IFRAT: An IoT Field Recognition Algorithm based on Time-series Data

Size: px
Start display at page:

Download "IFRAT: An IoT Field Recognition Algorithm based on Time-series Data"

Transcription

1 IFRAT: An IoT Field Algorithm based on Time-series Data Shuai Guo, Zhongwen Guo, Zhijin Qiu, Yingjian Liu and Yu Wang Ocean University of China, Qingdao, Shandong, China University of North Carolina at Charlotte, Charlotte, North Carolina, USA Taiyuan University of Technology, Taiyuan, Shanxi, China Abstract The increasing interest in integration of Internet of Things (IoT) heterogeneous data has resulted in the introduction of a variety of systems designs and schema matching algorithms However, numerous algorithms for schema matching fail to process automatically and efficiently because of the unknown of data sources schema In this paper, we attempt to solve this problem by introducing a new algorithm that could recognize the field of data source through its large collections of timeseries data By knowing the field forward, we could get the basic schema, which makes great contribution to schema matching afterwards Our algorithm has a good advantage at extracting characteristics of time series data and cluster them by using the self-organizing map (SOM) Then we apply clustering results to recognize IoT fields and devices when a new unknown dataset is coming We demonstrate the utility and efficiency of our algorithm with a set of comprehensive experiments on real datasets from several fields The results show that our algorithm has good performance and efficiency Index Terms IoT, Heterogeneous data, Time-series data, Selforganizing map, Schema matching I INTRODUCTION With the rapid development of Internet of Things (IoT) technology and wide acceptance of the concept of Internet Plus, IoT [1] is transforming from fragmentation and isolation to integration and interconnection Everything in the world is going to interconnecting via IoT and Internet IoT technologies have been widely utilized in many fields, such as smart home, intelligent transportation, smart grid, and health care [2] [6], which generate massive heterogeneous data However, most of heterogeneous data of IoT are stored independently In order to take the most advantage of these data, more and more researchers devote to the study of data integration, which is defined as a problem of combining data from different sources [7] One of the main tasks in the design of data integration systems is to establish the mapping between the sources and the global schema There are a few approaches to deal with data integration such as both-as-view(bav), global-as-view(gav), local-as-view(lav) and global-local-as-view(glav) [8] Database schema matching plays an important role in the process of data integration, drawing much researchers attention Although we can integrate IoT heterogeneous data by standardizing data interface, it is hard to implement in practice because of the high cost of reforming database schema In a word, it is inevitable to deal with IoT heterogeneous data, whose characteristics are as follows: (1) wide data sources and diversified structures, (2) high growth, (3) time series, (4) noisy data The techniques of database schema matching provide a good solution to solve the problems More specifically, the approach based on time-series data is suitable to the characteristics of IoT heterogeneous data Many researchers use artificial neural network to analyze time-series data due to its good performance The self-organizing map (SOM) [9] is an unsupervised learning algorithm which is good at clustering and producing a low-dimensional representation of the input space of the training samples It differs from other artificial neural networks as they apply competitive learning as opposed to error-correction learning and use a neighborhood function to preserve the topological properties of the input space Based on the techniques mentioned above and the characteristics of IoT heterogeneous data, in our previous work [10] we have built an IoT-oriented heterogeneous data conversion model, which could make the integration process faster and more efficient However, in our model, the schema matcher has high artificial participation Therefore, we need to find an automatic approach to realize schema matching The first obstacle we have to get through is how to get the characteristics of schema of an unknown data source Every data source from different IoT fields has its own basic characteristics of schema and all the information is hidden in the time-series data In this paper, we design an algorithm to analyze time-series data of IoT, predict what kinds of devices are utilized and which field those data most likely come from Once we know the field, we could get the basic characteristics of schema, which play an important role in schema matching afterwards We make the following contributions in this paper: We analyze the characteristics of IoT heterogeneous data and design a data preprocessor for time-series data By analyzing preprocessed data, we find the correlation among different sensors in one device and turn the correlation into a mathematical model Based on numerical distribution characteristics of preprocessed data, we extract feature vectors as the input vectors of SOM By leveraging SOM, we improve the efficiency of data clustering From clustering results, we can calculate the similarity between incoming dataset and clustering results In the end, we fulfill the recognition of IoT fields and devices

2 The remaining of this paper is organized as follows Section II introduces some related work about data mining and time-series data analysis Section III details the design of proposed algorithm, which could recognize IoT field (here the IoT field may be one specific part of a big IoT field) by mining time-series data Section IV demonstrates the utility and efficiency of our algorithm with a set of comprehensive experiments on real datasets from several fields Finally, Section V gives a brief conclusion and possible direction of future work II RELATED WORK The huge heterogeneous data generated by the Internet of Things (IoT) are considered of high value, and a lot of researchers are dedicated to improving data mining algorithms for IoT, with a goal to obtain the information hidden in the data of IoT For example, He et al [11] present an intelligent parking and maintenance cloud service by mining vehicle data Qiu et al [12] utilize PCA-ELM classifier to analyze data and solve problems from fault identification of Tennessee Eastman process In this paper, we are trying to realize field recognition of IoT by analyzing time-series data Time-series analysis methods and techniques for analyzing time-series data are utilized to extract meaningful characteristics of data, such as finding similar time-series [13], subsequence searching in time-series [14], dimensionality reduction [15] and so on To recognize IoT field, we first need to recognize features of data of IoT devices and sensors Ding et al [16] focus on the discovery of semantic correspondence among multiple attributes of sensors data, deem every attribute as vector and cluster them to find similarity However, in most cases we are not able to get the attributes of IoT sensors data Even if we can, its not efficient because we have to do too much preprocess work to analyze all attributes manually Li and Liu [17] automatically fulfill sensor matching based on BP neural network, by analyzing the characteristics of data value distribution But it can only be applied to one-on-one sensor matching To fulfill IoT fields recognition, we have to extract the characteristics of IoT devices, which contain many sensors III IFRAT ALGORITHM The overview of IFRAT architecture is shown in Fig 1 IFRAT is capable of recognizing the IoT field by analyzing the time-series data Firstly, we preprocess training data and replace the original value of time-series data with the rate of data change Next, we extract the characteristics of numerical distribution from the preprocessed data and set them as feature vectors Then we utilize SOM to cluster these feature vectors In the end, we calculate similarity to recognize the IoT fields and devices A Data Preprocessing For every sensor of one IoT device, they have their own different units and value ranges Therefore, it is difficult to find the correlation among different sensors by comparing the value Training Dataset Unknown Dataset Data Preprocessor Feature Extractor SOM Network Similarity Compare Fig 1: Architecture overview of IFRAT Result of data In this paper, we use data change rate to replace raw data, taking sampling time into account, which makes it much easier to establish certain correlation of every sensor within one IoT device Our data preprocessor works as following steps At first, we make several definitions for the symbols used throughout this paper: F represents a certain IoT field D represents a set of all the devices used in F, and D = {d 1, d 2, d 3, } For any device d in D, we denote S as a set of all the sensors of d, and S = {s 1, s 2, s 3, } For a time-series data A from IoT field F, its time-series set is T = {t 1, t 2, t 3,, t m } A can be made into a two-dimensional matrix, which could be separated into many small matrixes A d by device d in D We assume A d has n sensors a i represents time-series data of sensor s i during T a 11 a 12, a 1n A d = (a 1, a 2, a 3,, a n ) = a 21 a m,1 a m,n (1) We definite a (m 1) n matrix B d, for each b ij in B d, b ij = (a i+1,j a ij )/(t i+1,j t ij ), thus every entry in B d is the rate of data change We specify B d as data change matrix, which reflects the features of A d For each device d in D, we implement the same math above and get every matrix B d of corresponding devices in D b 11 b 12 b 1n B d b = (b 1, b 2, b 3,, b n ) = 21 b m 1,1 b m 1,n (2) B Extracting Feature Vectors We extract feature vectors x of B d so that we could use x to represent the features of the entries in B d Our approach is relied on a notion of numerical distribution characteristics For all the entries in each row of B d, we calculate C 2 n to get all the combinations The combination result has six cases by looking at the positive and negative status of the data in B d : (negative, negative), (negative, 0), (negative, positive),

3 Input layer Computational layer Fig 2: Architecture of SOM neural network Algorithm 1: M ax/m in Algorithm Input: Matrix X Output: Max/Min features of the input matrix 1 Calculate Euclidean distance (ED) of every two vectors in this matrix 2 Choose Max(ED) and Min(ED), assume their pairs of vectors are (v 1, v 2 ) and (v 3, v 4 ) 3 Return {(ED v1 v 2, cos θ v 1 v 2), (ED v 3 v 4, cos θ v 3 v4)} as the features of the input matrix Here ED vi v j and θ v i v j are the ED and angle between vectors v i and v j (0, 0), (0, positive), (positive, positive) We go through all the combinations, count every time when any case happens and calculate the frequency of each case Then we put the results into vector P = {p 1, p 2, p 3, p 4, p 5, p 6 } as part of the features of B d Meanwhile, we get the maximum and minimum values of all the data in B d, dividing the region (min, max) into k parts and the length of each k: k = (max min)/k We go through all the data in B d, count every time when it falls in corresponding part and calculate the frequency at the end of counting each corresponding part We put the result into vector Q = {q 1, q 2, q 3,, q k } Finally we get our feature vector x of B d by combing P and Q After getting all the feature vectors of every B d for time-series data A, we can get feature vector matrix X = {x 1, x 2, x 3,, x r }, where r is the number of devices in D F C Training Algorithm In terms of feature vector matrix X, we cluster all the vectors in it by using SOM algorithm [9] Compared with k-means algorithm, SOM algorithm do not need to set the number of classes in clustering results, thus can be more slightly affected by using a wrong initial value The basic training steps of SOM algorithm are as follows Step 1: We use feature vector x i in matrix X = {x i : i = 1, 2,, r} as our input vector and build a two-dimensional computational layer with m 2 neurons The connection weights between the input units i and the neurons j in the computation layer can be written as w j = {w ji : i = 1, 2,, r; j = 1, 2,, m 2 } Initially, every weight vectors w j are set with random number in (0, 1) Then set winning region N(0) j and learning rate ρ [9] Step 2: Randomly choose input vector x i from matrix X = {x i : i = 1, 2,, r} where r is the number of neurons in input layer (also the number of devices in D F ) Step 3: Find the winning neuron I(x) We calculate the Euclidean distance between x i and w j, and choose the smallest distance as winning neuron r Min( (x i, w ji ) 2 ) I(x) (3) i=1 Step 4: Definite winning region N(t) j around the winning neuron [9] Step 5: Update the weight as follows: w ji = ρ(t)w j,i(x)) (t)(x i w ji ) (4) w j (t + 1) = w j (t) + w j (5) Step 6: Keep returning to Step 2 until the feature map (ie, weights) stops changing D of IoT Device and Field After training, we have clustering center set C F = {c 1, c 2, c 3, } of IoT field F Eventually, we could get several clustering centers of IoT fields we want, which occupy a significant position in recognizing IoT devices or fields 1) of IoT Field: When a dataset is coming and unknown about its IoT field, we first extract its features to generate feature vector matrix X = {x i : i = 1, 2, } Then utilize Algorithm 1 to get Max/Min features of input matrix X Then, for every clustering center set C of IoT fields F, use the same approach to get its Max/Min features (target features) Finally calculate the similarity of those target features and the features of X by using Euclidean distance, and get the optimal matching, which is most similar to X Fig 3 illustrates the whole procedure 2) of IoT Device: After we know the field of dataset, we can use that information to recognize what kinds of devices they have When a dataset is coming and it is from IoT field F with clustering center C F = {c j : j = 1, 2, }, firstly extract its features to generate feature vector matrix X = {x i : i = 1, 2, } For each c j in C F, calculate the Euclidean distance between x i and c j, then choose the smallest distance We can recognize every device in the dataset and their basic type, which could be used to do the matching X C F1 C F2 C F3 C F Max/Min Algorithm Similarity Calculator Fig 3: of IoT field Result

4 Xr X2 X1 C F c 1 c 2 c 3 c j x1 Similarity Calculator x2 x3 Fig 4: of IoT device TABLE I: Characteristics of household appliances data IFRAT Statistics MX100 PV190 WT550 (negative,negative) 191% 068% 872% (negative,0) 1093% 1382% 2253% (negative,positive) 025% 116% 781% (0,0) 7265% 6984% 3282% (0,positive) 1175% 1373% 2054% (positive,positive) 251% 077% 758% Value Distribution Statistics MX100 PV190 WT550 (0,025) 64% % (025,05) 198% % (05,075) 4519% 6416% 046% (075,1) 2864% 3584% 3414% Max value Min value afterwards Fig 3 depicts that x 1 most likely comes from c 2, the same with x 2 to c 1 and so on IV EXPERIMENT AND EVALUATION To demonstrate the utility and efficiency of IFRAT algorithm, we have chosen to leverage real life datasets from the fields of household appliances testing and ocean observation Both datasets are obtained by our research group The first datasets are from the test of fridges freezing capacity during April and May in 2016, which includes several IoT devices such as MX100, PV190 and WT550 The second datasets are from the observation of ocean energy generating test sites during August in 2015, which includes several ocean observation devices such as CTD, Wave Buoy and Wave Rider We utilize 80% data as training data and 20% data as testing data Table I and Table II are the results of characteristics of data preprocessed by IFRAT It is obvious from the results of IFRAT statistics that MX100 is similar to PV190 and there is a higher similarity between Wave Buoy and Wave Rider, which really match the facts Compare to value distribution method, IFRAT method is better at extracting the characteristics of data from IoT devices A Performance of Clustering After preprocessing data by IFRAT, we set the results of IFRAT statistics as input feature vectors of SOM algorithm As shown in Fig 5, SOM algorithm has better performances at clustering IoT data than K-Means algorithm x2 x1 xi x3 TABLE II: Characteristics of ocean observation data IFRAT Statistics CTD Wave Buoy Wave Rider (negative,negative) 1786% 1192% 1523% (negative,0) 913% 2130% 1945% (negative,positive) 3294% 2503% 2682% (0,0) 622% 556% 3890% (0,positive) 1217% 2352% 1822% (positive,positive) 2168% 1267% 1638% Value Distribution Statistics CTD Wave Buoy Wave Rider (0,025) 66% 8626% 382% (025,05) 2107% 605% 2833% (05,075) 994% 0 0 (075,1) 299% 769% 3347% Max value Min value TABLE III: Evaluation results on data recognition IFRAT(SOM) DVD(SOM) IFRAT(K-Means) Precision 8012% 7035% 7722% Recall 7033% 6339% 6853% B Evaluation on IoT Data We utilize 20% of all the datasets as test data, which contains 20 datasets from the two fields above To evaluate the quality of data recognition, we use the following two indexes: 1) Precision ratio: P recision = T/P = T/(T + F ) 2) Recall ratio: Recall = T/R Here, T, P, R, F are defined as follows: T : right recognition of matching result P : matching result from IFRAT algorithm R: manual matching result F : wrong matching result As shown in Table III and Fig 6, IFRAT has better precision and recall ratio compared by only data value distribution (DVD) method with SOM and IFRAT with K-Means V CONCLUSION In this paper, we analyze the characteristics of IoT heterogeneous data and design a new IoT field recognition method, IFRAT, for time-series data In IFRAT, by analyzing preprocessed data, we find the correlation among different sensors in one device Based on numerical distribution characteristics of preprocessed data, IFRAT extracts feature vectors as the input vectors of SOM, which improves the efficiency of data clustering Via calculating the similarity between incoming dataset and clustering results, IFRAT fulfill the recognition of IoT field and devices IFRAT shows good performances of extracting features from time-series data and clustering them by using SOM algorithm The next step, after knowing the field of coming data source, we will focus on automatic schema matching ACKNOWLEDGMENT Shuai Guo and Zhijin Qiu are supported by the fellowship from the China Scholarship Council (CSC) under Nos

5 (a) Household appliance + IFRAT (b) Ocean observation + IFRAT (c) Household appliance + K-means (d) Ocean observation + K-means Fig 5: Clustering results of household appliance and ocean observation testing data trained by K-Means and SOM Fig 6: Comparison of different methods by precision and recall ratio on data recognition and This work is also partially supported by the National Natural Science Foundation of China under Nos , and REFERENCES [11] W He, G Yan, and L Da Xu, Developing vehicular data cloud services in the IoT environment, IEEE Transactions on Industrial Informatics, vol 10, no 2, pp , 2014 [12] R Qiu, K Liu, H Tan, and L Jun, Classification algorithm based on extreme learning machine and its application in fault identification of Tennessee Eastman process, Journal of ZheJiang University, vol 50, no 10, pp , 2016 [13] R A K-l Lin and H S S K Shim, Fast similarity search in the presence of noise, scaling, and translation in time-series databases, in Proceeding of the 21th International Conference on Very Large Data Bases, 1995, pp [14] T Rakthanmanon, B Campana, A Mueen, G Batista, B Westover, Q Zhu, J Zakaria, and E Keogh, Addressing big data time series: Mining trillions of time series subsequences under dynamic time warping, ACM Transactions on Knowledge Discovery from Data (TKDD), vol 7, no 3, p 10, 2013 [15] V Megalooikonomou, G Li, and Q Wang, A dimensionality reduction technique for efficient similarity analysis of time series databases, in Proceedings of the 13th ACM international conference on Information and knowledge management ACM, 2004, pp [16] G Ding, Y Xu, and J Guo, Multi-schema matching based on DBscan clustering algorithm, Computer Applications and Software, vol 33, no 2, 2016 [17] Y Li and D Liu, A method for automatic schema matching using characteristic of data distribution, Computer Science, vol 32, no 11, pp 85 86, 2005 [1] L Atzori, A Iera, and G Morabito, The internet of things: A survey, Computer networks, vol 54, no 15, pp , 2010 [2] D Miorandi, S Sicari, F De Pellegrini, and I Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks, vol 10, no 7, pp , 2012 [3] M&M Research Group and others, Internet of things (IoT) & M2M communication market-advanced technologies, future cities & adoption trends, roadmaps & worldwide forecasts , Electronics ca Publications, Tech Rep, 2012 [4] D Bandyopadhyay and J Sen, Internet of things: Applications and challenges in technology and standardization, Wireless Personal Communications, vol 58, no 1, pp 49 69, 2011 [5] J Zhao, T Jung, Y Wang, and X Li, Achieving differential privacy of data disclosure in the smart grid, in Proc of IEEE InfoCom 2014, 2014 [6] Y Wang, Y Ge, W Wang, and W Fan, Mobile big data meets cyberphysical system: Mobile crowdsensing based cyber-physical system for smart urban traffic control, in 2015 Workshop for Big Data Analytics in CPS: Enabling the Move From IoT to Real-Time Control, 2015 [7] X L Dong and D Srivastava, Big data integration, in Proc of 2013 IEEE 29th International Conference on Data Engineering (ICDE) IEEE, 2013, pp [8] M Lenzerini, Data integration: A theoretical perspective, in Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems ACM, 2002, pp [9] J Vesanto and E Alhoniemi, Clustering of the self-organizing map, IEEE Transactions on neural networks, vol 11, no 3, pp , 2000 [10] S Guo, Z Guo, N Hu, and Z Qiu, IoT-oriented heterogeneous data conversion model, Journal of Ocean University of China, to appear

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection Based on Locality Preserving Projection 2 Information & Technology College, Hebei University of Economics & Business, 05006 Shijiazhuang, China E-mail: 92475577@qq.com Xiaoqing Weng Information & Technology

More information

An Efficient Approach for Color Pattern Matching Using Image Mining

An Efficient Approach for Color Pattern Matching Using Image Mining An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,

More information

An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao1, a, Hu Jianming2, b, Zhang Yi3 and Wang Zhenyu4

An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao1, a, Hu Jianming2, b, Zhang Yi3 and Wang Zhenyu4 6th International Conference on Information Engineering for Mechanics and Materials (ICIMM 206) An ELM-based traffic flow prediction method adapted to different data types Wang Xingchao, a, Hu Jianming2,

More information

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks SOMSN: An Effective Self Organizing Map for Clustering of Social Networks Fatemeh Ghaemmaghami Research Scholar, CSE and IT Dept. Shiraz University, Shiraz, Iran Reza Manouchehri Sarhadi Research Scholar,

More information

Keywords Clustering, Goals of clustering, clustering techniques, clustering algorithms.

Keywords Clustering, Goals of clustering, clustering techniques, clustering algorithms. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey of Clustering

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

Time Series Prediction as a Problem of Missing Values: Application to ESTSP2007 and NN3 Competition Benchmarks

Time Series Prediction as a Problem of Missing Values: Application to ESTSP2007 and NN3 Competition Benchmarks Series Prediction as a Problem of Missing Values: Application to ESTSP7 and NN3 Competition Benchmarks Antti Sorjamaa and Amaury Lendasse Abstract In this paper, time series prediction is considered as

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability

Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, 1087-1102 (2009) Multi-Clustering Centers Approach to Enhancing the Performance of SOM Clustering Ability CHING-HWANG WANG AND CHIH-HAN KAO * Department

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

An Improved Document Clustering Approach Using Weighted K-Means Algorithm

An Improved Document Clustering Approach Using Weighted K-Means Algorithm An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.

More information

Energy efficient optimization method for green data center based on cloud computing

Energy efficient optimization method for green data center based on cloud computing 4th ational Conference on Electrical, Electronics and Computer Engineering (CEECE 2015) Energy efficient optimization method for green data center based on cloud computing Runze WU1, a, Wenwei CHE1, b,

More information

Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems

Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems Xiaohu Ge, Senior Member, IEEE School of Electronic Information and Communications Huazhong University of Science and

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya

More information

Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare

Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare Jingjing Wang 1, Xiaoyu Zhang 1, Jingjing Guo 1, and Jianfeng Wang 1 1 State Key Laboratory of Integrated

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

Power Load Forecasting Based on ABC-SA Neural Network Model

Power Load Forecasting Based on ABC-SA Neural Network Model Power Load Forecasting Based on ABC-SA Neural Network Model Weihua Pan, Xinhui Wang College of Control and Computer Engineering, North China Electric Power University, Baoding, Hebei 071000, China. 1471647206@qq.com

More information

COMBINED METHOD TO VISUALISE AND REDUCE DIMENSIONALITY OF THE FINANCIAL DATA SETS

COMBINED METHOD TO VISUALISE AND REDUCE DIMENSIONALITY OF THE FINANCIAL DATA SETS COMBINED METHOD TO VISUALISE AND REDUCE DIMENSIONALITY OF THE FINANCIAL DATA SETS Toomas Kirt Supervisor: Leo Võhandu Tallinn Technical University Toomas.Kirt@mail.ee Abstract: Key words: For the visualisation

More information

Network Traffic Classification Based on Deep Learning

Network Traffic Classification Based on Deep Learning Journal of Physics: Conference Series PAPER OPEN ACCESS Network Traffic Classification Based on Deep Learning To cite this article: Jun Hua Shu et al 2018 J. Phys.: Conf. Ser. 1087 062021 View the article

More information

SMART WATER MANAGEMENT PROCESS ARCHITECTURE WITH IOT BASED REFERENCE

SMART WATER MANAGEMENT PROCESS ARCHITECTURE WITH IOT BASED REFERENCE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,

More information

Data Distortion for Privacy Protection in a Terrorist Analysis System

Data Distortion for Privacy Protection in a Terrorist Analysis System Data Distortion for Privacy Protection in a Terrorist Analysis System Shuting Xu, Jun Zhang, Dianwei Han, and Jie Wang Department of Computer Science, University of Kentucky, Lexington KY 40506-0046, USA

More information

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang

More information

Intelligent Control of Micro Grid: A Big Data-Based Control Center

Intelligent Control of Micro Grid: A Big Data-Based Control Center IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Intelligent Control of Micro Grid: A Big Data-Based Control Center To cite this article: Lu Liu et al 2018 IOP Conf. Ser.: Earth

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan 5th International Conference on Civil Engineering and Transportation (ICCET 205) Traffic Flow Prediction Based on the location of Big Data Xijun Zhang, Zhanting Yuan Lanzhou Univ Technol, Coll Elect &

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Using Decision Boundary to Analyze Classifiers

Using Decision Boundary to Analyze Classifiers Using Decision Boundary to Analyze Classifiers Zhiyong Yan Congfu Xu College of Computer Science, Zhejiang University, Hangzhou, China yanzhiyong@zju.edu.cn Abstract In this paper we propose to use decision

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

Clustering Analysis based on Data Mining Applications Xuedong Fan

Clustering Analysis based on Data Mining Applications Xuedong Fan Applied Mechanics and Materials Online: 203-02-3 ISSN: 662-7482, Vols. 303-306, pp 026-029 doi:0.4028/www.scientific.net/amm.303-306.026 203 Trans Tech Publications, Switzerland Clustering Analysis based

More information

Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1

Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong

More information

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems 13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

An Efficient Learning Scheme for Extreme Learning Machine and Its Application

An Efficient Learning Scheme for Extreme Learning Machine and Its Application An Efficient Learning Scheme for Extreme Learning Machine and Its Application Kheon-Hee Lee, Miso Jang, Keun Park, Dong-Chul Park, Yong-Mu Jeong and Soo-Young Min Abstract An efficient learning scheme

More information

A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering

A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering Gurpreet Kaur M-Tech Student, Department of Computer Engineering, Yadawindra College of Engineering, Talwandi Sabo,

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,

More information

Feature Extraction in Wireless Personal and Local Area Networks

Feature Extraction in Wireless Personal and Local Area Networks Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content

More information

Design and Realization of Data Mining System based on Web HE Defu1, a

Design and Realization of Data Mining System based on Web HE Defu1, a 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Design and Realization of Data Mining System based on Web HE Defu1, a 1 Department of Quartermaster, Wuhan Economics

More information

Anomaly Detection System for Video Data Using Machine Learning

Anomaly Detection System for Video Data Using Machine Learning Anomaly Detection System for Video Data Using Machine Learning Tadashi Ogino Abstract We are developing an anomaly detection system for video data that uses machine learning. The proposed system has two

More information

American International Journal of Research in Science, Technology, Engineering & Mathematics

American International Journal of Research in Science, Technology, Engineering & Mathematics American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629

More information

Towards New Heterogeneous Data Stream Clustering based on Density

Towards New Heterogeneous Data Stream Clustering based on Density , pp.30-35 http://dx.doi.org/10.14257/astl.2015.83.07 Towards New Heterogeneous Data Stream Clustering based on Density Chen Jin-yin, He Hui-hao Zhejiang University of Technology, Hangzhou,310000 chenjinyin@zjut.edu.cn

More information

Customer Clustering using RFM analysis

Customer Clustering using RFM analysis Customer Clustering using RFM analysis VASILIS AGGELIS WINBANK PIRAEUS BANK Athens GREECE AggelisV@winbank.gr DIMITRIS CHRISTODOULAKIS Computer Engineering and Informatics Department University of Patras

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Graph projection techniques for Self-Organizing Maps

Graph projection techniques for Self-Organizing Maps Graph projection techniques for Self-Organizing Maps Georg Pölzlbauer 1, Andreas Rauber 1, Michael Dittenbach 2 1- Vienna University of Technology - Department of Software Technology Favoritenstr. 9 11

More information

A PERSONALIZED RECOMMENDER SYSTEM FOR TELECOM PRODUCTS AND SERVICES

A PERSONALIZED RECOMMENDER SYSTEM FOR TELECOM PRODUCTS AND SERVICES A PERSONALIZED RECOMMENDER SYSTEM FOR TELECOM PRODUCTS AND SERVICES Zui Zhang, Kun Liu, William Wang, Tai Zhang and Jie Lu Decision Systems & e-service Intelligence Lab, Centre for Quantum Computation

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Web-based Building Energy Consumption Monitoring and Conservation Service DONG Wei1, a

Web-based Building Energy Consumption Monitoring and Conservation Service DONG Wei1, a 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Web-based Building Energy Consumption Monitoring and Conservation Service DONG Wei1, a 1 Faculty

More information

Semi-supervised Data Representation via Affinity Graph Learning

Semi-supervised Data Representation via Affinity Graph Learning 1 Semi-supervised Data Representation via Affinity Graph Learning Weiya Ren 1 1 College of Information System and Management, National University of Defense Technology, Changsha, Hunan, P.R China, 410073

More information

Dynamic Clustering of Data with Modified K-Means Algorithm

Dynamic Clustering of Data with Modified K-Means Algorithm 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq

More information

Extending the Growing Neural Gas Classifier for Context Recognition

Extending the Growing Neural Gas Classifier for Context Recognition Extending the Classifier for Context Recognition Eurocast 2007, Workshop on Heuristic Problem Solving, Paper #9.24 14. February 2007, 10:30 Rene Mayrhofer Lancaster University, UK Johannes Kepler University

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information

Time Series Classification in Dissimilarity Spaces

Time Series Classification in Dissimilarity Spaces Proceedings 1st International Workshop on Advanced Analytics and Learning on Temporal Data AALTD 2015 Time Series Classification in Dissimilarity Spaces Brijnesh J. Jain and Stephan Spiegel Berlin Institute

More information

A PSO-based Generic Classifier Design and Weka Implementation Study

A PSO-based Generic Classifier Design and Weka Implementation Study International Forum on Mechanical, Control and Automation (IFMCA 16) A PSO-based Generic Classifier Design and Weka Implementation Study Hui HU1, a Xiaodong MAO1, b Qin XI1, c 1 School of Economics and

More information

Fabric Defect Detection Based on Computer Vision

Fabric Defect Detection Based on Computer Vision Fabric Defect Detection Based on Computer Vision Jing Sun and Zhiyu Zhou College of Information and Electronics, Zhejiang Sci-Tech University, Hangzhou, China {jings531,zhouzhiyu1993}@163.com Abstract.

More information

PATTERN RECOGNITION USING NEURAL NETWORKS

PATTERN RECOGNITION USING NEURAL NETWORKS PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION

INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION http:// INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION 1 Rajat Pradhan, 2 Satish Kumar 1,2 Dept. of Electronics & Communication Engineering, A.S.E.T.,

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Affine Arithmetic Self Organizing Map

Affine Arithmetic Self Organizing Map Affine Arithmetic Self Organizing Map Tony Bazzi Department of Electrical and Systems Engineering Oakland University Rochester, MI 48309, USA Email: tbazzi [AT] oakland.edu Jasser Jasser Department of

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:

More information

Selecting Models from Videos for Appearance-Based Face Recognition

Selecting Models from Videos for Appearance-Based Face Recognition Selecting Models from Videos for Appearance-Based Face Recognition Abdenour Hadid and Matti Pietikäinen Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P.O.

More information

Fall 2017 ECEN Special Topics in Data Mining and Analysis

Fall 2017 ECEN Special Topics in Data Mining and Analysis Fall 2017 ECEN 689-600 Special Topics in Data Mining and Analysis Nick Duffield Department of Electrical & Computer Engineering Teas A&M University Organization Organization Instructor: Nick Duffield,

More information

A Vision Recognition Based Method for Web Data Extraction

A Vision Recognition Based Method for Web Data Extraction , pp.193-198 http://dx.doi.org/10.14257/astl.2017.143.40 A Vision Recognition Based Method for Web Data Extraction Zehuan Cai, Jin Liu, Lamei Xu, Chunyong Yin, Jin Wang College of Information Engineering,

More information

Package rucrdtw. October 13, 2017

Package rucrdtw. October 13, 2017 Package rucrdtw Type Package Title R Bindings for the UCR Suite Version 0.1.3 Date 2017-10-12 October 13, 2017 BugReports https://github.com/pboesu/rucrdtw/issues URL https://github.com/pboesu/rucrdtw

More information

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation

More information

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-

More information

Data Mining Technology Based on Bayesian Network Structure Applied in Learning

Data Mining Technology Based on Bayesian Network Structure Applied in Learning , pp.67-71 http://dx.doi.org/10.14257/astl.2016.137.12 Data Mining Technology Based on Bayesian Network Structure Applied in Learning Chunhua Wang, Dong Han College of Information Engineering, Huanghuai

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

GIS based topology for wireless sensor network modeling: Arc-Node topology approach

GIS based topology for wireless sensor network modeling: Arc-Node topology approach GIS based topology for wireless sensor network modeling: Arc-Node topology approach S.Amin Hosseini (Author) Zanjan Branch, Islamic Azad University, Zanjan,. Iran Email: s.a.hosseini86@gmail.com Behrooz

More information

Neural Network Classifier for Isolated Character Recognition

Neural Network Classifier for Isolated Character Recognition Neural Network Classifier for Isolated Character Recognition 1 Ruby Mehta, 2 Ravneet Kaur 1 M.Tech (CSE), Guru Nanak Dev University, Amritsar (Punjab), India 2 M.Tech Scholar, Computer Science & Engineering

More information

A New Type of ART2 Architecture and Application to Color Image Segmentation

A New Type of ART2 Architecture and Application to Color Image Segmentation A New Type of ART2 Architecture and Application to Color Image Segmentation Jiaoyan Ai 1,BrianFunt 2, and Lilong Shi 2 1 Guangxi University, China shinin@vip.163.com 2 Simon Fraser University, Canada Abstract.

More information

Cluster analysis of 3D seismic data for oil and gas exploration

Cluster analysis of 3D seismic data for oil and gas exploration Data Mining VII: Data, Text and Web Mining and their Business Applications 63 Cluster analysis of 3D seismic data for oil and gas exploration D. R. S. Moraes, R. P. Espíndola, A. G. Evsukoff & N. F. F.

More information

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical

More information

Recognizing and Predicting Context by Learning from User Behavior

Recognizing and Predicting Context by Learning from User Behavior Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 >

More information

Top-k Keyword Search Over Graphs Based On Backward Search

Top-k Keyword Search Over Graphs Based On Backward Search Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer

More information

A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization

A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization A Modular k-nearest Neighbor Classification Method for Massively Parallel Text Categorization Hai Zhao and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University, 1954

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information