Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Size: px
Start display at page:

Download "Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies"

Transcription

1 Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković Commuicatio Networks Laboratory School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada

2 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 2

3 lhr: 535,102 odes ad 601,678 liks 3

4 lhr: 535,102 odes ad 601,678 liks 4

5 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 5

6 Measuremets of etwork traffic Traffic measuremets: help uderstad characteristics of etwork traffic are basis for developig traffic models are used to evaluate performace of protocols ad applicatios Traffic aalysis: provides iformatio about the etwork usage helps uderstad the behavior of etwork users Traffic predictio: importat to assess future etwork capacity requiremets used to pla future etwork developmets 6

7 Traffic modelig: self-similarity Self-similarity implies a fractal-like behavior Data o various time scales have similar patters Implicatios: o atural legth of bursts bursts exist across may time scales traffic does ot become smoother whe aggregated it is ulike Poisso traffic used to model traffic i telephoe etworks as the traffic volume icreases, the traffic becomes more bursty ad more self-similar 7

8 Self-similarity: ifluece of time-scales Geuie MPEG traffic trace E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb

9 Self-similarity: ifluece of time-scales Sythetically geerated Poisso model E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb

10 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 10

11 BCNET packet capture: physical overview BCNET is the hub of advaced telecommuicatio etwork i British Columbia, Caada that offers services to research ad higher educatio istitutios 11

12 BCNET packet capture BCNET trasits have two service providers with 10 Gbps etwork liks ad oe service provider with 1 Gbps etwork lik Optical Test Access Poit (TAP) splits the sigal ito two distict paths The sigal splittig ratio from TAP may be modified The Data Capture Device (NijaBox 5000) collects the real-time data (packets) from the traffic filterig device 12

13 Net Optics Director 7400: applicatio diagram Net Optics Director 7400 is used for BCNET traffic filterig It directs traffic to moitorig tools such as NijaBox 5000 ad FlowMo 13

14 Network moitorig ad aalyzig: Edace card Edace Data Acquisitio ad Geeratio (DAG) 5.2X card resides iside the NijaBox 5000 It captures ad trasmits traffic ad has time-stampig capability DAG 5.2X is a sigle port Peripheral Compoet Itercoect Exteded (PCIx) card ad is capable of capturig o average Etheret traffic of 6.9 Gbps 14

15 Real time etwork usage by BCNET members The BCNET etwork is high-speed fiber optic research etwork British Columbia's etwork exteds to 1,400 km ad coects Kamloops, Kelowa, Price George, Vacouver, ad Victoria 15

16 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 16

17 Iteret topology Iteret is a etwork of Autoomous Systems: groups of etworks sharig the same routig policy idetified with Autoomous System Numbers (ASN) Autoomous System Numbers: assigmets/as-umbers Iteret topology o AS-level: the arragemet of ASes ad their itercoectios Aalyzig the Iteret topology ad fidig properties of associated graphs rely o miig data ad capturig iformatio about Autoomous Systems (ASes) 17

18 Variety of graphs Radom graphs: odes ad edges are geerated by a radom process Erdős ad Réyi model Small world graphs: odes ad edges are geerated so that most of the odes are coected by a small umber of odes i betwee Watts ad Strogatz model (1998) 18

19 Scale-free graphs Scale-free graphs: graphs whose ode degree distributio follow power-law rich get richer Barabási ad Albert model (1999) Aalysis of complex etworks: discovery of spectral properties of graphs costructig matrices describig the etwork coectivity 19

20 Aalyzed datasets Sample datasets: Route Views: TABLE_DUMP B / IGP : : : :3000 NAG RIPE: TABLE_DUMP B / IGP : :3010 NAG 20

21 Iteret topology at AS level Datasets collected from Border Gateway Protocols (BGP) routig tables are used to ifer the Iteret topology at AS-level

22 Iteret topology The Iteret topology is characterized by the presece of various power-laws: ode degree vs. ode rak eigevalues of the matrices describig Iteret graphs (adjacecy matrix ad ormalized Laplacia matrix) Power-laws expoets have ot sigificatly chaged over the years Spectral aalysis reveals ew historical treds ad otable chages i the coectivity ad clusterig of AS odes over the years 22

23 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 23

24 Traffic aomalies Slammer, Nimda, ad Code Red I aomalies affected performace of the Iteret Border Gateway Protocol (BGP) BGP aomalies also iclude: Iteret Protocol (IP) prefix hijacks, miss-cofiguratios, ad electrical failures Techiques for detectig BGP aomalies have recetly gaied visible attetio ad importace 24

25 Aomaly detectio techiques Classificatio problem: assigig a aomaly or regular label to a data poit Accuracy of a classifier depeds o: extracted features combiatio of selected features uderlyig model Goal: Detect Iteret routig aomalies usig the Border Gateway Protocol (BGP) update messages 25

26 BGP features Approach: Defie a set of 37 features based o BGP update messages Extract the features from available BGP update messages that are collected durig the time period whe the Iteret experieced aomalies: Slammer Nimda Code Red I 26

27 Feature selectio algorithms Select the most relevat features for classificatio usig: Fisher Miimum Redudacy Maximum Relevace (mrmr) Odds Ratio Decisio Tree Fuzzy Rough Sets 27

28 Feature classificatio Trai classifiers for BGP aomaly detectio usig: Support Vector Machies Hidde Markov Models Naive Bayes Decisio Tree Extreme Learig Machie (ELM) 28

29 BGP: update messages Border Gateway Protocol (BGP) eables exchage of routig iformatio betwee gateway routers usig update messages BGP update message collectios: Réseaux IP Europées (RIPE) uder the Routig Iformatio Service (RIS) project Route Views Available i multi-threaded routig toolkit (MRT) biary format 29

30 BGP: aomalies Aomaly Date Duratio (h) Slammer Jauary 25, Nimda September 18, Code Red I July 19, Traiig Data Dataset Slammer + Nimda Dataset 1 Slammer + Code Red I Dataset 2 Code Red I + Nimda Dataset 3 Slammer Dataset 4 Nimda Dataset 5 Code Red I Dataset 6 30

31 BGP: features Defie 37 features Sample every miute durig a five-day period: the peak day of a aomaly two days prior ad two days after the peak day 7,200 samples for each aomalous evet: 5,760 regular samples (o-aomalous) 1,440 aomalous samples Imbalaced dataset 31

32 BGP features Feature Defiitio Category 1 Number of aoucemets Volume 2 Number of withdrawals Volume 3 Number of aouced NLRI prefixes Volume 4 Number of withdraw NLRI prefixes Volume 5 Average AS-PATH legth AS-path 6 Maximum AS-PATH legth AS-path 7 Average uique AS-PATH legth AS-path 8 Number of duplicate aoucemets Volume 9 Number of duplicate withdrawals Volume 10 Number of implicit withdrawals Volume 32

33 BGP features Feature Defiitio Category 11 Average edit distace AS-path 12 Maximum edit distace AS-path 13 Iter-arrival time Maximum edit distace =, where = (7,..., 17) Maximum AS-path legth =, where = (7,..., 15) Volume AS-path AS-path 34 Number of IGP packets Volume 35 Number of EGP packets Volume 36 Number of icomplete packets Volume 37 Packet size (B) Volume 33

34 Feature selectio: decisio tree Commoly used algorithm i data miig Geerates a model that predicts the value of a target variable based o several iput variables A top-dow approach is commoly used for costructig decisio trees: a appropriate variable is chose to best split the set of items based o homogeeity of the target variable withi subsets C5 software tool was used to geerate decisio trees C5 [Olie]. Available: 34

35 Feature selectio: decisio tree Dataset Traiig data Selected Features Dataset 1 Slammer + Nimda 1 21, 23 29, Dataset 2 Slammer + Code Red I 1 22, 24 29, Dataset 3 Code Red I + Nimda 1 29, Either four (30, 31, 32, 33) or five (22, 30, 31, 32, 33) features are removed i the costructed trees maily because: features are umerical ad some are used repeatedly 35

36 Feature selectio: fuzzy rough sets Deal with the approximatio of fuzzy sets i a fuzzy approximatio space defied by a fuzzy similarity relatio or by a fuzzy partitio The fuzzy similarity relatio Sim(C) is: a x matrix that describes similarities betwee ay two samples computed by the mi operator Computatioal complexity: O( 2 m) is the umber of samples m is the umber of features 36

37 Feature selectio: fuzzy rough sets Dataset Traiig data Selected Features Dataset 4 Slammer 1, 3 6, 9, 10, 13 32, 35 Dataset 5 Nimda 1, 3 4, 8 10, 12, 14 32, 35, 36 Dataset 6 Code Red I 3 4, 8 10, 12, 14 32, 35, 36 Usig combiatio of datasets, for example Slammer + Nimda for traiig leads to higher computatioal load Each dataset was used idividually 37

38 Aomaly classifiers: decisio tree Dataset Testig data Acc trai Acc test Traiig time (s) Dataset 1 Code Red I Dataset 2 Nimda Dataset 3 Slammer Each path from the root ode to a leaf ode may be trasformed ito a decisio rule A set of rules that are obtaied from a traied decisio tree may be used for classifyig usee samples 38

39 Aomaly classifier: ELM Used for learig with a sigle hidde layer feed forward eural etwork Weights coectig the iput ad hidde layers with the bias terms are iitialized radomly Weights coectig the hidde ad output layers are aalytically determied Lears faster tha SVMs by a factor of thousads Suitable for olie applicatios We use all features (37), all cotiuous features (17), features selected by fuzzy rough sets (28 or 27), ad cotiuous features selected by fuzzy rough sets (9 or 8) 39

40 Aomaly classifiers: ELM No. of features Dataset Acc trai Acc Traiig time test (s) Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± hidde uits The biary features are removed to form a set of 17 features 40

41 Aomaly classifiers: ELM No. of features Dataset Acc trai Acc test 28 Dataset ± ± (from 37) Dataset ± ± Dataset ± ± Dataset ± ± (from 17) Dataset ± ± Dataset ± ±

42 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case study: Collectio of BCNET traffic Iteret topology ad spectral aalysis of Iteret graphs Machie learig models for feature selectio ad classificatio of traffic aomalies Coclusios 42

43 Coclusios Data collected from deployed etworks are used to: evaluate etwork performace characterize ad model traffic (iter-arrival ad call holdig times) idetify treds i the evolutio of the Iteret topology classify traffic ad etwork aomalies 43

44 Coclusios Machie learig algorithms (feature selectio ad classificatio algorithms) are used for detectig BGP aomalies Performace of classifiers greatly depeded o the employed datasets Feature selectio algorithms were used to improve the performace of classifiers For smaller datasets, performace of the ELM classifier was improved by usig fuzzy rough sets Both decisio tree ad ELM are relatively fast classifiers with satisfactory accuracy 44

45 Refereces: sources of data RIPE RIS raw data [Olie]. Available: Uiversity of Orego Route Views project [Olie]. Available: CAIDA: Ceter for Applied Iteret Data Aalysis: {Olie}. Available: 45

46 Refereces: Y. Li, H. J. Xig, Q. Hua, X.-Z. Wag, P. Batta, S. Haeri, ad Lj. Trajković, Classificatio of BGP aomalies usig decisio trees ad fuzzy rough sets, i Proc. IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics, SMC 2014, Sa Diego, CA, October 2014, pp N. Al-Rousa, S. Haeri, ad Lj. Trajković, Feature selectio for classificatio of BGP aomalies usig Bayesia models," i Proc. ICMLC 2012, Xi'a, Chia, July 2012, pp N. Al-Rousa ad Lj. Trajković, Machie learig models for classificatio of BGP aomalies, i Proc. IEEE Cof. High Performace Switchig ad Routig, HPSR 2012, Belgrade, Serbia, Jue 2012, pp T. Farah, S. Lally, R. Gill, N. Al-Rousa, R. Paul, D. Xu, ad Lj. Trajković, Collectio of BCNET BGP traffic," i Proc. 23rd ITC, Sa Fracisco, CA, USA, Sept. 2011, pp S. Lally, T. Farah, R. Gill, R. Paul, N. Al-Rousa, ad Lj. Trajković, Collectio ad characterizatio of BCNET BGP traffic," i Proc IEEE Pacific Rim Cof. Commuicatios, Computers ad Sigal Processig, Victoria, BC, Caada, Aug. 2011, pp

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

Mining Network Traffic Data

Mining Network Traffic Data Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal

More information

Mining Network Traffic Data

Mining Network Traffic Data Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal

More information

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, and Ljiljana Trajković Hebei University, Baoding,

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally, Tanjila Farah, Rajvir Gill, Ravinder Paul, Nabil Al-Rousan, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia,

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences Miig from Quatitative Data with Liguistic Miimum Supports ad Cofideces Tzug-Pei Hog, Mig-Jer Chiag ad Shyue-Liag Wag Departmet of Electrical Egieerig Natioal Uiversity of Kaohsiug Kaohsiug, 8, Taiwa, R.O.C.

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

A new algorithm to build feed forward neural networks.

A new algorithm to build feed forward neural networks. A ew algorithm to build feed forward eural etworks. Amit Thombre Cetre of Excellece, Software Techologies ad Kowledge Maagemet, Tech Mahidra, Pue, Idia Abstract The paper presets a ew algorithm to build

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Lecture 13: Validation

Lecture 13: Validation Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally lally@sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Feature Selection for Classification of BGP Anomalies using Bayesian Models

Feature Selection for Classification of BGP Anomalies using Bayesian Models July 17, 2012 11th International Conference on Machine Learning and Cybernetics, Xi an, China 1/ 32 Feature Selection for Classification of BGP Anomalies using Bayesian Models Nabil Al-Rousan, Soroush

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

arxiv: v2 [cs.lg] 12 Jan 2018

arxiv: v2 [cs.lg] 12 Jan 2018 HINET: HIERARCHICAL CLASSIFICATION WITH NEU- RAL NETWORK Zhezhou Wu SAP Iovatio Ceter, Sigapore Sigapore 119958 zhezhou.wu@sap.com Sea Saito Yale-NUS College Sigapore, 138533 sea.saito@u.yale-us.edu.sg

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Software Fault Prediction of Unlabeled Program Modules

Software Fault Prediction of Unlabeled Program Modules Software Fault Predictio of Ulabeled Program Modules C. Catal, U. Sevim, ad B. Diri, Member, IAENG Abstract Software metrics ad fault data belogig to a previous software versio are used to build the software

More information

Using Markov Model and Popularity and Similarity-based Page Rank Algorithm for Web Page Access Prediction

Using Markov Model and Popularity and Similarity-based Page Rank Algorithm for Web Page Access Prediction Iteratioal Coferece o Advaces i Egieerig ad Techology (ICAET'2014 March 29-30, 2014 Sigapore Usig Markov Model ad Popularity ad Similarity-based Page Rak Algorithm for Web Page Access Predictio Phyu Thwe

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

BGP with an Adaptive Minimal Route Advertisement Interval

BGP with an Adaptive Minimal Route Advertisement Interval with a Adaptive Miimal Route Advertisemet Iterval Nead Lasković ad Ljiljaa Trajković Simo Fraser Uiversity Vacouver, British Columbia, Caada {laskovi, ljilja}@cs.sfu.ca Abstract The duratio of the Miimal

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

A New Bit Wise Technique for 3-Partitioning Algorithm

A New Bit Wise Technique for 3-Partitioning Algorithm Special Issue of Iteratioal Joural of Computer Applicatios (0975 8887) o Optimizatio ad O-chip Commuicatio, No.1. Feb.2012, ww.ijcaolie.org A New Bit Wise Techique for 3-Partitioig Algorithm Rajumar Jai

More information

Learning Sensor Data Characteristics in Unknown Environments.

Learning Sensor Data Characteristics in Unknown Environments. Learig Sesor Data Characteristics i Ukow Eviromets. Tatiaa Bokareva tbokareva@cse.usw.edu.au The Uiversity of NSW Nirupama Bulusu bulusu@cs.pdx.edu Portlad State Uiversity Sajay Jha sjha@cse.usw.edu.au

More information

Lecture 1: Introduction

Lecture 1: Introduction Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

The identification of key quality characteristics based on FAHP

The identification of key quality characteristics based on FAHP Iteratioal Joural of Research i Egieerig ad Sciece (IJRES ISSN (Olie: 2320-9364, ISSN (Prit: 2320-9356 Volume 3 Issue 6 ǁ Jue 2015 ǁ PP.01-07 The idetificatio of ey quality characteristics based o FAHP

More information

Intrusion Detection Method Using Protocol Classification and Rough Set Based Support Vector Machine

Intrusion Detection Method Using Protocol Classification and Rough Set Based Support Vector Machine Computer ad formatio Sciece trusio Detectio Method Usig Protocol Classificatio ad Rough Set Based Support Vector Machie Xuyi Re College of Computer Sciece, Najig Uiversity of Post & Telecommuicatios Najig

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Deploying 32-bit ASNs

Deploying 32-bit ASNs Deployig 32-bit ASNs ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 26 th September

More information

A Martingale Framework for Concept Change Detection in Time-Varying Data Streams

A Martingale Framework for Concept Change Detection in Time-Varying Data Streams A Martigale Framework for Cocept Chage Detectio i Time-Varyig Data Streams She-Shyag Ho sho@gmu.edu Departmet of Computer Sciece, George Maso Uiversity, 4400 Uiversity Drive, Fairfax, VA 22030 USA Abstract

More information

Clustering and Classifying Diabetic Data Sets Using K-Means Algorithm

Clustering and Classifying Diabetic Data Sets Using K-Means Algorithm Article ca be accessed olie at http://www.publishigidia.com Clusterig ad Classifyig Diabetic Data Sets Usig K-Meas Algorithm M. Kothaiayaki*, P. Thagaraj** Abstract The k-meas algorithm is well kow for

More information

Analysis of Different Similarity Measure Functions and their Impacts on Shared Nearest Neighbor Clustering Approach

Analysis of Different Similarity Measure Functions and their Impacts on Shared Nearest Neighbor Clustering Approach Aalysis of Differet Similarity Measure Fuctios ad their Impacts o Shared Nearest Neighbor Clusterig Approach Ail Kumar Patidar School of IT, Rajiv Gadhi Techical Uiversity, Bhopal (M.P.), Idia Jitedra

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information