A Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a*

Size: px
Start display at page:

Download "A Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a*"

Transcription

1 17 nd International Conference on Computer Science and Technology (CST 17) ISBN: A Bayes Learng-based Anomaly Detection Approach Large-scale Networks Wei-song HE a* Department of Electronic Information Engeerg, Liangjiang International College, Chongqg University of Technology a heweisong@gmail.com *Correspondg author Keywords: Anomaly detection, Network traffic, Bayes learng, Feature extraction, Detection algorithm. Abstract. With quick developments of new application patterns and network technologies, network anomalies have an important impact on network operations. How to accurately detect network anomalies has become the hot topic current communication networks. This paper proposes a new detection approach to diagnose the anomaly network traffic. Firstly, we use the Bayes learng theory to describe network traffic properties. By the learng process, normal network traffic can correctly be modeled. Secondly, the feature extraction is used to differentiate abnormal network traffic from normal huge traffic. Thirdly, the detail detection algorithm is presented to fd the anomalous component network traffic. Fally, we carry out the detailed simulation experiments. Simulation results dicate that our approach is effective. Introduction With quick advance of new communication technologies and application patterns, new network anomalies have the creasg appearance current networks. Particularly, network traffic has quickly creased communication networks. Network anomalies have impact on network performance and normal operations [1-]. How to effectively detect and fd abnormal components networks has become a larger challenge [3-4]. Moreover, network anomalies imply users' and network devices' abnormal behaviors their operation process. These behaviors turn degrade network performance and user experience. Accordgly, this further decreases the maximum profit of network providers and adds user costs. Specially, anomalous network traffic has produced the heavy damage to current networks. Therefore, anomaly detections for network traffic have become an important topic current academic and dustries [-8]. Some anomaly detection technologies have been proposed to diagnose network traffic. The transformation doma-based analysis methods, such as wavelet analysis, time doma transformation, frequency transformation, and so on, are used to fd anomalous network traffic [, ]. These methods achieved the fairly accurate detections for abnormal network traffic. Information metrics [3] and parametric methods [9] were aloes exploited to detect network traffic anomalies. By such this way, network traffic can be characterized and extracted different metrics or mode functions. Additionally, the parameter-based detection method could diagnose the abnormal part network traffic [1-11]. Periodicity features were characterized and modeled to fd out traffic 4

2 anomalies communication networks [7]. Accordgly, a period signal model could accurately to detection and diagnose abnormal network traffic. Additionally, the detection method for multimedia traffic was also presented to guarantee network performance [8]. A new detection approach was proposed to fd out abnormal network events [1-1]. To effectively detect abnormal network traffic, the spectral kurtosis theory was used to diagnose abnormal network traffic [16]. Dynamic detection technologies were presented to fd and identify abnormal dynamic traffic flow communication networks [4]. The formation theory analysis method was effectively used to extract anomalous network traffic components [17]. However, these approaches still hold the larger detection errors. This motivates us to research the new method to detect network traffic anomalies. This paper presents a new method to detect the anomaly parts network traffic. Our approach uses the Bayes learng theory to describe the normal network traffic and build the correspondg normal traffic model. Firstly, we regard network traffic as a dynamic Bayes random process. The correspondg Bayes theory model is used to characterize network traffic. Secondly, to accurately model network traffic, we describe the network traffic modelg problem as a Bayes learng process. By the Bayes learng, we can effectively capture the dynamic nature normal network traffic. In such a case, we can accurately build the correct network traffic model for normal situation. Accordgly, we simplify the complex network traffic modelg issue to the simple Bayes learng process. To describe network traffic correlations time doma, we transform network traffic sequence to a dynamic matrix accordg to the common destation of traffic flows. Then each row of dynamic traffic is used to perform the Bayes learng the distribution way. The correspondg extractg process is carried out the Bayes learng process. Thirdly, an appropriate detection threshold identification method is presented to fd out the abnormal network traffic. At the same time, we also propose an anomaly detection algorithm to perform the accurate and effective identification of anomalous network traffic. Simulation results show that our approach is effective and feasible The remag of this paper is arranged as follows. We proposed our detection method Section. In Section 3, we present the simulation results and analysis. Fally, we conclude our work Section 4. Problem Statement For any network traffic, we can refer it as a random process the time doma, namely x = { x(1), x(),...} where x() i (wherei = 1,,... ) represents the value of traffic flow x at time sloti. Network traffic x follows the normal process distribution as follows: 1 ( x μ) PX ( = x) = exp( ) (1) πδ δ where μ and δ are the mean value and variance of the normal process X. Generally, network traffic x() t at time slot t is correlated with network traffic x( z ) (where z = t 1, t,..., t n) before time slot t. In such a case, the Bayes theory is used to describe and model network traffic at time slot k as follows: PXk ( ( ), Xk ( 1), Xk ( ),...) PX ˆ( ) = PXk ( ( ) Xk ( 1), Xk ( ),...) = PXk ( ( 1), Xk ( ),...) ()

3 Without loss of generality, we only take to account the correlations of network traffic of - before with the current network traffic. This is reasonable because network traffic holds strongest correlations with network traffic of several closest to current time slot. In contrast, selectg network traffic of the - is appropriate and computationally simple. Therefore, Equation () can be converted to: PXk ( ( ), Xk ( 1), Xk ( ),..., Xk ( )) PXk ( ( ) Xk ( 1), Xk ( ),..., Xk ( ),) = PXk ( ( 1), Xk ( ),..., Xk ( )) Equation (3) can effectively describe the dynamic traffic of each network flow. However, different network flows hold the larger correlation space. Particularly, network traffic of flows with common destations exhibits larger space correlations. Thereby, we arrange network traffic with common destations to a row to construct an formation matrix about network traffic. Network traffic of all flows the network can be denoted as u= { u( t) i, j = 1,,..., n} and n is an teger. Then we atta a new matrix as follows: u11( t), u1( t),..., u1n ( t) u ( t), u ( t),..., u ( t)... un1( t), un( t),..., unn( t) 1 n = n n = Ut () { u()} t Each low Equation (4) holds the common destation. The traffic of these flows has the stronger space correlations, while they are dependent time. Therefore, we jotly analyze the traffic of each low the matrix Equation (4). The followg equation can be obtaed: uˆ ( t) = E( u( t)) [ ˆ( ( ))... ˆ( ( ))... ˆ = P u t P u t P( u ( t))] du ( t)... du ( t) () i i1 ik i1 k j uˆ () t Equation () is a function with respect to μ and δ for network flows from f i1 to f. Equation () can be further denoted as: uˆ ( t) = E( ui ( t) μi1, μi,..., μ, δi1, δi,..., δ) [ Pˆ ( u (), t μ, δ )... Pˆ ( u (), t μ, δ )... Pˆ ( u (), t μ, δ )] du ()... t du () t = k j i1 i1 i1 ik i i i1 Accordg to Equation (6), by the Bayes learng process N network traffic samples, we can decide the value of μi1, μi,..., μ, δi1, δi,..., δ. In such a case, we build the model about normal network traffic. Accordgly, we construct the below detection process for the traffic of each network flow u () t as follows: Δ u () t = u () t uˆ () t (7) Compute the variance of Δ u () t Equation (6) as follows: Δ d = var( Δ u ( t)) (8) We use the followg anomaly identification method: (3) (4) (6) 6

4 u () t is anomalous, if Δ u () t >Δd u () t is not anomalous, if Δu () t Δd Accordg to Equation (9), we can perform the detection process for network traffic time. Equations ()-(9) show our detection approach for the dynamic network traffic. Now, we propose our detection algorithm. The steps of our algorithm are as follows: Step 1: Give network traffic u= { u ( t) i, j = 1,..., n}, the number N of traffic samples. Step : Accordg to Equation (4), construct the formation matrix Ut () about network traffic. Let j = 1. Step 3: For row i the formation matrix Ut, () accordg to Equations (1)-(3) and the Bayes learng method, use the N network traffic samples to decide the parameters μ, δ of the traffic of network flow u () t. Step 4: Build the model about the traffic of network flow u () t usg the parameters μ, δ, namely attag the followg equation: 1 ( u( t) μ ) PU ( ( t) = u( t)) = exp( ) (1) πδ δ Step : If i < n, let j = j+ 1 and go to back Step 3. Step 6: Build the below jot distribution density function of u( t) = { u ( t),..., u ( t)} : i i1 (9) 1 x 16 (a) Bayes learng results 1 x 16 (a) background traffic (b) Bayes learng relative errors x 16 (b) anormal traffic Figure 1. Bayes learng results and relative errors for network traffic Figure. Network traffic without and with anomalies. pu ( ( t)) = N( μ, μ,..., μ δ, δ,..., δ ) (11) i i1 i, i1 i Step 7: Accordg to Equation (6), atta the estimation uˆ () t of network traffic u() t. 7

5 Step 8: Through Equation (7), compute the deviation Δ u () t of network traffic u() t. Step 9: By Equation (8), calculate the variance d Δ for network traffic u () t. Step 1: Then we use Equation (9) to perform the makg-decision process. If Δ u ( t) > Δ d, network traffic is anomalous. Step 11: If the detection process is fished, save the detection results to the file and exit. Or otherwise go back to Step 7 to contue the detection process. Simulation Result and Analysis Now we carry out the simulations to validate our detection approach for network traffic anomalies. In our test process, we ject anomalous network traffic to normal background network traffic at four different of 4, 8, 1, and 14 with the duration of, respectively. We run 1 times simulation to atta the average detection performance for our detection method. The detection threshold Equation (8) is established accordg to our detection algorithm. In our simulations, we discuss the model performance of network traffic built accordg to the Bayes learng process, and anomaly detection ability. We use the data from the real network to carry out our simulation process. In our experiment, we select the first 3 samples to build our traffic model. We construct a formation matrix about network traffic to carry out jot analysis process. Figure 1 shows the Bayes learng results and relative errors for network traffic. Figure 1 (a) shows that our method can effectively estimate network traffic usg the Bayes learng process, where the estimations follow the dynamic change of the real network traffic. Figure 1 (b) denotes that the estimation results of our method hold the small estimation errors. This dicates that our method can capture the network traffic nature and change. More importantly, we only use the first 3 to build the model about network traffic, while we can atta the accurate estimations. This states that our method can effectively perform the feature characterization of network traffic. Figure plots the network traffic without anomalies and with anomalies. From Figure, we are able to fd that there are no difference between normal network traffic and abnormal network traffic. The anomalous network traffic components hide the larger normal network traffic, which is very difficult to fd and diagnose. 1 x 16 (a) Bayes learng results for network traffic with anomalies x 1 7 (b) Bayes learng errors for network traffic with anomalies Figure 3. Bayes learng results for network traffic with anomalies. 8

6 1 (a) Smoothg deviations (b) Detectg anomaly Figure 4. Deviation smoothg and anomaly detection. Figure 3 plots the Bayes learng results and relative errors for network traffic with anomalies. Different Figure 1, we can fd that for network traffic with anomalies, our method can effectively exhibit the larger deviations for the anomalous network traffic. Figure 4 shows the traffic anomaly detection usg our method. To detection the anomalies, we smooth the deviations of network traffic, which can effectively embody network traffic deviation from normal components. Then we exploit the appropriate detection threshold to fd out the anomalous network traffic. Figure 4 shows that our method can effectively detect diagnose the anomalous traffic. Conclusions This paper proposes a new detection approach to detect the anomaly components network traffic, usg the Bayes learng theory. By Bayes learng, we can describe the normal network traffic and build the correspondg normal traffic model. Through Bayes learng, we describe the network traffic modelg problem as a Bayes learng process. Then we can effectively capture the dynamic nature normal network traffic. We transform network traffic sequence to a dynamic matrix accordg to the common destation of traffic flows so that we can describe network traffic correlations time doma. Then each row of dynamic traffic is used to perform the Bayes learng the distribution way. The correspondg extractg process is carried out the Bayes learng process. We also propose an anomaly detection algorithm to perform the accurate anomalous detection for network traffic. Fally, simulations show that our method is feasible and effective for detectg anomalous components network traffic. Acknowledgement This paper is supported by the Scientific and Technological Research Program of Chongqg Municipal Education Commission (Grant No. KJ18). References [1] M. Ahmed, A. N. Mahmood, J. Hu. A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 16, 6(1):

7 [] D. Jiang, Z. Xu, P. Zhang, et al. A transform doma-based anomaly detection approach to network-wide traffic. Journal of Network and Computer Applications, 14, 4(): [3] Y. Xiang, K. Li, and W. Zhou. "Low-rate DDoS attacks detection and trace back by usg new formation metrics," IEEE Transactions on Information Forensics and Security, 11, 6(): [4] G. Thatte, U. Mitra, and J. Heidemann. "Parametric methods for anomaly detection aggregate traffic," IEEE/ACM Transactions on Networkg, vol. 19, no., pp. 1-, 11. [] D. Jiang, Y. Han, Z. Xu, et al, A time-frequency detectg method for network traffic anomalies, Proc. ICCP 1, 1, pp [6] W. Xiong, H. Hu, N. Xiong, et al. Anomaly secure detection methods by analyzg dynamic characteristics of the network traffic cloud communications. Information Sciences, 14, 8(14): [7] T. Akgül, S. Baykut, M. E. Kantarci, et al. Periodicity-based anomalies self-similar network traffic flow measurements. IEEE Transactions on Instrumentation and Measurement, 11, 6(4): [8] D. Jiang, Z. Yuan, P. Zhang, et al. A traffic anomaly detection approach communication networks for applications of multimedia medical devices. Multimedia Tools and Applications, 16, onle available, pp. 1-. [9] G. Thatte, U. Mitra, J. Heidemann. Parametric methods for anomaly detection aggregate traffic. IEEE Transactions on Networkg, 11, 19(): 1-. [1] D. Jiang, W. Q, L. Nie, et al. Time-frequency detection algorithm of network traffic anomalies, Proc. ICIIM'1, 1, pp [11] G. Thatte, U. Mitra, and J. Heidemann. "Parametric methods for anomaly detection aggregate traffic," IEEE/ACM Transactions on Networkg, vol. 19, no., pp. 1-, 11. [1] B. Eriksson, P. Barford, R. Bowden, et al. Basisdetect: A model-based network event detection framework, Proc. IMC, pp , 1. [13] D. Jiang, C. Yao, Z. Xu, et al. Multi-scale anomaly detection for high-speed network traffic. Transactions on Emergg Telecommunications Technologies, 1, 6(3): [14] M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita. A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 16, 348(): [1] J. Kevric, S. Jukic, A. Subasi. An effective combg classifier approach usg tree algorithms for network trusion detection. Neural Computg and Applications, 16, onle available. [16] D. Jiang, C. Yao, W. Zhang, et al. A detection algorithm to anomaly network traffic based on spectral kurtosis analysis, Proc. ITSim 13, 13, pp [17] P. Tune, D. Veitch. Samplg vs sketchg: An formation theoretic comparison, Proc. of INFOCOM, 11, pp:

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L.

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing Talk outline Context and problem Objective Evidence gathering framework

More information

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Network Traffic Measurements and Analysis

Network Traffic Measurements and Analysis DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Monowar H. Bhuyan and Abhishek Kalwar Dept. of Computer Science & Engg. Kaziranga University, Jorhat-785006, Assam

More information

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2. 2015 Enhanced Multivariate Correlation

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Artificial Neural Network To Detect Know And Unknown DDOS Attack

Artificial Neural Network To Detect Know And Unknown DDOS Attack IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 56-61 www.iosrjournals.org Artificial Neural Network To Detect Know

More information

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Network Traffic Anomaly Detection based on Ratio and Volume Analysis 190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security

More information

A Formal Approach to Score Normalization for Meta-search

A Formal Approach to Score Normalization for Meta-search A Formal Approach to Score Normalization for Meta-search R. Manmatha and H. Sever Center for Intelligent Information Retrieval Computer Science Department University of Massachusetts Amherst, MA 01003

More information

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems 13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using

More information

Behavior-based Authentication Systems. Multimedia Security

Behavior-based Authentication Systems. Multimedia Security Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through

More information

Anomaly Detection on Data Streams with High Dimensional Data Environment

Anomaly Detection on Data Streams with High Dimensional Data Environment Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

1.1 SYMPTOMS OF DDoS ATTACK:

1.1 SYMPTOMS OF DDoS ATTACK: 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Entropy Based Approach for the Detection of DDOS Attack Abhilash Singh,

More information

Network Anomaly Detection Using Autonomous System Flow Aggregates

Network Anomaly Detection Using Autonomous System Flow Aggregates Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM 4. Draft version Thienne ohnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona,

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES RENATO PREIGSCHADT DE AZEVEDO, DOUGLAS CAMARGO FOSTER, RAUL CERETTA NUNES, ALICE KOZAKEVICIUS Universidade

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

Metric and Identification of Spatial Objects Based on Data Fields

Metric and Identification of Spatial Objects Based on Data Fields Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 368-375 Metric and Identification

More information

Basic Concepts And Future Directions Of Road Network Reliability Analysis

Basic Concepts And Future Directions Of Road Network Reliability Analysis Journal of Advanced Transportarion, Vol. 33, No. 2, pp. 12.5-134 Basic Concepts And Future Directions Of Road Network Reliability Analysis Yasunori Iida Background The stability of road networks has become

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

Density Based Clustering using Modified PSO based Neighbor Selection

Density Based Clustering using Modified PSO based Neighbor Selection Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com

More information

Two Algorithms of Image Segmentation and Measurement Method of Particle s Parameters

Two Algorithms of Image Segmentation and Measurement Method of Particle s Parameters Appl. Math. Inf. Sci. 6 No. 1S pp. 105S-109S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Two Algorithms of Image Segmentation

More information

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering Chapter 4 Fuzzy Systems Knowledge Engeerg Fuzzy Systems Christian Jacob jacob@cpsc.ucalgary.ca Department of Computer Science University of Calgary [Kasabov, 1996] Fuzzy Systems Knowledge Engeerg [Kasabov,

More information

Detection Of Dos Attack Using Multivariate Correlation Analysis

Detection Of Dos Attack Using Multivariate Correlation Analysis Detection Of Dos Attack Using Multivariate Correlation Analysis Miss Smita N.Shendge, Mr. Prasad R.Kulkarni Student,, Computer Department,Aditya Engineering college Beed,Maharastra,India Professor, Computer

More information

Provision of Quality of Service with Router Support

Provision of Quality of Service with Router Support Provision of Quality of Service with Router Support Hongli Luo Department of Computer and Electrical Engineering Technology and Information System and Technology Indiana University Purdue University Fort

More information

Analysis of Detection Mechanism of Low Rate DDoS Attack Using Robust Random Early Detection Algorithm

Analysis of Detection Mechanism of Low Rate DDoS Attack Using Robust Random Early Detection Algorithm Analysis of Detection Mechanism of Low Rate DDoS Attack Using Robust Random Early Detection Algorithm 1 Shreeya Shah, 2 Hardik Upadhyay 1 Research Scholar, 2 Assistant Professor 1 IT Systems & Network

More information

HUE PRESERVING ENHANCEMENT ALGORITHM BASED ON WAVELET TRANSFORM AND HUMAN VISUAL SYSTEM

HUE PRESERVING ENHANCEMENT ALGORITHM BASED ON WAVELET TRANSFORM AND HUMAN VISUAL SYSTEM International Journal of Information Technology and Knowledge Management July-December 011, Volume 4, No., pp. 63-67 HUE PRESERVING ENHANCEMENT ALGORITHM BASED ON WAVELET TRANSFORM AND HUMAN VISUAL SYSTEM

More information

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017 Internet Traffic Classification Using Machine Learning Tanjila Ahmed Dec 6, 2017 Agenda 1. Introduction 2. Motivation 3. Methodology 4. Results 5. Conclusion 6. References Motivation Traffic classification

More information

Image Interpolation using Collaborative Filtering

Image Interpolation using Collaborative Filtering Image Interpolation using Collaborative Filtering 1,2 Qiang Guo, 1,2,3 Caiming Zhang *1 School of Computer Science and Technology, Shandong Economic University, Jinan, 250014, China, qguo2010@gmail.com

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Spring 2016 A second course in data mining!! http://www.it.uu.se/edu/course/homepage/infoutv2/vt16 Kjell Orsborn! Uppsala Database Laboratory! Department of Information Technology,

More information

A DYNAMIC CONTROLLING SCHEME FOR A TRACKING SYSTEM. Received February 2009; accepted April 2009

A DYNAMIC CONTROLLING SCHEME FOR A TRACKING SYSTEM. Received February 2009; accepted April 2009 ICIC Express Letters ICIC International c 2009 ISSN 1881-803X Volume 3, Number 2, June 2009 pp. 219 223 A DYNAMIC CONTROLLING SCHEME FOR A TRACKING SYSTEM Ming-Liang Li 1,Yu-KueiChiu 1, Yi-Nung Chung 2

More information

A Levy Alpha Stable Model for Anomaly Detection in Network Traffic

A Levy Alpha Stable Model for Anomaly Detection in Network Traffic A Levy Alpha Stable Model for Anomaly Detection in Network Traffic Diana A Dept of IT, KalasalingamUniversity, Tamilnadu, India E-mail: arul.diana@gmail.com Mercy Christial T Asst. Prof I/IT, Dept of IT,

More information

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 31 st July 01. Vol. 41 No. 005-01 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 1 SRIRAM.B, THIYAGARAJAN.S 1, Student,

More information

Clustering Analysis based on Data Mining Applications Xuedong Fan

Clustering Analysis based on Data Mining Applications Xuedong Fan Applied Mechanics and Materials Online: 203-02-3 ISSN: 662-7482, Vols. 303-306, pp 026-029 doi:0.4028/www.scientific.net/amm.303-306.026 203 Trans Tech Publications, Switzerland Clustering Analysis based

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

Anomaly Detection System for Video Data Using Machine Learning

Anomaly Detection System for Video Data Using Machine Learning Anomaly Detection System for Video Data Using Machine Learning Tadashi Ogino Abstract We are developing an anomaly detection system for video data that uses machine learning. The proposed system has two

More information

Impact of Sampling on Anomaly Detection

Impact of Sampling on Anomaly Detection Impact of Sampling on Anomaly Detection DIMACS/DyDan Workshop on Internet Tomography Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer

More information

CPSC 340: Machine Learning and Data Mining. Outlier Detection Fall 2018

CPSC 340: Machine Learning and Data Mining. Outlier Detection Fall 2018 CPSC 340: Machine Learning and Data Mining Outlier Detection Fall 2018 Admin Assignment 2 is due Friday. Assignment 1 grades available? Midterm rooms are now booked. October 18 th at 6:30pm (BUCH A102

More information

Image Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei

Image Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei Image Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei College of Physical and Information Science, Hunan Normal University, Changsha, China Hunan Art Professional

More information

Improving Image Segmentation Quality Via Graph Theory

Improving Image Segmentation Quality Via Graph Theory International Symposium on Computers & Informatics (ISCI 05) Improving Image Segmentation Quality Via Graph Theory Xiangxiang Li, Songhao Zhu School of Automatic, Nanjing University of Post and Telecommunications,

More information

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,

More information

Research on Quality Inspection method of Digital Aerial Photography Results

Research on Quality Inspection method of Digital Aerial Photography Results Research on Quality Inspection method of Digital Aerial Photography Results WANG Xiaojun, LI Yanling, LIANG Yong, Zeng Yanwei.School of Information Science & Engineering, Shandong Agricultural University,

More information

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of

More information

Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Using a Gaussian Process Based Surrogate Model

Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Using a Gaussian Process Based Surrogate Model Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Usg a Gaussian Process Based Surrogate Model Bo Liu, Yg He, Patrick Reynaert, Georges Gielen ESAT-MICAS, Katholieke

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Research Article Modeling and Simulation Based on the Hybrid System of Leasing Equipment Optimal Allocation

Research Article Modeling and Simulation Based on the Hybrid System of Leasing Equipment Optimal Allocation Discrete Dynamics in Nature and Society Volume 215, Article ID 459381, 5 pages http://dxdoiorg/11155/215/459381 Research Article Modeling and Simulation Based on the Hybrid System of Leasing Equipment

More information

10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors

10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors Dejan Sarka Anomaly Detection Sponsors About me SQL Server MVP (17 years) and MCT (20 years) 25 years working with SQL Server Authoring 16 th book Authoring many courses, articles Agenda Introduction Simple

More information

Anti-Distortion Image Contrast Enhancement Algorithm Based on Fuzzy Statistical Analysis of the Histogram Equalization

Anti-Distortion Image Contrast Enhancement Algorithm Based on Fuzzy Statistical Analysis of the Histogram Equalization , pp.101-106 http://dx.doi.org/10.14257/astl.2016.123.20 Anti-Distortion Image Contrast Enhancement Algorithm Based on Fuzzy Statistical Analysis of the Histogram Equalization Yao Nan 1, Wang KaiSheng

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

Self-Organized Similarity based Kernel Fuzzy Clustering Model and Its Applications

Self-Organized Similarity based Kernel Fuzzy Clustering Model and Its Applications Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Self-Organized Similarity based Kernel Fuzzy

More information

Reliability Measure of 2D-PAGE Spot Matching using Multiple Graphs

Reliability Measure of 2D-PAGE Spot Matching using Multiple Graphs Reliability Measure of 2D-PAGE Spot Matching using Multiple Graphs Dae-Seong Jeoune 1, Chan-Myeong Han 2, Yun-Kyoo Ryoo 3, Sung-Woo Han 4, Hwi-Won Kim 5, Wookhyun Kim 6, and Young-Woo Yoon 6 1 Department

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Bridge Surface Crack Detection Method

Bridge Surface Crack Detection Method , pp.337-343 http://dx.doi.org/10.14257/astl.2016. Bridge Surface Crack Detection Method Tingping Zhang 1,2, Jianxi Yang 1, Xinyu Liang 3 1 School of Information Science & Engineering, Chongqing Jiaotong

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Improved Balanced Parallel FP-Growth with MapReduce Qing YANG 1,a, Fei-Yang DU 2,b, Xi ZHU 1,c, Cheng-Gong JIANG *

Improved Balanced Parallel FP-Growth with MapReduce Qing YANG 1,a, Fei-Yang DU 2,b, Xi ZHU 1,c, Cheng-Gong JIANG * 2016 Joint International Conference on Artificial Intelligence and Computer Engineering (AICE 2016) and International Conference on Network and Communication Security (NCS 2016) ISBN: 978-1-60595-362-5

More information

Classification and K-Nearest Neighbors

Classification and K-Nearest Neighbors Classification and K-Nearest Neighbors Administrivia o Reminder: Homework 1 is due by 5pm Friday on Moodle o Reading Quiz associated with today s lecture. Due before class Wednesday. NOTETAKER 2 Regression

More information

Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation

Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation Dennis Ippoliti and Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs Colorado

More information

FSRM Feedback Algorithm based on Learning Theory

FSRM Feedback Algorithm based on Learning Theory Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong

More information

Available Online through

Available Online through Available Online through www.ijptonline.com ISSN: 0975-766X CODEN: IJPTFI Research Article ANALYSIS OF CT LIVER IMAGES FOR TUMOUR DIAGNOSIS BASED ON CLUSTERING TECHNIQUE AND TEXTURE FEATURES M.Krithika

More information

On the Improvement of Weighted Page Content Rank

On the Improvement of Weighted Page Content Rank On the Improvement of Weighted Page Content Rank Seifede Kadry and Ali Kalakech Abstract The World Wide Web has become one of the most useful formation resource used for formation retrievals and knowledge

More information

An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation

An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation Yaozong LIU 1*, Hong ZHANG 1, Fawang HAN 2, Jun TAN 3 1 School of Computer Science and Engineering Nanjing University of Science

More information

A new robust watermarking scheme based on PDE decomposition *

A new robust watermarking scheme based on PDE decomposition * A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid

More information

An Integrated Face Recognition Algorithm Based on Wavelet Subspace

An Integrated Face Recognition Algorithm Based on Wavelet Subspace , pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,

More information

A Real-Time Network Simulation Application for Multimedia over IP

A Real-Time Network Simulation Application for Multimedia over IP A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network

More information

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Chapter 5: Outlier Detection

Chapter 5: Outlier Detection Ludwig-Maximilians-Universität München Institut für Informatik Lehr- und Forschungseinheit für Datenbanksysteme Knowledge Discovery in Databases SS 2016 Chapter 5: Outlier Detection Lecture: Prof. Dr.

More information

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Transform Based on Local Energy Means

An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Transform Based on Local Energy Means An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Based on Local Energy Means K. L. Naga Kishore 1, N. Nagaraju 2, A.V. Vinod Kumar 3 1Dept. of. ECE, Vardhaman

More information

SD 372 Pattern Recognition

SD 372 Pattern Recognition SD 372 Pattern Recognition Lab 2: Model Estimation and Discriminant Functions 1 Purpose This lab examines the areas of statistical model estimation and classifier aggregation. Model estimation will be

More information

Evaluation of Fourier Transform Coefficients for The Diagnosis of Rheumatoid Arthritis From Diffuse Optical Tomography Images

Evaluation of Fourier Transform Coefficients for The Diagnosis of Rheumatoid Arthritis From Diffuse Optical Tomography Images Evaluation of Fourier Transform Coefficients for The Diagnosis of Rheumatoid Arthritis From Diffuse Optical Tomography Images Ludguier D. Montejo *a, Jingfei Jia a, Hyun K. Kim b, Andreas H. Hielscher

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM

CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM 1 PHYO THET KHIN, 2 LAI LAI WIN KYI 1,2 Department of Information Technology, Mandalay Technological University The Republic of the Union of Myanmar

More information

International Journal of Informative & Futuristic Research ISSN (Online):

International Journal of Informative & Futuristic Research ISSN (Online): Reviewed Paper Volume 2 Issue 3 November 2014 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 A System For Denial-Of-Service Attack Detection Based On Multivariate Correlation

More information

Quaternion-based color difference measure for removing impulse noise in color images

Quaternion-based color difference measure for removing impulse noise in color images 2014 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) Quaternion-based color difference measure for removing impulse noise in color images Lunbo Chen, Yicong

More information

A study of classification algorithms using Rapidminer

A study of classification algorithms using Rapidminer Volume 119 No. 12 2018, 15977-15988 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of classification algorithms using Rapidminer Dr.J.Arunadevi 1, S.Ramya 2, M.Ramesh Raja

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Firewall Policy Modelling and Anomaly Detection

Firewall Policy Modelling and Anomaly Detection Firewall Policy Modelling and Anomaly Detection 1 Suhail Ahmed 1 Computer Science & Engineering Department, VTU University, SDIT, Mangalore, Karnataka. India Abstract - In this paper an anomaly management

More information

Global Thresholding Techniques to Classify Dead Cells in Diffusion Weighted Magnetic Resonant Images

Global Thresholding Techniques to Classify Dead Cells in Diffusion Weighted Magnetic Resonant Images Global Thresholding Techniques to Classify Dead Cells in Diffusion Weighted Magnetic Resonant Images Ravi S 1, A. M. Khan 2 1 Research Student, Department of Electronics, Mangalore University, Karnataka

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

Computer Technology Department, Sanjivani K. B. P. Polytechnic, Kopargaon

Computer Technology Department, Sanjivani K. B. P. Polytechnic, Kopargaon Outlier Detection Using Oversampling PCA for Credit Card Fraud Detection Amruta D. Pawar 1, Seema A. Dongare 2, Amol L. Deokate 3, Harshal S. Sangle 4, Panchsheela V. Mokal 5 1,2,3,4,5 Computer Technology

More information