A Comparative Impact Study of Attribute Selection Techniques on Naïve Bayes Spam Filters

Size: px
Start display at page:

Download "A Comparative Impact Study of Attribute Selection Techniques on Naïve Bayes Spam Filters"

Transcription

1 A Compaative Impact Study of Attibute Selection Techniques on Naïve Bayes Spam Filtes J. R. Méndez, I. Cid, D. Glez-Peña, F. Fdez-Riveola, M. Rocha 2 Dept. Infomática, Univesity of Vigo, Escuela Supeio de Ingenieía Infomática Edificio Politécnico, Campus Univesitaio As Lagoas s/n, 32004, Ouense, Spain {moncho.mendez icgomez dgpena iveola}@uvigo.es 2 Dept. Infomática, Univesity of Minho, Cento de Ciências e Tecnologias da Computação. Campus de Gualta, , Baga, Potugal mocha@di.uminho.pt Abstact. The main poblem of the Intenet sevice is the massive spam message delivey. Eveyday, hundeds of unwanted and unhelpful messages ae eceived by Intenet uses flooding thei mailboxes. Fotunately, nowadays thee ae diffeent kinds of filtes able to identify and automatically delete most of these messages. In ode to educe the poblem dimensionality only epesentative attibutes ae selected fom each using featue selection techniques. This wok pesents a compaison among five well-known featue selection stategies when they ae applied in conunction with fou diffeent types of Naïve Bayes classifies. The esults obtained fom the expeiments caied out show the elevance of choosing an appopiate featue selection technique in ode to obtain accuate esults. Intoduction and Motivation Duing the last yeas, Intenet has become an extemely impotant communication and infomation exchange platfom. In this context, elevant authoities have intoduced some stategic plans in ode to pomote the usage of Intenet and the newest communication technologies. Included into this plans, we can cite i200, a Euopean stategic pogamme designed to boost economical and social evolution based on a new society of knowledge []. Fo the development of these plans, seveal socioeconomic aspects, communication infastuctues, and education level fo the infomation society have been evaluated. Nevetheless, although the toubles caused by the delivey of spam messages ae upseting Intenet uses, these pogammes have not taken this fact into consideation. We believe that sevice and electonic delivey of instant messages ae one key matte fo the evolution of the infomation society. In this context, thee is a compelling need fo inceasing the classification accuacy of existing filtes in ode to automatically detect and dop spam messages. Nowadays, Intenet sevice is usually used by the vast maoity of the Intenet uses [2]. This fact ensues the efficacy of the advetising messages sent though Intenet [3]. Spam identification is a difficult task because spammes (spam message sendes) use ticks in ode to avoid spam filtes and ensue thei deliveies.

2 Moeove, the misclassification eos of anti-spam systems pesent diffeent cost values. False positive eos (legitimate messages classified as spam) ae unacceptable fo a geat amount of uses. Fom a complementay point of view, the pesence of a false negative eo (spam message classified as legitimate) is less hamful than a false positive misclassification. Geneally speaking, thee ae two kind of spam filteing techniques: (i) collaboative systems and (ii) content-based appoaches. The fome ae based on shaing identifying infomation fom spam messages in a filteing community while the late ae based on a deep analysis of the message content in ode to identify its class (usually using machine leaning techniques). This wok is focused in Naïve Bayes filtes, an accuate and well-known content-based technique based on combining the pobability of finding tems in spam and legitimate messages. Content-based spam filtes analyze the wods extacted fom the available messages. Although, each tem could be a candidate featue that should be analyzed fo spam filteing, this is not possible in pactice because the amount of wods extacted fom the whole copus is vey lage. The usage of lage featue vectos with machine leaning techniques is not advisable because it can cause the loss of efficiency and accuacy in existing filtes [4]. Theefoe, seveal featue eduction techniques need to be applied as a pe-pocessing stage pevious to the constuction of any spam filteing system. These techniques have been designed fo the dimensionality eduction and thei goal is to discad attibutes that do not povide essential infomation fo the classification task. This wok pesents a compaative study fo the impact of five featue selection methods when using fou vaiants of the oiginal Naïve Bayes algoithm woking as spam filte. The featue selection methods studied ae the following: (i) Infomation Gain (IG) (ii) Odds atio (OR), (iii) Document Fequency (DF) (iv) χ 2 statistic and (v) Mutual Infomation (MI). Moeove, we have analyzed the following Naïve Bayes altenatives: (i) Multivaiate Benoulli, (ii) Multinomial Naïve Bayes, (iii) Multivaiate Gaussian, and (iv) Flexible Bayes. The emaining of the pape is stuctued as follows: Section 2 pesents fou successful Naïve Bayes appoaches fo spam classification. Section 3 intoduces the details of seveal featue selection techniques used in the spam filteing domain. The expeimental potocol and the empiical evaluation esults ae showed in Section 4. Finally, Section 5 summaizes the main conclusions extacted fom this wok and outlines futue eseach lines. 2 Naïve Bayes fo Spam Filteing Nowadays, the vast maoity of commecial anti-spam filteing tools ae based on the usage of Naïve Bayes filtes [5, 6, 7]. This section pesents a compilation of diffeent ways of applying this technique fo spam filteing. Naïve Bayes classifies epesent each message, d, as a featue vecto in the fom x = { x,..., xm}, whee each x i stands fo the value of an attibute containing infomation about a token (tem o wod) identified in the taget . Keeping in mind

3 the Bayes theoem [2], the pobability of a given message belonging to the class c (spam, c s o legitimate, c l ) can be computed as shown in Expession (). p ( c) p( x c) pc ( x) = () px ( ) A Naïve Bayes classifie assigns to each message the class maximizing p c p x c whee p(c ) epesents the pobability of class c and p( x c ) is ( ) ( ) the pobability of finding a vecto x in the categoy c. Theefoe, in the spam filteing domain, we can classify a message d as spam when Expession (2) becomes tue: p(c s ) p( x c s ) p(c s ) p( x c s ) + p(c l ) p( x c l ) > T (2) whee c s and c l epesent the spam and legitimate classes espectively, and T is a theshold that epesents the equied secuity level included in the inteval [0, ]. The most common value fo T is 0.5 [8]. Thee ae seveal vaiants of the Naïve Bayes algoithm able to cope with the poblem of spam filteing. The main diffeence between them is the way to compute the pobability of finding a message that contains the featue vecto x consideing only those s belonging to class c, p( x c ). In this context, we can find the following altenatives: (i) Multivaiate Benoulli, (ii) Multinomial NB (iii) Multivaiate Gaussian and, (iv) Flexible Bayes. Multivaiate Benoulli is a vaiant of Naïve Bayes that epesents each message as a featue vecto x = { x,..., xm}, whee each element x i is a boolean attibute epesenting if the wod appeas on the taget message o not. Moeove, this vaiant consides that esults ae independent fo each categoy [9]. Multivaiate Benoulli computes the pobability p( x c ) as shown in Expession (3): ( ) ( x ) i p x c p t c p t c m xi ( ) = ( i ) ( i ) i= whee the pobability of finding a tem t i in a given message belonging to class c, p( t c ), is calculated using a Laplacean pio as shown in Expession (4). i (3) ( i c) p t + M = 2 + M ti, c c (4) whee M ti, cis the numbe of messages belonging to class c (spam o legitimate) that contains the tem t i and M c stands fo the amount of messages in class c.

4 Multinomial NB uses a vecto x = { x x },..., m in ode to epesent each message d, whee each element x i is epesented by a boolean attibute that indicates the pesence o absence of the tem t i in the message [2]. Moeove, thee is an altenative fo Multinomial NB based on epesenting each element x i as the numbe of appeaances of each tem t i in the message d. Nevetheless, this vaiant has showed to achieve p x c is computed as Expession (5) shows. poo esults [8]. In this case, ( ) i= ( i c) m p t p( x c ) = p( d ) d! x! whee x i is the value fo the tem t i and p(t i c ) is the pobability of finding documents containing the tem t i when only messages fom class c ae selected. As d is independent fom categoy c, thee is no need to calculate the sub-expessions p(d) and d! [0]. Moeove, each pobability p( ti c ) is estimated by means of a Laplacean pio as Expession (6) shows. + Nt i, c pt ( i c) = (6) m+ N whee N ti, c is the numbe of messages belonging to class c (spam o legitimate) that contain the tem t i, and N c stands fo the amount of messages belonging to class c. Multivaiate Gaussian uses continuous attibutes epesenting the fequency of the tems in a message. It assumes, in compaison with Multinomial NB, that the distibution associated to each tem is a Gaussian distibution fo each class c. Moeove, this vaiant consides that the values of the attibutes ae independent in each categoy [8]. The pobability p( x c ) is computed as Expession (7) shows c m px ( c) = gx ( ; μ ; σ ) i ic, ic, i= whee μic, and σ ic, epesent the mean and the standad deviation of the appeaance fequency of the tem t i in messages belonging to class c. Flexible Bayes [] woks in a simila way than Multivaiate Gaussian, but the distibutions of each attibute x i ae estimated by means of L i Gaussian distibutions epesenting each diffeent value fo the attibute in each class. Theefoe, the pob- p x c is computed as Expession (8) shows. ability ( ) i x i (5) (7)

5 m m Li ( ) = ( ) = i ( i; μlc,, σ, ) lc p x c p x c g x L i i i l= (8) whee L i epesents the numbe of diffeent values fo the attibute x i in the categoy c, μlc, is the l-th value fo attibute x i in categoy c and σ lc, epesents the standad deviation of the l-th value fo the attibute x i. In ode to simplify the calculation, σ is estimated as Expession (9) shows. lc, σ = lc, M c (9) whee M c is the numbe of messages belonging to categoy c []. Despite the simplicity of Naïve Bayes, the execution of featue eduction techniques is advisable in ode to dop unhelpful infomation gatheed fom s. Next section intoduces some featue selection techniques commonly used on spam filteing domain. 3 Featue Selection Techniques Thee ae a lot of available techniques fo featue selection puposes [2]. In this wok, we have consideed the usage of five well-known featue eduction stategies commonly used on the text mining domain. This section descibes the application of the following techniques: (i) Infomation Gain (IG), (ii) Odds atio (OR), (iii) Document Fequency (DF), (iv) χ 2 statistic and (v) Mutual Infomation (MI). IG is able to measue the numbe of bits that wee acquied fo the classification of spam and legitimate messages fom using the pesence o absence of a tem in a message [2]. If {c } n = epesents the set of categoies (spam o legitimate), the Infomation Gain of a tem t i is computed as Expession (0) shows. n ( i) = ( ) log ( ) IG t p c p c = n ( i) ( ) log ( i) + p t p c p c t = n ( i) ( ) log ( i) + p t p c p c t = whee p(t i ) is the pobability of finding a message with the tem t i, and p(c t i ) stands fo the pobability of an belonging to categoy c and containing the tem t i. OR is able to find tems commonly included in messages belonging to a cetain categoy. The meaning of this measue is the following: wods that appea in both (0)

6 spam and legitimate classes ae assigned an OR scoe nea to, othewise, tems with ae epesentative of a cetain class pesent an OR value highe than [3]. OR is computed as Expession () shows. ( i, ) OR t c ( i ) ( ) i p ( ti c) p( ti c) p t c p t c = i whee p( t c ) epesents the pobability of finding the tem t i in messages belonging to categoy c and ( i ) () p t c stands fo the pobability of finding the tem t i in e- mails fom opposite class to c. The DF measue epesents the numbe of messages whee a given tem appeas. Fo each tem t i, this method computes the numbe of s fom the taining copus containing it. Then those tems having lowe DF values ae discaded [2]. χ 2 statistic is able to test the hypothesis of the independency of two diffeent vaiables. Using a tem t i and a categoy c, Expession (2) shows the way to compute χ 2 statistic. χ 2 ( t, c ) = i 2 N ( A D C B) ( A+ C) ( B+ D) ( A+ B) ( C+ D) whee A is the amount of documents belonging to class c and containing the tem t i, B stands fo the numbe of documents containing the tem t i and belonging to the opposite categoy of c, C epesents the numbe of documents fom class c that do not contain the tem t i, D is the numbe of documents that does not contain the tem t i and does not belong to categoy c, and finally, N epesents the amount of available messages. χ 2 statistic eaches a value of 0 if t i and c ae independent. This method usually calculates the measue χ 2 fom each tem and categoy. The esults achieved fo the diffeent categoies can be computed as Expession (3) shows [2]. χ n ( t ) = p( c ) χ ( t, c ) 2 2 avg i i = (2) (3) MI is a technique fo statistic modelling of the language. Fo a given tem t i and a categoy c, MI scoe can be computed as Expession (4) shows. ( i ) p( ti c) A N ( ) p( c ) ( A+ C) ( A+ B) MI t, c = log log p t i whee A, B, C, D and N ae defined as peviously mentioned, p(t i ) epesents the pobability of finding a message with the tem t i, and p(t i c ) stands fo the pobability of finding a document fom categoy c containing the tem t i. Similaly to χ 2 statis- (4)

7 tic, MI(t i, c s ) and MI(t i, c l ) (The MI scoes fo the tem t i in spam and legitimate classes) can easily be combined as shown in Expession (3). Once the diffeent Naïve Bayes vaiants and the selected featue selection methods have been intoduced, next section pesents the expeimental potocol designed fo the empiical evaluation caied out as well as the esults achieved duing the execution of the expeiments. 4 Expeimental Setup and Results This section pesents the expeimental potocol designed fo the evaluation of the diffeent featue selection methods when they ae used in conunction with Naïve Bayes filtes. Moeove, we pesent the esults achieved duing the expeimentation caied out. Despite pivacy issues associated with legitimate messages, ecently some compilations have been published though Intenet. Fom these copuses, we highlight LingSpam [3] and SpamAssassin [4]. Given the geat amount of messages, we have selected the SpamAssassin copus fo the execution of the diffeent expeiments. Moeove, we have used only space chaactes as token sepaato and a stopwod emoval pe-pocessing technique as ecommended in [8]. All expeiments have been caied out using featue vectos containing 000 attibutes fo epesenting each message. Finally, in ode to ensue the quality of the achieved esults, we have used a 0 statified fold-coss validation [9]. Fo compaison puposes, we have used 5 well-known accuacy measues: (i) pecentage of false positives, false negatives and coect classifications, (ii) batting aveage, (iii) ecall and pecision, (iv) F-scoe and balanced F-scoe using diffeent β values and (v) Total Cost Ratio using diffeent values fo λ. Figue shows, the esults fo the false positive (FP), false negative (FN) and coect classifications (OK) achieved by the diffeent Naïve Bayes appoaches using the selected featue selection methods. The amount of FP eos should be caefully studied in ode to pevent the elimination of legitimate messages fom the inbox of final uses [5]. As we can see fom Figue (a), the wost method fo featue selection when using a Multivaiate Benoulli classifie is OR, while DF poduces the highest pecentage of coect classifications (90.67%) with a lowe amount of FP eos. Although, the MI method geneates the lowest FP eo ate, the numbe of eos achieved by using it is vey high. On the othe hand Figue (b), whee a Multinomial Naïve Bayes is used, OR pesents a poo pefomance (achieving the pecentages of 65% of FP eos and 9.43% of coect classifications). The method with the highest pecentage of coect classifications is DF (85.53%). Nevetheless, this method still pesents geat amount of FP eos (2%). Finally, although MI pesents the lowest FP ate, the pecentage of coect classifications is not vey good (72%). In Figue (c), the esults fo a Mutivaiate Gaussian NB ae shown and OR featue selection method behaves bette than othe techniques achieving a high pecentage of coect classifications (92.06%) as well as, the lowest amount of FP eos.

8 Finally, analysing the esults fom using a Flexible Bayes classifie in Figue (d), we can ealize that the OR featue selection technique achieves the highest amount of coect classifications (93.43%). Moeove, the use of this method does not intoduce FP eos. Theefoe, this combination epesents a good appoach fo spam filteing. IG also poduces a elatively high pefomance ate (75.08%) with a low amount of FP eos. Finally, the MI method should be discaded fo spam filteing woking with Flexible Bayes because it achieves a geat amount of FP eos (65%). 00% 00% 90% 90% 80% 80% 70% 70% 60% %FP 60% %FP 50% %FN 50% %FN 40% %OK 40% %OK 30% 30% 20% 20% 0% 0% 0% 0% MI CHI DF INFO OR (a) Multivaiate Benoulli MI CHI DF INFO OR (b) Multinomial NB 00% 00% 90% 90% 80% 80% 70% 70% 60% %FP 60% %FP 50% %FN 50% %FN 40% %OK 40% %OK 30% 30% 20% 20% 0% 0% 0% 0% MI CHI DF INFO OR (c) Multivaiate Gaussian MI CHI DF INFO OR (d) Flexible Bayes Figue. Pecentage of coect classifications, FP and FN eos ove the SpamAssassin copus Afte a pecentage accuacy evaluation we have analyzed pecision, ecall, F-scoe and balanced F-scoe measues fo the compaison of the selected poposals. Recall estimates the filte pefomance (a high scoe indicates that the vast maoity of spam messages ae detected) while pecision stands fo a secue opeation (geat scoe when no FP eos ae achieved). In ode to combine pecision and ecall measues two new measues have been ecently intoduced [6]. F-scoe is equal to when the evaluated classifie does not pesent eos. Balanced F-scoe woks similaly than F- scoe but it includes a weighted facto β in ode to establish the elevance between pecision and ecall. It can be computed as Expession (5) shows. f scoe β = (β 2 + ) pecision ecall β 2 pecision + ecall (5) If β is equal to, then F-scoe gets the same value than balanced F-scoe. Moeove, if β is geate than, pecision is consideed moe impotant that ecall. Othe-

9 wise, ecall is assumed as the most impotant citeion [6]. Table pesents a pecision and ecall analysis fo the use of diffeent featue selection methods in combination with Multivaiate Benoulli vaiant of Naïve Bayes. Table. Pecision, ecall, F-scoe and balanced F-scoe using Multivaiate Benoulli Pecision Recall F-scoe balanced F-scoe (β=2) A look at Table shows that in this case, DF clealy achieves the best scoes fo ecall and pecision. Table 2 shows a compaison of the analyzed featue selection techniques with Multinomial Naïve Bayes using the above mentioned measues. Table 2. Pecision, ecall, F-scoe and balanced F-scoe using Multinomial Naïve Bayes pecision ecall F-scoe balanced F-scoe (β=2) Analyzing Table 2, it is clea that the usage of OR in conunction with Multinomial NB geneates a poo pecision (geat amount of FP eos). Moeove, the DF method achieves the best value fo pecision. Finally, χ 2, DF and IG ae able to detect a geat amount of spam messages (ecall is geate). Table 3 pesents the pevious measues achieved by using the diffeent featue selection methods with Multivaiate Gaussian. Table 3. Pecision, ecall, F-scoe and balanced F-scoe using Multivaiate Gaussian pecision ecall 0, F-scoe 0, balanced F-scoe (β=2) 0, In this case, it is visible that the OR method pesents a high pecision ate as well as the highest ecall scoe. Finally, Table 4 shows the evaluation of the scenaio whee a Flexible Bayes classifie is used. In this scenaio, OR achieves the highest pecision level. This value means that thee ae no FP eos. Moeove, MI achieves a geat amount of FP eos. The analysis of F-scoe measue shows that OR is the most eliable featue selection method fo Flexible Bayes. Table 4. Pecision, ecall, F-scoe and balanced F-scoe β=2 using Flexible Bayes pecision ecall F-scoe balanced F-scoe (β=2)

10 We have also used batting aveage and TCR scoes fo compaison puposes. Batting aveage measues the ability to detect spam messages (effectiveness) and the capacity of geneating a small amount of FP eos (pecision). This measue is a pai hit ate/stike ate, whee the fome epesents the ate of spam messages detected and the late the amount FP eo ate [7]. TCR is a pefomance measue fom a cost point of view applied to spam filtes. It uses a λ paamete that shows the cost popotion between FP and FN eos. When TCR is computed, a FP is consideed λ times moe expensive than a FN eo [8]. It can be calculated as shown in Expession (6). TCR λ = nspam λ fp + fn whee fp and fn epesent the false positive and false negative amount and nspam stands fo the numbe of spam messages. High TCR scoes indicate low global cost while TCR scoes unde indicate that the usage of the classifie is wose than manually classifying the documents. Table 5 pesents the TCR and batting aveage esults achieved using the available featue eduction stategies with Multivaiate Benoulli. Table 5. TCR and batting aveage using Multivaiate Benoulli TCR λ= TCR λ= TCR λ= batting aveage 0.302/ 0.025/ / / /0.00 As we can see fom Table 5, DF, MI and χ 2 methods pesent the geatest pefomance in this scenaio. Moeove, the DF method obtains the lowest amount of FP eos. Table 6 shows the TCR and batting aveage scoes fo the diffeent featue selection methods when Multinomial Naïve Bayes filte is used. Table 6. TCR and batting aveage using Multinomial Naïve Bayes TCR λ= TCR λ= TCR λ= batting aveage 0.06/ / / / /0.346 As Table 6 shows, DF and χ 2 methods seem to be the most viable featue eduction stategies fo use in this scenaio. Table 7 shows the TCR and batting aveage scoes fo the diffeent featue selection methods using Multivaiate Gaussian. (6)

11 Table 7. TCR and batting aveage using Multivaiate Gaussian TCR λ= TCR λ= TCR λ= batting aveage 0.689/ / / / /0.76 As we can ealize fom Table 7, OR is clealy the best option fo use in this context. Table 8 shows the esults of batting aveage and TCR fo the diffeent featue selection stategies when using Flexible Bayes classifie. Table 8. TCR and batting aveage using Flexible Bayes TCR λ= TCR λ= TCR λ= Batting aveage 0.83/ / / / /0.329 Analyzing the TCR values showed in Table 8, we can see that the best method fo this scenaio is OR. Moeove, the est of the methods ae vey poo fom a cost pespective. Fom anothe point of view, OR pesents a stike ate equal to 0 guaanteeing the geat pefomance of Flexible Bayes woking with an OR featue selection. 5 Conclusions and Futhe Wok This pape pesents and compaes seveal featue selection methods commonly used in the context of text mining in conunction with fou diffeent Naïve Bayes classifies. In ode to evaluate the poposals, we have designed an empiical test using seveal measues commonly used in the domain of spam filteing. To sum up the main conclusions, the OR method pesents a high pefomance level when it is used with Gaussian-based Naïve Bayes algoithms. Nevetheless, the esults achieved by using Laplace-based Naïve Bayes vaiants ae vey poo. These appoaches wok bette when using DF, IG and χ 2 methods fo featue selection. Expeiments have shown that MI method should be discaded fo spam filteing. Fom anothe point of view, OR, χ 2, DF o IG methods should be selected taking into consideation the taget classifie. As futue wok, a pomising diection would be the possibility of using continuous updating stategies in conunction with Naïve Bayes spam filtes. The spam filteing domain is constantly changing and pesents the poblem of concept dift []. Theefoe, the usage of lazy leaning stategies should wok bette than the application of eage leaning algoithms. Moeove, some dynamical evaluation appoaches must be designed fo the filtes. This kind of assessment should pemit the evaluation of the impact of dynamical changes on the envionment.

12 Refeences. Euopean Commission: i200 - A Euopean Infomation Society fo gowth and employment. [ (2007) 2. CadCommunications - Siteband Copoation: Tends Repot [ (2007) 3. Cunningham, P., Nowlan, N., Delany, S. J., Haah, M.: A Case-Based Appoach to Spam Filteing than Can Tack Concept Dift. Poceedings of the 5th Intenational Confeence on Case Based Reasoning, ICCBR-2003, Wokshop of Long-Lived CBR Systems (2003), Jain, A., Zongke, D.: Featue Selection: Evaluation, Application, and Small Sample Pefomance, IEEE Tansactions on Patten Analysis and Machine Intelligence (997), Vol. 9(2), Petes, T., Robinson, G., Hooft, R., Hammond, M., Meye, T., Tue, S., Walke, A., Hindle, C., Pickett, N., Stone, T.: SpamBayes Poect. [ (2002) 6. Mozilla Poect: Mozilla Spam Filte. [ 7. Buton Compute Copoation: SpamPobe: A Fast Spam Bayesian Filte. [ (2002) 2. Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifie unde zeoone loss. Machine Leaning (997), Vol. 29, Andoutsopoulos, I., Metsis, V., Paliouas, G.: Spam Filteing with Naive Bayes Which Naive Bayes?. Poceedings of the 3d Confeence on and AntiSpam (2006) 4. Andoutsopoulos, I., Koustias, J., Chandinos, K.V., Paliouas, G., Spyopoulos, C.: An Evaluation of Naïve Bayesian Anti-Spam Filteing. Poc. of the Wokshop on Machine Leaning in the New Infomation Age at th Euopean Confeence on Machine Leaning (2000), Schneide, K. M.: A compaison of event models fo Naive Bayes anti-spam filteing. 0th Confeence of the Euopean Chapte of the ACL, Budapest, Hungy (2003). John, G., Langley, P.: Estimating continuous distibutions in Bayesian classifies. Poceedings of the th Confeence on Uncetainty in Atificial Intelligence (995), Yang, Y., Pedesen, J.: A Compaative Study on Featue Selection in Text Categoization. Poceedings of the 4th Intenational Confeence on Machine Leaning (997), Andoutsopoulos, I.: Ling Spam Copus [ (2000) 4. Mason, J.: The Apache SpamAssassin Poect [ (2005) 5. Fdez-Riveola, F., Iglesias, E. L., Díaz, F., Méndez, J. R., Cochado, J. M.: Applying Lazy Leaning Algoithms to Tackle Concept Dift in Spam Filteing. Expet Systems With Applications, (2007) Vol. 33(), Shaw, W. M., Bugin, R., e Howell, P.: Pefomance standads and evaluations in IR test collections: Cluste-based etieval models. Infomation Pocessing and Management (997) 7. Gaham-Cumming, J.: Undestanding Spam Filte Accuacy. JGC spam and anti-spam newslette (2004) 8. Méndez, J. R., Iglesias, E. L., Fdez-Riveola, F., Díaz, F. y Cochado, J. M.: Tokenising, Stemming and Stopwod Removal on Anti-Spam Filteing Domain. Lectue notes in atificial intelligence (2006), Vol. 447, Kohavi, R.: A study of coss-validation and bootstap fo accuacy estimation and model selection. Poceedings of the 4th Intenational Joint Confeence on Atificial Intelligence (995), 37-43

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

BUPT at TREC 2006: Spam Track

BUPT at TREC 2006: Spam Track BUPT at TREC 2006: Spam Tac Zhen Yang, Wei Xu, Bo Chen, Weian Xu, and Jun Guo PRIS Lab, School of Infomation Engineeing, Beijing Univesity of Posts and Telecommunications, 100876, Beijing, China yangzhen@pis.edu.cn

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY

AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY Chistophe Waceman (1), William G. Pichel (2), Pablo Clement-Colón (2) (1) Geneal Dynamics Advanced Infomation Systems, P.O. Box 134008 Ann Abo

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Strictly as per the compliance and regulations of:

Strictly as per the compliance and regulations of: Global Jounal of HUMAN SOCIAL SCIENCE Economics Volume 13 Issue Vesion 1.0 Yea 013 Type: Double Blind Pee Reviewed Intenational Reseach Jounal Publishe: Global Jounals Inc. (USA) Online ISSN: 49-460x &

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Optimal Adaptive Learning for Image Retrieval

Optimal Adaptive Learning for Image Retrieval Optimal Adaptive Leaning fo Image Retieval ao Wang Dept of Compute Sci and ech singhua Univesity Beijing 00084, P. R. China Wangtao7@63.net Yong Rui Micosoft Reseach One Micosoft Way Redmond, WA 9805,

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

Machine Learning for Automatic Classification of Web Service Interface Descriptions

Machine Learning for Automatic Classification of Web Service Interface Descriptions Machine Leaning fo Automatic Classification of Web Sevice Inteface Desciptions Amel Bennaceu 1, Valéie Issany 1, Richad Johansson 4, Alessando Moschitti 3, Romina Spalazzese 2, and Daniel Sykes 1 1 Inia,

More information

Assessment of query reweighing, by rocchio method in farsi information retrieval

Assessment of query reweighing, by rocchio method in farsi information retrieval Univesity of Wollongong Reseach Online Univesity of Wollongong in Dubai - Papes Univesity of Wollongong in Dubai 2008 Assessment of quey eweighing, by occhio metho in fasi infomation etieval F Sabooi Bu-Ali

More information

LOSSLESS audio coding is used in such applications as

LOSSLESS audio coding is used in such applications as INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2013, VOL. 59, NO. 1, PP. 17 23 Manuscipt eceived Januay 10, 2013; evised Mach, 2013. DOI: 10.2478/eletel-2013-0002 Novel Ideas fo Lossless Audio Coding

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION Intenational Achives of the Photogammety Remote Sensing and Spatial Infomation Sciences Volume XXXIX-B3 2012 XXII ISPRS Congess 25 August 01 Septembe 2012 Melboune Austalia MULTI-TEMPORAL AND MULTI-SENSOR

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

A Study of Semi-Discrete Matrix Decomposition for LSI in Automated Text Categorization

A Study of Semi-Discrete Matrix Decomposition for LSI in Automated Text Categorization A Study of Semi-Discete Matix Decomposition fo LSI in Automated ext Categoization Wang Qiang Wang XiaoLong Guan Yi School of Compute Science and echnology, Habin Institute of echnology, Habin {qwang, wangxl,

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Effective Missing Data Prediction for Collaborative Filtering

Effective Missing Data Prediction for Collaborative Filtering Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

3D Hand Trajectory Segmentation by Curvatures and Hand Orientation for Classification through a Probabilistic Approach

3D Hand Trajectory Segmentation by Curvatures and Hand Orientation for Classification through a Probabilistic Approach 3D Hand Tajectoy Segmentation by Cuvatues and Hand Oientation fo Classification though a Pobabilistic Appoach Diego R. Faia and Joge Dias Abstact In this wok we pesent the segmentation and classification

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

E.g., movie recommendation

E.g., movie recommendation Recommende Systems Road Map Intodction Content-based ecommendation Collaboative filteing based ecommendation K-neaest neighbo Association les Matix factoization 2 Intodction Recommende systems ae widely

More information

Detection and tracking of ships using a stereo vision system

Detection and tracking of ships using a stereo vision system Scientific Reseach and Essays Vol. 8(7), pp. 288-303, 18 Febuay, 2013 Available online at http://www.academicjounals.og/sre DOI: 10.5897/SRE12.318 ISSN 1992-2248 2013 Academic Jounals Full Length Reseach

More information

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Poceedings of the ASME 215 Dynamic Systems and Contol Confeence DSCC215 Octobe 28-3, 215, Columbus, Ohio, USA DSCC215-999 PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Jaeyeon Lee

More information

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING A. Potsis a, A. Reigbe b, E. Alivisatos a, A. Moeia c,and N. Uzunoglu a a National Technical

More information

Sequence labeling with multiple annotators

Sequence labeling with multiple annotators DOI 10.1007/s10994-013-5411-2 Sequence labeling with multiple annotatos Filipe Rodigues Fancisco Peeia Benadete Ribeio Received: 13 Novembe 2012 / Accepted: 17 August 2013 The Autho(s) 2013 Abstact The

More information

Linear Ensembles of Word Embedding Models

Linear Ensembles of Word Embedding Models Linea Ensembles of Wod Embedding Models Avo Muomägi Univesity of Tatu Tatu, Estonia avom@ut.ee Kaiit Sits Univesity of Tatu Tatu, Estonia kaiit.sits@ut.ee Sven Lau Univesity of Tatu Tatu, Estonia swen@math.ut.ee

More information

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification SAND 0-50 C Effective & Efficient Handling of Ill - Conditioned Coelation atices in Kiging & adient Enhanced Kiging Emulatos hough Pivoted Cholesky Factoization Keith Dalbey, PhD Sandia National Labs,

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Decision Support for Rule and Technique Discovery in an Uncertain Environment

Decision Support for Rule and Technique Discovery in an Uncertain Environment Decision Suppot fo Rule and Technique Discovey in an Uncetain Envionment D. James F. Smith III Naval Reseach Laboatoy, Code 5741 Washington, D.C., 0375-5000 Telephone: 0.767.5358 Fax: 0.404.7690 jfsmith@dsews.nl.navy.mil

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

User Group testing report

User Group testing report Use Goup testing epot Deliveable No: D6.10 Contact No: Integated Poject No. 506723: SafetyNet Aconym: SafetyNet Title: Building the Euopean Road Safety Obsevatoy Integated Poject, Thematic Pioity 6.2 Sustainable

More information

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA Methods fo histoy matching unde geological constaints Jef Caes Stanfod Univesity, Petoleum Engineeing, Stanfod CA 9435-222, USA Abstact Two geostatistical methods fo histoy matching ae pesented. Both ely

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints

Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints Optimal Spoadic Location Pivacy Peseving Systems in Pesence of Bandwidth Constaints ABSTRACT Michael Hemann KU Leuven ESAT/COSIC, iminds Leuven, Belgium michael.hemann@esat.kuleuven.be Claudia Diaz KU

More information