Research on Prediction Technique of Network Situation Awareness

Size: px
Start display at page:

Download "Research on Prediction Technique of Network Situation Awareness"

Transcription

1 Research on Predcton Technque of Networ Stuaton Awareness Juan Wang,ZhGuang Qn,L Ye School of Coputer Scence and Engneerng Unversty of Electronc Scence and Technology Chengdu, Chna Abstract In ths paper we study on the predcton technque of networ stuaton awareness. It has two levels: the hghlevel stuaton and the lowlevel next attac step. The frst one ncludes the ndexes and the evaluaton results of the networ securty stuaton, they are fgure for, we use the RBF networ to predct the for RBF s selflearnng character. Then we use the weghted attac graph to predct the next attac step. The weghts represent the probablty; the bggest weghts ndcate the ost possble next attac step. The sulatons show these predcton ethods can offer dfferent predcton capablty to satsfy the predcton need of the networ stuaton awareness. Keywords networ stuaton awareness,rbf neural networ, alert analyss I. INTRODUCTION Now, we are n nforaton age, varous nforaton around us, but ore nforaton doesn t ean ore nowledge. Because, ths nforaton s xed up and outoforder, people hard to fnd out useful nowledge they want, ths called an nforaton gap [1]. Then the Stuaton Awareness (SA) s proposed to solve ths proble. SA pays attenton to the nforaton transfor technology between the abstract data and the nowledge understood by person. It has three levels to transfor the data to nowledge: percepton, coprehenson and predcton. Its applcaton n networ securty s called Networ Stuaton Awareness (NSA), frst proposed by T Bass, 1999[5]. Tradtonal networ securty devces such as Intruson Detecton Systes (IDS), frewalls, and securty scanners wor ndependently,wth no nowledge of the networ resource they are defendng. Ths lac of nforaton results n nuerous abgutes when nterpretng alerts and ang decsons on adequate responses. We desgn a nearrealte ontorng syste that converts NetFlow source data and networ securty equpent (e.g., IDS, Frewor, IPS, etc) alerts to vsualzatons of ndvdual and suary statstcs, n graphc and tabular forats. Ths novel networ ontorng syste provdes stuatonal awareness of traffc actvty by geographcal entty (e.g., locaton, organzaton, cty, state, etc), then autoresponse by preconfgure. The syste can decrease the response te of networ decsonang and acton. One portant odule of the syste s predcton; nclude the stuaton predcton, ndexes predcton and the attac step predcton. Supported by Natonal Coputer Securty Center Project of Chna (242 project)under Grant No.2006C27,and the Chna Scholarshp Councl. Accurate predcton s the foundaton of the early warnng, the support of the decsonang. We apply noral predcton technque le RBF neural networs, to predct the stuaton and the ndexes; and the Weghted Attac Graph (WAG, a drected graph) to predct the next attac step that can help networ anager or the syste tself change the networ securty strategy tely. The sulatons show these predcton ethods can offer dfferent predcton capablty to satsfy the predcton need of the networ stuaton awareness. The reander of ths paper s organzed as follows: Secton 2 contans a bref ntroducton of stuatonal awareness and soe related wors. Secton 3 gves a detaled descrpton of predcton ethods. Secton 4 gves the sulaton of our predcton ethods of the NSA syste. We end wth a suary and conclusons n Secton 5. II. NETWORK SITUATIONAL AWARENESS The ter Stuatonal Awareness (SA) coes fro the ltary plot feld, t eans the ablty to dentfy, and coprehenson the crtcal eleents [2]. SA s the foundaton of decsonang t can help people n any felds such as ar traffc controllers, drvng, and ltary operatons [3]. Ensley [4] defned Stuatonal awareness as the percepton of the eleents n the envronent wth a volue of te and space, the coprehenson of ther eanng, and the projecton of ther status n the near future The followng three levels consttute the foral defnton of SA [2]: Level 1 percepton of the eleents n the envronent. Level 2 coprehenson of the current stuaton. Level 3 projecton of future status. The ental odel and the decsonang show n the Fg.1 descrbe the relatonshp of the three levels. Fgure 1. Stuatonal Awareness As enton above, T Bass brng t nto the networ securty research feld [5].He frst use ths NSA dea n /08 /$ IEEE CIS 2008

2 Intruson Detecton Syste (IDS) to fuse data that coe fro ultsensor, and get the nforaton of the rate of ntruson, attacers of ntruson, and the object of the attac, at last offer the evaluaton functon of attac threaten, t s also the stuaton awareness of attac to the user. But he ddn t offer the predcton functon. Other researchers and groups n ths feld nclude Stephen Lau (Lawrence Bereley Natonal Labs) [6], NetSA(The CERT Networ Stuatonal Awareness Group) of CarnegeMellon Unversty[7], Natonal Center for Advanced Secure Systes Research(NCASSR)[8]. These groups put the data fuson technque nto practce, and use the vsualzaton technque proves the dea of T Bass to get awareness of the networ stuaton. These systes offer only the nforaton of the net flow and also lac capablty of predcton, or only predct the net flow. III. PREDICTION OF NETWORK SITUATION AWARENESS The coprehenson process of our NSA syste generates the followng nforaton: a) The ndexes get fro the alerts of the networ securty devces such as SNORT [12]. And the netflow data of the networ connected devces such as CISCO ROUTER. b) The attac graphs get fro alerts that are dsplayed on the user nterface to help networ anager easly locate the source and object of the attacs, and gve anager a good dea of attac strategy. The evaluaton results of the networ stuaton that are floatng pont nubers get fro all of ndexes(how to get we wll report n another paper), The result represent the rs ran fro the low (green) to the hghest severe (red), the rs ran defned as [9]. The ndexes and the evaluaton values are fgures, they have slar character, we use RBF neural networ to predct both of the, for RBF s selflearnng character and the coplex relatons of the ndexes and evaluaton results. For the attac graphs, we add weghts to the attac graph to predct the next attac step. The weght represents the probablty of whch attac wll be the next attac. The detals of these ethods are gven below. The predcaton process of the ndexes s slar to the predcaton of evaluaton values. We descrbe the latter one for exaple A. RBF neural networ based predcton of the stuaton of the NSA Frstly, I sply ntroduce the ndexes and the evaluaton values. One ndex s a feature of networ such as the rate of netflow (783 bt per hour),we defne t as I 1. We totally have thrtyone ndexes (I 1, I 2 I 31 ), all of ndexes are processed to fgure for. As te fles, we can get a te seral values for each ndex, the sae to evaluaton values whch are fgure fro 0 to 1. We use past te values to tran the RBF neural networ, when t ready we use t to predct future values of both ndexes and evaluaton results. Radal bass functon (RBF) neural networ are based on supervsed learnng. The nput nto an RBF networ s nonlnear whle the output s lnear, due to the nonlnear approxaton propertes. RBF networ are able to odel coplex appngs. The transforaton functons used are based on a Gaussan dstrbuton. We use a threelayer nh RBF networ to predct, as the Fg.2.The n s the nuber of nputs, h s the nuber of hdden unts, and the s the nuber of outputs. Fgure 2. Φ1( x c1 ) Φh ( x ch ) W R h Threelayer RBF neural networ T n x = ( x x x The 1, 2, n ) R s the nput feature vector, h C (=1,2,,h) are the center of the hdden data, W R s the output atrx, b 0,,b are the offset of output unt, T y = [ y 1 y ] Φ s the output of the networ, ( ) s the actvaton functon of the th hdden node. Before usng the RBF networs to predct, we need optze the networ paraeters n order to ft the networ outputs to the gven nputs. The ft s evaluated by eans of a cost functon, usually assued to be the ean square error. We tae the followng tranng process: The output of the th hdden unt of the RBF networ s: q = Φ ( x c ) (1) The output of the th output node s: y = ω q θ Algorth: 1) Use as teratve tes, ntalze =1.Then use test X = { X,, } data 1 X 2 X to fnd the centre of the data, ared C 1 l C 1, delegate the centre of lth, th cluster. 2) Suppose the su of node to each cluster center dstance s A(),and the dstance of to ts cluster centre s B(),then suppose R = X, { ax( A( ) B( )), = 1,, }. 3) Eject R fro ts cluster, recount that cluster center, and suppose new center s C j 4) set =+1, that eans ncrease the nuber of cluster fro to =1, ntalze the cluster center s 1 ' 1 ( R 1, C 1,, ( C j ), C 1 ). 5) Calculate the dstance of all nodes to the center n the set X, and dvde the nodes to dfferent cluster whch center s the ost close to the. (2)

3 6) then recount the center C = ( C1 C ),judge whether C have changed or not, changed, then turn to step(5), otherwse contnung to next step; 7) calculate varance of all cluster: D = ( D1 D ) ; 8) suppose the dstance of R to ts cluster center s D ax D,the varance of each cluster s ean,f D ax <ax( Dean ),then clusterng s over, go to next step, f not go to step 2; Now, clusterng s over, each cluster center s fxed. Then use the least square ethod to fnd out each wegh value, then the predcton odule s ready. When we got a set of stuaton evaluaton values, we tae these values as the nput of the RBF networ, and then the RBF networ wll gve us the values of subsequent te. B. Weghted Attac Graph based predcton of the next attac step As enton above, n the coprehenson process we get attac graph fro the alerts, such as Fg.3 shows: Fgure 3. Attac graph How do we get ths graph s not the pont n ths paper, but you can get soe dea fro [10] whch s the base of our ethod. The an dea s before the hacers ntrude nto vct, there are seres attac steps, and early steps prepare for the later ones. So we can defne the prerequstes and consequences of attac (by experence or generated by algorth), then we connect the prerequstes and consequences produce the attac graph. We ntegrate the slar alerts nto hyperalert. One hyperalert s a set of alerts whch have the sae prerequstes and consequences. The alerts n the attac graph are hyperalerts. But when we use the attac graph to predct next attac step, there s a proble that n an attac graph one attac ay has any next steps, such as the node DNSAttac n Fg.3, the next step of t ay be webht or SPortTraffc or Nopsx86.We don t now whch one s the best choce. So n order to predct the next attac, we calculate the le hood of two drect relaton attacs. We call the two drect relaton attac as a preparefor par, the forer one contrbutes to the latter one. All of the preparefor pars and ther weghts (le hood) are stored n a chan table, as the Fg.4 shows: Fgure 4. The weghted preparefor par chan tale A, B, C, D, and E represent a nd of hyperalert. For exaple, DNSAttac s the hyperalert of dnszonetransfer, DNSversonquery, and so on. All of the use DNS to get nforaton of object, we thn the have the sae effect n an real attac so we use a hyperalert DNSAttac to delegate all of the.also the webht s the hyperalert of webcgphf, webcgtestcg, webcghandler, webcgperlexe, webcgnphtestcg, and so on. The N ab n the chan table represent how any tes the par (A, B) appearanced. When we observe a par (A,B) fro the alert strea, the N ab update to N ab +1.Ths nforaton get fro the alerts strea n tranng stage. The Su (*) s su of certan hyperalert appearance nubers. The W s the weght of preparefor par.its coputaton algorth as follows: Algorth 1 preparefor par weght coputaton Let, j be a certan hyperalert; Let (,j) be a preparefor par; Let N (, j) be the appearance nubers of par (,j); Let W (, j) be the weght of par (,j); For all hyperalert n chan table do Copute the su of hyperalert s appearance nubers: Su () = N (,*); W (, j) = N (, j)/su (); After tranng stage, the weght wll change when the predcton s ht or not. Its update algorth as follows: Algorth 2 preparefor par weght update Let (,j) be a preparefor par; Let N (, j) be the appearance nubers of par (,j); Let W (, j) be the weght of par (,j); Let Su () s su of hyperalert appearance tes; For all preparefor par do If the predcton of par (, j) s ht then Update the N (, j) = N (, j) +1; Update the Su () = Su () +1; Update the W (, j) = N (, j)/ Su (); End f We don t update the weght by update all the N (, j), Su (, j), and get W=N/Su. If the alerts and pars are thousands, t s a te consue wor, don t ft our nearrealte need. On the other sde, one ht copare thousands pars and alerts s too few, t cannot contrbute to the weght change obvously, ths also ean t cannot help to get new attac strategy qucly.

4 Lastly, the predcton of next attac algorth as follows: Algorth 3 attac predcton Let I be the attac just happened; Let W (, j) be the weght of par (, j); For all W (, *) n chan table do If the W (, j) s the ax one Return the attac j as the possble next attac End f attacs n Jun data. We get the attac graph Fg.3 fro the 2000 Aprl, now we calculate the weght of each edge, and then we get the weghted attac graph as Fg.6 show. IV. SIMULATION A. RBF neural networ based predcton of the stuaton of the NSA. Our sulated data are the net flow data of Chongqng (one cty of Chna) offered by the Chnese Natonal Networ Securty Centre (CNNSC), we transfored the data nto ndexes, and got the stuaton evaluaton values (one hour get one value) fro to , total 7 days. We used 1924 evaluaton values as tranng data, and the last day as the test data. Our RBF networ s 24h1 structure, has 24 nputs (one day has 24 hours), 1 output (the next hour). We got the predcton values of 25 whole day. Be lted by space we show the forer 7 hours values, the table 1 and the Fg.5 show the predcton values (P), the real values (R),and error between the(e), E = P R. TABLE 1: PREDICTION VALUES AND REAL VALUES P R E Fgure 5. Predcton values and real values The ean error of predcton s , the predcton offset less than 5%, and the trend of the predcton s the sae to the real one, the sulaton shows our RBF networ based predcton ethod of stuaton can eet the need. B. Weghted Attac Graph based predcton of the next attac step We use the Honeypot data [11] to prove the ethod, for the alerts of CNNSC aren t publc. We use the 2000 Aprl, May data to tranng our weght (le hood of preparefor par).and use the weghted attac graph to predct the Fgure 6. The weghted attac graph We can get the nforaton that the ntruson begn wth portscan, for hacers have to fnd who s onlne frst. Then the DNSAttac follows, the result reveals that the vct host has the DNS explots bug whch can be used ntrude nto the vct. Let s see followng alert of Jun 6: Jun 6 22:58:56 lsa snort [8804]: IDS198/SYN FIN Scan: :53 > There was a portscan attac happened Our weghted attac graph shows the next attac ay be DNSAttac or RPCInfoQuery, the forer one happen probablty larger then the latter one. Actually, the DNSAttac happen latter, naed DNSversonquery (Fg.6.red lne fro portscan ).As entons above,we ntegrate the slar alerts nto hyperalert. DNSversonquery belongs to hyperalert DNSAttac. And the weght (portscan, DNSAttac) update to The alert s ths: Jun 6 22:59:12 lsa snort [8804]: IDS/DNSversonquery: :3722> The contnuous 4 days (Jun 69) predcton as the table 2 shows. We can see the ntruson start wth a portscan, then follows a DNSAttac, and a.we ae soe wrong predcton of (fro the DNSAttac node, the follow red lne are our predcton, blue one s the real one).but when the weght update, we can ae correct predcton later. In tranng data the weght of RPCInfoQuery) s too hgh. Actually, before the Jun 6 the attac cae fro networ, and after Jun 6 the attac cae fro networ, they were two dfferent attacs. Although our predcton ethod aes soe stae, the ethod can predct rghtly after the weght changed. Our ethod has adaptablty TABLE 2. FOUR DAYS PREDICTION Day Happened Predcton Real next Update weght(0.1,0.05) attac attac attac 6 Portscan DNSAttac DNSAttac (Portscan,DNSAttac,0.77) 6 DNSAttac RPCInfoQu ery,0.23)

5 7 DNSAttac RPCInfoQu ery 8 DNSAttac 9 DNSAttac V. CONCLUSION RPCInfoQuery,0.31),0.28) RPCInfoQuery,0.26),0.38),0.48) The sulatons show our predcton ethod can predct the hghlevel stuaton and the low level next attac step. Our future research are tranng the RBF networ as set the predcton te unt fro an hour to a day,a wee and a onth, to see the algorth s perforance, and prove the weghted attac graph by consderng soe other nforaton such as source IP. ACKNOWLEDGMENT The wor reported n ths paper was supported n part by Natonal Coputer Securty Center Project of Chna (242 projects) under Grant No.2006C27, naed The Networ Stuaton Awareness and Analyss Syste The organzaton gve us drecton and experental data. Thans the for ther help. And also thans to the support of Chna Scholarshp Councl. REFERENCES [1] M. R. Endsley (2001). Desgnng for stuaton awareness n coplex systes. Proceedngs of the Second ntenatonal worshop on syboss of huans, artfacts and envronent, Kyoto, Japan [2] M. R. Endsley, B. Bolt e, and D.G. Jones. Desgnng.For Stuatonal Awareness, An Approach to UserCentered Desgn. Taylor & Francs, [3] Y. Lvnat,J. Agutter,S. Moon and S. Forest.Vsual Correlaton for Stuatonal Awareness.IEEE Syposu on Inforaton Vsualzaton [4] M. R. Endsley. Desgn and evaluaton for stuaton awareness enhanceent. In Proceedngs of the Huan Factors Socety 32nd Annual Meetng, pages , Santa Monca, CA, Huan Factor Socety. [5] T.Bass, D. Gruber.A glpse nto the future of d. htl, 1999 [6] S. Lau.The spnnng cube of potental doo.councatons of the ACM,2004,47(6):25 26 [7] Carnege Mellon' s SEI. Syste for Internet Level Knowledge (SILK). forge.net,2005 [8] W.Yurc. Vsualzng NetFlows for Securty at Lne Speed:The SIFT Tool Sute.In:19th Usenx Large Installaton Syste Adnstraton Conference(LISA),San Dego,CA USA,Dec.2005 [9] [10] P. Nng and D. Xu. Learnng attac stratages fro ntruson alerts. TR , Dept. of Cop. Sc., NCSU, [11] Honey net project now your eney statstcs[eb/ol] http :// [12] SNORT.

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Human Face Recognition Using Radial Basis Function Neural Network

Human Face Recognition Using Radial Basis Function Neural Network Huan Face Recognton Usng Radal Bass Functon eural etwor Javad Haddadna Ph.D Student Departent of Electrcal and Engneerng Arabr Unversty of Technology Hafez Avenue, Tehran, Iran, 594 E-al: H743970@cc.au.ac.r

More information

Aircraft Engine Gas Path Fault Diagnosis Based on Fuzzy Inference

Aircraft Engine Gas Path Fault Diagnosis Based on Fuzzy Inference 202 Internatonal Conference on Industral and Intellgent Inforaton (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sngapore Arcraft Engne Gas Path Fault Dagnoss Based on Fuzzy Inference Changzheng L,

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

Multiple Instance Learning via Multiple Kernel Learning *

Multiple Instance Learning via Multiple Kernel Learning * The Nnth nternatonal Syposu on Operatons Research and ts Applcatons (SORA 10) Chengdu-Juzhagou, Chna, August 19 23, 2010 Copyrght 2010 ORSC & APORC, pp. 160 167 ultple nstance Learnng va ultple Kernel

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

Handwritten English Character Recognition Using Logistic Regression and Neural Network

Handwritten English Character Recognition Using Logistic Regression and Neural Network Handwrtten Englsh Character Recognton Usng Logstc Regresson and Neural Network Tapan Kuar Hazra 1, Rajdeep Sarkar 2, Ankt Kuar 3 1 Departent of Inforaton Technology, Insttute of Engneerng and Manageent,

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Outline. Third Programming Project Two-Dimensional Arrays. Files You Can Download. Exercise 8 Linear Regression. General Regression

Outline. Third Programming Project Two-Dimensional Arrays. Files You Can Download. Exercise 8 Linear Regression. General Regression Project 3 Two-densonal arras Ma 9, 6 Thrd Prograng Project Two-Densonal Arras Larr Caretto Coputer Scence 6 Coputng n Engneerng and Scence Ma 9, 6 Outlne Quz three on Thursda for full lab perod See saple

More information

Measuring Cohesion of Packages in Ada95

Measuring Cohesion of Packages in Ada95 Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Multimodal Biometric System Using Face-Iris Fusion Feature

Multimodal Biometric System Using Face-Iris Fusion Feature JOURNAL OF COMPUERS, VOL. 6, NO. 5, MAY 2011 931 Multodal Boetrc Syste Usng Face-Irs Fuson Feature Zhfang Wang, Erfu Wang, Shuangshuang Wang and Qun Dng Key Laboratory of Electroncs Engneerng, College

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A new Fuzzy Noise-rejection Data Partitioning Algorithm with Revised Mahalanobis Distance

A new Fuzzy Noise-rejection Data Partitioning Algorithm with Revised Mahalanobis Distance A new Fuzzy ose-reecton Data Parttonng Algorth wth Revsed Mahalanobs Dstance M.H. Fazel Zarand, Mlad Avazbeg I.B. Tursen Departent of Industral Engneerng, Arabr Unversty of Technology Tehran, Iran Departent

More information

The Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding

The Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding Internatonal Journal of Operatons Research Internatonal Journal of Operatons Research Vol., No., 9 4 (005) The Man-hour Estmaton Models & Its Comparson of Interm Products Assembly for Shpbuldng Bn Lu and

More information

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90)

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90) CIS 5543 Coputer Vson Object Detecton What s Object Detecton? Locate an object n an nput age Habn Lng Extensons Vola & Jones, 2004 Dalal & Trggs, 2005 one or ultple objects Object segentaton Object detecton

More information

Determination of Body Sway Area by Fourier Analysis of its Contour

Determination of Body Sway Area by Fourier Analysis of its Contour PhUSE 213 Paper SP8 Deternaton of Body Sway Area by Fourer Analyss of ts Contour Abstract Thoas Wollsefen, InVentv Health Clncal, Eltvlle, Gerany Posturography s used to assess the steadness of the huan

More information

Prediction of Dumping a Product in Textile Industry

Prediction of Dumping a Product in Textile Industry Int. J. Advanced Networkng and Applcatons Volue: 05 Issue: 03 Pages:957-96 (03) IN : 0975-090 957 Predcton of upng a Product n Textle Industry.V.. GANGA EVI Professor n MCA K..R.M. College of Engneerng

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Generalized Spatial Kernel based Fuzzy C-Means Clustering Algorithm for Image Segmentation

Generalized Spatial Kernel based Fuzzy C-Means Clustering Algorithm for Image Segmentation Internatonal Journal of Scence and Research (IJSR, Inda Onlne ISSN: 39-7064 Generalzed Spatal Kernel based Fuzzy -Means lusterng Algorth for Iage Segentaton Pallav Thakur, helpa Lnga Departent of Inforaton

More information

A Cluster Tree Method For Text Categorization

A Cluster Tree Method For Text Categorization Avalable onlne at www.scencedrect.co Proceda Engneerng 5 (20) 3785 3790 Advanced n Control Engneerngand Inforaton Scence A Cluster Tree Meod For Text Categorzaton Zhaoca Sun *, Yunng Ye, Weru Deng, Zhexue

More information

Comparative Study between different Eigenspace-based Approaches for Face Recognition

Comparative Study between different Eigenspace-based Approaches for Face Recognition Coparatve Study between dfferent Egenspace-based Approaches for Face Recognton Pablo Navarrete and Javer Ruz-del-Solar Departent of Electrcal Engneerng, Unversdad de Chle, CHILE Eal: {pnavarre, jruzd}@cec.uchle.cl

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Using Gini-Index for Feature Selection in Text Categorization

Using Gini-Index for Feature Selection in Text Categorization 3rd Internatonal Conference on Inforaton, Busness and Educaton Technology (ICIBET 014) Usng Gn-Index for Feature Selecton n Text Categorzaton Zhu Wedong 1, Feng Jngyu 1 and Ln Yongn 1 School of Coputer

More information

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA 1, rue d Artos, F-75008 PARIS CIGRE US Natonal Cottee http : //www.cgre.org 016 Grd of the Future Syposu Predctng Power Grd Coponent Outage In Response to Extree Events R. ESKANDARPOUR, A. KHODAEI Unversty

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Pose Invariant Face Recognition using Hybrid DWT-DCT Frequency Features with Support Vector Machines

Pose Invariant Face Recognition using Hybrid DWT-DCT Frequency Features with Support Vector Machines Proceedngs of the 4 th Internatonal Conference on 7 th 9 th Noveber 008 Inforaton Technology and Multeda at UNITEN (ICIMU 008), Malaysa Pose Invarant Face Recognton usng Hybrd DWT-DCT Frequency Features

More information

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients Low tranng strength hgh capacty classfers for accurate ensebles usng Walsh Coeffcents Terry Wndeatt, Cere Zor Unv Surrey, Guldford, Surrey, Gu2 7H t.wndeatt surrey.ac.uk Abstract. If a bnary decson s taken

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

FAST IMAGE INDEXING AND VISUAL GUIDED BROWSING

FAST IMAGE INDEXING AND VISUAL GUIDED BROWSING FAST IMAGE INDEXING AND VISUAL GUIDED OWSING Guopng Qu, L Ye and Xa Feng School of Coputer Scence, The Unversty of Nottngha Jublee Capus, Nottngha, NG8 1, Unted Kngdo e-al {qu, lxy, xxf} @ cs.nott.ac.uk

More information

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3 Internatonal Conference on Autoaton, Mechancal Control and Coputatonal Engneerng (AMCCE 05) Research on acton recognton ethod under oble phone vsual sensor Wang Wenbn, Chen Ketang, Chen Langlang 3 Qongzhou

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Keyword Spotting Based on Phoneme Confusion Matrix

Keyword Spotting Based on Phoneme Confusion Matrix Keyword Spottng Based on Phonee Confuson Matrx Pengyuan Zhang, Jan Shao, Jang Han, Zhaoje Lu, Yonghong Yan ThnkIT Speech Lab, Insttute of Acoustcs, Chnese Acadey of Scences Bejng 00080 {pzhang, jshao,

More information

A Bayesian Mixture Model for Multi-view Face Alignment

A Bayesian Mixture Model for Multi-view Face Alignment A Bayesan Mxture Model for Mult-vew Face Algnent Y Zhou, We Zhang, Xaoou Tang, and Harry Shu Mcrosoft Research Asa Bejng, P. R. Chna {t-yzhou, xtang, hshu}@crosoft.co DCST, Tsnghua Unversty Bejng, P. R.

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Information Fusion Based Decision Support via Hidden Markov Models and Time Series Anomaly Detection

Information Fusion Based Decision Support via Hidden Markov Models and Time Series Anomaly Detection th Internatonal Conference on Inforaton Fuson Seattle, WA, USA, July 6-9, 009 Inforaton Fuson Based Decson Support va Hdden Markov Models and e Seres Anoaly Detecton Jon Barker, Rchard Green, Paul hoas

More information

Large Margin Nearest Neighbor Classifiers

Large Margin Nearest Neighbor Classifiers Large Margn earest eghbor Classfers Sergo Bereo and Joan Cabestany Departent of Electronc Engneerng, Unverstat Poltècnca de Catalunya (UPC, Gran Captà s/n, C4 buldng, 08034 Barcelona, Span e-al: sbereo@eel.upc.es

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Performance Analysis of Coiflet Wavelet and Moment Invariant Feature Extraction for CT Image Classification using SVM

Performance Analysis of Coiflet Wavelet and Moment Invariant Feature Extraction for CT Image Classification using SVM Perforance Analyss of Coflet Wavelet and Moent Invarant Feature Extracton for CT Iage Classfcaton usng SVM N. T. Renukadev, Assstant Professor, Dept. of CT-UG, Kongu Engneerng College, Perundura Dr. P.

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS 1 HENDRA RAHMAWAN, 2 KUSPRIYANTO, 3 YUDI SATRIA GONDOKARYONO School of Electrcal Engneerng and Inforatcs, Insttut Teknolog Bandung,

More information

SUV Color Space & Filtering. Computer Vision I. CSE252A Lecture 9. Announcement. HW2 posted If microphone goes out, let me know

SUV Color Space & Filtering. Computer Vision I. CSE252A Lecture 9. Announcement. HW2 posted If microphone goes out, let me know SUV Color Space & Flterng CSE5A Lecture 9 Announceent HW posted f cropone goes out let e now Uncalbrated Potoetrc Stereo Taeaways For calbrated potoetrc stereo we estated te n by 3 atrx B of surface norals

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

A Novel Fuzzy Classifier Using Fuzzy LVQ to Recognize Online Persian Handwriting

A Novel Fuzzy Classifier Using Fuzzy LVQ to Recognize Online Persian Handwriting A Novel Fuzzy Classfer Usng Fuzzy LVQ to Recognze Onlne Persan Handwrtng M. Soleyan Baghshah S. Bagher Shourak S. Kasae Departent of Coputer Engneerng, Sharf Unversty of Technology, Tehran, Iran soleyan@ce.sharf.edu

More information

THE PHYSICS 23 LAB BOOK 23 Lab 03: Conservation of Linear Momentum

THE PHYSICS 23 LAB BOOK 23 Lab 03: Conservation of Linear Momentum 6/4/03 23lab3.cd THE PHYSICS 23 LAB BOOK 23 Lab 03: Conservaton of Lnear Moentu SS2003 ds Nae: Lab Instructor: Objectve:.To easure the oentu before and after collsons between artrack glders. 2.To calculate

More information

A system based on a modified version of the FCM algorithm for profiling Web users from access log

A system based on a modified version of the FCM algorithm for profiling Web users from access log A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Nighttime Motion Vehicle Detection Based on MILBoost

Nighttime Motion Vehicle Detection Based on MILBoost Sensors & Transducers 204 by IFSA Publshng, S L http://wwwsensorsportalco Nghtte Moton Vehcle Detecton Based on MILBoost Zhu Shao-Png,, 2 Fan Xao-Png Departent of Inforaton Manageent, Hunan Unversty of

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016)

5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) 5th Internatonal Conference on Advanced Materals and Coputer Scence (ICAMCS 6) Aeral Survey and Scannng Pont Cloud Data Acquston & Modelng Technology for Hydropower Engneerng Shangwe LIU,, Yng WANG, Hua

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Chinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks

Chinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of

More information

Backpropagation: In Search of Performance Parameters

Backpropagation: In Search of Performance Parameters Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Realistic 3D Face Modeling by Fusing Multiple 2D Images

Realistic 3D Face Modeling by Fusing Multiple 2D Images Realstc 3D Face Modelng by Fusng Multple D ages Changhu Wang EES Departent, Unversty of Scence and echnology of Chna, wch@ustc.edu Shucheng Yan, Hongjang Zhang, Weyng Ma Mcrosoft Research Asa, Bejng,.R.

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps

Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.6, June 2006 199 Correlatng Intruson Alerts nto Attack Scenaros based on Improved Evolvng Self-Organzng Maps Yun Xao and Chongzhao

More information

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval Proceedngs of the Thrd NTCIR Workshop Descrpton of NTU Approach to NTCIR3 Multlngual Informaton Retreval Wen-Cheng Ln and Hsn-Hs Chen Department of Computer Scence and Informaton Engneerng Natonal Tawan

More information

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

EXTENDED FORMAL SPECIFICATIONS OF 3D SPATIAL DATA TYPES

EXTENDED FORMAL SPECIFICATIONS OF 3D SPATIAL DATA TYPES - 1 - EXTENDED FORMAL SPECIFICATIONS OF D SPATIAL DATA TYPES - TECHNICAL REPORT - André Borrann Coputaton Cvl Engneerng Technsche Unverstät München INTRODUCTION Startng pont for the developent of a spatal

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005 Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed

More information

Key-Words: - Under sear Hydrothermal vent image; grey; blue chroma; OTSU; FCM

Key-Words: - Under sear Hydrothermal vent image; grey; blue chroma; OTSU; FCM A Fast and Effectve Segentaton Algorth for Undersea Hydrotheral Vent Iage FUYUAN PENG 1 QIAN XIA 1 GUOHUA XU 2 XI YU 1 LIN LUO 1 Electronc Inforaton Engneerng Departent of Huazhong Unversty of Scence and

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

A Theory of Non-Deterministic Networks

A Theory of Non-Deterministic Networks A Theory of Non-Deternstc Networs Alan Mshcheno and Robert K rayton Departent of EECS, Unversty of Calforna at ereley {alan, brayton}@eecsbereleyedu Abstract oth non-deterns and ult-level networs copactly

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information