = max( g( X, Λ g( X, Λ Snce dfferent decson rules yeld dfferent decson boundares, the performances of above methods should vary. The frst method concerns the most relevant sub-classes n a spam and a legtmate mage class. The second and thrd methods measure average scores. We determne the best decson rule emprcally, and n secton 6, the performances of above three approaches are measured and compared aganst each other. 5. MFOM-BASED CLASSIFIER LEARNING In classfer learnng wth mult-class characterzaton, we estmate parameters Λ for classfers, gven tranng data { X, C}, wth Λ= { Λ, Λ M, N} and M ) = max( g( X, Λ N C = C C. Here, we adopt an MFoM-based learnng approach proposed n [9]. In an MFoM-based learnng approach, = )), )). () (2) M η g ( X, Λ ) log exp{ (, )} η = g X Λ, (4) M =

6 the classfer parameters Λ are estmated by drectly optmzng a certan performance metrc of classfers (e.g., detecton errors, F, or precson). A typcal performance metrc used s an average detecton error rate (DER). The DER s defned as an arthmetc average of false postve rate and false negatve rate: FP FN DER =, (5) 2N T C C where N s the number of classes, T s the total number of tranng data, ( ) s a cardnalty, and FP and FN are false postve error and false negatve error for the th class. However, we cannot optmze ths performance metrc analytcally snce FP and FN are dscrete enttes. Therefore, n MFoM-based learnng, a contnuous and dfferentable functon, called a class loss functon l, s ntroduced to approxmate FP and FN for class. Snce both FP and FN are computed from the error counts made from class, a class loss functon should smulate these error counts. In partcular a class loss functon should be close to zero when X s correctly classfed and should be close to one when X s msclassfed. Summng over the entre tranng data set, FP and FN can be approxmated wth as: where I( ) s an ndcator functon. For choosng a class loss functon, any functons satsfyng the above behavor would work. Typcally, a sgmod functon s adopted, defned as: where α and β are all postve constants, servng as parameters that determne the sze of the learnng wndow and the offset of decson boundary, and d s a functon of X and Λ, called a class msclassfcaton functon. Defnng a class msclassfcaton functon s the most mportant consderaton n an MFoM-based classfer learnng approach. d should be consstent wth the class loss functon s behavor. In partcular, d should be negatve for correct decsons and postve for ncorrect ones. Usng the same notaton used n Secton 4, we can defned as: where FP FN d d =g( X, Λ ) g( X, Λ ), (8) = = X X Λ s the parameter set of a competng class for class, whch s Λ for C or Λ for C, and g s constructed by one of the methods dscussed n Secton 4. It s easy to check that the decson rule n Secton 4 s equvalent to the followng: Choose C f d < 0, Choose ( l ) I( X C ), l I( X C ), l =, exp{ α ( d β )} C otherwse, l (6) (7) (9) where C C represents a competng class for class, whch s C for C. If a classfer s assumed to be perfect, for C or l becomes close to zero when becomes close to one. l X C ; otherwse, In sum, a DER s now approxmated wth a contnuous and dfferentable functon as a result. The approxmated functon now becomes our obectve functon. Summng over all classes, the overall obectve functon L( T, Λ) can be wrtten as follows: L( T, Λ) = 2N ( l (, )) ( ) ( (, )) ( ) X Λ I X C l X Λ I X C, T C C X The smlar approaches can be appled for any other performance metrcs such as precson, recall, or F to the correspondng construct obectve functons. In our framework, a DER s the preferred metrc. Fnally, the maxmzaton of the obectve functon L ( T, Λ) can be done by a generalzed probablstc decent algorthm. One of the mportant propertes of MFoM-based learnng approaches s that a relatve dstance between class and ts competng classes wll be maxmzed when the performance metrc s optmzed. To see how ths dstance s maxmzed, let us look at the class msclassfcaton functon d for class. It s easy to see that the absolute value of s the separaton between class and ts competng class. Snce a bgger separaton mples a smaller error, the value of d wll be ncreasng as the obectve functon s maxmzed. Ths mght mply the robustness of an MFoM-based classfer learnng approach. 6. EXPERIMENTAL RESULTS We extracted 90,70 mage fles from the SpamArchve spam corpora and used them as our spam mages. Unfortunately, most of the extracted fles were malware propagaton vehcles (.e., malware embedded n a fle wth an mage fle suffx). Many of the fles also contaned formattng errors. After elmnatng these malformed fles and repeated mages, the data set contaned 669 dstnct mages. We wll refer to these mages as our SpamArchve mage data set. For legtmate mages, we obtaned 267 mages from Corel CDs and 358 mages from Google Image Search. We wll refer to these mages as the CG mage data set. In Secton 2, spam mages are characterzed wth 5 sub-classes, and legtmate mages are characterzed wth 3 sub-classes. Through several prelmnary experments, we decded to ntegrate three sub-classes ( Non_Text, Non_Synthetc_Other, and Non_Synthetc_Sexual ) nto one sub-class ( Others ). Then, we were left wth a total of 6 sub-classes: 3 for spam mages and 3 for legtmate mages. The followng s a summary of the resultng mult-class characterzaton used and the numbers of mages that belong to each sub-class: d a) The SpamArchve mage data set Text_Smple : 360 mages, Text_Complex : 4 mages, Others : 68 mages (0)

7 b) The CG mage data set Photos : 404 mages, Cartoons : 5 mages, Maps : 05 mages Next, we determned the parameters for feature extracton. For the color heterogenety feature, we defne the number of colors used for quantzaton to be 8. The number of centrods s also set to 8 for the conspcuousness feature. When extractng the selfsmlarty feature, we set the number of patterns to be equal to 64. Feature fuson s done by concatenatng four features drectly, whch yelds a 72-dmensonal feature vector. To decde the best feature fuson method, we carred out classfcaton experments wth two other feature fuson methods, whch are an MBT approach [23] and a weghted sum approach [22], and compared the results. Among the three feature fuson methods, concatenatng four features outperforms the other two methods consstently. For an MFoM-based learnng approach, a lnear dscrmnant functon s adopted for a sub-class scorng functons X, Λ ) g ( and X, Λ ). A lnear dscrmnant functon s defned as: g ( where w and b are parameters. In our framework, therefore, w and b for the th sub-class of spam mages and w and b for the th T g( X, Λ ) = w X b, () sub-class of legtmate mages are gong to be estmated. α and β are determned emprcally n a way that for ntal teraton, the obectve functon fluctuates and then converges subtly. For dfferent decson rules, dfferent α and β should be used. 6. Comparson of Decson Rules To determne the best decson rule for spam mage dentfcaton wth mult-class characterzaton, we evaluated the three decson rules specfed n Secton 4 usng the SpamArchve and CG datasets. Frst, the class msclassfcaton functon s derved from each of the decson rules, and each MFoM-based classfer s traned accordngly. 0% of the mages are randomly chosen for testng, and the rest of the mages are used n the tranng stage. We repeat ths random selecton 0 tmes and average all of the results. Table 2 gves the results for the frst decson rule selectng the maxmum values (D), the second decson rule arthmetc average (D2), and the thrd decson rule geometrc average (D3). Table 2. Comparson of Decson Rules Identfcaton Rate(%) d Postve(%) D D D Ths table shows that the frst decson rule (D) acheves the best for dentfyng spam mages, and the thrd decson rule (D3) has the lowest false postve rate. The second decson rule (D2) performs worst, compared to the other two rules. For overall performance, the frst decson rule appears to be the best for spam mage dentfcaton wth mult-class characterzaton. 6.2 Mult-Class vs. Sngle-Class Characterzaton In ths secton, we compare mult-class characterzaton approaches and sngle-class characterzaton approaches. For a sngle-class characterzaton approach, the decson rule defned n Eq. () s adopted. For the class dscrmnant functons g ( X, Λ ) and g ( X, Λ ), a lnear dscrmnant functon, specfed as n Eq. (), s used, and an MFoM-based classfer s traned. For a mult-class characterzaton approach, the results are borrowed from Secton 6., whch were obtaned usng the frst decson rule (D). Table 3 shows the comparson between sngleclass characterzaton and mult-class characterzaton. Table 3. Mult-Class vs. Sngle-Class Identfcaton Rate(%) Postve(%) Sngle-Class Mult-Class Ths table shows that a mult-class characterzaton approach works better than a sngle-class characterzaton. The mprovement n false postve rate s qute sgnfcant, and the spam mage dentfcaton rate mprovement s also notceable. Therefore, as clamed, mult-class characterzaton s more effectve and sutable for spam mage dentfcaton. Addtonally, snce low false postve rates are typcally more mportant than hgh spam dentfcaton rates n spam mage dentfcaton, we can acheve another preferred characterstc through mult-class characterzaton. 6.3 Comparson wth Other Technques It s mpossble to compare other prevously proposed technques [, 24] wth our proposed framework drectly. The man reason concerns dfferences n the datasets that were used. In [], legtmate mages were retreved from Google Image Search, and n [24], legtmate mages only conssted of mages selected from CorelCDs. However, t s possble to poston our proposed framework by analyzng those other technques results. Table 4 shows the performance of []. In that work, sngle-class characterzaton was used. Snce only par-wse performances were reported, we average all of ther performances and compute an overall performance. They also used two dstnct datasets, SPAM- and SPAM-2, for spam mages. Table 4. Identfcaton Result (Aradhey, et al., 2005) Dataset Identfcaton Rate(%) Postve(%) SPAM SPAM Average Table 5 gves the results n [24]. In that work, three classfcaton results, dependng on SVM parameters, were reported. Among

8 those results, we take a classfcaton result most wdely used n [24] Table 5. Spam Detecton Results (Wu, et al., 2005) Identfcaton Rate(%) Postve(%) Based on the fgures n the above two tables, we observe that our proposed framework generally obtans better results and sometmes comparable results. Snce we use multple sources to construct our datasets, whereas other technques reled on a sngle source such as ether CorelCDs or an mage search engne, we beleve that our tranng and test datasets are more realstc and more dffcult to model. Therefore, we beleve that our proposed framework works as well as (f not better than) prevous technques. 6.4 Generalzaton Capabltes In spam mage dentfcaton, generalzaton s rather mportant because the varaton of mages s mmense. We test generalzaton capabltes of our approaches wth completely dfferent datasets. In the tranng stage, the SpamArchve and CG mage data sets, totalng 246 mages, are used. In the testng stage, mages extracted from the TREC 2005 emal corpus are used.,249 spam mage fles and 288 legtmate mage fles were extracted and processed usng our normalzaton processes. Unfortunately, these data sets contaned overlappng mages (.e., mages found n both legtmate and spam emals), whch we were forced to remove. From our observatons, most overlappng mages were ether cons or background templates. 7 spam mages and 52 legtmate mages were retaned, and the results of our analyss are shown n Table 6. Table 6. Identfcaton Results on TREC 2005 Corpus Identfcaton Rate(%) Postve(%) Sngle-Class Mult-Class In Table 6, we observe that our false postve rate ncreased by 3.5%. One explanaton for ths ncrease s the dfference between CG mages and TREC 2005 legtmate mages. Ths result clearly reflects the need for a standardzed data set for legtmate emal mages. On the other hand, we observed mprovements n the spam mage dentfcaton rate, compared wth the results n Table 4. Ths proves the generalzaton capabltes of our proposed framework for dentfyng spam mages. We also observe that mult-class characterzaton acheves better than sngle-class characterzaton, even for the TREC 2005 emal corpus. postve rate s mproved by 5.9% and spam mage dentfcaton rate s ncreased by.8% as well. The mprovement n false postve rate s more emnent as observed n Secton 6.2. If we recall that the legtmate mages used for tranng are not from real emals, t can be clamed that a mult-class characterzaton approach s much advantageous for spam mage dentfcaton tasks snce t s very dffcult to obtan approprate tranng data. 7. CONCLUSION AND FUTURE WORK In ths paper, we propose a framework for spam mage dentfcaton that apples mult-class characterzaton and MFoMbased learnng. We dentfy four key propertes of spam mages: color moments, color heterogenety, conspcuousness, and selfsmlarty. By combnng mult-class characterzaton and these four propertes for feature extracton, expermental results show that our proposed technque s effectve. For our SpamArchve spam mage data set, we obtan a spam mage dentfcaton rate of 8.5% and a false postve rate of only 5.6% for the legtmate mages. The robustness of the technque s demonstrated by an experment usng the same classfer (wthout retranng) on the mages n the TREC 2005 emal corpus. Our approach acheves 86.6% spam mage dentfcaton wth 9.% false postves. The hgher false postve rate s due to the dfferences between our legtmate corpus used for classfer tranng and the TREC 2005 data set. However, wth a comparson between sngle-class characterzaton and mult-class characterzaton for the TREC 2005 emal corpus, we acheve a much better false postve rate when a mult-class characterzaton approach s used. Our results are consstent wth the hypothess that spam mages are fundamentally dfferent from normal mages, and therefore, we can apply mage analyss technques to dstngush them. Ths s an nterestng and encouragng result snce early attempts to apply OCR algorthms to convert mages to text have been defeated by spammers applyng smple CAPTCHA technques. Our approach s a component technology that can be combned wth text-based flters to mprove the recall and precson of flterng text-and-multmeda spam messages. Beyond emal, our technques are also applcable n other spam applcaton areas such as web spam, blog spam, and nstant messagng spam, where non-text (multmeda) data has been growng n volume and mportance. We are currently workng on refnements for our mult-class MFoM-based characterzaton of spam mages. For example, addtonal propertes and a more refned class categorzaton may mprove the precson and recall of the method. On the applcaton sde, ncorporatng our approach wth text-based learnng flters for emal spam flterng s a natural next step. Other spam meda such as web spam are also nterestng but relatvely unexplored areas. Another area that wll mprove our research and the performance of our approach s the avalablty of large-scale data sets for both spam mages and legtmate mages. 8. ACKNOWLEDGMENTS Ths work has been supported by grants from the Ar Force Offce of Scentfc Research. The authors would lke to thank Flppo Vella who ntally bult up our mage processng systems. We also thank anonymous revewers for ther nsghtful feedback and comments. 9. REFERENCES [] Aradhey, H. B., et al., Image Analyss for Effcent Categorzaton of Image-based Spam E-mal, Proc. of ICDAR, 2005.

9 [2] Carbonetto, P., Fretas, N., and Barnard, K., A Statstcal Model for General Contextual Obect Recognton, Proc. of ECCV, [3] Carreras, X. and Mrquez, L., Boostng Trees for Ant-Spam Emal Flterng, Proc. of RANLP-0, 200. [4] Chen, Y. and Wang, J., Image Categorzaton by Learnng and Reasonng wth Regons, The Journal of Machne Learnng Research, vol. 5, pp , [5] Drucker, H., Wu, D., and Vapnk, V. N. Support Vector Machnes for Spam Categorzaton, IEEE Trans. on Neural Networks, vol. 0, no. 5., 999. [6] Feld, D. J., Relatons between the statstcs of natural mages and the response propertes of cortcal cells, Journal of Optcal Socety of Amerca, vol.4, No. 2., 987 [7] Fumera, G., Plla, I., and Rol, F., Spam Flterng Based on The Analyss of Text Informaton Embedded Into Images, Journal of Machne Learnng Research, vol. 7, pp , [8] Gao, S., Wang, D. H., and Lee, C. H., Automatc Image Annotaton Through Mult-Topc Text Categorzaton, Proc. of ICASSP, vol. 2, pp , [9] Gao, S., Wu, W., Lee, C. H., and Chua T. S., A MFoM Learnng Approach to Robust Multclass Mult-Label Text Categorzaton, Proc. of ICML., 2004 [0] Gonzalez, R. C. and Woods, R. E., Dgtal Image Processng 2ed, Prentce Hall Press, pp. 295., [] Gonzalez, R. C., Woods, R. E., and Eddns, S. L., Dgtal Image Processng usng Matlab, Prentce Hall Press., [2] Hu, J. and Bagga, A., Categorzng Images n Web Documents, IEEE Multmeda, vol., no., pp , [3] Koves, P. D(999), Image Feature from Phase Congruency, Vdere: Journal of Computer Vson Research, The MIT Press, vol., no. 3., 999. [4] Koves, P. D., MATLAB and Octave Functons for Computer Vson and Image Processng, [5] Leavtt, N. (2007), Vendors Fght Spam s Sudden Rse, IEEE Computer, vol. 40, no. 3, pp 6-9., [6] Ru, Y., Huang, T. S., and Chang, S. F. (999), Image Retreval: Current Technques, Promsng Drectons and Open Issues, Journal of Vsual Communcatons and Image Representaton, vol. 0, no. 4, pp , 999. [7] Saham, M., Dumas, S., Heckerman, D., and Horvtz, E., A Bayesan Approach to Flterng Junk Emal, AAAI Workshop on Learnng for Text Categorzaton., 998. [8] Strcker, M. and Orengo, M., Smlarty of Color Images, Proc. of SPIE, pp , 995. [9] Swan, M. and Ballard, D., Color Indexng, Int. Journal of Computer Vson, vol., pp -32., 99. [20] Symantec Corp., The State of Spam, A Monthly Report January, [2] Szummer, M. and Pcard, R., Indoor-Outdoor Image Classfcaton, IEEE Workshop on CAIVD, pp. 42., 998. [22] Vella, F., et al., Informaton Fuson Technques for Automatc Image Annotaton, Proc. of VISAPP., [23] Wang, D. -H., et al., Dscrmnatve Fuson Approach for Automatc Image Annotaton, Proc. of MMSP., [24] Wu, C. -T., Cheng, K. -T., Zhu, Q., and Wu, Y. -L., Usng Vsual Features For Ant-Spam Flterng, Proc. of ICIP., 2005.

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Weighted Penalty Model for Content Balancing in CATS

Weighted Penalty Model for Content Balancing in CATS Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

MULTIPLE LAYAR KERNEL-BASED APPROACH IN RELEVANCE FEEDBACK CONTENT-BASED IMAGE RETRIEVAL SYSTEM

MULTIPLE LAYAR KERNEL-BASED APPROACH IN RELEVANCE FEEDBACK CONTENT-BASED IMAGE RETRIEVAL SYSTEM Proceedngs of the Fourth Internatonal Conference on Machne Learnng and Cybernetcs, Guangzhou, 18-21 August 2005 MULTIPLE LAYAR KERNEL-BASED APPROACH IN RELEVANCE FEEDBACK CONTENT-BASED IMAGE RETRIEVAL

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis A Novel UWB Imagng System Setup for Computer- Aded Breast Cancer Dagnoss Xang He, Ja L, Chenxng Wu Electrcal and Computer Engneerng Oakland Unversty, OU Rochester, I 48309, U.S.A xhe2@oakland.edu, l4@oakland.edu,

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Networks. Backpropagation. Backpropagation. Introduction to. Backpropagation Network training. Backpropagation Learning Details 1.04.

Networks. Backpropagation. Backpropagation. Introduction to. Backpropagation Network training. Backpropagation Learning Details 1.04. Networs Introducton to - In 1986 a method for learnng n mult-layer wor,, was nvented by Rumelhart Paper Why are what and where processed by separate cortcal vsual systems? - The algorthm s a sensble approach

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

4.3- Modeling the Diode Forward Characteristic

4.3- Modeling the Diode Forward Characteristic 2/8/2012 3_3 Modelng the ode Forward Characterstcs 1/3 4.3- Modelng the ode Forward Characterstc Readng Assgnment: pp. 179-188 How do we analyze crcuts wth juncton dodes? 2 ways: Exact Solutons ffcult!

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Comparison of Two Measurement Devices I. Fundamental Ideas.

Comparison of Two Measurement Devices I. Fundamental Ideas. Comparson of Two Measurement Devces I. Fundamental Ideas. ASQ-RS Qualty Conference March 16, 005 Joseph G. Voelkel, COE, RIT Bruce Sskowsk Rechert, Inc. Topcs The Problem, Eample, Mathematcal Model One

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Finding Person X: Correlating Names with Visual Appearances

Finding Person X: Correlating Names with Visual Appearances Fndng Person X: Correlatng Names wth Vsual Appearances Jun Yang, Mng-yu Chen, and Alex Hauptmann School of Computer Scence, Carnege Mellon Unversty Pttsburgh, PA 1513, USA {juny, mychen, alex}@cs.cmu.edu

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information

Document Comparison with a Weighted Topic Hierarchy

Document Comparison with a Weighted Topic Hierarchy Document Comparson wth a Weghted Topc Herarchy A. Gelbukh, G. Sdorov, and A. Guzmán-Arenas Natural Language Laboratory, Center for Computng Research (CIC), Natonal Polytechnc Insttute (IPN), Mexco Cty

More information

Application of Linear Discriminant Analysis to Doppler Classification

Application of Linear Discriminant Analysis to Doppler Classification Applcaton of Lnear Dscrmnant Analyss to Doppler Classfcaton M. Jahangr QnetQ St Andrews Road, Malvern WORCS, UK, WR14 3PS Unted Kngdom mjahangr@qnetq.com ABSTRACT In ths wor the author demonstrated a robust

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Classification of Satellite Images by Texture-Based Models Modulation Using MLP, SVM Neural Networks and Nero Fuzzy

Classification of Satellite Images by Texture-Based Models Modulation Using MLP, SVM Neural Networks and Nero Fuzzy Internatonal Journal of Electroncs and Electrcal Engneerng Vol. 1, No. 4, December, 2013 Classfcaton of Satellte Images by Texture-Based Models Modulaton Usng MLP, SVM Neural Networks and Nero Fuzzy Gholam

More information

FEATURE SELECTION FOR SMALL-SIGNAL STABILITY ASSESSMENT

FEATURE SELECTION FOR SMALL-SIGNAL STABILITY ASSESSMENT FEAURE SELECION FOR SMALL-SIGNAL SABILIY ASSESSMEN S.P. eeuwsen Unversty of Dusburg teeuwsen@un-dusburg.de Abstract INRODUCION hs paper ntroduces dfferent feature selecton technques for neural network

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

A Novel Hybrid Neural Network for Data Clustering

A Novel Hybrid Neural Network for Data Clustering A Novel Hybrd Neural Network for Data Clusterng Dongha Guan, Andrey Gavrlov Department of Computer Engneerng Kyung Hee Unversty, Korea dongha@oslab.khu.ac.kr, Avg1952@rambler.ru Abstract. Clusterng plays

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

sensors ISSN

sensors ISSN Sensors,, 8-97; do:.339/s8 OPEN ACCESS sensors ISSN 44-8 www.mdp.com/ournal/sensors Artcle Extended Target Recognton n Cogntve Radar Networks Ymn We, uadong Meng *, Ymn Lu and Xqn Wang Department of Electronc

More information

Research Article Indoor Localisation Based on GSM Signals: Multistorey Building Study

Research Article Indoor Localisation Based on GSM Signals: Multistorey Building Study Moble Informaton Systems Volume 26, Artcle ID 279576, 7 pages http://dx.do.org/.55/26/279576 Research Artcle Indoor Localsaton Based on GSM Sgnals: Multstorey Buldng Study RafaB Górak, Marcn Luckner, MchaB

More information

Subarray adaptive beamforming for reducing the impact of flow noise on sonar performance

Subarray adaptive beamforming for reducing the impact of flow noise on sonar performance Subarray adaptve beamformng for reducng the mpact of flow nose on sonar performance C. Bao 1, J. Leader and J. Pan 1 Defence Scence & Technology Organzaton, Rockngham, WA 6958, Australa School of Mechancal

More information

Frequency Map Analysis at CesrTA

Frequency Map Analysis at CesrTA Frequency Map Analyss at CesrTA J. Shanks. FREQUENCY MAP ANALYSS A. Overvew The premse behnd Frequency Map Analyss (FMA) s relatvely straghtforward. By samplng turn-by-turn (TBT) data (typcally 2048 turns)

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE ICC 21 proceedngs Clusterng Based Fractonal Frequency Reuse and Far Resource

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Webinar Series TMIP VISION

Webinar Series TMIP VISION Webnar Seres TMIP VISION TMIP provdes techncal support and promotes knowledge and nformaton exchange n the transportaton plannng and modelng communty. DISCLAIMER The vews and opnons expressed durng ths

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

FUSING SPEECH SIGNAL AND PALMPRINT FEATURES FOR AN SECURED AUTHENTICATION SYSTEM

FUSING SPEECH SIGNAL AND PALMPRINT FEATURES FOR AN SECURED AUTHENTICATION SYSTEM DOI: 10.21917/jvp.2011.0043 FUSING SPEECH SIGNAL AND PALMPRINT FEATURES FOR AN SECURED AUTHENTICATION SYSTEM P.K. Mahesh 1 and M.N. Shanmukha Swamy 2 Department of Electroncs and Communcaton Engneerng,

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Video Occupant Detection for Airbag Deployment

Video Occupant Detection for Airbag Deployment Fourth IEEE Workshop on Applcatons of Computer Vson, October 1998, Prnceton, New Jersey, USA Vdeo Occupant Detecton for Arbag Deployment John Krumm and Greg Krk Intellgent Systems & Robotcs Center Sanda

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

arxiv: v1 [cs.lg] 8 Jul 2016

arxiv: v1 [cs.lg] 8 Jul 2016 Overcomng Challenges n Fxed Pont Tranng of Deep Convolutonal Networks arxv:1607.02241v1 [cs.lg] 8 Jul 2016 Darryl D. Ln Qualcomm Research, San Dego, CA 92121 USA Sachn S. Talath Qualcomm Research, San

More information

California, 4 University of California, Berkeley

California, 4 University of California, Berkeley Dversty Processng WCDMA Cell earcher Implementaton Ahmed M. Eltawl, Eugene Grayver 2, Alreza Targhat, Jean Francos Frgon, Kambz hoarnejad, Hanl Zou 3 and Danjela Cabrc 4 Unversty of Calforna, Los Angeles,

More information

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis Arteral Travel Tme Estmaton Based On Vehcle Re-Identfcaton Usng Magnetc Sensors: Performance Analyss Rene O. Sanchez, Chrstopher Flores, Roberto Horowtz, Ram Raagopal and Pravn Varaya Department of Mechancal

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Channel Alternation and Rotation in Narrow Beam Trisector Cellular Systems

Channel Alternation and Rotation in Narrow Beam Trisector Cellular Systems Channel Alternaton and Rotaton n Narrow Beam Trsector Cellular Systems Vncent A. Nguyen, Peng-Jun Wan, Ophr Freder Illnos Insttute of Technology-Communcaton Laboratory Research Computer Scence Department-Chcago,

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR A. Coppalle, M. Talbaut and F. Corbn UMR 6614 CORIA, Sant Etenne du Rouvray, France INTRODUCTION Recent mprovements

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

EEG Channel Selection Using Decision Tree in Brain-Computer Interface

EEG Channel Selection Using Decision Tree in Brain-Computer Interface EEG Channel Selecton Usng Decson ree n Bran-Computer Interface Mahnaz Arvaneh * Cunta Guan Ka Keng Ang and Hok Cha Quek * * School of Computer Engneerng Nanyang echnologcal Unversty Sngapore Insttute for

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION 7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J. ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 2, DECEMBER 204 695 On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Student Member, IEEE, Ru Zhang, Member,

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

Adaptive System Control with PID Neural Networks

Adaptive System Control with PID Neural Networks Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information