Adaptive Naïve Bayesian Anti-Spam Engine

Size: px
Start display at page:

Download "Adaptive Naïve Bayesian Anti-Spam Engine"

Transcription

1 Wold Academy of Scece, Egeeg ad Techology Adaptve Naïve Bayesa At-Spam Ege Wojcech P. Gajewsk Abstact The poblem of spam has bee seously toublg the Iteet commuty dug the last few yeas ad cuetly eached a alamg scale. Obsevatos made at CERN (Euopea Ogazato fo Nuclea Reseach located Geeva, Swtzelad) show that spam mals ca costtute up to 75% of daly SMTP taffc. A aïve Bayesa classfe based o a Bag Of Wods epesetato of a emal s wdely used to stop ths uwated flood as t combes good pefomace wth smplcty of the tag ad classfcato pocesses. Howeve, facg the costatly chagg pattes of spam, t s ecessay to assue ole adaptablty of the classfe. Ths wok poposes combg such a classfe wth aothe NBC (aïve Bayesa classfe) based o pas of adjacet wods. Oly the latte wll be etaed wth examples of spam epoted by uses. Tests ae pefomed o cosdeable sets of mals both fom publc spam achves ad CERN malboxes. They suggest that ths achtectue ca cease spam ecall wthout affectg the classfe pecso as t happes whe oly the NBC based o sgle wods s etaed. Keywods Text classfcato, aïve Bayesa classfcato, spam, emal. I. INTRODUCTION HE poblem of Spam (Usolcted commecal emal) has T become vey seous fo the Iteet commuty the last few yeas. I Decembe 2004 oly less tha 5% of mals avg at SMTP gateways of CERN wee legtmate (Souce: statstcs of CERN Mal Sevce ([2]). Smla fomato s head fom all pats of the wold ad oe ca hadly fd a emal use who s ot famla wth ths stuato fom hs o he pesoal expeece. Ths pheomeo s egaded as a theat to emal use poductvty, ases seously the TCO (Total Cost of Oweshp) of mal seves ad fally eve becomes a secuty ssue to may ogazatos. Fom a emal use pespectve, t hghly educes the usablty of emal eveyday lfe. I such ccumstaces t s udestadable that the wold of scece has see may woks elated to spam ecet yeas. Fom the theoetcal pot of vew, spam fghtg s a text categozato task ad a pat of the Natual Laguage Pocessg (NLP) feld. Ths pape poposes usg two depedet aïve Bayesa classfes to detect spam. The fst oe epesets a emal as Mauscpt eceved July 3, Wojcech P. Gajewsk s wth the Isttute of Cotol ad Computato Egeeg at the Wasaw Uvesty of Techology, ul. Nowowejska 5/9, Waszawa, Polad. (e-mal: wojcech.gajewsk@gmal.com). a vecto of sgle wods (ugam ad ts tag set s costat wheeas the othe epesets a emal as a vecto of pas of adjacet wods (bgam ad ts tag set s supplemeted by spam messages epoted by uses. Such a cofguato esults adaptablty of at-spam ege ad the mpovemet of classfcato pefomace. I ths secto, some specfc featues of spam detecto as a text categozato wll be metoed ad the costucto of so called Gaham's veso of aïve Bayesa classfe wll be shotly dscussed. The eade ca also fd hee some commets o elated wok. Next, the teestg featues of used algothm wll be descbed ad test esults wll be peseted. Fally, a shot dscusso wll coclude the pape. A. Spam Fghtg as a Text Classfcato Task At the fst glace, spam detecto mght appea a elatvely easy task fo two easos. Fst of all, thee ae oly two categoes whle a stadad text classfcato poblem ca have tes o moe of them. Secodly, a defto of Spam as a usolcted commecal mal may tself appea vey hemetc ad stctly elated to commece ad cosumpto goods o some vey well defed sectos of actvty as phamacy o poogaphc dusty. Both of them mght mply that we could quckly come out wth classfes whch pefomace s suffcet eough to elmate the poblem. Ufotuately, eve f ths mght have bee tue a few yeas ago, ow t s ot the case aymoe. Spammes ae awae of geeal methods used at-spam systems ad take steps to ovecome mposed baes. Some messages cota a set of adom wods that ca fluece a classfe's decso. I othes the key wods ae dvded by spaces, whch stll make t eadable by humas, but mpossble fo classfes to make a ght decso. I my opo, we could be eve obsevg a classcal amamets ace whee a mpovemet o oe sde s mmedately balaced by a eply fom the othe whch wll be aga ovecome by fst sde ad so o. Fo exteded dscusso of ths matte also cotext of spam detecto see [0]. Futhemoe, most spam messages ae owadays costucted a way that makes them as smla to legtmate emals as possble. They ca esemble a message wth Chstmas wshes fom a fed o cota oly oe ot suspcous setece (e.g. Do you wat a Watch?). These examples ae poofs that the defto of spam categoy s fuzzy. Of couse ths ca be equally sad about ay othe categoy whch wll have a ceta amout of examples suffcetly close to the bode of categoy, makg t patculaly dffcult to gve a cofdet classfcato. I case 45

2 Wold Academy of Scece, Egeeg ad Techology of spam, howeve, the fact that ceatos of those messages ae puposely tyg to make them dstgushable fom legtmates s becomg a seous poblem. All these factos make the spam detecto task moe dffcult tha a classcal task of text classfcato. I the latte case, obody s puposely tyg to make both possble categoes as smla as possble; ethe takes steps to make the classfcato moe dffcult. O the othe had, oe could fd othe featues of spam that could ease spam detecto: spam s usually set lage sees to mass ecpet. That meas that whe ecevg a patcula usolcted emal thee s a vey hgh pobablty of ecevg othe smla o detcal emals at the scope of ogazato. Pesumably, ths mechasm s elated to methods of updatg ecpet lsts used by spammes. Fally, a obsevato could be made that spam s chagg o a daly bass. Ceta malg campags ae stll ogog but othes wll quckly eplace them. To deepe aalyze the last obsevato I poposed the followg expemet. Fom spams epoted by uses at CERN dug a peod of Octobe 2004 I extacted all URLs. Ths set was the made avalable to SpamKlle (moe fomato o SpamKlle ad CERN at-spam achtectue ca be foud [3]) system that couted a umbe of emals comg to CERN cotag oly URLs aleady oted befoe. Dug the tme of the expemet, o ew URLs wee added to the set. Daly statstcs fo the ed of Octobe ae peseted at Fgue. Fg. Numbe of emals cotag URLs extacted fom a set of spams We ca see that afte 0 days of expemet oly up to 20% of the mals wee ot chaged. Of couse, a chage of the URL s possbly the easest possble to execute but ths gves a clea dea how dyamc s a pheomeo of spam. I vew of these agumets t s mpotat to esue ceta featues of evey spam detecto. It should be: Adaptve Spam pattes ae cuetly evolvg a vey dyamc way. At-spam softwae that was petty successful ot a log tme ago could today have a pefomace below the level of acceptablty o smply be useless. Ole A deal classfe wll statly adapt tself to elmate coectly classfed samples. Usg uses' feedback Oly close coopeato wth mal uses ca povde suffcet fomato to allow ole etag of spam classfes. Automatc As lage as possble depedece fom a eed of huma's teveto ca help to educe mateace costs. May at-spam eges use aïve Bayesa classfe based o a sgle wod epesetato of a emal because of ts good pefomace ad smplcty. Ole update of ts spam tag set ca, howeve, deteoate the pecso of classfcato. I popose theefoe to combe such a classfe wth aothe aïve Bayesa classfe epesetg a emal usg pas of adjacet wods. The latte classfe's tag set of spam wll be updated wth ew spam epoted by emal uses. Ths soluto, what s show by the expemets, aswes all of the metoed eeds. B. Gaham's Veso of Naïve Bayesa Classfe May woks ad pactcal mplemetatos (e.g. SpamGuu, see [4]) base o the dea of aïve Bayesa classfe ad Bag of Wods (BOW) epesetato of emals to detect spam. A patcula veso of such classfe, dffeet fom classcal (descbed fo example [9]), was peseted by Paul Gaham []. I geeal, a classfcato doe by aïve Bayesa classfe ca be descbed as choosg ths patcula categoy c fom the set of categoes C whch s the most pobable gve a w featue vecto w = M, costucted of all the wods foud w aalyzed message m: c = ag max c w) () c C c w) s computed usg Bayes fomula: c w) = C k = c) I I w c) k w c ) c ) Navety of the model comes fom the assumpto of wod depedece wth categoes. Theefoe: I w c) = w ) (3) c I spam detecto task, a set of categoes s educed oly to two elemets ( C = { s, l} ) as we ca cosde a emal as ethe beg a spam o legtmate oe. I Paul Gaham's classfe oly the pobablty of belogg to spam categoy gve the featue vecto w s k (2) 46

3 Wold Academy of Scece, Egeeg ad Techology estmated ( s w) ). Equato (3) appled togethe wth Bayes fomula yeld: w ) I w s w ) = (4) = w ) I w l) l w ) = (5) = Equatos (4) ad (5) appled to (2) yeld: s w) = s w ) + s w ) ( ) ( s w )) Gve a umbe of messages tag sets of spam ad legtmate messages ( N ad N espectvely) ad umbe of s occueces of a wod w tag sets ( s ad l ) a followg estmate s computed fo each wod dug tag pocess: s Ns s w ) = (7) s l + Ns Nl Fally, I assume a po that P ( =. Gaham s 2 veso of the classfe s bette suted fo the spam detecto task tha the classcal oe as t cludes fomato about both categoes featue pobablty computg. Ths tu smplfes featue vecto educto to mpove classfcato pefomace. Moe o classcal aïve Bayesa classfes ca be foud [5, 9]. To follow a detaled dscusso about Gaham's aïve Bayesa pobablstc techques cosult [4]. C. Pevous Wok Thee have bee seveal attempts to use addtoal kowledge elated to bgams the aïve Bayesa classfcato. I [7] the authos use bgams togethe wth sgle wods (ugam as featues the NBC the geeal text classfcato task. They ote a se of a umbe of coectly classfed postve documets (spam. Howeve, moe egatve documets wee also classfed coectly. A compaso betwee a aïve Bayesa classfe based o tems ad bgams spam ecogto ca be foud [8]. Thee, fo some paametes of classfes, the oe based o bgams ca have bette oveall pefomace. Howeve, the methodology of tag pocess s uclea. II. ALGORITHM Two modules based o Gaham's veso of aïve Bayesa classfe [] wee vestgated: oe epesetg a emal the fom of Bag of Wods (usg sgle wods - ugam ad the othe epesetg a emal as a set of pas of adjacet l (6) wods (bgam. Betwee the classfes thee ae also two othe mpotat dffeeces: The NBC based o sgle wods geeates the pobablty oly o 5 featues fo whch the followg value s hghest: P ( s w ) 0.5 (8) as t was descbed the ogal Gaham's algothm. I the case of the latte NBC the same fucto s used to choose featues (pas of adjacet wod fo the classfcato pocess. Howeve, the umbe s ot costat ad s popotoal to the message body legth. It ca be descbed as: l( m) ( l( m)) = m l( m),max(5, ) (9) 5 whee l(m) s the umbe of wods the emal body. I the case of the NBC based o bgams the assumpto has bee made that each featue located a patcula emal ad ot ecoded the classfe dctoay (ot foud the tag set) has a po low pobablty. Abtaly a value of 0.03 was chose. The assumpto of default low pobablty fo pevously usee featues case of NBC based o bgams s costucted as a aswe to the way the classfe wll be used. The tag set of spams wll potetally have a lage cadalty tha ths of solcted mals ad the pocess of etag wll oly mply elagemet of the fst set. Theefoe, teatg bgams usee the tag set as belogg to solcted categoy wll esult categozg as spam oly emals vey smla to examples exstg the spam tag set. Vey lage dctoay of pa of wods s ecouagg us to make ths assumpto. To lmt dctoay sze, a smple featue selecto algothm was mplemeted both vesos of algothms. It deleted all wods o pas of wods whch occued less tha 5 tmes the tag sets ad s based o Zpf's Law [6]. Accodg to t we ca assume that vey ae wods would have lttle fomatve stegth ad could theefoe be emoved fom tag pocess wthout much ham to classfcato pefomace. A. Mal Pasg Scheme Much cae ad atteto was dected to assue the pope pasg of a emal message. Fst of all, a multpat message was ufed to a sgle mal body cosstg oly of textual (pla text ad HTML) peces. No pat of message heade s used the classfcato pocess. Also I esue that tasfe ecodg lke `Quoted-ptable' ad `Base64' (see []) ae decoded as they ae vey ofte used to obfuscate emals. I the ext step HTML pasg s used to locate those pats of the text, whch ae vsble o vey dffcult to see by huma eadg the emal. A popula spammes techque s based o cludg some lettes, wods o eve fagmets of text sde the physcal message wth ethe fot colo equal to fot backgoud o mmal fot sze. Ths esults esults hdg pats of a text fom the eye of a use but potetally ot 47

4 Wold Academy of Scece, Egeeg ad Techology fom a classfyg ege. Fally, all the HTML tags o pseudo-html tags (aga used by spammes to obfuscate a emal) togethe wth HTML commets ad othe specal chaactes (lke ASCII Le Feed ad Caage Retu) ae emoved fom mal body leavg oly a sequece of legth of pla wods. It s used to ceate a featue vecto. III. EMPIRICAL RESULTS I ths secto the codtos of expemets ad the esults wll be peseted. A. Tag Sets Both of classfes wee taught wth a basc set of solcted mals ad spams. Solcted mals wee adomly chose fom use malboxes ad caefully vefed ot to cota ay spams. Spam set was collected dug the whole yea Those sets wll be efeeced to as basc tag sets futhe o. Tag set of spams was elaged by 963 spam mals epoted by CERN mal uses dug Decembe 2004 ad begg of Jauay Ths goup of spams wll be late efeeced to as addtoal spam set. Both classfes wee taed wth basc tag set ehaced by a addtoal oe. B. Tests Tests volve vefyg esults povded by both classfes o a gve set of spam o solcted mals. I vefy how spam detectablty could be mpoved by classfyg a emal as spam f ay of the classfes epots t as such. The most popula pefomace measues used the lteatue o spam ecogto ae spam pecso (p) ad spam ecall(): s s p = (9) s s + l s s s = (0) s s + s l whee s meas umbe of spams classfed coectly. l ad s l mea espectvely a umbe of legtmate emals ad spams classfed coectly. To facltate pesetato of esults, a abbevato NBC wll mea a aïve Bayesa classfe based o sgle wods ad NBC 2 a aïve Bayesa classfe based o adjacet pas of wods. ) Spams Repoted by Uses Ths test s pefomed o goup of spam emals epoted by uses betwee Decembe 2004 ad begg of Jauay The set used fo ths test ad the addtoal spam set wee fomed depedetly. Results of the test ca be see Table I. TABLE I SPAM REPORTED BY CERN USERS Classfcato codto s Recall NBC % NBC % NBC NBC % NBC NBC % We ca see that combg both classfes ca mpove the ecall by about 7%. Addtoal mals detected wth help of NBC 2 epeset ealy 34% of all of the false egatves ot detected by NBC. 2) Solcted Mals Extacted fom Uses Spam pecso s much moe mpotat tha spam ecall fom the pot of vew of a emal use who should be cofdet about ecevg solcted mals. Solutos leadg to spam ecall cease should theefoe be tated wth cauto beag md a possble decle of classfcato pecso. Ths ca be moe costly fom a use pot of vew tha a se of ecall ad theefoe questo the whole modfcato. To aalyze ths poblem I extacted adom mals fom CERN malboxes. Ths goup of mals was the classfed wth both NBCs taed wth all avalable tag sets (basc ad addtoal). All coectly classfed examples wee vefed to exclude the possblty of meetg eal spam the mals take fom use accouts. To vefy the mpact o each classfe's pecso, the same set of mals was the checked by NBC taught oly wth basc tag set. The esults ae peseted Table II. TABLE II LEGITIMATE S Classfe l l afte vefcato NBC NBC a NBC a Retaed usg oly basc tag set The esults clealy dcate supeoty of NBC 2 ove NBC tems of pecso. Futhemoe, they show that expadg the spam tag set the case of NBC ca lead to seous deteoato of classfe pecso. I ou case we eceve twce moe of false-postves. 3) Spam fom spamachve.og Ths test was pefomed o 5448 spams fom the begg of Jauay 2005 stoed SpamAchve ( Both NBCs wee taed wth basc ad addtoal tag sets. The esults ae peseted Table III. TABLE III SPAM FROM SPAMARCHIVE Classfcato codto s l Recall NBC % NBC % NBC NBC % NBC NBC % 48

5 Wold Academy of Scece, Egeeg ad Techology The esults clealy dcate that usg NBC 2 aloe wll esult vey poo ecall of spam. Howeve, combg output fom both classfes ca esult detectg ove 4% moe of spam. Moeove, a cosdeable goup of spam s detected by both classfes. Ths fact ca be used to teat those spams wth a specal cofdece. Fo example they could be ejected at the SMTP level wthout a eal sk of ot delveg a eal message. A geeally lowe pefomace of NBCs tha the case of spams collected at CERN ca be explaed by a choce of tag sets. They cosst oly of spams fom CERN, whch ae dffeet fom messages eceved by othe ogazatos. Ths fact udeles the ecessty of adjustg tag sets to patcula ogazato's eeds. 4) Real-Wold Evomet The cuet veso of SpamKlle mplemeted at CERN to flte all comg mals s usg a dual-nbc stuctue descbed ths atcle. Pevously t was based oly o NBC taed wth basc tag set, detcal to ths used above tests. Fom the begg of 2005, all the spams epoted by CERN mal uses automatcally elage a set of spams used to ta NBC 2. So fact evey comg mal s checked by two NBCs ad a decso of ay of them s fact suffcet to teat a emal as a spam. Fgue 2 shows daly statstcs of SpamKlle fo Febuay Fg.2 Pefomace of aïve Bayesa classfes wokg at CERN It s woth otg that SpamKlle aalyzes oly pat of the spam avg at CERN SMTP gateways. The majoty of t s ejected wth ealy level mal classfcato based fo example o blacklsts of teet addesses. Oly the less clea cases of spam ae let ad subject to cotet aalyss. We ca see that dug the whole moth the pefomace of NBC s degadg. Ths s elated to evolvg atue of spam. We should ot foget that ths classfe s ot beg etaed ad ts kowledge s based o costat tag set. Meawhle the spam chaactestc s chagg, povg oce aga the eed to dyamcally ta the classfe. The latte classfe, based o bgams, s costatly etaed wth use-epoted spams. The amout of detected spam s cosdeably lowe tha the case of NBC. Ths s udestadable as ts codtos of classfcato ae much stcte tha case of NBC. Howeve, the amout of detected spam by NBC 2 s ot deceasg; fact s eve slowly gog up dug the moth. It dcates that the classfe s adaptg to chagg spam pattes ad ts kowledge s ot agg. Fally, t s woth metog that dug moe tha two moths of opeatos of NBC 2 thee was ot a sgle sgal fom the use sde about possble false-postves wheeas thee wee seveal cases of false-postves elated to the wok of NBC.Ad stll the spam tag set was at the begg of Mach 2005 about two tmes lage tha the tag set cotag legtmate emals. The tag pocess ca be theefoe descbed as ot eedg opeato assstace. IV. CONCLUSION The esults show that etag aïve Bayesa classfe based o sgle wods ca, apat fom sg spam ecall, deteoate seously a classfcato pecso. I pactce, ths sde effect should eglect such a opto as a espose to chagg pattes of spam. Howeve, suppotg ths classfe wth aothe oe, based o pas of adjacet wods ca esult both ecall cease ad steady pecso. Of couse, the addtoal classfe decsos ae legtmate-based. Oe of the easos fo ths s a teatmet of pevously usee bgams, whch ae a po cosdeed as stogly legtmate-boud. Ths tu allows us to safely beak the balace betwee the stegth of legtmate ad spam tag sets. These featues ca allow ceatg a at-spam system that wll automatcally copoate kowledge about ew spams epoted by uses. Rug of such a system ca be assued wth mmal umbe of huma tevetos as a successful mplemetato at CERN Mal Sevces showed. Nevetheless, stll much could be doe to mpove the spam ecall of the addtoal classfe. Aeas of mpovemet should clude paametezato (e.g. the legth of featue vecto) ad fght wth mal obfuscato whch flueces the decsos made by automatc classfes a egatve way. I my opo, whateve steps wll be pocued, the pecso of the classfe should always be kept o as hgh level as possble. To sum up, some questos coceg ole etag of both of the classfes wll be dscussed the followg sectos. ) Retag NBC based o Sgle Wods Naïve Bayesa classfe ca be easly etaed afte tal tag phase by addg ew examples to ethe the goup of legtmate mals o spams. Howeve, thee s lttle eed to elage a set of legtmate mals as the categoy s geeal statc ad s ot subject to seous modfcatos wth tme. Ths s ot the case of spam as ths tag set ca be expaded wth spam examples that ae coectly classfed by the classfe. It should be oted that etag a NBC based o sgle wods has seous dawbacks: 49

6 Wold Academy of Scece, Egeeg ad Techology A cosdeable amout of examples s eeded to alte the pobablty of featues (wod that wee peset both tag sets. Ths s cotay to the eed of classfe adaptablty as patcula wods peset ewly obseved spam wll stll be cosdeed as legtmate o eutal dug classfcato task. Iceasg a spam tag set too much may esult may eutal ealty featues ecevg a hgh spam pobablty just because of the fact that they wee ot peset the legtmate tag set. Behd evey wod thee s ts sematcs. It becomes evdet that the most tellget spam s costucted wth as ocet as possble vocabulay whch makes the fomatve cotet of a spam blued ad udefed. Two fst pots ae elated to elatvely small featue space. Of couse, the secod pot oe be addessed by equally addg examples to legtmate tag set. Ufotuately, ths ca be dffcult fo easos of pvacy. Futhemoe, smply extactg emals fom use malboxes may clude a umbe of spams to the legtmate tag set whch tu could heavly lowe the classfe pefomace. 2) Retag NBC based o Bgams My expemets show that combg use feedback wth aïve Bayesa classfe epesetg a emal as set of bgams (pas of adjacet wod ca lagely elmate poblems metoed pevous secto. Such soluto ca be used as a complemet of the NBC based o ugams. Usefuless of pas of wods to epeset a emal s elated to a exta dmeso of featue space, whch tu lagely ceases the vocabulay sze. Patcula featues (udestood as pas of adjacet wod have much lowe pobablty of epeatg tself whe ceasg the tag sets. Ths fact makes t possble to easly extact fgepts of a ew type of spam epoted by uses: usually t wll cota a set of bgams usee legtmate tag set. Retag the classfe wth a ceta umbe of examples of udetected spam wll expad the dctoay wth some wod pas wth vey hgh pobablty of epesetg a spam. Moeove, because of addg a featue dmeso, t s possble to dastcally chage the popotos of tag sets. Amout of spam used to ta the classfe ca be ow much hghe tha amout of solcted mals as patcula spam featues wll stll be aely met solcted categoy. Fally, such a classfe, fom the theoetcal pot of vew, wll base ts decsos moe o a wod stuctues used a emal tha o a sematc meag of patcula wods, whch ca be msleadg. Spammes, as dscussed befoe, ted to avod usg suspcous wods ad specal message stuctues wth goal of makg the spam as smla to a oday emal as possble ad to fool ths way the at-spam eges. Bgam epesetato could be egaded to a ceta extet as a aswe to spams costucted to be solcted-lke because t s moe sestve o patcula phases that ca deteme a spam such cases. ACKNOWLEDGMENT The autho would lke to wamly thak d Paweł Cchosz fo valuable commets o ths pape. Specal expessos of gatefuless must be dected towads Iteet Sevces goup at CERN ad especally M. Emmauel Omacey (ceato of SpamKlle) fo makg possble the completo of ths aalyss. REFERENCES [] P.Gaham. (2002, August). A Pla fo Spam [Ole]. Avalable: [2] P. Gaham, Bette Bayesa Flteg, Poceedgs of Spam Cofeece Avalable: [3] I.Adoutsopoulos, J.Koutsas, K.V.Chados, G.Palouas, C.D. Spyopoulos, A evaluato of aïve Bayesa at-spam flteg, Wokshop o Mache Tag the New Ifomato Age [4] R.Segal, J.Cawfod, J.Kephat, B.Leba, SpamGuu: A Etepse At-Spam Flteg System, Poceedgs of Fst Cofeece o Emal ad At-Spam (CEAS) [5] K. Aas, L. Ekvl. Text categozato: A suvey, Techcal epot, Nowega Computg Cete, 999. [6] G. Zpf, Huma Behavo ad the Pcple of Least Effot. Addso-Wesley, 949. [7] C. M. Ta, Y. F. Wag, C. D. Lee, The Use of BGams to Ehace Text Categozato, Joual Ifomato Pocessg ad Maagemet., vol. 30, No. 4, pp , [8] H. Ste. Optmzg Naïve Bayesa Netwoks fo Spam Detecto, CSCI 6509: Natual Laguage Pocessg poject, Dalhouse Uvesty, Halfax, NS, Caada, [9] T. Mtchell, Mache leag. McGaw Hll, 997. [0] N. Dalv, P. Domgos, Mausam, S. Sagha, D. Vema. Advesaal Classfcato, Poceedgs of the Teth Iteatoal Cofeece o Kowledge Dscovey ad Data Mg (pp ), [] Multpupose Iteet Mal Extesos (MIME) Pat Oe: Fomat of Iteet Message Bodes. Request fo Commets 2045, 996. [2] Euopea Ogazato fo Nuclea Reseach. Mal Sevce Web Ste. [3] Euopea Ogazato fo Nuclea Reseach. At-Spam Web Ste. [4] M. Fombege. Bayesa Classfcato of Usolcted E-Mal, upublshed. Avalable: 50

Risk Evaluation in Auto Spare Parts Transport Based on the

Risk Evaluation in Auto Spare Parts Transport Based on the MAEC Web of Cofeeces 100, 05060 Rsk Evaluato Auto Spae Pats aspot Based o the AHP Method Rog Zeg 1 ad Chag Xu 2 1 Wuha Huaxa Uvesty of echology, Wuha, Cha 2 Wuha Uvesty of echology, Wuha, Cha Abstact By

More information

A Proactive Fault-detection Mechanism in Large-scale Cluster Systems

A Proactive Fault-detection Mechanism in Large-scale Cluster Systems A Poactve Fault-detecto Mechasm age-scale Cluste Systems Wu pg Meg Da Gao We ad Zha Jafeg Isttute of Computg Techology Chese Academy of Sceces Bejg Cha {wlp md gw jfzha}@cc.ac.c Gaduate School of the Chese

More information

Computer Technology MSIS 22:198:605 Homework 1

Computer Technology MSIS 22:198:605 Homework 1 Compute Techology MSIS 22:198:605 Homewok 1 Istucto: Faid Alizadeh Due Date: Moday Septembe 30, 2002 by midight Submissio: by e-mail See below fo detailed istuctios) last updated o Septembe 27, 2002 Rules:

More information

Fuzzy Probability Approximation Space and Its Information Measures

Fuzzy Probability Approximation Space and Its Information Measures Fuzzy Pobablty Appomato Space ad Its Ifomato Measues Qghua Hu, Dae Yu Hab Isttute of Techology, Cha Abstact ough set theoy has attacted much atteto modelg wth mpecse ad complete fomato A geealzed appomato

More information

Pairwise comparisons in the analysis of carcinogenicity data *

Pairwise comparisons in the analysis of carcinogenicity data * Vol4, No1, 91-918 (1) http://xoog/1436/health141139 ealth Pawse compasos the aalyss of cacogecty ata Mohamma A Rahma 1#, Ram C Twa 1 Dvso of Bometcs-6, Offce of Bostatstcs, Cete fo Dug Evaluato a Reseach,

More information

1-D matrix method. U 4 transmitted. incident U 2. reflected U 1 U 5 U 3 L 2 L 3 L 4. EE 439 matrix method 1

1-D matrix method. U 4 transmitted. incident U 2. reflected U 1 U 5 U 3 L 2 L 3 L 4. EE 439 matrix method 1 -D matrx method We ca expad the smple plae-wave scatterg for -D examples that we ve see to a more versatle matrx approach that ca be used to hadle may terestg -D problems. The basc dea s that we ca break

More information

CS 2710 Foundations of AI Lecture 22. Machine learning. Machine Learning

CS 2710 Foundations of AI Lecture 22. Machine learning. Machine Learning CS 7 Foudatos of AI Lecture Mache learg Mlos Hauskrecht mlos@cs.ptt.edu 539 Seott Square Mache Learg The feld of mache learg studes the desg of computer programs (agets) capable of learg from past eperece

More information

Mixture Model of the Exponential, Gamma and Weibull Distributions to Analyse Heterogeneous Survival Data

Mixture Model of the Exponential, Gamma and Weibull Distributions to Analyse Heterogeneous Survival Data Joual of Scetfc Reseach & Repots 5: -9, 05; Atcle o.jsrr.05.080 ISSN: 0-07 SCIENCEDOMAIN teatoal www.scecedoma.og Mxtue Model of the Expoetal, Gamma ad Webull Dstbutos to Aalyse Heteogeeous Suvval Data

More information

The Search for Coalition Formation in Costly Environments 1

The Search for Coalition Formation in Costly Environments 1 The Seach fo Coalto Fomato Costly Evomets 1 Davd Sae 1 ad Sat Kaus 1,2 1 Depatmet of Compute Scece, Ba-Ila Uvesty, Ramat-Ga, 52900 Isael {saed, sat} @ macs.bu.ac.l 2 Isttute fo Advaced Compute Studes Uvesty

More information

SOLVING METHOD FOR FUZZY MULTIPLE OBJECTIVE INTEGER OPTIMIZATION

SOLVING METHOD FOR FUZZY MULTIPLE OBJECTIVE INTEGER OPTIMIZATION SOLVING METHOD FOR FUZZY MULTIPLE OBJECTIVE INTEGER OPTIMIZATION BOGDANA POP Taslvaa Uvesty of Basov Romaa Abstact Statg fom the dea of Wag ad Lao (00 fo solvg fuzzy o-lea tege ogammg oblem ad tag to accout

More information

Bezier curves. 1. Defining a Bezier curve. A closed Bezier curve can simply be generated by closing its characteristic polygon

Bezier curves. 1. Defining a Bezier curve. A closed Bezier curve can simply be generated by closing its characteristic polygon Curve represetato Copyrght@, YZU Optmal Desg Laboratory. All rghts reserved. Last updated: Yeh-Lag Hsu (--). Note: Ths s the course materal for ME55 Geometrc modelg ad computer graphcs, Yua Ze Uversty.

More information

Registration of Multiple Laser Scans Based on 3D Contour Features

Registration of Multiple Laser Scans Based on 3D Contour Features Regstato of Multple Lase Scas Based o 3D Cotou Featues st Shaoxg HU, d Hogb ZHA, 3 d Awu ZHANG st School of Mechacal Egeeg & Automato, Beg Uvesty of Aeoautcs ad Astoautcs, Beg 83, d Natoal Laboatoy o Mache

More information

Research of Education Evaluation Information Mining Technology Based on Gray Clustering Analysis and Fuzzy Evaluation Method

Research of Education Evaluation Information Mining Technology Based on Gray Clustering Analysis and Fuzzy Evaluation Method Compute a Ifomato Scece Reseach of Eucato Evaluato Ifomato Mg Techology Base o Gay Clusteg Aalyss a Fuzzy Evaluato Metho Yag Lu College of Compute a Automatzato, Taj Polytechc Uvesty Taj, 30060, Cha E-mal:

More information

Optically adjustable display color gamut in time-sequential displays using LED/Laser light sources

Optically adjustable display color gamut in time-sequential displays using LED/Laser light sources Optcall adjustale dspla colo amut tme-sequetal dsplas us LE/Lase lht souces splas vol. 7 006 Moo-Cheol Km School of Electcal Eee ad Compute Scece Kupook Natoal Uv. Astact evelopmet of vaous wde colo amut

More information

ITEM ToolKit Technical Support Notes

ITEM ToolKit Technical Support Notes ITEM ToolKt Notes Fault Tree Mathematcs Revew, Ic. 2875 Mchelle Drve Sute 300 Irve, CA 92606 Phoe: +1.240.297.4442 Fax: +1.240.297.4429 http://www.itemsoft.com Page 1 of 15 6/1/2016 Copyrght, Ic., All

More information

Clustering documents with vector space model using n-grams

Clustering documents with vector space model using n-grams Clusterg documets wth vector space model usg -grams Klas Skogmar, d97ksk@efd.lth.se Joha Olsso, d97jo@efd.lth.se Lud Isttute of Techology Supervsed by: Perre Nugues, Perre.Nugues@cs.lth.se Abstract Ths

More information

RECOGNITION OF COMMON BUILDINGS IN CARTOGRAPHIC FILES

RECOGNITION OF COMMON BUILDINGS IN CARTOGRAPHIC FILES RECOGITIO OF COMMO BUIIGS I CRTOGRPHIC FIES Ha-We Hsao, Kam W. Wog epatmet of Cvl Egeeg Uvesty of Illos at Ubaa-Champag 5. Mathews ve. Ubaa, Illos 68, US Emal: h-hsao@studets.uuc.edu, -wog@staff.uuc.edu

More information

For all questions, answer choice E) NOTA" means none of the above answers is correct. A) 50,500 B) 500,000 C) 500,500 D) 1,001,000 E) NOTA

For all questions, answer choice E) NOTA means none of the above answers is correct. A) 50,500 B) 500,000 C) 500,500 D) 1,001,000 E) NOTA For all questos, aswer choce " meas oe of the above aswers s correct.. What s the sum of the frst 000 postve tegers? A) 50,500 B) 500,000 C) 500,500 D),00,000. What s the sum of the tegers betwee 00 ad

More information

Point Estimation-III: General Methods for Obtaining Estimators

Point Estimation-III: General Methods for Obtaining Estimators Pot Estmato-III: Geeral Methods for Obtag Estmators RECAP 0.-0.6 Data: Radom Sample from a Populato of terest o Real valued measuremets: o Assumpto (Hopefully Reasoable) o Model: Specfed Probablty Dstrbuto

More information

TDT-2004: ADAPTIVE TOPIC TRACKING AT MARYLAND

TDT-2004: ADAPTIVE TOPIC TRACKING AT MARYLAND TDT-2004: ADAPTIVE TOPIC TRACKING AT MARYLAND Tamer Elsayed, Douglas W. Oard, Davd Doerma Isttute for Advaced r Studes Uversty of Marylad, College Park, MD 20742 Cotact author: telsayed@cs.umd.edu Gary

More information

Recursion. Announcements. Follow-up from yesterday. Recursion Overview. A Recursive Program. The Factorial Function (n!)

Recursion. Announcements. Follow-up from yesterday. Recursion Overview. A Recursive Program. The Factorial Function (n!) Aoucemets Recusio Lectue CS Summe 7 Fo exta Java help Lots of cosultig/office-hous available Ca set up idividual meetigs with TAs via email Check soo that you ae i CMS Academic Itegity Note Assigmet #

More information

COMSC 2613 Summer 2000

COMSC 2613 Summer 2000 Programmg II Fal Exam COMSC 63 Summer Istructos: Name:. Prt your ame the space provded Studet Id:. Prt your studet detfer the space Secto: provded. Date: 3. Prt the secto umber of the secto whch you are

More information

Blind Steganalysis for Digital Images using Support Vector Machine Method

Blind Steganalysis for Digital Images using Support Vector Machine Method 06 Iteratoal Symposum o Electrocs ad Smart Devces (ISESD) November 9-30, 06 Bld Stegaalyss for Dgtal Images usg Support Vector Mache Method Marcelus Hery Meor School of Electrcal Egeerg ad Iformatcs Badug

More information

Chap 5: Product-Form Queuing Networks (QN)

Chap 5: Product-Form Queuing Networks (QN) CPU disk Chap 5: Poduct-Fom Queuig Netwoks (QN) Etities: ) sevice cetes with diffeet sevice disciplies ) customes (obs) sigle class multiple classes (each/w a diffeet wokload) ) liks coectig sevice cetes

More information

Machine Learning. CS 2750 Machine Learning. Administration. Lecture 1. Milos Hauskrecht 5329 Sennott Square, x4-8845

Machine Learning. CS 2750 Machine Learning. Administration. Lecture 1. Milos Hauskrecht 5329 Sennott Square, x4-8845 CS 75 Mache Learg Lecture Mache Learg Mlos Hauskrecht mlos@cs.ptt.edu 539 Seott Square, 5 people.cs.ptt.edu/~mlos/courses/cs75/ Admstrato Istructor: Prof. Mlos Hauskrecht mlos@cs.ptt.edu 539 Seott Square,

More information

LP: example of formulations

LP: example of formulations LP: eample of formulatos Three classcal decso problems OR: Trasportato problem Product-m problem Producto plag problem Operatos Research Massmo Paolucc DIBRIS Uversty of Geova Trasportato problem The decso

More information

A Multi-Categorization Method of Text Documents using Fuzzy Correlation Analysis

A Multi-Categorization Method of Text Documents using Fuzzy Correlation Analysis Poceedg of the 0th WE Iteatoal Cofeece o PPLIED MTHEMTIC, Dalla, Texa, U, Novembe -3, 006 9 Mult-Categozato Method of Text Documet ug Fuzzy Coelato aly NNCY P. LIN, HO-EN CHUEH Deatmet of Comute cece ad

More information

Chapter 3 Descriptive Statistics Numerical Summaries

Chapter 3 Descriptive Statistics Numerical Summaries Secto 3.1 Chapter 3 Descrptve Statstcs umercal Summares Measures of Cetral Tedecy 1. Mea (Also called the Arthmetc Mea) The mea of a data set s the sum of the observatos dvded by the umber of observatos.

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications /03/ Mache Learg: Algorthms ad Applcatos Florao Z Free Uversty of Boze-Bolzao Faculty of Computer Scece Academc Year 0-0 Lecture 3: th March 0 Naïve Bayes classfer ( Problem defto A trag set X, where each

More information

Visually Built Task Models for Robot Teams in Unstructured Environments Abstract 1. Introduction

Visually Built Task Models for Robot Teams in Unstructured Environments Abstract 1. Introduction Vsuall Bult as Models fo Robot eams Ustuctued Evomets Vve A. Suja ad Steve Dubows (vasuja dubows@mt.edu} Depatmet of Mechacal Egeeg Massachusetts Isttute of echolog Cambdge, MA 039 Abstact I feld evomets

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Office Hours. COS 341 Discrete Math. Office Hours. Homework 8. Currently, my office hours are on Friday, from 2:30 to 3:30.

Office Hours. COS 341 Discrete Math. Office Hours. Homework 8. Currently, my office hours are on Friday, from 2:30 to 3:30. Oce Hours Curretly, my oce hours are o Frday, rom :30 to 3:30. COS 31 Dscrete Math 1 Oce Hours Curretly, my oce hours are o Frday, rom :30 to 3:30. Nobody seems to care. Chage oce hours? Tuesday, 8 PM

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

arxiv: v1 [math.co] 21 Jan 2016

arxiv: v1 [math.co] 21 Jan 2016 PROOF OF BIJECTION FOR COMBINATORIAL NUMBER SYSTEM axv:60.05794v [math.co] Jan 06 ABU BAKAR SIDDIQUE, SAADIA FARID, AND MUHAMMAD TAHIR Abstact. Combnatoal numbe system epesents a non-negatve natual numbes

More information

Descriptive Statistics: Measures of Center

Descriptive Statistics: Measures of Center Secto 2.3 Descrptve Statstcs: Measures of Ceter Frequec dstrbutos are helpful provdg formato about categorcal data, but wth umercal data we ma wat more formato. Statstc: s a umercal measure calculated

More information

On a Sufficient and Necessary Condition for Graph Coloring

On a Sufficient and Necessary Condition for Graph Coloring Ope Joural of Dscrete Matheatcs, 04, 4, -5 Publshed Ole Jauary 04 (http://wwwscrporg/joural/ojd) http://dxdoorg/0436/ojd04400 O a Suffcet ad Necessary Codto for raph Colorg Maodog Ye Departet of Matheatcs,

More information

Bidding Strategies for Generation Companies in a Day-ahead Market using Fuzzy Adaptive Particle Swarm Optimization

Bidding Strategies for Generation Companies in a Day-ahead Market using Fuzzy Adaptive Particle Swarm Optimization J. Vaya Kuma, D. M. Vod Kuma, K. Eduodalu Bddg Stateges fo Geeato Compaes a Day-ahead Maet usg Fuzzy Adaptve Patcle Swam Optmzato J. VIJAYA KUMAR *, D. M. VINOD KUMAR ad K EDUKONDALU Depatmet of Electcal

More information

An Object Based Auto Annotation Image Retrieval System

An Object Based Auto Annotation Image Retrieval System Poceedngs of the 5th WSEAS Intenatonal Confeence on Telecommuncatons and Infomatcs, Istanbul, Tukey, May 27-29, 2006 (pp509-54) An Obect Based Auto Annotaton Image Reteval System Pe-Cheng Cheng, Been-Chan

More information

MATHEMATICAL PROGRAMMING MODEL OF THE CRITICAL CHAIN METHOD

MATHEMATICAL PROGRAMMING MODEL OF THE CRITICAL CHAIN METHOD MATHEMATICAL PROGRAMMING MODEL OF THE CRITICAL CHAIN METHOD TOMÁŠ ŠUBRT, PAVLÍNA LANGROVÁ CUA, SLOVAKIA Abstract Curretly there s creasgly dcated that most of classcal project maagemet methods s ot sutable

More information

Differentiated Service of Streaming Media Playback Technology

Differentiated Service of Streaming Media Playback Technology Iteratoal Coferece o Advaced Iformato ad Commucato Techology for Educato (ICAICTE 2013) Dfferetated Servce of Streamg Meda Playback Techology CHENG Z-ao 1 MENG Bo 1 WANG Da-hua 1 ZHAO Yue 1 1 Iformatzato

More information

Local vs. Global Illumination & Radiosity

Local vs. Global Illumination & Radiosity Local vs. Global Illumato & Radosty Last Tme? Ray Castg & Ray-Object Itesecto Recusve Ray Tacg Dstbuted Ray Tacg A ealy applcato of adatve heat tasfe stables. Local Illumato BRDF Ideal Dffuse Reflectace

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

ENGI 4421 Counting Techniques for Probability Page Example 3.01 [Navidi Section 2.2; Devore Section 2.3]

ENGI 4421 Counting Techniques for Probability Page Example 3.01 [Navidi Section 2.2; Devore Section 2.3] ENGI 4421 Coutig Techiques fo Pobability Page 3-01 Example 3.01 [Navidi Sectio 2.2; Devoe Sectio 2.3] Fou cads, labelled A, B, C ad D, ae i a u. I how may ways ca thee cads be daw (a) with eplacemet? (b)

More information

EVALUATING EFFECTIVENESS OF GRINDING PROCESS GRAIN MATERIALS

EVALUATING EFFECTIVENESS OF GRINDING PROCESS GRAIN MATERIALS EALUATING EFFECTIENESS OF GRINDING PROCESS GRAIN MATERIALS Raml Iskedeov, Aatoly Lebedev, Ato Zacha, Pavel Lebedev Stavopol State Agaa Uvesty, Russa skedeov_aml@box.u Abstact. The desg featues of sheddes

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Eight Solved and Eight Open Problems in Elementary Geometry

Eight Solved and Eight Open Problems in Elementary Geometry Eght Solved ad Eght Ope Problems Elemetary Geometry Floret Smaradache Math & Scece Departmet Uversty of New Mexco, Gallup, US I ths paper we revew eght prevous proposed ad solved problems of elemetary

More information

A COMPARISON OF MULTIVARIATE DISCRIMINATION OF BINARY DATA

A COMPARISON OF MULTIVARIATE DISCRIMINATION OF BINARY DATA Iteatoal Joual of Mathematcs ad Statstcs Studes Vol.No.4.40-6 Setembe 04 Publshed by Euoea Cete fo eseach Tag ad Develomet UK www.eaouals.og A COMPAISON OF MULTIVAIATE DISCIMINATION OF INAY DATA. I. Egbo;.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Identifying Chemical Names in Biomedical Text: An Investigation of the Substring Co-occurrence Based Approaches

Identifying Chemical Names in Biomedical Text: An Investigation of the Substring Co-occurrence Based Approaches Idetfyg Chemcal Names Bomedcal Text: A Ivestgato of the Substrg Co-occurrece Based Approaches Alexader Vasserma Departmet of Computer ad Iformato Scece Uversty of Pesylvaa Phladelpha, PA 94 avasserm@seas.upe.edu

More information

Face Recognition using Supervised & Unsupervised Techniques

Face Recognition using Supervised & Unsupervised Techniques Natoal Uversty of Sgapore EE5907-Patter recogto-2 NAIONAL UNIVERSIY OF SINGAPORE EE5907 Patter Recogto Project Part-2 Face Recogto usg Supervsed & Usupervsed echques SUBMIED BY: SUDEN NAME: harapa Reddy

More information

A modified Logic Scoring Preference method for dynamic Web services evaluation and selection

A modified Logic Scoring Preference method for dynamic Web services evaluation and selection A modfed Logc Scorg Preferece method for dyamc Web servces evaluato ad selecto Hog Qg Yu ad Herá Mola 2 Departmet of Computer Scece, Uversty of Lecester, UK hqy@mcs.le.ac.uk 2 Departmet of Iformatcs, School

More information

Soochow University: Description and Analysis of the Chinese Word Sense Induction System for CLP2010

Soochow University: Description and Analysis of the Chinese Word Sense Induction System for CLP2010 Soochow Unvesty: Descpton and Analyss of the Chnese Wod Sense Inducton System fo CLP2010 Hua Xu Bng Lu Longhua Qan Guodong Zhou Natual Language Pocessng Lab School of Compute Scence and Technology Soochow

More information

Nine Solved and Nine Open Problems in Elementary Geometry

Nine Solved and Nine Open Problems in Elementary Geometry Ne Solved ad Ne Ope Problems Elemetary Geometry Floret Smaradache Math & Scece Departmet Uversty of New Mexco, Gallup, US I ths paper we revew e prevous proposed ad solved problems of elemetary D geometry

More information

Optimal Allocation of Complex Equipment System Maintainability

Optimal Allocation of Complex Equipment System Maintainability Optmal Allocato of Complex Equpmet System ataablty X Re Graduate School, Natoal Defese Uversty, Bejg, 100091, Cha edcal Protecto Laboratory, Naval edcal Research Isttute, Shagha, 200433, Cha Emal:rexs841013@163.com

More information

Adaptive Clustering Algorithm for Mining Subspace Clusters in High-Dimensional Data Stream *

Adaptive Clustering Algorithm for Mining Subspace Clusters in High-Dimensional Data Stream * ISSN 673-948 CODEN JKYTA8 E-mal: fcst@vp.63.com Joural of Froters of Computer Scece ad Techology http://www.ceaj.org 673-948/200/04(09)-0859-06 Tel: +86-0-566056 DOI: 0.3778/j.ss.673-948.200.09.009 *,2,

More information

Parallel Iterative Poisson Solver for a Distributed Memory Architecture

Parallel Iterative Poisson Solver for a Distributed Memory Architecture Parallel Iteratve Posso Solver for a Dstrbted Memory Archtectre Erc Dow Aerospace Comptatoal Desg Lab Departmet of Aeroatcs ad Astroatcs 2 Motvato Solvg Posso s Eqato s a commo sbproblem may mercal schemes

More information

ChEn 475 Statistical Analysis of Regression Lesson 1. The Need for Statistical Analysis of Regression

ChEn 475 Statistical Analysis of Regression Lesson 1. The Need for Statistical Analysis of Regression Statstcal-Regresso_hadout.xmcd Statstcal Aalss of Regresso ChE 475 Statstcal Aalss of Regresso Lesso. The Need for Statstcal Aalss of Regresso What do ou do wth dvdual expermetal data pots? How are the

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A Comparison of the Optimal Classification Rule and Maximum Likelihood Rule for Binary Variables

A Comparison of the Optimal Classification Rule and Maximum Likelihood Rule for Binary Variables Joual of Mathematcs Reseach; Vol. 6 No. 4; 04 ISSN 96-9795 E-ISSN 96-9809 Publshed by Caada Cete of Scece ad Educato A Comaso of the Otmal Classfcato Rule ad Mamum Lelhood Rule fo ay Vaables I. Egbo S.

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

SVM Classification Method Based Marginal Points of Representative Sample Sets

SVM Classification Method Based Marginal Points of Representative Sample Sets P P College P P College P Iteratoal Joural of Iformato Techology Vol. No. 9 005 SVM Classfcato Method Based Margal Pots of Represetatve Sample Sets Wecag ZhaoP P, Guagrog JP P, Ru NaP P, ad Che FegP of

More information

A Comparative Impact Study of Attribute Selection Techniques on Naïve Bayes Spam Filters

A Comparative Impact Study of Attribute Selection Techniques on Naïve Bayes Spam Filters A Compaative Impact Study of Attibute Selection Techniques on Naïve Bayes Spam Filtes J. R. Méndez, I. Cid, D. Glez-Peña, F. Fdez-Riveola, M. Rocha 2 Dept. Infomática, Univesity of Vigo, Escuela Supeio

More information

DE-STRIPING FOR TDICCD REMOTE SENSING IMAGE BASED ON STATISTICAL FEATURES OF HISTOGRAM

DE-STRIPING FOR TDICCD REMOTE SENSING IMAGE BASED ON STATISTICAL FEATURES OF HISTOGRAM Te Iteatoal Acves of te Potogammety, Remote Sesg ad Spatal Ifomato Sceces, Volume XLI-B, 26 XXIII ISPRS Cogess, 2 9 July 26, Pague, Czec Republc DE-STRIPIN FOR TDICCD REMOTE SENSIN IMAE BASED ON STATISTICAL

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Fitting. We ve learned how to detect edges, corners, blobs. Now what? We would like to form a. compact representation of

Fitting. We ve learned how to detect edges, corners, blobs. Now what? We would like to form a. compact representation of Fttg Fttg We ve leared how to detect edges, corers, blobs. Now what? We would lke to form a hgher-level, h l more compact represetato of the features the mage b groupg multple features accordg to a smple

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

2 General Regression Neural Network (GRNN)

2 General Regression Neural Network (GRNN) 4 Geeral Regresso Neural Network (GRNN) GRNN, as proposed b oald F. Specht [Specht 9] falls to the categor of probablstc eural etworks as dscussed Chapter oe. Ths eural etwork lke other probablstc eural

More information

Using Linear-threshold Algorithms to Combine Multi-class Sub-experts

Using Linear-threshold Algorithms to Combine Multi-class Sub-experts Usg Lear-threshold Algorthms to Combe Mult-class Sub-experts Chrs Mesterharm MESTERHA@CS.RUTGERS.EDU Rutgers Computer Scece Departmet 110 Frelghuyse Road Pscataway, NJ 08854 USA Abstract We preset a ew

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

ASSIGN 01: Due Monday Feb 04 PART 1 Get a Sketchbook: 8.5 x 11 (Minimum size 5 x7 ) fo keeping a design jounal and a place to keep poject eseach & ideas. Make sue you have you Dopbox account and/o Flash

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

FEATURE SELECTION ON COMBINATIONS FOR EFFICIENT LEARNING FROM IMAGES. Rong Xiao, Lei Zhang, and Hong-Jiang Zhang

FEATURE SELECTION ON COMBINATIONS FOR EFFICIENT LEARNING FROM IMAGES. Rong Xiao, Lei Zhang, and Hong-Jiang Zhang FEATURE SELECTION ON COMBINATIONS FOR EFFICIENT LEARNING FROM IMAGES Rog Xao, Le Zhag, ad Hog-Jag Zhag Mcrosoft Research Asa, Bejg 100080, P.R. Cha {t-rxao, lezhag, hjzhag}@mcrosoft.com ABSTRACT Due to

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

MINIMIZATION OF THE VALUE OF DAVIES-BOULDIN INDEX

MINIMIZATION OF THE VALUE OF DAVIES-BOULDIN INDEX MIIMIZATIO OF THE VALUE OF DAVIES-BOULDI IDEX ISMO ÄRÄIE ad PASI FRÄTI Departmet of Computer Scece, Uversty of Joesuu Box, FI-800 Joesuu, FILAD ABSTRACT We study the clusterg problem whe usg Daves-Bould

More information

FUNDAMENTALS OF RADIOMETRY

FUNDAMENTALS OF RADIOMETRY 1 FUNDAMENTALS OF RADIOMETRY Lectue 5 Radomety 2 Quanttatve measuement of the popetes of EM adaton nteacton wth matte o emsson fom t Radomety deals wth total EM adaton We extend the concept of adans n

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Constructive Semi-Supervised Classification Algorithm and Its Implement in Data Mining

Constructive Semi-Supervised Classification Algorithm and Its Implement in Data Mining Costructve Sem-Supervsed Classfcato Algorthm ad Its Implemet Data Mg Arvd Sgh Chadel, Arua Twar, ad Naredra S. Chaudhar Departmet of Computer Egg. Shr GS Ist of Tech.& Sc. SGSITS, 3, Par Road, Idore (M.P.)

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

A novel method in scam detection and prevention using data mining approaches

A novel method in scam detection and prevention using data mining approaches A ovel method scam detecto ad preveto usg data mg approaches Mokhtar, M, Saraee, M ad Haghsheas, A Ttle Authors Type URL Publshed Date 2008 A ovel method scam detecto ad preveto usg data mg approaches

More information

Eight Solved and Eight Open Problems in Elementary Geometry

Eight Solved and Eight Open Problems in Elementary Geometry Eght Solved ad Eght Ope Problems Elemetary Geometry Floret Smaradache Math & Scece Departmet Uversty of New Mexco, Gallup, US I ths paper we revew eght prevous proposed ad solved problems of elemetary

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

An Ensemble Approach to Classifier Construction based on Bootstrap Aggregation

An Ensemble Approach to Classifier Construction based on Bootstrap Aggregation A Esemble Approach to Classfer Costructo based o Bootstrap Aggregato Dewa Md. Fard Jahagragar Uversty Dhaka-342, Bagladesh Mohammad Zahdur Rahma Jahagragar Uversty Dhaka-342, Bagladesh Chowdhury Mofzur

More information

Variable Thresholding In Naïve Bayesian Spam Filters

Variable Thresholding In Naïve Bayesian Spam Filters Varable Thresholdg I Naïve Bayesa Spam Flters Sherma Bragaza Departmet of Electrcal ad Computer Egeerg Uversty of Waterloo Waterloo, ON, Caada. sbragaz@uwaterloo.ca Abstract Emal has become a essetal meas

More information

This thesis fo the Docto of Philosophy degee by Ae Spaldig has bee appoved by David C. Fishe J. Richad Ludge Staley Paye Ross McCoell Tom Altma Date

This thesis fo the Docto of Philosophy degee by Ae Spaldig has bee appoved by David C. Fishe J. Richad Ludge Staley Paye Ross McCoell Tom Altma Date MIN-PLUS ALGEBRA AND GRAP DOMINATION by Ae Spaldig B.S., Uivesity of Coloado at Deve, 1993 M.S., Uivesity of Coloado at Deve, 199 A thesis submitted to the Uivesity of Coloado at Deve i patial fulllmet

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments

A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments Sensos 2010, 10, 10006-10013; do:10.3390/s101110006 OPEN ACCESS sensos ISSN 1424-8220 www.mdp.com/jounal/sensos Atcle A QoS Scheme fo a Congeston Coe Netwok Based on Dssmla QoS Stuctues n Smat-Phone Envonments

More information

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods Rendeing techniques Compute Gaphics Lectue 10 Can be classified as Local Illumination techniques Global Illumination techniques Global Illumination 1: Ray Tacing and Radiosity Taku Komua 1 Local Illumination

More information

Cubic fuzzy H-ideals in BF-Algebras

Cubic fuzzy H-ideals in BF-Algebras OSR Joural of Mathematcs (OSR-JM) e-ssn: 78-578 p-ssn: 39-765X Volume ssue 5 Ver (Sep - Oct06) PP 9-96 wwwosrjouralsorg Cubc fuzzy H-deals F-lgebras Satyaarayaa Esraa Mohammed Waas ad U du Madhav 3 Departmet

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

APPLICATION OF CLUSTERING METHODS IN BANK S PROPENSITY MODEL

APPLICATION OF CLUSTERING METHODS IN BANK S PROPENSITY MODEL APPLICATION OF CLUSTERING METHODS IN BANK S PROPENSITY MODEL Sergej Srota Haa Řezaková Abstract Bak s propesty models are beg developed for busess support. They should help to choose clets wth a hgher

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

PERSPECTIVES OF THE USE OF GENETIC ALGORITHMS IN CRYPTANALYSIS

PERSPECTIVES OF THE USE OF GENETIC ALGORITHMS IN CRYPTANALYSIS PERSPECTIVES OF THE USE OF GENETIC ALGORITHMS IN CRYPTANALYSIS Lal Besela Sokhum State Uversty, Poltkovskaa str., Tbls, Georga Abstract Moder cryptosystems aalyss s a complex task, the soluto of whch s

More information