Spam Detection Through Sliding Windowing of Headers

Size: px
Start display at page:

Download "Spam Detection Through Sliding Windowing of Headers"

Transcription

1 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada C/ Perodsta Danel Saucedo Aranda, s/n Granada (Span) Phone: Fax: Emal: fjsalc@ugr.es, jedv@ugr.es, pgteodor@ugr.es FJSC and JEDV 2011

2 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Index 1. Introducton 2. Prevous Work on Spam Avodance 3. Segmental Approach for Spam Detecton a. Statc Parameterzaton of Headers b. Sldng Wndowng of E-mal headers 4. Segmental-based HMM-based E-mal Detecton 5. Expermental Results a. Framework b. Detecton usng statc parameterzaton c. HMM-based system wth dynamc parameterzaton 6. Conclusons 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 2

3 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Introducton Spam s a bg problem: Tme expended by users deletng spam Computer memory wasted Internet Servce Provders bandwdth wasted Illustratve fgures: In 2008 more than 90% of e-mal were abusve 1 Companes lost more than $70 bllon just n workers' productvty only n USA durng Source: Messagng Ant-Abuse Workng Group (MAAG) 2 Source: Nucleus Research 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 3

4 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Prevous Work on Spam Avodance A wde varety of solutons to fght aganst spam Ant-Spam Strateges/Technques Preventve Healng (Flters) Protocol changes Laws Whtelsts/ blacklsts K-Nearest- Neghbour (KNN) Case-based (ECUE, SpamHuntng) Bayesan Flters Non-machne learnng Machne Learnng Support Vector Machnes (SVMs) Boostng algorthms (Adaboost) Compresson- Based Systems (DMC) 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 4

5 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Prevous Work on Spam Avodance Most of ant-spam methods: Tokenzaton-based Use the body of e-mals (some header felds) Language-dependent and weak M0n y nstead money Volates users prvacy (llegal n many countres) Fco. Javer Salcedo Campos C/ Perodsta Manuel Saucedo The technque proposed: Unversty of Granada H, I m tryng to explan you what are the problems dervated to nspect the body of the e-mals. I don t know what s happen wth ths object. It s awfull. See you later. Based on a new perspectve: e-mal headers are nterpreted as a dgtal sgnal No nspecton of the body s needed (avods prvacy and legal concerns) Independent of the language or body encrypton used n e- mals. 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 5

6 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental Approach for Spam Detecton Statc Parameterzaton of Headers Headers can be descrbed as a sequence of elements of a vocabulary H h1h 2... h T h V V { h 1 K} f K count ( v, H ) j1 count ( v j, H ) p H) f, f,..., ( 1 2 Return-Path: <morukn@andn.org> 0,09 Delvered-To: jgll@gmal.com 0,08 Receved: from amysktchen.net 0,07 (unknown [ ])by mal2.gmal.com (Postfx) wth SMTP d 23C for 0,06 <jgll@gmal.com>; Sat, 23 Jan :25: ,05 (MET) From: Approved 0,04 Store <morukn@andn.org> Subject: New Year 0,03 Sales To: <jgll@gmal.com> 0,02 0,01 Message-Id: < C @mal2.gmal.com> 0 Date: Sat, 23 Jan :25: <? \ _ b e h k n q t w z character count fk 0 = 16 1 = = 5 : = 8 ; = 1... a = 20 b = 5... z = 0 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 6

7 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental Approach for Spam Detecton Sldng Wndowng of E-mal headers Header are consdered as dgtal sgnals codfed n ASCII H h1h 2... ht h V Segmentaton: wndows of W characters dsplaced Δ Return-Path: morukn@andn.org\ndelvered -To: jgll@gmal.com\nreceved: from amysk tchen.net (unknown [ ]) by mal2.g mal.com (Postfx) wth SMTP d 23C for <jgll@gmal.com>; Sat, 23 Jan :25: (MET)\nFrom: Approved Store <moru kn@andn.org> \nsubject: New Year Sales\n To: <jgll@gmal.com>\nmessage-id: C @mal2.gmal.com\nDate:S at, 23 Jan :25: \n 0,09 0,08 0,07 0,06 0,05 0,04 0,09 0,03 0,08 0,02 0,07 0,01 0,06 0,05 0 0,04 0,09 0,03 0, <? \ _ b e h k n q t w z 0,02 0,07 0,01 0,06 0,05 0 0,04 0,09 0,03 0, <? \ _ b e h k n q t w z 0,02 0,07 0,01 0,06 0,05 0 0,04 0, <? \ _ b e h k n q t w z 0,02 0,01 0 count wndow 80 characters dsplacement 40 characters <? \ _ b e h k n q t w z 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 7

8 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental Approach for Spam Detecton Sldng Wndowng of E-mal headers Improvng the dynamcs of the system: addng 1 st and 2 nd dervatves of f k n each wndow Frst order: Second order: d a k k k k ( f f W 1) k k ( d d W 1) Thus a header Q s: Q 1 2 q1 q2... qr, q f, f,... f K,d 1,d 2,...,d K,a 1,a 2,...,a K 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 8

9 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental-based HMM-based E-mal Detecton Hdden Markov Models (HMMs) have been successfully used to model processes of a sequental nature (speech recognton) Evaluaton P(λ Q) probabltes where λ s an HMM model and Q the observed header (Bayes rule) Two ntal models class ( Q) arg max{ P( Q ) P( )} { S, L} Determne topology and wndows wdth W and dsplacement Δ... START 1 2 N-1 N END States 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 9

10 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental-based HMM-based E-mal Detecton Frst experment: determne W and Δ usng 3 states models Best CA value obtaned W=25 and Δ=10 Determnng the number of states of HMMs Accordng to the topology and the length of headers (24 to 2124 segments) Soluton: Use more than one model for spam and ham dependng on the sze of the header 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 10

11 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Segmental-based HMM-based E-mal Detecton Segmental-based HMM-based E-mal Detecton Module assgnement j arg mn N 1C 5 R 19 modules SpamAssassn 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 11

12 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Expermental Results Framework SpamAssassn publc corpus (9351 e-mals wth 2.90 ham/spam rato) 10-fold stratfed cross-valdaton to ncrease the confdence n the expermental fndngs Measures to compare results 1. True Postves (TP) 2. False Postves (FP) 3. Classfcaton Accuracy (CA) n TP N nl FP N n CA SS S S L SS N L n N LL S 100 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 12

13 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Expermental Results Results usng statc parameterzaton Evaluated technques: 1. SVM: Polynomal and Gaussan functons Best results cubc and σ=5 2. KNN: 4 dstances (eucldean, ctyblock, cosne, and correlaton) and 1 to 10 nearest neghbors Best results 2 neghbors 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 13

14 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Expermental Results HMM-based system wth dynamc parameterzaton Last results usng CEAS08 corpus: TP=98.4% CA= 98.6% FP=0.4% 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 14

15 Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada Conclusons A novel method for spam detecton s proposed: a)based only n the nspecton of the headers b)consder the header as a sgnal and parameterze and process t accordngly c) Uses HMMs as basc detector d)preserves the prvacy of users e)independent of the users' language and body encrypton Smlar or better results than other methods lke SVM, Naïve Bayes, etc. 9th Internatonal Conference on Appled Cryptography and Network Securty - ACNS '11 June 7-10, 2011, Nerja (Malaga), Span v1.0 15

16 Thanks for your attenton Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada C/ Perodsta Danel Saucedo Aranda, s/n Granada (Span) Phone: Fax: Emal: fjsalc@ugr.es, jedv@ugr.es, pgteodor@ugr.es FJSC and JEDV 2011

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Improving anti-spam filtering, based on Naive Bayesian and neural networks in multi-agent filters

Improving anti-spam filtering, based on Naive Bayesian and neural networks in multi-agent filters J. Appl. Envron. Bol. Sc., 5(7S)381-386, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com Improvng ant-spam flterng, based on Nave Bayesan

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Japanese Dependency Analysis Based on Improved SVM and KNN

Japanese Dependency Analysis Based on Improved SVM and KNN Proceedngs of the 7th WSEAS Internatonal Conference on Smulaton, Modellng and Optmzaton, Bejng, Chna, September 15-17, 2007 140 Japanese Dependency Analyss Based on Improved SVM and KNN ZHOU HUIWEI and

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

Feature Extraction and Test Algorithm for Speaker Verification

Feature Extraction and Test Algorithm for Speaker Verification Feature Extracton and Test Algorthm for Speaker Verfcaton Wu Guo, Renhua Wang and Lrong Da Unversty of Scence and Technology of Chna, Hefe guowu@mal.ustc.edu.cn,{rhw, lrda}@ustc,edu.cn Abstract. In ths

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models

Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models Applyng Contnuous Acton Renforcement Learnng Automata(CARLA to Global Tranng of Hdden Markov Models Jahanshah Kabudan, Mohammad Reza Meybod, and Mohammad Mehd Homayounpour Department of Computer Engneerng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection

Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton We-Chh Hsu, Tsan-Yng Yu E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton

More information

Incremental Learning with Support Vector Machines and Fuzzy Set Theory

Incremental Learning with Support Vector Machines and Fuzzy Set Theory The 25th Workshop on Combnatoral Mathematcs and Computaton Theory Incremental Learnng wth Support Vector Machnes and Fuzzy Set Theory Yu-Mng Chuang 1 and Cha-Hwa Ln 2* 1 Department of Computer Scence and

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS46: Mnng Massve Datasets Jure Leskovec, Stanford Unversty http://cs46.stanford.edu /19/013 Jure Leskovec, Stanford CS46: Mnng Massve Datasets, http://cs46.stanford.edu Perceptron: y = sgn( x Ho to fnd

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Real-time Network Attack Intention Recognition Algorithm

Real-time Network Attack Intention Recognition Algorithm Internatonal Journal of Securty and Its Applcatons, pp.51-62 http://dx.do.org/10.14257/sa.2016.10.4.06 Real-tme Network Attack Intenton Recognton Algorthm Qu Hu and Wang Kun Zhengzhou Insttute of Informaton

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Comparison Study of Textural Descriptors for Training Neural Network Classifiers Comparson Study of Textural Descrptors for Tranng Neural Network Classfers G.D. MAGOULAS (1) S.A. KARKANIS (1) D.A. KARRAS () and M.N. VRAHATIS (3) (1) Department of Informatcs Unversty of Athens GR-157.84

More information

Development of Face Tracking and Recognition Algorithm for DVR (Digital Video Recorder)

Development of Face Tracking and Recognition Algorithm for DVR (Digital Video Recorder) IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.3A, March 2006 7 Development of Face Trackng and Recognton Algorthm for DVR (Dgtal Vdeo Recorder) Jang-Seon Ryu and Eung-Tae

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

SIGGRAPH Interactive Image Cutout. Interactive Graph Cut. Interactive Graph Cut. Interactive Graph Cut. Hard Constraints. Lazy Snapping.

SIGGRAPH Interactive Image Cutout. Interactive Graph Cut. Interactive Graph Cut. Interactive Graph Cut. Hard Constraints. Lazy Snapping. SIGGRAPH 004 Interactve Image Cutout Lazy Snappng Yn L Jan Sun Ch-Keung Tang Heung-Yeung Shum Mcrosoft Research Asa Hong Kong Unversty Separate an object from ts background Compose the object on another

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Wavefront Reconstructor

Wavefront Reconstructor A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Multi-stable Perception. Necker Cube

Multi-stable Perception. Necker Cube Mult-stable Percepton Necker Cube Spnnng dancer lluson, Nobuuk Kaahara Fttng and Algnment Computer Vson Szelsk 6.1 James Has Acknowledgment: Man sldes from Derek Hoem, Lana Lazebnk, and Grauman&Lebe 2008

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

A New Automatic Method to Adjust Parameters for Object Recognition

A New Automatic Method to Adjust Parameters for Object Recognition A New Automatc Method to Adjust Parameters for Object Recognton Issam Qaffou Département Informatque, FSSM Unversté Cad Ayyad, Mohamed Sadgal Département Informatque, FSSM Unversté Cad Ayyad Azz Elfazzk

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Support Vector Machine for Remote Sensing image classification

Support Vector Machine for Remote Sensing image classification Support Vector Machne for Remote Sensng mage classfcaton Hela Elmanna #*, Mohamed Ans Loghmar #, Mohamed Saber Naceur #3 # Laboratore de Teledetecton et Systeme d nformatons a Reference spatale, Unversty

More information

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Machine Learning. Topic 6: Clustering

Machine Learning. Topic 6: Clustering Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess

More information

Potential Malicious Users Discrimination with Time Series Behavior Analysis

Potential Malicious Users Discrimination with Time Series Behavior Analysis Murat Semerc MURAT.SEMERCI@BOUN.EDU.TR Al Taylan Cemgl TAYLAN.CEMGIL@BOUN.EDU.TR Department of Computer Engneerng, Bogazc Unversty, 34342, Bebek, Istanbul, Turkey Bulent Sankur BULENT.SANKUR@BOUN.EDU.TR

More information

RECOGNIZING GENDER THROUGH FACIAL IMAGE USING SUPPORT VECTOR MACHINE

RECOGNIZING GENDER THROUGH FACIAL IMAGE USING SUPPORT VECTOR MACHINE Journal of Theoretcal and Appled Informaton Technology 30 th June 06. Vol.88. No.3 005-06 JATIT & LLS. All rghts reserved. ISSN: 99-8645 www.jatt.org E-ISSN: 87-395 RECOGNIZING GENDER THROUGH FACIAL IMAGE

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Three supervised learning methods on pen digits character recognition dataset

Three supervised learning methods on pen digits character recognition dataset Three supervsed learnng methods on pen dgts character recognton dataset Chrs Flezach Department of Computer Scence and Engneerng Unversty of Calforna, San Dego San Dego, CA 92093 cflezac@cs.ucsd.edu Satoru

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Classifier Swarms for Human Detection in Infrared Imagery

Classifier Swarms for Human Detection in Infrared Imagery Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

Fingerprint matching based on weighting method and SVM

Fingerprint matching based on weighting method and SVM Fngerprnt matchng based on weghtng method and SVM Ja Ja, Lanhong Ca, Pnyan Lu, Xuhu Lu Key Laboratory of Pervasve Computng (Tsnghua Unversty), Mnstry of Educaton Bejng 100084, P.R.Chna {jaja}@mals.tsnghua.edu.cn

More information

Relevance Feedback Document Retrieval using Non-Relevant Documents

Relevance Feedback Document Retrieval using Non-Relevant Documents Relevance Feedback Document Retreval usng Non-Relevant Documents TAKASHI ONODA, HIROSHI MURATA and SEIJI YAMADA Ths paper reports a new document retreval method usng non-relevant documents. From a large

More information

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed

More information

COMPARISON OF ENHANCED SCHEMES FOR AUDIO CLASSIFICATION

COMPARISON OF ENHANCED SCHEMES FOR AUDIO CLASSIFICATION Volume 4, No. 1, December 13 Journal of Global Research n Computer Scence REVIEW ARTICLE Avalable Onlne at www.grcs.nfo COMPARISON OF ENHANCED SCHEMES FOR AUDIO CLASSIFICATION Dr. V. Radha *1 and G.Anuradha

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Using Neural Networks and Support Vector Machines in Data Mining

Using Neural Networks and Support Vector Machines in Data Mining Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Using an Automatic Weighted Keywords Dictionary for Intelligent Web Content Filtering

Using an Automatic Weighted Keywords Dictionary for Intelligent Web Content Filtering Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 6, No. 1, February 2015), Pages: 101-114 www.jacr.ausar.ac.r Usng

More information

MULTIRESOLUTION TEXT DETECTION IN VIDEO FRAMES

MULTIRESOLUTION TEXT DETECTION IN VIDEO FRAMES MULTIRESOLUTION TEXT DETECTION IN VIDEO FRAMES Maros Anthmopoulos, Basls Gatos and Ioanns Pratkaks Computatonal Intellgence Laboratory, Insttute of Informatcs and Telecommuncatons Natonal Center for Scentfc

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

Feature Selection as an Improving Step for Decision Tree Construction

Feature Selection as an Improving Step for Decision Tree Construction 2009 Internatonal Conference on Machne Learnng and Computng IPCSIT vol.3 (2011) (2011) IACSIT Press, Sngapore Feature Selecton as an Improvng Step for Decson Tree Constructon Mahd Esmael 1, Fazekas Gabor

More information

Support Vector Machines. CS534 - Machine Learning

Support Vector Machines. CS534 - Machine Learning Support Vector Machnes CS534 - Machne Learnng Perceptron Revsted: Lnear Separators Bnar classfcaton can be veed as the task of separatng classes n feature space: b > 0 b 0 b < 0 f() sgn( b) Lnear Separators

More information

CSCI 5417 Information Retrieval Systems Jim Martin!

CSCI 5417 Information Retrieval Systems Jim Martin! CSCI 5417 Informaton Retreval Systems Jm Martn! Lecture 11 9/29/2011 Today 9/29 Classfcaton Naïve Bayes classfcaton Ungram LM 1 Where we are... Bascs of ad hoc retreval Indexng Term weghtng/scorng Cosne

More information

Texture Feature Extraction Inspired by Natural Vision System and HMAX Algorithm

Texture Feature Extraction Inspired by Natural Vision System and HMAX Algorithm The Journal of Mathematcs and Computer Scence Avalable onlne at http://www.tjmcs.com The Journal of Mathematcs and Computer Scence Vol. 4 No.2 (2012) 197-206 Texture Feature Extracton Inspred by Natural

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl

More information

Hierarchical Semantic Perceptron Grid based Neural Network CAO Huai-hu, YU Zhen-wei, WANG Yin-yan Abstract Key words 1.

Hierarchical Semantic Perceptron Grid based Neural Network CAO Huai-hu, YU Zhen-wei, WANG Yin-yan Abstract Key words 1. Herarchcal Semantc Perceptron Grd based Neural CAO Hua-hu, YU Zhen-we, WANG Yn-yan (Dept. Computer of Chna Unversty of Mnng and Technology Bejng, Bejng 00083, chna) chhu@cumtb.edu.cn Abstract A herarchcal

More information