Potential Malicious Users Discrimination with Time Series Behavior Analysis
|
|
- Barbara Holmes
- 6 years ago
- Views:
Transcription
1 Murat Semerc Al Taylan Cemgl Department of Computer Engneerng, Bogazc Unversty, 34342, Bebek, Istanbul, Turkey Bulent Sankur Department of Electrcal & Electroncs Engneerng, Bogazc Unversty, 34342, Bebek, Istanbul, Turkey Abstract Dscrmnatng the malcous users n a network s crucal n protectng the network enttes and preventng any ongong attacks. In an organzed attack, a group users are supposed to behave synchronously n the same manner. In ths study, we partcularly focus on organzed attacks where the attackers create a hgh volume of requests to overwhelm the server under heavy resource consumpton. We propose a novel behavor analyss based on the tme seres algnment kernel and spectral clusterng to determne the group of users that concurrently perform smlar behavors (or dssmlar behavor to that of nnocent users). We experment the proposed model on the smulated data. 1. Introducton Analyss of tme seres for classfcaton, predcton, change and outler detecton has been actve research topcs for decades wth partcular focus on fnancal markets (Gupta et al., 2014). Among the plethora of methods proposed one can menton: ) methods that map the tme seres nto a new feature space, such as spectral entropy, autocorrelaton etc. (Hyndman et al., 2015); ) kernel methods for tme-seres classfcaton wth emphass on sequence algnment (Cutur, 2011; Svaramakrshnan et al., 2007; Chen et al., 2013); ) clusterng tme seres wth a combned dstance functon of trangle smlarty and dynamc tme warpng dstance (Zhang et al., 2011); v) approaches fttng the data to a number of possble models, such as hdden Markov models and autoregressve movng average, and clusterng the data based on model nstance wth the best ft (Oates et al., 1999; Xong & Yeung, 2002); v) sngular Proceedngs of the 33 rd Internatonal Conference on Machne Learnng, New York, NY, USA, JMLR: W&CP volume 48. Copyrght 2016 by the author(s). spectral analyss where data s embedded, the embeddng matrx decomposed and reconstructed nto trend, nose and oscllatory components. In ths study, our goal s to buld an anomaly detector that analyzes the behavor of multple tme seres n order to dscrmnate the set of malcous users n a cyber attack scenaro. The underlyng assumpton s that n a cyber attack, the attacker group would show correlated behavor patterns and act n a concurrent manner (e.g. botnet attacks). To ths purpose, we frst develop a measure of user behavor smlarty based on the types and tmngs of ther actons. Then, we use spectral clusterng technques to dscrmnate the malcous users from the ordnary ones. The paper s organzed as follows: Secton 2 dscusses the method to algn two sequences of dfferent length, presents our sequence algnment kernel and defnes the parwse heat kernel. Secton 3 elaborates on the dscrmnate the users. In Secton 4, a heurstcs for automatc selecton of the attacker group s proposed, and the complete algorthm s gven. Experments results and dscusson of future research drectons are gven n Secton 5 and Secton 6, respectvely. 2. Sequence Algnment and the Proposed Kernel One way to express the smlarty between two sequences of possbly dfferent length s by the sum of smlartes of all ther possble algnments, wth no par repetton. In ths method, whle proceedng n the algnments, we allow ether only one member to vary or both of the members to vary smultaneously. Fgure 1 shows an example of all possble algnments for two sequences, whch, respectvely, have lengths two and three. In the specfc example there are 5 possble algnments. Thus, the smlarty of two sequences wll be hgher f they have hgher memberparwse smlarty values. In our work the sequences correspond to the message sent by the termnals, characterzed
2 x 1, y 2 x 1, y 1 x 2, y 2 x 2, y 1 x 3, y 2 x 3, y 1 Fgure 1. All possble algnments for x = {x 1, x 2, x 3} and y = {y 1, y 2}, where x and y j are denoted as members. by ther types and tme stamps. (x 1, y 1 ), (x 1, y 2 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 3, y 1 ), (x 3, y 2 ) The smlarty of two sequences s a functon of parwse smlarty of sequence members. Thus, the smlarty of two sequences s hgher f they have hgh overall parwse smlarty values. A global algnment kernel has been proposed n (Cutur et al., 2007), whch uses dynamc programmng to compute the smlarty of all possble algnments of two sequences. We use a varaton of ths algorthm as detaled n Algorthm 1, where we employ a parwse heat kernel that s based on the Mahalanobs dstance and dfferences of tme stamps. The sequence algnment kernel for two sequences of length, respectvely, m and n, s gven as k(x, Y) = T n+1,m+1. Ths kernel consders all possble algnments of tme stamps of the two sequences, sums these terms weghted by the parwse kernel functon, κ(x, y j ). Here κ(x, y j ), measures the smlarty of two tme stamped message events x and y j, and each such vector ncorporates the qualfer for the type of message one of the d possble message types) and the tme of arrval of the message. After the kernel matrx for all user pars s obtaned, we unt-dagonal normalze the kernel matrx n order to elmnate scalng ssues: k (X, Y) = k(x, Y) k(x, X) k(y, Y) k (X, Y) [0, 1] (1) Algorthm 1 Global Algnment Kernel 1: For any two gven user behavor sequences X = (x 1,..., x n ), X R (d+1) n and Y = (y 1,..., y m ), Y R (d+1) m n a state space Ψ, create T R (n+1) (m+1). 2: Set the members n the frst row and n the frst column of T to zero (T 1,: = T :,1 = 0). Set T 1,1 = 1. 3: for = 2 to n + 1 do 4: for j = 2 to m + 1 do 5: T,j = (T,j 1 +T 1,j 1 +T 1,j )κ(x 1, y j 1 ) 6: end for 7: end for 8: Return T n+1,m+1 After ths normalzaton, smlar behavng user pars get values close to 1 and the dssmlar pars get values close to 0. Each users network actons are characterzed by the multtme seres, each seres correspondng to the ordered tmestamped sequence of one type of message. At any one tme at most one type of message can be sent. Thus, for a message vector x = [x 1, x 2,..., x d ], x s {0, 1} and s x s = 1, where d s the number of message types. Wthn an observaton nterval, users can send arbtrary number of dfferent messages so that messagng event sequences can have dfferent lengths. A kernel functon (the parwse heat functon) for any two tme-stamped message vector, x = (x, t x ) and y j = (y j, t y j ) s evaluated as: κ((x, t x ), (y j, t y j )) = exp( γd(x, y j) ρ t x t y j ) (2) where D(x, y j ) s a dstance functon such as Eucldean or Mahalanobs dstance. The squared Mahalanobs dstance for a gven Mahalanobs matrx, M, can be evaluated as follows: D(x, y j) = (x y j) M(x y j) (3) Note that κ((x, t x ), (y j, t y j )) = 1 ff x == y j and t x == t y j. 3. Spectral Clusterng A smlarty matrx s created of the users from the parwse user-to-user smlartes as n Equaton 1. The smlarty matrx then corresponds to a weghted adjacency graph. In order to partton ths graph such that users wth smlar messagng behavor are collected n the same sub-graph. To ths effect, we have used a spectral clusterng algorthm. Such algorthms are conceved to realze graph parttonng solutons n clusterng problems, and n the lterature there are varous spectral clusterng algorthms (Luxburg, 2007).
3 We have appled the normalzed spectral clusterng algorthm over the kernel matrx obtaned from the user behavors, K (a U U matrx where U s the set of users). Ths matrx s also nterpreted as the weghted adjacency matrx (Sh & Malk, 2000) of a fully connected graph. Each user s a vertex n ths graph whle the edge between two users s ther messagng behavor smlarty. We am to partton the graph nto two sub-graphs such that the malcous users, typcally synchronzed and organzed, fall nto one cluster, and the rest s n the other cluster. The degree of l th user s evaluated as: U d l = K (l, u) (4) u=1 The degree matrx D s a dagonal matrx whose dagonal elements conssts of degree values, d 1, d 2,..., d U. The Laplacan matrx s evaluated as n Equaton 5 and spectral clusterng algorthm s gven n Algorthm 2. L = D K (5) concentraton to malcous users. Ths algorthm based on the heurstcs that malcous users must be somewhat coordnated to mount an attack and therefore the data vectors must concentrate along a few egenvectors s gven n Algorthm 3. Algorthm 3 Cluster Selecton Heurstcs 1: For the gven cluster label vector C, determne the two clusters, C 1 and C 2. 2: For the two clusters, evaluate the sample co-varance matrx of message vectors. 3: f a cluster has 0 co-varance matrx then 4: Return the cluster wth 0 co-varance matrx. 5: else 6: Evaluate the egenvalues of the cluster co-varance matrces. 7: For each matrx, evaluate the proportonal egenvalues wth respect to the total sum of egenvalues. 8: Return the cluster wth the hghest maxmum proportonal egenvalue. 9: end f Algorthm 2 Normalzed Laplacan Spectral Clusterng 1: Gven K, evaluate D and L, whch are all n R U U. 2: Compute the frst two egenvectors v 1 and v 2 of the two smallest egenvalues 0 = λ 1 < λ 2 for the generalzed egenproblem Lv = λdv. 3: Augment v 1 and v 2 to obtan V R U 2. Use the rows of V as the new feature vectors n the mapped space, y R 2. Apply k-means clusterng wth k = 2. 4: Return the cluster label vector C from k-means clusterng. 4. Assgnment of Malcous Users to a Cluster We ntend to cluster the users nto two sets: Potentally malcous users, characterzed by repettve and correlated behavors, and the rest of users, characterzed by uncoordnated and dverse behavors. Once the two clusters are formed, then the fnal task s that of determnng that of attackers, for whch we use a heurstc algorthm. For each of the two clusters, we compute the sample covarance matrx of the user message sequence vectors n that cluster. Recall that the elements of vectors conssts of the message types and ther tme stamps. Snce the malcous user cluster s assumed to consst of smlar messagng behavors, such message vectors are expected to be more strongly algned along a few partcular axes. In fact, n the extreme case when all messages n the cluster are of the same type and are perfectly synchronzed, the sample co-varance matrx would be the 0 matrx. Therefore, we assgn the cluster wth sgnfcantly hgher egenvalue Puttng all of these steps together, the algorthm to dscrmnate the malcous users s summarzed n Algorthm 4.. Algorthm 4 Potental Malcous Users Dscrmnaton 1: Set the weght parameters γ and ρ of the parwse heat kernel. 2: Evaluate the kernel matrx K such that (U, U j ) U U, we have K,j = k(u, U j ) as defned n Algorthm 1, where U, U j are the tme-stamped message sequences of th and j th users, respectvely and U s the set of all user sequences. 3: Unt-dagonal normalze K to obtan K. 4: Apply symmetrc normalzed Laplacan spectral clusterng over K such that # clusters = 2, as defned n Algorthm 2. 5: Use cluster label vector C returned by spectral clusterng n clusterng selecton heurstc as defned n Algorthm 3. 6: Return the cluster selected by the heurstcs as the set of malcous users. 5. Experments To evaluate the performance of the proposed algorthm we mplement a smulaton setup, where we create varable length sequences for the normal and malcous users (attackers). In our setup, we assume that n any nstance of attack, the attackers choose and send one type of message, and furthermore ther tmngs are very close. We use the Mahalanobs dstance n Equaton 3, whch s calculated as
4 the nverse of the sample co-varance matrx of the number of messages observed wthn a tme nterval (M = Σ 1 ). In the smulatons, the system s sampled at 1 second ntervals. Users can choose from 5 dfferent types of messages and they can send from 1 up to 5 messages of any type n a 1 second nterval. We have set the attack strength to three levels n terms of the number of messages an attacker can send: Low-level (3-10), md-level (5-10) and hgh-level (10-15). The smulaton envronment s dmensoned for 100 users n the system. We have demonstrated the performance of the malcous user detecton system as a functon of varatons n the attack duraton, the proporton of attackers and the magntude of attack. The attack duraton s represented as at whch nterval quarter the attack starts. The attack can start at tme 0.0; 0.25; 0.5; 0.75 second wthn a tme nterval of 1 second. Snce we know the labels n the smulated data, we can show the performance of the proposed system n terms F- Measure. The deal case would be when F-measure s 1, whch can be obtaned only when there s no falsely accused attackers (.e., P = 1) and all the attackers are dentfed. Precson (P) = # assgned true attackers # assgned attackers Recall (R) = # assgned true attackers # all attackers F-Measure (F) = 2 P R P + R Fgure 2 shows an example where our algorthm has successfully detected the malcous user groups accordng to the computed kernel. The uppermost sub-fgure s the ground-truth label matrx (K,j = 1 f and only f both u and u j are attackers). The second (md) sub-fgure s the computed kernel matrx. The bottom sub-fgure shows the cluster label matrx obtaned accordng to the Algorthm 4. Fgure 3 shows the effect of attack duraton on the detecton performance. Recall that, ndependent of the duraton of the attack, the number of messages that an attacker sends s wthn a fxed nterval. Thus, f the attack duraton s long (e.g., attack starts at 0.25 sec) then the messages are more dspersed n tme; on the contrary, f the attack duraton s short (e.g., attack starts at 0.75 sec), then all messages are concentrated wthn a shorter nterval and our algorthm can detect them more accurately, snce the parwse heat kernel returns hgher values when the messages have been sent wth close tmngs. The effect of ncreased attacker number s shown n Fgure 4. The hgher the number of attackers n the system, the more accurately the algorthm detects them. It detects all (6) (7) (8) Fgure 2. Detected attackers on smulated data usng spectral clusterng Fgure 3. The Effect of Attack Duraton for Fxed Number Attackers the attackers almost wthout any false alarms. Not surprsngly, n both cases, the attackers are detected more accurately when the ntensty of the attack becomes hgher. 6. Concluson and Future Work We have proposed a novel method to fnd the group of attackers wthn a group of users and tested t usng smulaton data. The attackers are characterzed by coordnated message sendng behavors, smlar to the botnet DDoS attacks. The proposed method dscrmnates the attackers from the vctms usng smlartes between them. Each user s regarded as a tme seres where each message s represented as a unt vector. A sequence algnment kernel s used to measure smlarty between the message sequences and ther tmngs. Then the users are clustered nto two groups usng spectral clusterng. Fnally, a heurstcs s appled for autonomous attacker cluster selecton. The performance of the proposed method mproves f the attackers send hgh number of messages or they send the messages n bursts n small tme ntervals. Smlarly, the method performs more accurately f the number of attackers ncrease.
5 Luxburg, U. A tutoral on spectral clusterng. Statstcs and Computng, 17(4): , Oates, T., Frou, L., and Cohen, P.R. Clusterng tme seres wth hdden markov models and dynamc tme warpng. In Proceedngs of the IJCAI-99 Workshop on Neural, Symbolc, and Renforcement Learnng Methods for Sequence Learnng, Fgure 4. The Effect of the Number of Attackers for a Fxed Attack Duraton Acknowledgements Ths study s a Bogazc Unversty - NETAS collaboraton and t s funded wth TEYDEB project number , Realzaton of Anomaly Detecton and Preventon wth Learnng System Archtectures, Qualty Improvement, Hgh Rate Servce Avalablty and Rch Servces n a VoIP Frewall Product, by the Scentfc and Technologcal Research Councl Of Turkey (TUBITAK). NOVA V- Gate s a trademark cyber-securty product of NETAS. Sh, J. and Malk, J. Normalzed cuts and mage segmentaton. IEEE Transactons on Pattern Analyss and Machne Intellgence, 22(8): , Svaramakrshnan, K. R., Karthk, K., and Bhattacharyya, C. Kernels for large margn tme-seres classfcaton. In 2007 Internatonal Jont Conference on Neural Networks, pp , Aug Xong, Y. and Yeung, D.-Y. Mxtures of arma models for model-based tme seres clusterng. In Proceedngs of the IEEE Internatonal Conference on Data Mnng, Zhang, X., Lu, J., Du, Y., and Lv, T. A novel clusterng method on tme seres data. Expert Systems wth Applcatons, 38(9): , References Chen, H., Tang, F., Tno, P., and Yao, X. Model-based kernel for effcent tme seres analyss. In Proceedngs of the 19th ACM SIGKDD Internatonal Conference on Knowledge Dscovery and Data Mnng, KDD 13, pp , New York, NY, USA, ACM. Cutur, M. Fast global algnment kernels. In Proceedngs of the 28th Internatonal Conference on Machne Learnng, ICML 2011, Bellevue, Washngton, USA, June 28 - July 2, 2011, pp , Cutur, M., Vert, J. P., Brkenes, O., and Matsu, T. A kernel for tme seres based on global algnment. In Proceedngs of IEEE Internatonal Conference on Acoustcs, Speech and Sgnal Processng 2007 (ICASSP 07), volume 2, pp , Gupta, M., Gao, J., Aggarwal, C. C., and Han, J. Outler detecton for temporal data: A survey. IEEE Transactons on Knowledge and Data Engneerng, 26(9): , Hyndman, R. J., Wang, E., and Laptev, N. Large-scale unusual tme seres detecton. In IEEE Internatonal Conference on Data Mnng Workshop, ICDMW 2015, Atlantc Cty, NJ, USA, November 14-17, 2015, pp , 2015.
Cluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationGraph-based Clustering
Graphbased Clusterng Transform the data nto a graph representaton ertces are the data ponts to be clustered Edges are eghted based on smlarty beteen data ponts Graph parttonng Þ Each connected component
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationLecture 4: Principal components
/3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationLECTURE : MANIFOLD LEARNING
LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationFace Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationA Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning
A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationOnline Detection and Classification of Moving Objects Using Progressively Improving Detectors
Onlne Detecton and Classfcaton of Movng Objects Usng Progressvely Improvng Detectors Omar Javed Saad Al Mubarak Shah Computer Vson Lab School of Computer Scence Unversty of Central Florda Orlando, FL 32816
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationImage Alignment CSC 767
Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances
More informationIntelligent Information Acquisition for Improved Clustering
Intellgent Informaton Acquston for Improved Clusterng Duy Vu Unversty of Texas at Austn duyvu@cs.utexas.edu Mkhal Blenko Mcrosoft Research mblenko@mcrosoft.com Prem Melvlle IBM T.J. Watson Research Center
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationKeywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines
(IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Herarchcal Web Page Classfcaton Based on a Topc Model and Neghborng Pages Integraton Wongkot Srura Phayung Meesad Choochart Haruechayasak
More informationClassification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM
Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based
More informationUSING LINEAR REGRESSION FOR THE AUTOMATION OF SUPERVISED CLASSIFICATION IN MULTITEMPORAL IMAGES
USING LINEAR REGRESSION FOR THE AUTOMATION OF SUPERVISED CLASSIFICATION IN MULTITEMPORAL IMAGES 1 Fetosa, R.Q., 2 Merelles, M.S.P., 3 Blos, P. A. 1,3 Dept. of Electrcal Engneerng ; Catholc Unversty of
More information12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification
Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationFitting & Matching. Lecture 4 Prof. Bregler. Slides from: S. Lazebnik, S. Seitz, M. Pollefeys, A. Effros.
Fttng & Matchng Lecture 4 Prof. Bregler Sldes from: S. Lazebnk, S. Setz, M. Pollefeys, A. Effros. How do we buld panorama? We need to match (algn) mages Matchng wth Features Detect feature ponts n both
More informationMachine Learning. Topic 6: Clustering
Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess
More informationAn efficient method to build panoramic image mosaics
An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationA Webpage Similarity Measure for Web Sessions Clustering Using Sequence Alignment
A Webpage Smlarty Measure for Web Sessons Clusterng Usng Sequence Algnment Mozhgan Azmpour-Kv School of Engneerng and Scence Sharf Unversty of Technology, Internatonal Campus Ksh Island, Iran mogan_az@ksh.sharf.edu
More informationCS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 15
CS434a/541a: Pattern Recognton Prof. Olga Veksler Lecture 15 Today New Topc: Unsupervsed Learnng Supervsed vs. unsupervsed learnng Unsupervsed learnng Net Tme: parametrc unsupervsed learnng Today: nonparametrc
More informationUnsupervised Learning and Clustering
Unsupervsed Learnng and Clusterng Supervsed vs. Unsupervsed Learnng Up to now we consdered supervsed learnng scenaro, where we are gven 1. samples 1,, n 2. class labels for all samples 1,, n Ths s also
More informationEfficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity
ISSN(Onlne): 2320-9801 ISSN (Prnt): 2320-9798 Internatonal Journal of Innovatve Research n Computer and Communcaton Engneerng (An ISO 3297: 2007 Certfed Organzaton) Vol.2, Specal Issue 1, March 2014 Proceedngs
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationDiscriminative Dictionary Learning with Pairwise Constraints
Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse
More informationCorner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity
Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA Robust Method for Estimating the Fundamental Matrix
Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.
More informationA Genetic Programming-PCA Hybrid Face Recognition Algorithm
Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,
More informationTPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints
TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationComputer Animation and Visualisation. Lecture 4. Rigging / Skinning
Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume
More informationC. Markert-Hahn, K. Schiffl, M. Strohmeier, Nonclinical Statistics Conference,
Roche Pharma Producton Penzberg Practcal Applcatons of Statstcal Process Control C. Markert-Hahn, K. Schffl, M. Strohmeer, Roche Dagnostcs GmbH, Penzberg Operatonal Excellence Statstcs Nonclncal Statstcs
More informationA B-Snake Model Using Statistical and Geometric Information - Applications to Medical Images
A B-Snake Model Usng Statstcal and Geometrc Informaton - Applcatons to Medcal Images Yue Wang, Eam Khwang Teoh and Dnggang Shen 2 School of Electrcal and Electronc Engneerng, Nanyang Technologcal Unversty
More informationRemote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information
Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097
More informationAn Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Similarity Measure Method for Symbolization Time Series
Research Journal of Appled Scences, Engneerng and Technology 5(5): 1726-1730, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scentfc Organzaton, 2013 Submtted: July 27, 2012 Accepted: September 03, 2012
More informationFinding Repetitive Patterns in 3D Human Motion Captured Data
Fndng Repettve Patterns n 3D Human Moton Captured Data Ka-Ta Tang Department of Computer Scence, Cty Unversty of Hong Kong, Hong Kong tjeff@ctyu.edu.hk Howard Leung Department of Computer Scence, Cty Unversty
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationLecture 13: High-dimensional Images
Lec : Hgh-dmensonal Images Grayscale Images Lecture : Hgh-dmensonal Images Math 90 Prof. Todd Wttman The Ctadel A grayscale mage s an nteger-valued D matrx. An 8-bt mage takes on values between 0 and 55.
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationFrom Comparing Clusterings to Combining Clusterings
Proceedngs of the Twenty-Thrd AAAI Conference on Artfcal Intellgence (008 From Comparng Clusterngs to Combnng Clusterngs Zhwu Lu and Yuxn Peng and Janguo Xao Insttute of Computer Scence and Technology,
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationAn Improved Neural Network Algorithm for Classifying the Transmission Line Faults
1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationK-means Optimization Clustering Algorithm Based on Hybrid PSO/GA Optimization and CS validity index
Orgnal Artcle Prnt ISSN: 3-6379 Onlne ISSN: 3-595X DOI: 0.7354/jss/07/33 K-means Optmzaton Clusterng Algorthm Based on Hybrd PSO/GA Optmzaton and CS valdty ndex K Jahanbn *, F Rahmanan, H Rezae 3, Y Farhang
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More information