Potential Malicious Users Discrimination with Time Series Behavior Analysis

Size: px
Start display at page:

Download "Potential Malicious Users Discrimination with Time Series Behavior Analysis"

Transcription

1 Murat Semerc Al Taylan Cemgl Department of Computer Engneerng, Bogazc Unversty, 34342, Bebek, Istanbul, Turkey Bulent Sankur Department of Electrcal & Electroncs Engneerng, Bogazc Unversty, 34342, Bebek, Istanbul, Turkey Abstract Dscrmnatng the malcous users n a network s crucal n protectng the network enttes and preventng any ongong attacks. In an organzed attack, a group users are supposed to behave synchronously n the same manner. In ths study, we partcularly focus on organzed attacks where the attackers create a hgh volume of requests to overwhelm the server under heavy resource consumpton. We propose a novel behavor analyss based on the tme seres algnment kernel and spectral clusterng to determne the group of users that concurrently perform smlar behavors (or dssmlar behavor to that of nnocent users). We experment the proposed model on the smulated data. 1. Introducton Analyss of tme seres for classfcaton, predcton, change and outler detecton has been actve research topcs for decades wth partcular focus on fnancal markets (Gupta et al., 2014). Among the plethora of methods proposed one can menton: ) methods that map the tme seres nto a new feature space, such as spectral entropy, autocorrelaton etc. (Hyndman et al., 2015); ) kernel methods for tme-seres classfcaton wth emphass on sequence algnment (Cutur, 2011; Svaramakrshnan et al., 2007; Chen et al., 2013); ) clusterng tme seres wth a combned dstance functon of trangle smlarty and dynamc tme warpng dstance (Zhang et al., 2011); v) approaches fttng the data to a number of possble models, such as hdden Markov models and autoregressve movng average, and clusterng the data based on model nstance wth the best ft (Oates et al., 1999; Xong & Yeung, 2002); v) sngular Proceedngs of the 33 rd Internatonal Conference on Machne Learnng, New York, NY, USA, JMLR: W&CP volume 48. Copyrght 2016 by the author(s). spectral analyss where data s embedded, the embeddng matrx decomposed and reconstructed nto trend, nose and oscllatory components. In ths study, our goal s to buld an anomaly detector that analyzes the behavor of multple tme seres n order to dscrmnate the set of malcous users n a cyber attack scenaro. The underlyng assumpton s that n a cyber attack, the attacker group would show correlated behavor patterns and act n a concurrent manner (e.g. botnet attacks). To ths purpose, we frst develop a measure of user behavor smlarty based on the types and tmngs of ther actons. Then, we use spectral clusterng technques to dscrmnate the malcous users from the ordnary ones. The paper s organzed as follows: Secton 2 dscusses the method to algn two sequences of dfferent length, presents our sequence algnment kernel and defnes the parwse heat kernel. Secton 3 elaborates on the dscrmnate the users. In Secton 4, a heurstcs for automatc selecton of the attacker group s proposed, and the complete algorthm s gven. Experments results and dscusson of future research drectons are gven n Secton 5 and Secton 6, respectvely. 2. Sequence Algnment and the Proposed Kernel One way to express the smlarty between two sequences of possbly dfferent length s by the sum of smlartes of all ther possble algnments, wth no par repetton. In ths method, whle proceedng n the algnments, we allow ether only one member to vary or both of the members to vary smultaneously. Fgure 1 shows an example of all possble algnments for two sequences, whch, respectvely, have lengths two and three. In the specfc example there are 5 possble algnments. Thus, the smlarty of two sequences wll be hgher f they have hgher memberparwse smlarty values. In our work the sequences correspond to the message sent by the termnals, characterzed

2 x 1, y 2 x 1, y 1 x 2, y 2 x 2, y 1 x 3, y 2 x 3, y 1 Fgure 1. All possble algnments for x = {x 1, x 2, x 3} and y = {y 1, y 2}, where x and y j are denoted as members. by ther types and tme stamps. (x 1, y 1 ), (x 1, y 2 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 2, y 2 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 3, y 2 ) (x 1, y 1 ), (x 2, y 1 ), (x 3, y 1 ), (x 3, y 2 ) The smlarty of two sequences s a functon of parwse smlarty of sequence members. Thus, the smlarty of two sequences s hgher f they have hgh overall parwse smlarty values. A global algnment kernel has been proposed n (Cutur et al., 2007), whch uses dynamc programmng to compute the smlarty of all possble algnments of two sequences. We use a varaton of ths algorthm as detaled n Algorthm 1, where we employ a parwse heat kernel that s based on the Mahalanobs dstance and dfferences of tme stamps. The sequence algnment kernel for two sequences of length, respectvely, m and n, s gven as k(x, Y) = T n+1,m+1. Ths kernel consders all possble algnments of tme stamps of the two sequences, sums these terms weghted by the parwse kernel functon, κ(x, y j ). Here κ(x, y j ), measures the smlarty of two tme stamped message events x and y j, and each such vector ncorporates the qualfer for the type of message one of the d possble message types) and the tme of arrval of the message. After the kernel matrx for all user pars s obtaned, we unt-dagonal normalze the kernel matrx n order to elmnate scalng ssues: k (X, Y) = k(x, Y) k(x, X) k(y, Y) k (X, Y) [0, 1] (1) Algorthm 1 Global Algnment Kernel 1: For any two gven user behavor sequences X = (x 1,..., x n ), X R (d+1) n and Y = (y 1,..., y m ), Y R (d+1) m n a state space Ψ, create T R (n+1) (m+1). 2: Set the members n the frst row and n the frst column of T to zero (T 1,: = T :,1 = 0). Set T 1,1 = 1. 3: for = 2 to n + 1 do 4: for j = 2 to m + 1 do 5: T,j = (T,j 1 +T 1,j 1 +T 1,j )κ(x 1, y j 1 ) 6: end for 7: end for 8: Return T n+1,m+1 After ths normalzaton, smlar behavng user pars get values close to 1 and the dssmlar pars get values close to 0. Each users network actons are characterzed by the multtme seres, each seres correspondng to the ordered tmestamped sequence of one type of message. At any one tme at most one type of message can be sent. Thus, for a message vector x = [x 1, x 2,..., x d ], x s {0, 1} and s x s = 1, where d s the number of message types. Wthn an observaton nterval, users can send arbtrary number of dfferent messages so that messagng event sequences can have dfferent lengths. A kernel functon (the parwse heat functon) for any two tme-stamped message vector, x = (x, t x ) and y j = (y j, t y j ) s evaluated as: κ((x, t x ), (y j, t y j )) = exp( γd(x, y j) ρ t x t y j ) (2) where D(x, y j ) s a dstance functon such as Eucldean or Mahalanobs dstance. The squared Mahalanobs dstance for a gven Mahalanobs matrx, M, can be evaluated as follows: D(x, y j) = (x y j) M(x y j) (3) Note that κ((x, t x ), (y j, t y j )) = 1 ff x == y j and t x == t y j. 3. Spectral Clusterng A smlarty matrx s created of the users from the parwse user-to-user smlartes as n Equaton 1. The smlarty matrx then corresponds to a weghted adjacency graph. In order to partton ths graph such that users wth smlar messagng behavor are collected n the same sub-graph. To ths effect, we have used a spectral clusterng algorthm. Such algorthms are conceved to realze graph parttonng solutons n clusterng problems, and n the lterature there are varous spectral clusterng algorthms (Luxburg, 2007).

3 We have appled the normalzed spectral clusterng algorthm over the kernel matrx obtaned from the user behavors, K (a U U matrx where U s the set of users). Ths matrx s also nterpreted as the weghted adjacency matrx (Sh & Malk, 2000) of a fully connected graph. Each user s a vertex n ths graph whle the edge between two users s ther messagng behavor smlarty. We am to partton the graph nto two sub-graphs such that the malcous users, typcally synchronzed and organzed, fall nto one cluster, and the rest s n the other cluster. The degree of l th user s evaluated as: U d l = K (l, u) (4) u=1 The degree matrx D s a dagonal matrx whose dagonal elements conssts of degree values, d 1, d 2,..., d U. The Laplacan matrx s evaluated as n Equaton 5 and spectral clusterng algorthm s gven n Algorthm 2. L = D K (5) concentraton to malcous users. Ths algorthm based on the heurstcs that malcous users must be somewhat coordnated to mount an attack and therefore the data vectors must concentrate along a few egenvectors s gven n Algorthm 3. Algorthm 3 Cluster Selecton Heurstcs 1: For the gven cluster label vector C, determne the two clusters, C 1 and C 2. 2: For the two clusters, evaluate the sample co-varance matrx of message vectors. 3: f a cluster has 0 co-varance matrx then 4: Return the cluster wth 0 co-varance matrx. 5: else 6: Evaluate the egenvalues of the cluster co-varance matrces. 7: For each matrx, evaluate the proportonal egenvalues wth respect to the total sum of egenvalues. 8: Return the cluster wth the hghest maxmum proportonal egenvalue. 9: end f Algorthm 2 Normalzed Laplacan Spectral Clusterng 1: Gven K, evaluate D and L, whch are all n R U U. 2: Compute the frst two egenvectors v 1 and v 2 of the two smallest egenvalues 0 = λ 1 < λ 2 for the generalzed egenproblem Lv = λdv. 3: Augment v 1 and v 2 to obtan V R U 2. Use the rows of V as the new feature vectors n the mapped space, y R 2. Apply k-means clusterng wth k = 2. 4: Return the cluster label vector C from k-means clusterng. 4. Assgnment of Malcous Users to a Cluster We ntend to cluster the users nto two sets: Potentally malcous users, characterzed by repettve and correlated behavors, and the rest of users, characterzed by uncoordnated and dverse behavors. Once the two clusters are formed, then the fnal task s that of determnng that of attackers, for whch we use a heurstc algorthm. For each of the two clusters, we compute the sample covarance matrx of the user message sequence vectors n that cluster. Recall that the elements of vectors conssts of the message types and ther tme stamps. Snce the malcous user cluster s assumed to consst of smlar messagng behavors, such message vectors are expected to be more strongly algned along a few partcular axes. In fact, n the extreme case when all messages n the cluster are of the same type and are perfectly synchronzed, the sample co-varance matrx would be the 0 matrx. Therefore, we assgn the cluster wth sgnfcantly hgher egenvalue Puttng all of these steps together, the algorthm to dscrmnate the malcous users s summarzed n Algorthm 4.. Algorthm 4 Potental Malcous Users Dscrmnaton 1: Set the weght parameters γ and ρ of the parwse heat kernel. 2: Evaluate the kernel matrx K such that (U, U j ) U U, we have K,j = k(u, U j ) as defned n Algorthm 1, where U, U j are the tme-stamped message sequences of th and j th users, respectvely and U s the set of all user sequences. 3: Unt-dagonal normalze K to obtan K. 4: Apply symmetrc normalzed Laplacan spectral clusterng over K such that # clusters = 2, as defned n Algorthm 2. 5: Use cluster label vector C returned by spectral clusterng n clusterng selecton heurstc as defned n Algorthm 3. 6: Return the cluster selected by the heurstcs as the set of malcous users. 5. Experments To evaluate the performance of the proposed algorthm we mplement a smulaton setup, where we create varable length sequences for the normal and malcous users (attackers). In our setup, we assume that n any nstance of attack, the attackers choose and send one type of message, and furthermore ther tmngs are very close. We use the Mahalanobs dstance n Equaton 3, whch s calculated as

4 the nverse of the sample co-varance matrx of the number of messages observed wthn a tme nterval (M = Σ 1 ). In the smulatons, the system s sampled at 1 second ntervals. Users can choose from 5 dfferent types of messages and they can send from 1 up to 5 messages of any type n a 1 second nterval. We have set the attack strength to three levels n terms of the number of messages an attacker can send: Low-level (3-10), md-level (5-10) and hgh-level (10-15). The smulaton envronment s dmensoned for 100 users n the system. We have demonstrated the performance of the malcous user detecton system as a functon of varatons n the attack duraton, the proporton of attackers and the magntude of attack. The attack duraton s represented as at whch nterval quarter the attack starts. The attack can start at tme 0.0; 0.25; 0.5; 0.75 second wthn a tme nterval of 1 second. Snce we know the labels n the smulated data, we can show the performance of the proposed system n terms F- Measure. The deal case would be when F-measure s 1, whch can be obtaned only when there s no falsely accused attackers (.e., P = 1) and all the attackers are dentfed. Precson (P) = # assgned true attackers # assgned attackers Recall (R) = # assgned true attackers # all attackers F-Measure (F) = 2 P R P + R Fgure 2 shows an example where our algorthm has successfully detected the malcous user groups accordng to the computed kernel. The uppermost sub-fgure s the ground-truth label matrx (K,j = 1 f and only f both u and u j are attackers). The second (md) sub-fgure s the computed kernel matrx. The bottom sub-fgure shows the cluster label matrx obtaned accordng to the Algorthm 4. Fgure 3 shows the effect of attack duraton on the detecton performance. Recall that, ndependent of the duraton of the attack, the number of messages that an attacker sends s wthn a fxed nterval. Thus, f the attack duraton s long (e.g., attack starts at 0.25 sec) then the messages are more dspersed n tme; on the contrary, f the attack duraton s short (e.g., attack starts at 0.75 sec), then all messages are concentrated wthn a shorter nterval and our algorthm can detect them more accurately, snce the parwse heat kernel returns hgher values when the messages have been sent wth close tmngs. The effect of ncreased attacker number s shown n Fgure 4. The hgher the number of attackers n the system, the more accurately the algorthm detects them. It detects all (6) (7) (8) Fgure 2. Detected attackers on smulated data usng spectral clusterng Fgure 3. The Effect of Attack Duraton for Fxed Number Attackers the attackers almost wthout any false alarms. Not surprsngly, n both cases, the attackers are detected more accurately when the ntensty of the attack becomes hgher. 6. Concluson and Future Work We have proposed a novel method to fnd the group of attackers wthn a group of users and tested t usng smulaton data. The attackers are characterzed by coordnated message sendng behavors, smlar to the botnet DDoS attacks. The proposed method dscrmnates the attackers from the vctms usng smlartes between them. Each user s regarded as a tme seres where each message s represented as a unt vector. A sequence algnment kernel s used to measure smlarty between the message sequences and ther tmngs. Then the users are clustered nto two groups usng spectral clusterng. Fnally, a heurstcs s appled for autonomous attacker cluster selecton. The performance of the proposed method mproves f the attackers send hgh number of messages or they send the messages n bursts n small tme ntervals. Smlarly, the method performs more accurately f the number of attackers ncrease.

5 Luxburg, U. A tutoral on spectral clusterng. Statstcs and Computng, 17(4): , Oates, T., Frou, L., and Cohen, P.R. Clusterng tme seres wth hdden markov models and dynamc tme warpng. In Proceedngs of the IJCAI-99 Workshop on Neural, Symbolc, and Renforcement Learnng Methods for Sequence Learnng, Fgure 4. The Effect of the Number of Attackers for a Fxed Attack Duraton Acknowledgements Ths study s a Bogazc Unversty - NETAS collaboraton and t s funded wth TEYDEB project number , Realzaton of Anomaly Detecton and Preventon wth Learnng System Archtectures, Qualty Improvement, Hgh Rate Servce Avalablty and Rch Servces n a VoIP Frewall Product, by the Scentfc and Technologcal Research Councl Of Turkey (TUBITAK). NOVA V- Gate s a trademark cyber-securty product of NETAS. Sh, J. and Malk, J. Normalzed cuts and mage segmentaton. IEEE Transactons on Pattern Analyss and Machne Intellgence, 22(8): , Svaramakrshnan, K. R., Karthk, K., and Bhattacharyya, C. Kernels for large margn tme-seres classfcaton. In 2007 Internatonal Jont Conference on Neural Networks, pp , Aug Xong, Y. and Yeung, D.-Y. Mxtures of arma models for model-based tme seres clusterng. In Proceedngs of the IEEE Internatonal Conference on Data Mnng, Zhang, X., Lu, J., Du, Y., and Lv, T. A novel clusterng method on tme seres data. Expert Systems wth Applcatons, 38(9): , References Chen, H., Tang, F., Tno, P., and Yao, X. Model-based kernel for effcent tme seres analyss. In Proceedngs of the 19th ACM SIGKDD Internatonal Conference on Knowledge Dscovery and Data Mnng, KDD 13, pp , New York, NY, USA, ACM. Cutur, M. Fast global algnment kernels. In Proceedngs of the 28th Internatonal Conference on Machne Learnng, ICML 2011, Bellevue, Washngton, USA, June 28 - July 2, 2011, pp , Cutur, M., Vert, J. P., Brkenes, O., and Matsu, T. A kernel for tme seres based on global algnment. In Proceedngs of IEEE Internatonal Conference on Acoustcs, Speech and Sgnal Processng 2007 (ICASSP 07), volume 2, pp , Gupta, M., Gao, J., Aggarwal, C. C., and Han, J. Outler detecton for temporal data: A survey. IEEE Transactons on Knowledge and Data Engneerng, 26(9): , Hyndman, R. J., Wang, E., and Laptev, N. Large-scale unusual tme seres detecton. In IEEE Internatonal Conference on Data Mnng Workshop, ICDMW 2015, Atlantc Cty, NJ, USA, November 14-17, 2015, pp , 2015.

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Graph-based Clustering

Graph-based Clustering Graphbased Clusterng Transform the data nto a graph representaton ertces are the data ponts to be clustered Edges are eghted based on smlarty beteen data ponts Graph parttonng Þ Each connected component

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

LECTURE : MANIFOLD LEARNING

LECTURE : MANIFOLD LEARNING LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

A Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning

A Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Online Detection and Classification of Moving Objects Using Progressively Improving Detectors

Online Detection and Classification of Moving Objects Using Progressively Improving Detectors Onlne Detecton and Classfcaton of Movng Objects Usng Progressvely Improvng Detectors Omar Javed Saad Al Mubarak Shah Computer Vson Lab School of Computer Scence Unversty of Central Florda Orlando, FL 32816

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Image Alignment CSC 767

Image Alignment CSC 767 Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances

More information

Intelligent Information Acquisition for Improved Clustering

Intelligent Information Acquisition for Improved Clustering Intellgent Informaton Acquston for Improved Clusterng Duy Vu Unversty of Texas at Austn duyvu@cs.utexas.edu Mkhal Blenko Mcrosoft Research mblenko@mcrosoft.com Prem Melvlle IBM T.J. Watson Research Center

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines (IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Herarchcal Web Page Classfcaton Based on a Topc Model and Neghborng Pages Integraton Wongkot Srura Phayung Meesad Choochart Haruechayasak

More information

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based

More information

USING LINEAR REGRESSION FOR THE AUTOMATION OF SUPERVISED CLASSIFICATION IN MULTITEMPORAL IMAGES

USING LINEAR REGRESSION FOR THE AUTOMATION OF SUPERVISED CLASSIFICATION IN MULTITEMPORAL IMAGES USING LINEAR REGRESSION FOR THE AUTOMATION OF SUPERVISED CLASSIFICATION IN MULTITEMPORAL IMAGES 1 Fetosa, R.Q., 2 Merelles, M.S.P., 3 Blos, P. A. 1,3 Dept. of Electrcal Engneerng ; Catholc Unversty of

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Fitting & Matching. Lecture 4 Prof. Bregler. Slides from: S. Lazebnik, S. Seitz, M. Pollefeys, A. Effros.

Fitting & Matching. Lecture 4 Prof. Bregler. Slides from: S. Lazebnik, S. Seitz, M. Pollefeys, A. Effros. Fttng & Matchng Lecture 4 Prof. Bregler Sldes from: S. Lazebnk, S. Setz, M. Pollefeys, A. Effros. How do we buld panorama? We need to match (algn) mages Matchng wth Features Detect feature ponts n both

More information

Machine Learning. Topic 6: Clustering

Machine Learning. Topic 6: Clustering Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Webpage Similarity Measure for Web Sessions Clustering Using Sequence Alignment

A Webpage Similarity Measure for Web Sessions Clustering Using Sequence Alignment A Webpage Smlarty Measure for Web Sessons Clusterng Usng Sequence Algnment Mozhgan Azmpour-Kv School of Engneerng and Scence Sharf Unversty of Technology, Internatonal Campus Ksh Island, Iran mogan_az@ksh.sharf.edu

More information

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 15

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 15 CS434a/541a: Pattern Recognton Prof. Olga Veksler Lecture 15 Today New Topc: Unsupervsed Learnng Supervsed vs. unsupervsed learnng Unsupervsed learnng Net Tme: parametrc unsupervsed learnng Today: nonparametrc

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervsed Learnng and Clusterng Supervsed vs. Unsupervsed Learnng Up to now we consdered supervsed learnng scenaro, where we are gven 1. samples 1,, n 2. class labels for all samples 1,, n Ths s also

More information

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity ISSN(Onlne): 2320-9801 ISSN (Prnt): 2320-9798 Internatonal Journal of Innovatve Research n Computer and Communcaton Engneerng (An ISO 3297: 2007 Certfed Organzaton) Vol.2, Specal Issue 1, March 2014 Proceedngs

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Discriminative Dictionary Learning with Pairwise Constraints

Discriminative Dictionary Learning with Pairwise Constraints Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

A Genetic Programming-PCA Hybrid Face Recognition Algorithm

A Genetic Programming-PCA Hybrid Face Recognition Algorithm Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume

More information

C. Markert-Hahn, K. Schiffl, M. Strohmeier, Nonclinical Statistics Conference,

C. Markert-Hahn, K. Schiffl, M. Strohmeier, Nonclinical Statistics Conference, Roche Pharma Producton Penzberg Practcal Applcatons of Statstcal Process Control C. Markert-Hahn, K. Schffl, M. Strohmeer, Roche Dagnostcs GmbH, Penzberg Operatonal Excellence Statstcs Nonclncal Statstcs

More information

A B-Snake Model Using Statistical and Geometric Information - Applications to Medical Images

A B-Snake Model Using Statistical and Geometric Information - Applications to Medical Images A B-Snake Model Usng Statstcal and Geometrc Informaton - Applcatons to Medcal Images Yue Wang, Eam Khwang Teoh and Dnggang Shen 2 School of Electrcal and Electronc Engneerng, Nanyang Technologcal Unversty

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Similarity Measure Method for Symbolization Time Series

A Similarity Measure Method for Symbolization Time Series Research Journal of Appled Scences, Engneerng and Technology 5(5): 1726-1730, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scentfc Organzaton, 2013 Submtted: July 27, 2012 Accepted: September 03, 2012

More information

Finding Repetitive Patterns in 3D Human Motion Captured Data

Finding Repetitive Patterns in 3D Human Motion Captured Data Fndng Repettve Patterns n 3D Human Moton Captured Data Ka-Ta Tang Department of Computer Scence, Cty Unversty of Hong Kong, Hong Kong tjeff@ctyu.edu.hk Howard Leung Department of Computer Scence, Cty Unversty

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Lecture 13: High-dimensional Images

Lecture 13: High-dimensional Images Lec : Hgh-dmensonal Images Grayscale Images Lecture : Hgh-dmensonal Images Math 90 Prof. Todd Wttman The Ctadel A grayscale mage s an nteger-valued D matrx. An 8-bt mage takes on values between 0 and 55.

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

From Comparing Clusterings to Combining Clusterings

From Comparing Clusterings to Combining Clusterings Proceedngs of the Twenty-Thrd AAAI Conference on Artfcal Intellgence (008 From Comparng Clusterngs to Combnng Clusterngs Zhwu Lu and Yuxn Peng and Janguo Xao Insttute of Computer Scence and Technology,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults 1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

K-means Optimization Clustering Algorithm Based on Hybrid PSO/GA Optimization and CS validity index

K-means Optimization Clustering Algorithm Based on Hybrid PSO/GA Optimization and CS validity index Orgnal Artcle Prnt ISSN: 3-6379 Onlne ISSN: 3-595X DOI: 0.7354/jss/07/33 K-means Optmzaton Clusterng Algorthm Based on Hybrd PSO/GA Optmzaton and CS valdty ndex K Jahanbn *, F Rahmanan, H Rezae 3, Y Farhang

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information