An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation

Size: px
Start display at page:

Download "An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation"

Transcription

1 An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation Yaozong LIU 1*, Hong ZHANG 1, Fawang HAN 2, Jun TAN 3 1 School of Computer Science and Engineering Nanjing University of Science and Technology, Nanjing, China 2 Information Technology Department Nanjing Forest Police College, Nanjing, China 3 Department of Radiation Oncology University of Texas Southwestern Medical Center, Dallas, TX, USA new025@126.com Journal of Digital Information Management ABSTRACT: A large number of noise are usually carried in the original RFID data and need to be cleaned up before further processing. Outlier detection is an effective method for RFID data cleaning. In this paper, a point probability data model was proposed to describe the uncertain RFID data streams. The wavelet density threshold was incorporated in this method to adaptively detect the outliers in the sliding window by utilizing the multi-scale and multi-granularity characteristics of wavelet density estimation. The process of outlier detection for RFID data streams was discussed in depth. It was shown that, compared with the existing kernel density estimation algorithm, our method had higher efficiency and precision for the uncertain data streams of RFID data cleaning. Categories and Subject Descriptors H.2.8[Database Applications]: Data Mining General Terms: Data mining, RFID Data processing Keywords: RFID data streams, Data cleaning, Outlier, Uncertain, Wavelet Density Estimation (WDE) Received: 20 August 2014, Revised 28 September 2014, Accepted 3 October Introduction RFID applications produce massive data streams, which often contain some anomaly data (such as missing, inconsistent, or duplicate data). Those data would reduce the accuracy of the RFID application and result in RFID data streams uncertainty [1]. To avoid such problems, it is necessary to clean the uncertain RFID data streams by detecting outliers. Outlier detection is a subject undergoing intense study in data mining research. There are two major categories of outlier detection methods: distance based methods and density-based ones. Most of the outlier detections for uncertain data or data streams focus on the former, and thereof, the outliers can be categorized as local outliers and global outliers. Outlier detection is an important anomaly detection method that has gained wide attention and been extensively adopted in RFID data streams cleaning [2-3]. The outlier detection for uncertain data is more difficult than that for traditional certain data. The biggest differences between RFID data streams and traditional data streams are uncertainty and huge traffic. Therefore, new outlier detection methods need to be introduced. A tag may be not in the location of readers, 10 Journal of Digital Information Management Volume 13 Number 1 February 2015

2 but be mistakenly in their monitoring range for various reasons, a phenomenon known as cross-reads. The RFID cross-reads can be viewed as if a reader accidentally reads once or twice. It has a very small probability, but the impact is huge, and it is also an important cause of RFID data streams uncertainty. Liao et al. [2] treated crossreads as outliers, and calculated the spatial density distribution of tag objects by using kernel density estimation method to determine the real position of the marked object, which is located in the detection range of the reader that has the highest density values. 2. Related Works There are few research results of outlier detection for RFID data streams. Elio [4] proposed a framework of outlier detection for RFID data. However, the framework is not suitable for RFID data streams processing. For massive, variable, unreliable, distributed and other characteristics of RFID data streams, Liang et al. [3] proposed a distancebased local streams outlier detection algorithm (LSOD) and approximation-based global streams outlier detection algorithm(gsod), but the uncertainty of RFID data is not emphasized. The density estimation method is suitable for outlier detection. Yang et al. [5] used kernel density estimation (KDE) method for detecting global outlier from distributed data streams. But KDE is incapable of multi-scale and multi-granularity analysis for data streams. Because the wavelet method has the local details performance capability, the wavelet density estimator (WDE) has the local signal characteristics analysis capability, which makes it suitable for outlier detection on uncertain data streams. Theoretically, WDE is better than traditional KDE method. Liu et al. [6] applied the WDE method in local outlier detection for traditional data streams, and its detection accuracy and efficiency are higher in comparison with KDE method. Aggarwal et al [7] proposed an outlier detection technique based on density, in which the data records were distributed in an uncertain region with a probability density function (PDF), where the value of PDF in this region is 1. Their algorithm defined a η-probability to quantify the probability of an uncertain data object appearing in a dense area. Searching within multiple subspace, when η- probability is less than a given density threshold, the object is called (, η)-outlier. The density estimation problem is that when the data dimension increases, the data become sparse relative to the spatial dimension, which cannot effectively distinguish between normal points and outliers. Since RFID data are spatial-temporal and have a high spatial dimension, the outlier detection method for data streams based on density estimation needs to be improved. Based on previous studies, this paper proposes an uncertain outlier detection algorithm of cleaning for RFID data streams, combining wavelet density estimation method. 2. Uncertain RFID Data Streams Cleaning Method Based on Outlier Detection When an object attached to a tag moves into the reader s sensing area, it will produce an RFID reading. The RFID reader collects data on the tag at a fixed frequency (e.g. every 10ms), and then the data set can be regarded as a chronologically arriving data streams (time series streams). For RFID applications, we usually convert the uncertain streams data into probability data streams. Figure 1. Cleaning model for RFID data streams based on Wavelet Density Estimation Figure 1 is the cleaning model for RFID data streams based on WDE. Before doing the outlier detection, uncertain RFID data streams must be preprocessed. RFID data can be tagged as O i (time, tag_id, location), where location indicates the position of the tag, with uncertainty which can usually be represented by a tuple (x, y, z) p, where p is the present probability to measure the uncertainty of its position. There exist some uncertain data models which can be divided into two categories: value uncertainty and presence level uncertainty. The former considers that a property value in the database tuples distributed with certain probability in the discrete domains or continuous domains, such as normal distribution. The specific attributes of uncertainty are usually described by probability density function (PDF) or statistical parameters (e.g. variance). The uncertainty of tuples can also be described in various ways. In the point probability model, the attribute value of tuples and presence uncertainty can be represented by a probability value between [0, 1]. In general RFID applications, due to the misreading and duplicate reading of RFID reader, there exists uncertainty in the data, therefore it is very suitable for describing RFID data streams with the point probability model [8]. Definition 1. The point probability data streams. Uncertain data streams can be viewed as the point probability data streams composed of uncertain tuples. Uncertain data streams S (also known as point probability streams) are a k-dimensional sequence composed of independent uncertainty tuples. S = {(X 1, p 1 ),..., (X i, p i ),..., (X n, p n )}, 0 p i 1, where X i is the value of the i th tuple, p i is the presence probability of the tuple. RFID data streams can be represented by the probability data streams [8]. Assuming that each tuple can get multiple values in a discrete domain [a, b], the value of each tuple is based on a probability density function of this discrete domain. Journal of Digital Information Management Volume 13 Number 1 February

3 In a RFID data streams tuple X i = (X 1,..., X d ), the attribute dimension of X is d. Assuming that each property is in line with the characteristics of independent and identically distributed, then the joint density probability of each attribute X is: P(X 1 [a 1, b 1 ],..., X d [a d, b d ]) b... a 1 1 b d a d i f(x 1,..., X d )dx 1,..., dx d (1) Since data streams have infinite resistance, it is not possible to store all the data before starting the calculations. It s necessary to determine the appropriate sample size of the data streams, typically using a sliding window mechanism, and the medium size of the sliding window can not only retain sample statistics completeness, but also reduce the storage cost of data streams. avg For collecting RFID data streams samples, we set p i as the observation probability for tag i in a gap. If the number of gaps in sliding window satisfies the inequality 1n (1/ρ) n i (2) p i avg Then it is guaranteed that tag i reading probability is greater than 1 ρ in the window n i. Definition 2. Adaptive sliding window. In order to detect the outliers for uncertain RFID data streams, the window size for reading the data streams is adaptive to change. The input is the average probability and the confidence probability of tag, the output is the size W i : W i = ComputingWindow(p i avg, ρ) (3) The number of tags detected in the window is represented by N, then the number of tags read in sliding window N meets the binomial distribution B(W i, p i avg ) [9]. When the confidence is ρ, the sufficient condition to ensure the integrity is given by Equation (2). When the window size is smaller than W, it is needed to expand the size of the window, while the conditions for window size changing are N - w i p i avg > 2 w i p i avg (1 p i avg ). The size of the sliding window should be adaptively adjusted according to the tag information changes, to ensure the collection of uncertain RFID data streams sample. 3.1 Sampling over RFID data streams Currently, sampling over RFID data streams is mainly based on the K-L distance and combined with finite mixture density to construct sampling function for analysis. For applications to track the positions of moving objects, Wang et al. [10] used the K-L distance method to capture the adaptive number of samples for a priori sample of the evolution of multi-tag RFID data. Since the kernel function and window width selection of KDE can greatly affect the accuracy. i Algorithm 1. Sampling over RFID data streams Step 1: Collect samples of the original RFID data streams by using eq. (2). Step 2: Use eq. (1) to calculate the probability density for each data streams tuple in sliding window, forming the RFID streams tuples in form of point probability data streams. Step 3: Repeat steps1 and Local outliers in RFID data streams The outliers in RFID data streams formed in RFID application systems can be divided into local outliers and global outliers [3]. This paper mainly focuses on cleaning of the local outliers on RFID data streams, while the global outliers are usually handled as abnormal events. Definition 2. RFID outliers. In the process of the RFID tag signal acquisition and recording, due to the severe noise interference, signal loss, reader failures and other reasons, there could be some signals too high or too low, which are called RFID outliers. Definition 3. Local outlier. When it is only needed to focus on the probability of data points appearing in a certain region, if the probability for a point to appear tends to be 0 or less than a given threshold, then the point is an outlier. For the probability data streams, we can measure the outlier by using the wavelet probability density function, which is called WDE outlier. Definition 4. WDE outlier. Let f denote a wavelet density function and the point x [a, b], when, ε( b a) ε( b a) PX ( [ x, x+ ] η where (ε,η) (0,1), 2 2 then x is an outlier. The range of the value of ε depends on the range of the value of η. Example 1 shows how to determine whether a point is an outlier. Example 1: Parameter ε = 0.15, η = 0.18, P(X [x , x ] = 0.06; 1 (a) P(X [x , x ] = 0.19; 1 (b) The probability from Equation (a) is much lower than the value of, while the probability from equation (b) is greater than the value of. It is easy to determine that is an outlier but is not. 3.3 Outlier detection for RFID data streams For the multi-scale and multi-granularity features of wavelet density estimation, we used the probability threshold and density estimation for determining whether a data point in current data streams sliding window is outlier, and the detection used the retention policy for threshold coefficient[11]. 12 Journal of Digital Information Management Volume 13 Number 1 February 2015

4 In order to ensure the threshold for uncertain data streams was chosen in a reasonable range, we chose the adaptive wavelet threshold selection method. The specific process of wavelet probability threshold is: For each non-zero wavelet coefficients d i, the random variable D i was set towith a certain probability and remained in the wavelet coefficients sequence, while the D i was set to 0 with another certain probability, namely the D i was removed from the wavelet coefficients sequence with condition E [D i ] = d i (mathematical expectation). The uncertainty of probability data streams tuples was measured by p i in definition 1. We used the threshold as the lower limit value of p i, which was value of taken from [, 1], (0 < <1). Algorithm 2: Outlier Detection for RFID data streams Step 1: Calculate the current sliding window WDE threshold of a sampled RFID data streams tuple from algorithm 1, and derive parameters and ; Step 2: Determine whether the data points in current window are outliers, based on definition 4 and parameters and; Step 3: If the pointis an outlier, then remove it and go to step Experimental Results To validate the efficiency of our outlier detection algorithm, we compared the detection accuracy of our algorithm with three other local outlier detection algorithms for data streams, on four different standard data sets (Table 1). The four standard data sets, of which the KDD-CUP99 is an uncertain data streams, were read out in the form of data streams. The result shows that the outlier detection accuracy of WDE on uncertain data streams (KDD-CUP99) is far superior to LOF and LoOP and slightly outperforms KDE. Their detection accuracy on other data streams are close. Therefore, the WDE algorithm is well suited for outlier detection in uncertain data streams. DataSet Method KDD- Ann- Ann- CUP99 Shuttle Throid1 Thyroid2 Outliers U2R Class7 Class1 Class2 To test the performance of our algorithm on real RFID data streams, we used simulated data generated based on the real data distribution observations which come from reader SR2240 on 2.4 GHz active tags, and the outliers meet uniform distribution [3]. Table 2 shows the experimental parameters. Experiment time granularity is in seconds and the time window size W = 2s. We investigated the effects of different window sizes on algorithm performance in Figure 2. RFID data streams were set in line with constant distribution where N = 20, and the number of same tags observed values in 2s are 20. In this section, we use examples to verify the accuracy and efficiency of the proposed method. The density estimation was performed using the Daubechies wavelet with vanishing moment 4. We compared the results with the sampling method based on KDE, in which the parameters were chosen with the methods from Liao et al. [2]. The main parameters of the experiment and the ranges are shown in Table 2. The main test performance indicators for this experiment are throughput and precision. Throughput = total number of observations / total processing time. Precision = correctly cross-reads times / total crossreads times. Parameters Description Value Range M Number of tags F Sampling frequency 5-20 events/sec W Sliding window size sec Wi Sliding window number BW Window adjustment cardinality 1-5 NorN The number of normal tags M*W*F*95%- observed in sliding window M*W*F FalN The number of cross-read tags observed in sliding window 0-M*W*F Table 2. Experimental parameters and ranges SIZE LOF LoOP KDE WDE LOF: Identifying Density-Based Local Outliers. LoOP: Local Outliers Probabilities. KDE: Kernel Density Estimation. WDE: Wavelet Density Estimation Table 1. Outlier Detection for four data sets Figure 2. Comparison of two methods of detection efficiency under different windows size Journal of Digital Information Management Volume 13 Number 1 February

5 As can be seen from Figure 2, the throughput of WDE method is higher than that of KDE in all different window sizes, and the margin increases with the window size. For a more comprehensive comparison of our WDE data cleaning algorithm with KDE data cleaning algorithm, we used three different data sets. DataSet1 contains 1000, DataSet2 contains 5000, and DataSet3 contains 10,000 raw data records, respectively. The three data sets are then mixed with 10%, 20%, and 30% of noise data respectively. The performances of two cleaning methods on three different data sets for cleansing are compared, and showned in Figure 3. In Figure 3, when the proportion of noise increases, the cleaning time also increases. In the results of three different noise ratio tests, the cleaning time of WDE should be less than KDE. Comprehensive comparison shows that, in premise of ensuring the accuracy of cleaning, the time cost of WDE is less than KDE, especially when noise data make up higher proportion in RFID data cleaning. Figure 3. Comparison of the accuracy of read-rate Figure 4. Comparison of normal-reads and cross-reads Figure 4 shows the statistics of the relative amount of observation data between normal-reads and cross-reads. The real data analysis shows that in about 95% of the cases FalN < NorN, and in 5% of the cases FalN > = NorN. 5. Conclusions And Future Work We have proposed an outlier detection for RFID data streams method incorporating the wavelet density estimation and an improved point probabilistic streams data model. Compared with the existing kernel density estimation (KDE) method, our method is more comprehensive and powerful in that it can be applied in uncertain RFID data streams cleaning and has achieved better performance. The future work will be to explore this method further and its applications in distributed RFID data streams cleaning. Acknowledgement This work was supported by the Fundamental Research Funds for the Central Universities (No.LGYB201412) and the National Nature Science Foundation of China (No ). References [1] Kanagal, B., Deshpande A. (2008). Online filtering, smoothing and probabilistic modeling of streamsing data. In: Proc. of the 24 th Int l Conf. on Data Engineering, p [2] Liao, Guoqiong., Li, Jing., Wan, Changxuan. (2010). Method over RFID Streams Based on Kernel Density Estimation. Journal of Computer Research and Development, 47 (Suppl) (In Chinese). [3] Guoqiong, Liao., Jing, Li (2010). Distance Based Outlier Dection for Distributed RFID Data Streams. Journal of Computer Research and Development, 47 (5) (In Chinese). [4] Masciari, Elio. (2007). A framework for outlier mining in RFID data, In: Proc of the 11 th Int Database Engineering and Applications Symposium, p [5] Yidong, Yang., Zhihui, Sun., Jing, Zhang. (2005). Finding Outliers in Distributed Data Streams Based on Kernel Density Estimation. Journal of Computer Research and Development, 42 (9) (In Chinese). [6] Liu, Yao-zong., Zhang, Hong., Meng, Jin., Han, Fawang. (2013).Outliers Detection in Data Streams Based on Wavelet Density Estimation. Computer Engineering, 39 (2) (In Chinese) [7] Aggarwal, CC., Yu, P S. (2008). Outlier detection with uncertain data. In: Proc. of the 7 th SIAM, p [8] Zhang, Chen., Jin, Che-Qing., Zhou, Ao-Ying. (2010). Clustering Algorithm over Uncertain Data Streams. Journal of Software, 21 (9) (In Chinese). [9] Shawn R J., Minos G., Michael J F. (2006). Adaptive cleaning for RFID data streams. Proceeding of the 32 nd International Conference on Very Large Data Bases, p [10] Wang, Yongli., Jiangbo Qian. (2012). Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization. Wireless Networks, 18 (12) [11] Heinz, C., Seeger, B. (2007). Adaptive Wavelet Density Estimators over Data Streams. In: Proc of the 19 th International Conference on Scientific and Statistical Database Management, p Journal of Digital Information Management Volume 13 Number 1 February 2015

Towards New Heterogeneous Data Stream Clustering based on Density

Towards New Heterogeneous Data Stream Clustering based on Density , pp.30-35 http://dx.doi.org/10.14257/astl.2015.83.07 Towards New Heterogeneous Data Stream Clustering based on Density Chen Jin-yin, He Hui-hao Zhejiang University of Technology, Hangzhou,310000 chenjinyin@zjut.edu.cn

More information

Evolution-Based Clustering Technique for Data Streams with Uncertainty

Evolution-Based Clustering Technique for Data Streams with Uncertainty Kasetsart J. (Nat. Sci.) 46 : 638-652 (2012) Evolution-Based Clustering Technique for Data Streams with Uncertainty Wicha Meesuksabai*, Thanapat Kangkachit and Kitsana Waiyamai ABSTRACT The evolution-based

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE

DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering

More information

Density-Based Clustering Based on Probability Distribution for Uncertain Data

Density-Based Clustering Based on Probability Distribution for Uncertain Data International Journal of Engineering and Advanced Technology (IJEAT) Density-Based Clustering Based on Probability Distribution for Uncertain Data Pramod Patil, Ashish Patel, Parag Kulkarni Abstract: Today

More information

Metric and Identification of Spatial Objects Based on Data Fields

Metric and Identification of Spatial Objects Based on Data Fields Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 368-375 Metric and Identification

More information

Open Access Self-Growing RBF Neural Network Approach for Semantic Image Retrieval

Open Access Self-Growing RBF Neural Network Approach for Semantic Image Retrieval Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1505-1509 1505 Open Access Self-Growing RBF Neural Networ Approach for Semantic Image Retrieval

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters

The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 3, May 2015 The Elimination Eyelash Iris Recognition Based on Local Median

More information

Stripe Noise Removal from Remote Sensing Images Based on Stationary Wavelet Transform

Stripe Noise Removal from Remote Sensing Images Based on Stationary Wavelet Transform Sensors & Transducers, Vol. 78, Issue 9, September 204, pp. 76-8 Sensors & Transducers 204 by IFSA Publishing, S. L. http://www.sensorsportal.com Stripe Noise Removal from Remote Sensing Images Based on

More information

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management

More information

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

Role of big data in classification and novel class detection in data streams

Role of big data in classification and novel class detection in data streams DOI 10.1186/s40537-016-0040-9 METHODOLOGY Open Access Role of big data in classification and novel class detection in data streams M. B. Chandak * *Correspondence: hodcs@rknec.edu; chandakmb@gmail.com

More information

Temporal Weighted Association Rule Mining for Classification

Temporal Weighted Association Rule Mining for Classification Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Research on Community Structure in Bus Transport Networks

Research on Community Structure in Bus Transport Networks Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks

More information

Open Access Research on the Data Pre-Processing in the Network Abnormal Intrusion Detection

Open Access Research on the Data Pre-Processing in the Network Abnormal Intrusion Detection Send Orders for Reprints to reprints@benthamscience.ae 1228 The Open Automation and Control Systems Journal, 2014, 6, 1228-1232 Open Access Research on the Data Pre-Processing in the Network Abnormal Intrusion

More information

A Novel Field-source Reverse Transform for Image Structure Representation and Analysis

A Novel Field-source Reverse Transform for Image Structure Representation and Analysis A Novel Field-source Reverse Transform for Image Structure Representation and Analysis X. D. ZHUANG 1,2 and N. E. MASTORAKIS 1,3 1. WSEAS Headquarters, Agiou Ioannou Theologou 17-23, 15773, Zografou, Athens,

More information

Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.

Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K. Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.Mrithyumjaya Rao 3 1. Assistant Professor, Department of Computer Science, Krishna University,

More information

DOI:: /ijarcsse/V7I1/0111

DOI:: /ijarcsse/V7I1/0111 Volume 7, Issue 1, January 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

A Patent Retrieval Method Using a Hierarchy of Clusters at TUT

A Patent Retrieval Method Using a Hierarchy of Clusters at TUT A Patent Retrieval Method Using a Hierarchy of Clusters at TUT Hironori Doi Yohei Seki Masaki Aono Toyohashi University of Technology 1-1 Hibarigaoka, Tenpaku-cho, Toyohashi-shi, Aichi 441-8580, Japan

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

K-means based data stream clustering algorithm extended with no. of cluster estimation method

K-means based data stream clustering algorithm extended with no. of cluster estimation method K-means based data stream clustering algorithm extended with no. of cluster estimation method Makadia Dipti 1, Prof. Tejal Patel 2 1 Information and Technology Department, G.H.Patel Engineering College,

More information

Structure-adaptive Image Denoising with 3D Collaborative Filtering

Structure-adaptive Image Denoising with 3D Collaborative Filtering , pp.42-47 http://dx.doi.org/10.14257/astl.2015.80.09 Structure-adaptive Image Denoising with 3D Collaborative Filtering Xuemei Wang 1, Dengyin Zhang 2, Min Zhu 2,3, Yingtian Ji 2, Jin Wang 4 1 College

More information

An Improved Algorithm for Reducing False and Duplicate Readings in RFID Data Stream Based on an Adaptive Data Cleaning Scheme

An Improved Algorithm for Reducing False and Duplicate Readings in RFID Data Stream Based on an Adaptive Data Cleaning Scheme An Improved Algorithm for Reducing False and Duplicate Readings in RFID Data Stream Based on an Adaptive Data Cleaning Scheme ^Neha Dhama *Meghna Sharma ^ Dept. of CS&IT, ITM UNIVERSITY, GURGAON *Assistant

More information

An Efficient Algorithm for finding high utility itemsets from online sell

An Efficient Algorithm for finding high utility itemsets from online sell An Efficient Algorithm for finding high utility itemsets from online sell Sarode Nutan S, Kothavle Suhas R 1 Department of Computer Engineering, ICOER, Maharashtra, India 2 Department of Computer Engineering,

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial

More information

An Enhanced Density Clustering Algorithm for Datasets with Complex Structures

An Enhanced Density Clustering Algorithm for Datasets with Complex Structures An Enhanced Density Clustering Algorithm for Datasets with Complex Structures Jieming Yang, Qilong Wu, Zhaoyang Qu, and Zhiying Liu Abstract There are several limitations of DBSCAN: 1) parameters have

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Research and Improvement of Apriori Algorithm Based on Hadoop

Research and Improvement of Apriori Algorithm Based on Hadoop Research and Improvement of Apriori Algorithm Based on Hadoop Gao Pengfei a, Wang Jianguo b and Liu Pengcheng c School of Computer Science and Engineering Xi'an Technological University Xi'an, 710021,

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Density Based Clustering using Modified PSO based Neighbor Selection

Density Based Clustering using Modified PSO based Neighbor Selection Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com

More information

Spatial Outlier Detection

Spatial Outlier Detection Spatial Outlier Detection Chang-Tien Lu Department of Computer Science Northern Virginia Center Virginia Tech Joint work with Dechang Chen, Yufeng Kou, Jiang Zhao 1 Spatial Outlier A spatial data point

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Managing Uncertainty in Data Streams. Aleka Seliniotaki Project Presentation HY561 Heraklion, 22/05/2013

Managing Uncertainty in Data Streams. Aleka Seliniotaki Project Presentation HY561 Heraklion, 22/05/2013 Managing Uncertainty in Data Streams Aleka Seliniotaki Project Presentation HY561 Heraklion, 22/05/2013 Introduction Uncertain Data Streams T V Data: incomplete, imprecise, misleading Results: unknown

More information

Anomaly Detection on Data Streams with High Dimensional Data Environment

Anomaly Detection on Data Streams with High Dimensional Data Environment Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant

More information

Mining User - Aware Rare Sequential Topic Pattern in Document Streams

Mining User - Aware Rare Sequential Topic Pattern in Document Streams Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,

More information

Research Article. Three-dimensional modeling of simulation scene in campus navigation system

Research Article. Three-dimensional modeling of simulation scene in campus navigation system Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):103-107 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Three-dimensional modeling of simulation scene

More information

A New Distance Independent Localization Algorithm in Wireless Sensor Network

A New Distance Independent Localization Algorithm in Wireless Sensor Network A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key

More information

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts Appl. Math. Inf. Sci. 6 No. 1S pp. 93S-97S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Novel Image Classification Model Based

More information

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)> RoboCup 2014 Rescue Simulation League Team Description Fu Jiang, Jun Peng, Xiaoyong Zhang, Tao Cao, Muhong Guo, Longlong Jing, Zhifeng Gao, Fangming Zheng School of Information Science

More information

A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods

A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods S.Anusuya 1, M.Balaganesh 2 P.G. Student, Department of Computer Science and Engineering, Sembodai Rukmani Varatharajan Engineering

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Shape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu

Shape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu Applied Mechanics and Materials Submitted: 2014-08-26 ISSN: 1662-7482, Vol. 662, pp 160-163 Accepted: 2014-08-31 doi:10.4028/www.scientific.net/amm.662.160 Online: 2014-10-01 2014 Trans Tech Publications,

More information

Discovering Advertisement Links by Using URL Text

Discovering Advertisement Links by Using URL Text 017 3rd International Conference on Computational Systems and Communications (ICCSC 017) Discovering Advertisement Links by Using URL Text Jing-Shan Xu1, a, Peng Chang, b,* and Yong-Zheng Zhang, c 1 School

More information

American International Journal of Research in Science, Technology, Engineering & Mathematics

American International Journal of Research in Science, Technology, Engineering & Mathematics American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629

More information

arxiv: v1 [cs.cv] 6 Jun 2017

arxiv: v1 [cs.cv] 6 Jun 2017 Volume Calculation of CT lung Lesions based on Halton Low-discrepancy Sequences Liansheng Wang a, Shusheng Li a, and Shuo Li b a Department of Computer Science, Xiamen University, Xiamen, China b Dept.

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

A Novel Image Transform Based on Potential field Source Reverse for Image Analysis

A Novel Image Transform Based on Potential field Source Reverse for Image Analysis A Novel Image Transform Based on Potential field Source Reverse for Image Analysis X. D. ZHUANG 1,2 and N. E. MASTORAKIS 1,3 1. WSEAS Headquarters, Agiou Ioannou Theologou 17-23, 15773, Zografou, Athens,

More information

A Survey on DBSCAN Algorithm To Detect Cluster With Varied Density.

A Survey on DBSCAN Algorithm To Detect Cluster With Varied Density. A Survey on DBSCAN Algorithm To Detect Cluster With Varied Density. Amey K. Redkar, Prof. S.R. Todmal Abstract Density -based clustering methods are one of the important category of clustering methods

More information

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

EFFICIENT ADAPTIVE PREPROCESSING WITH DIMENSIONALITY REDUCTION FOR STREAMING DATA

EFFICIENT ADAPTIVE PREPROCESSING WITH DIMENSIONALITY REDUCTION FOR STREAMING DATA INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 EFFICIENT ADAPTIVE PREPROCESSING WITH DIMENSIONALITY REDUCTION FOR STREAMING DATA Saranya Vani.M 1, Dr. S. Uma 2,

More information

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles 2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 05, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 05, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 05, 2016 ISSN (online): 2321-0613 A Study on Handling Missing Values and Noisy Data using WEKA Tool R. Vinodhini 1 A. Rajalakshmi

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

FSRM Feedback Algorithm based on Learning Theory

FSRM Feedback Algorithm based on Learning Theory Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong

More information

COMP 465: Data Mining Still More on Clustering

COMP 465: Data Mining Still More on Clustering 3/4/015 Exercise COMP 465: Data Mining Still More on Clustering Slides Adapted From : Jiawei Han, Micheline Kamber & Jian Pei Data Mining: Concepts and Techniques, 3 rd ed. Describe each of the following

More information

Video annotation based on adaptive annular spatial partition scheme

Video annotation based on adaptive annular spatial partition scheme Video annotation based on adaptive annular spatial partition scheme Guiguang Ding a), Lu Zhang, and Xiaoxu Li Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory

More information

IMAGE RESTORATION VIA EFFICIENT GAUSSIAN MIXTURE MODEL LEARNING

IMAGE RESTORATION VIA EFFICIENT GAUSSIAN MIXTURE MODEL LEARNING IMAGE RESTORATION VIA EFFICIENT GAUSSIAN MIXTURE MODEL LEARNING Jianzhou Feng Li Song Xiaog Huo Xiaokang Yang Wenjun Zhang Shanghai Digital Media Processing Transmission Key Lab, Shanghai Jiaotong University

More information

Optimization of Observation Membership Function By Particle Swarm Method for Enhancing Performances of Speaker Identification

Optimization of Observation Membership Function By Particle Swarm Method for Enhancing Performances of Speaker Identification Proceedings of the 6th WSEAS International Conference on SIGNAL PROCESSING, Dallas, Texas, USA, March 22-24, 2007 52 Optimization of Observation Membership Function By Particle Swarm Method for Enhancing

More information

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang

More information

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,

More information

COMPARISON OF DENSITY-BASED CLUSTERING ALGORITHMS

COMPARISON OF DENSITY-BASED CLUSTERING ALGORITHMS COMPARISON OF DENSITY-BASED CLUSTERING ALGORITHMS Mariam Rehman Lahore College for Women University Lahore, Pakistan mariam.rehman321@gmail.com Syed Atif Mehdi University of Management and Technology Lahore,

More information

Semi supervised clustering for Text Clustering

Semi supervised clustering for Text Clustering Semi supervised clustering for Text Clustering N.Saranya 1 Assistant Professor, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore 1 ABSTRACT: Based on clustering

More information

Sliding HyperLogLog: Estimating cardinality in a data stream

Sliding HyperLogLog: Estimating cardinality in a data stream Sliding HyperLogLog: Estimating cardinality in a data stream Yousra Chabchoub, Georges Hébrail To cite this version: Yousra Chabchoub, Georges Hébrail. Sliding HyperLogLog: Estimating cardinality in a

More information

Data Stream Clustering Using Micro Clusters

Data Stream Clustering Using Micro Clusters Data Stream Clustering Using Micro Clusters Ms. Jyoti.S.Pawar 1, Prof. N. M.Shahane. 2 1 PG student, Department of Computer Engineering K. K. W. I. E. E. R., Nashik Maharashtra, India 2 Assistant Professor

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

Introduction to Trajectory Clustering. By YONGLI ZHANG

Introduction to Trajectory Clustering. By YONGLI ZHANG Introduction to Trajectory Clustering By YONGLI ZHANG Outline 1. Problem Definition 2. Clustering Methods for Trajectory data 3. Model-based Trajectory Clustering 4. Applications 5. Conclusions 1 Problem

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4 5th International Conference on Advanced Engineering Materials and Technology (AEMT 205) Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu,a, Yanhua Gu 2,b

More information

Detection of Anomalies using Online Oversampling PCA

Detection of Anomalies using Online Oversampling PCA Detection of Anomalies using Online Oversampling PCA Miss Supriya A. Bagane, Prof. Sonali Patil Abstract Anomaly detection is the process of identifying unexpected behavior and it is an important research

More information

A Framework for Clustering Massive Text and Categorical Data Streams

A Framework for Clustering Massive Text and Categorical Data Streams A Framework for Clustering Massive Text and Categorical Data Streams Charu C. Aggarwal IBM T. J. Watson Research Center charu@us.ibm.com Philip S. Yu IBM T. J.Watson Research Center psyu@us.ibm.com Abstract

More information

Classification of Printed Chinese Characters by Using Neural Network

Classification of Printed Chinese Characters by Using Neural Network Classification of Printed Chinese Characters by Using Neural Network ATTAULLAH KHAWAJA Ph.D. Student, Department of Electronics engineering, Beijing Institute of Technology, 100081 Beijing, P.R.CHINA ABDUL

More information

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang Xi an Fanyi University, Xi an

More information

Adaptive Algorithm in Image Denoising Based on Data Mining

Adaptive Algorithm in Image Denoising Based on Data Mining Adaptive Algorithm in Image Denoising Based on Data Mining Yan-hua Ma 1 Chuan-jun Liu 2 1 Qingdao University of Science and Technology 2 Hisense Mobil Communication Technology Corporation Abstract An adaptive

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya

More information

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices

More information

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept

More information

Reliability of chatter stability in CNC turning process by Monte Carlo simulation method

Reliability of chatter stability in CNC turning process by Monte Carlo simulation method Reliability of chatter stability in CNC turning process by Monte Carlo simulation method Mubarak A. M. FadulAlmula 1, Haitao Zhu 2, Hassan A. Wahab 3 1 College of Mechanical and Electrical Engineering,

More information

Sequences Modeling and Analysis Based on Complex Network

Sequences Modeling and Analysis Based on Complex Network Sequences Modeling and Analysis Based on Complex Network Li Wan 1, Kai Shu 1, and Yu Guo 2 1 Chongqing University, China 2 Institute of Chemical Defence People Libration Army {wanli,shukai}@cqu.edu.cn

More information

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan 5th International Conference on Civil Engineering and Transportation (ICCET 205) Traffic Flow Prediction Based on the location of Big Data Xijun Zhang, Zhanting Yuan Lanzhou Univ Technol, Coll Elect &

More information

A Feature Selection Method to Handle Imbalanced Data in Text Classification

A Feature Selection Method to Handle Imbalanced Data in Text Classification A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University

More information

Efficiently Mining Positive Correlation Rules

Efficiently Mining Positive Correlation Rules Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 39S-44S Efficiently Mining Positive Correlation Rules Zhongmei Zhou Department of Computer Science & Engineering,

More information

Evaluation of Moving Object Tracking Techniques for Video Surveillance Applications

Evaluation of Moving Object Tracking Techniques for Video Surveillance Applications International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Evaluation

More information

An Approach for Reduction of Rain Streaks from a Single Image

An Approach for Reduction of Rain Streaks from a Single Image An Approach for Reduction of Rain Streaks from a Single Image Vijayakumar Majjagi 1, Netravati U M 2 1 4 th Semester, M. Tech, Digital Electronics, Department of Electronics and Communication G M Institute

More information

ART 알고리즘특강자료 ( 응용 01)

ART 알고리즘특강자료 ( 응용 01) An Adaptive Intrusion Detection Algorithm Based on Clustering and Kernel-Method ART 알고리즘특강자료 ( 응용 01) DB 및데이터마이닝연구실 http://idb.korea.ac.kr 2009 년 05 월 01 일 1 Introduction v Background of Research v In

More information

A Kind of Fast Image Edge Detection Algorithm Based on Dynamic Threshold Value

A Kind of Fast Image Edge Detection Algorithm Based on Dynamic Threshold Value Sensors & Transducers 13 by IFSA http://www.sensorsportal.com A Kind of Fast Image Edge Detection Algorithm Based on Dynamic Threshold Value Jiaiao He, Liya Hou, Weiyi Zhang School of Mechanical Engineering,

More information

Image and Video Quality Assessment Using Neural Network and SVM

Image and Video Quality Assessment Using Neural Network and SVM TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 18/19 pp112-116 Volume 13, Number 1, February 2008 Image and Video Quality Assessment Using Neural Network and SVM DING Wenrui (), TONG Yubing (), ZHANG Qishan

More information

Research on Mining Cloud Data Based on Correlation Dimension Feature

Research on Mining Cloud Data Based on Correlation Dimension Feature 2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Research on Mining Cloud Data Based on Correlation Dimension Feature Jingwen

More information

Noval Stream Data Mining Framework under the Background of Big Data

Noval Stream Data Mining Framework under the Background of Big Data BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 5 Special Issue on Application of Advanced Computing and Simulation in Information Systems Sofia 2016 Print ISSN: 1311-9702;

More information