Improving anti-spam filtering, based on Naive Bayesian and neural networks in multi-agent filters
|
|
- Clarence Pitts
- 6 years ago
- Views:
Transcription
1 J. Appl. Envron. Bol. Sc., 5(7S) , , TextRoad Publcaton ISSN: Journal of Appled Envronmental and Bologcal Scences Improvng ant-spam flterng, based on Nave Bayesan and neural networs n mult-agent flters Adeleh Jafar gholbe 1, Mohammad amn Edalatrad 2 1 Department of Computer Scence, Shush Branch, Islamc Azad Unversty, Shush, Iran 2 Department of Computer Scence, Dezful Branch, Islamc Azad Unversty, Dezful, Iran ABSTRACT Receved: March 19, 2015 Accepted: May 2, 2015 Ths artcle wll dscuss offerng pre-processng flter n the stage before processng of flter content. One alternatve has been proposed by whch a Nave Bayesan classfcaton automatcally have been taught to detect spam messages. In ths study, a new verson has been provded based on Nave Bayesan approach by mult-agent flters. The advantage of smultaneous usng of the user nterests, Keywords and content-based valuaton vew s based on ssue. Followng the above verson wll be developed and we dentfy spam usng MLP neural networ algorthm. KEYWORDS: spam, mult-agent flter, emal, nave bayesan, neural networ. 1. INTRODUCTION The problem of unwanted e-mals nown as spam has become a serous problem today, so that 57-80% of the volume of e-mal s spam. Spam creates several problems rather; spam causes traffc and destroys storage space and computng power. Spam causes the users a lot of tme to separate and remove wasted mals and also hurt users and causes nsecurty, fnally spam causes legal problems such as pornography, pyramd schemes and economc fraud as well as Phshng. Now, accordng to studes conducted by Pnon and Stuc about dfferent types of tools and technques of ant-spam, flterng s the most common method to protect aganst spam [1]. The research shows that the spam flterng s a method based on machne learnng that s a very good method among the methods based on learnng n terms of effcency n spam capture and the best value n terms of the lowest false postves. Flterng method s usng of Nave Bayesan method whch has had a better performance than smlar methods such as decson trees and Svm (Support Vector Machne). A study n 1997 found that spam messages almost form 10 percent of receved messages on a shared networ [2]. It seems that the stuaton s gettng worse. Legslatve measures aganst spam are gradually beng concluded, but despte ths they have had lttle and very lmted effect. Currently ant-spam flters are software tools that attempt to automatcally bloc spam messages. 2. Mult-Agent flters Snce spam has several dfferent aspects wth dfferent characterstcs, therefore, methods usng several agents were suggested. An mportant feature of ths method s that the user can f there s only one agent n name of A, when receves x e-mal, based on value of A, the possblty that x s spam or not s shown by PS ( x ). If the possblty of PS ( x ) a value that cannot be decded on the bass of a sngle agent, then sends t to the secton of agent group dentfcaton. In group statea, sends x e-mal to other agents n mult-agent system AC and other AC agents specfy the possblty that X s spam by PS ( x ) and send t to source agent. Agent of source A maes the fnal dagnoss based on other agents. In order to classfy the ablty of any agent, f decson of spam s rght, t receves a postve score and otherwse t receves a negatve score. Methodology In ths method, every agent has the ablty to detect, so they are called heterogeneous agents. To learn any agent we use a number of methods such as: Nave Bayesan, decson tree and neural networ. Learnng of agent s done n two layers: the frst layer, based on pror nowledge of agent, wthout the partcpaton and control of the user. In second layer, accordng to the user's montorng, wth the nowledge of characterstcs of spam and the real e-mal, ads agent to learn more. In fact, every agent used the smart technques for the dagnoss Naïve Bayesan method Ths algorthm s the smplest and most wdely used algorthms, and of machne learnng methods for text classfcaton whch arses from the theory of Bayese decson[3]. Thus ths method s to use a tranng set (whch ncludes a number e- mals that have spam tag or correct mal) to calculate probablty of beng spam or beng correct of any words (features) n the messages. So when a new letter to the user's malbox by usng the probablty of beng spam or beng correct of words, has Correspondng Author: Adeleh Jafar gholbe, Department of Computer Scence, Shush Branch, Islamc Azad Unversty, Shush, Iran 381
2 Gholbe and Edalatrad, 2015 n t, the possblty that t s a spam or a proper one would be calculated. By usng the Bayese prncple, class occurrence probablty s expressed usng the vector of feature x. To dsplay an e-mal, a feature vector x = {x 1, x 2, x n} s used. n: number of features (words) contaned n that letter. x: obtaned probablty value (va the tranng set) for class C. In order to use Nave Bayesan prncple, t s assumed that the propertes of a message ndependent of each other occur n a letter. However, assumng that feature vector of a mal has features x n, x 2, x 1 the followng formula (1)s resulted. Π n P ( X IC )* P ( C ) P( CIX ) = = 1 Π n P( X ) = 1 So that o(x c): perhaps feature x occurs n class C P(C): perhaps class C occurs n set of mals. P(x ): perhaps word x occurs n message Output of the class that ts probablty s more. (1) 2.2. Neural Networs Neural networs s of the most wdely used and practcal methods of modellng of complex and great problems (ncludng hundreds varable). Neural networs can be used to classfy thngs (the output of a class), or regresson ssues (the output of a numerc value). The neural networ ncludes an nput layer whch each node n ths layer s equvalent to one of the predctor varables. Nodes n the mddle layer are connected n number of nodes n the hdden layer. Each nput node s connected to all nodes n the hdden layer. Nodes n the hdden layer can be connected to other nodes n a hdden layer or can be connected output layer. Output layer contans one or more output varables. Each edge between two nodes has a weght. The weghts are used n the calculaton of ntermedate layers and how to use them n such a way that each node n the mddle layers (layers other than the frst layer) has some nput from varous edges, whch, as mentoned earler, each s wth a specfc weght. Each node n the mddle layer multples value of each nput by ts relatve edge, and the outcome of these are added together and then apples a predetermned functon (actvaton functon) on ths outcome and gves the result as the output to nodes of the next layer. Edge weghts are unnown parameters that are determned by the tranng functon and tranng data gven to the data system. The number of nodes and the number of hdden layers and how to connect the nodes to each other wll specfy the archtecture (topology) of neural networ. User or software that desgns neural networs should specfy the number of nodes, number of hdden layers, the actvaton functon and edge weght constrants. Neural networs are powerful estmators that do estmaton as well as other technques and sometmes better. The maor dsadvantage of ths method s to spend a lot of tme for parameter selecton and tranng of the networ. An example of used neural networ s the type of nonlnear feedbac wth the sgmod actvaton functon: f ( x ) = 1 (2) x 1+ e Ths actvaton functon produces output n the range of (0, 1). Accordng to the fgure below shows a networ wth an outlet for every word n the dctonary, s formed of a hdden layer and an output neuron. Input and hdden layer nclude a bas neuron wth constant actvty 1[4, 5, 6]. Fg. 1. the structure of neural networs When an e-mal s ntroduced to the networ, nputs for the words that are found n a mal wll be 1. And other nputs 0. If the output value s more than 0/5 the electronc mal s dentfed as spam. When the desred output networ s beng traned the correct letters are taen 0/1 and for spam 0/1. The number of correct letters and spam that are ntroduced to the networ should have a lttle dfference, because f the number of nstances of a class s more than the other class the method tends to that class and tres to class the letters of that class better. A learnng algorthm wth descendng slope that uses rear-facng publcaton s used to optmze the weghts of the networ. 382
3 J. Appl. Envron. Bol. Sc., 5(7S) , The proposed method of mult-agent flters n artfcal neural networs MLP Artfcal neural networs are those of dynamcal systems that wth processng on the expermental data transfer nowledge or code behnd the data to the networ structure. A one neuron networs have some lmtatons, ncludng the nablty to mappng of nonlnear functons. In the meantme, Artfcal Neural Networs Multlayer Perceptron (MLP) has ablty of approxmaton and mplementaton of nonlnear functons. Perceptron networ model s as a feed forward networ wth bac-propagaton learnng law n. In the feed forward networ nput vector s appled to frst layer and ts mpacts are through ntermedate layers to the output layer, n ths route, networ parameters are consdered fxed wth no change. In the second route that follows the law BP, the networ parameters MLP are regulated and changed. Ths change s done accordng to the law of error correcton [5, 6]. Fg. 2. Multlayer Perceptron networ Amount of error s equal to the dfference between the desred response and the actual response of networ. After calculatng the error amount, n bac trac and through the networ layers would be the dstrbuted n networ. Snce error dstrbuton occurs aganst n the opposte drecton of weght communcaton error the term of propagaton s sad to t. MLP networ s formed of an nput layer, a number ntermedate layers and an output layer. Fg. 3. Shows the structure of an MLP networ MLP neural networ learnng algorthm Lst of terms used n the algorthm[7]: Input vector: X=(x 1.x,.x n) Output vector desred : t =(t 1..t,...t n) δ : a percentage of error to correct weght W that n fact s used to dstrbute error from output layer Y K to prevous layers of Z (hdden layer). δ : a percentage of error to correct weght V. ths error s transferred from mddle layer Z to nput layer X. α: learnng rate ;X : nput unt f ; Z : hdden unt of nput networ of Z s shown by z_n. m Z _ n = v o + x v o = 1 Output sgnal Z s shown by z z = f ( z _ n ) (4) Y : output unt of K Input networ Y s shown by y_n p y _ n = w 0 + z w = 1 Output sgnal Y s specfed by y (3) (5) 383
4 Gholbe and Edalatrad, 2015 y = f ( y _ n ) (6) tranng algorthm Networ tranng s performed by propagaton n three stages: 1. Feed forward propagaton of nput learnng patterns 2. Feedbac propagaton to the obtaned error 3. Set Weghts Tranng algorthm runs as follows: Step 0: Determne the ntal weghts Stage 1: untl the stop condtons are wrong, do steps 2 to 9. Step 2: For each par of correspondng nput and output do steps 3 to feed forward networs Step 3: Every Input unt (X, =1,.,n) receves nput sgnal X and sends t to all of the hgher layers unts (hdden unts). Step 4: every hdden layer (Z, = 1,, p) calculates the total of ts nput sgnals. m Z _ n = v o + x v o = 1 Trgger functon s used to calculate the output sgnal and send t to the other layers unts. z = f ( z_ n ) (8) - step 5: every output sgnal ( Y, = 1,.,m) calculates total of ts nput weghted sgnals. p y_ n = w 0 + z w = 1 And uses ts actve functon to calculate ts output sgnal. y = f ( y _ n ) (10) Error propagaton error step 6: every output unt Y receves the output of a desred pattern correspondng to the nput tranng pattern that calculates δ accordng to obtaned and desred output. δ = ( t y ) f ( y _ n ) (11) w 0 = αδ w = αδ z (12) And sends δ to underlyng layers. Step 7: every hdden layer Z calculates total of ts nput delta. δ _ n m = δ w = 1 And multples result by trgger functon dervatve to obtan error nformaton term: δ = δ _ n f ( z _ n ) (14) And from δ we measure the values ΔV and ΔV 0 that are later needed to correct V 0 and v are measured. S L correcton weghts and bases Step 8: every output unt Y corrects ts bas and weghts (=0, p). w ( new ) = w ( old) + w (15) Every hdden unt Z corrects ts bas and weghts as follows: v ( new ) = v ( old) + v (16) Step 9: fnally we chec the stop condtons. (7) (9) (13) 384
5 J. Appl. Envron. Bol. Sc., 5(7S) , Implementaton and expermental results of flter mult-agent method n neural networ 3.1. Smulaton In order to obtan an optmum structure to understand the behavor t s necessary to nvestgate neural networ error for the number of dfferent repettons, a varety of trgger functons and dfferent layers. The networ wth the least square error of Square root wll be the desred networ Optmzed archtecture As mentoned prevously we consdered nput number of the networ accordng to propertes as equal to the number of words n the desred dctonary and the number of output 2. The number of mddle layers was obtaned usng tral and error method. That s, the number of 1 to 3 hdden layer and 2 to 20 neurons for each layer have been tested that at ths pont two trgger functons are consdered. The followng table, for example shows root mean square error of a number of done tests. The best archtecture has the lowest root mean square error. At ths pont, frequences s also of partcular mportance because each structure shows dfferent behavor for the number of dfferent repettons. Fgure (4) shows root mean square error (RMSE) of any structure for the number of repettons. Fg. 4. Error of (RMSE) of every structure per number of dfferent repeat 3.3. Forecast of Networ After defnng the networ archtecture n prevous secton, n order to assess and compare the proposed methods wth real data, we appled the test seres to the networ. Fgure (5) (A) shows the comparson (B) of real and proposed nterest. As you can see, the horzontal axs s allocated to networ response and vertcal axs to the predcted value. Dstrbuton of ponts around the frst bsector ndcates how networ behaves. Proxmty of ponts to the bsector means networ closer response to expected value. (B) (A) Fg. 5. Comparson(A), Real nterest and recommended (B) 3.4 Evaluaton of Networ To be able to show the traned neural networ, the output of Fgure (6) shows the user's nterests. Testng s by subect, content and combnaton that ndcates better performance. 385
6 Gholbe and Edalatrad, 2015 (A) (B) Fg. 6. Combnng of methods and the user's nterests (A) the user's nterests nterest (B) 5,000 prvate emals Subect + user nterests Subect + transmtter Transmtter + user's nterests Subect + transmtter + user's nterests Table 1. data of mass emals publshed n publc way Detect spam based on Detect spam based on Detect spam based on subect sender content 61/09% 52/86% 72/60% 61/09% 52/60% 71/82% 61/09% 52/60% 72/60% 61/09% 52/60% 8/60% Detect spam based on user nterests 88/50% 88/50% 98/18% 99/49% 4. Concluson As was observed, addng a pre-processng stage for processng e-mal content to users usng user categores to categores based on the content and theme and the sender and the combnaton of three methods based on user nterests, determnng the postve and negatve rate of false would mprove accuracy of statstcal flters n the processng stage and also would cause more speed and better functon of these flters n processng stage. These calculatons would cause that n an electronc message server users' nterests are consdered n a category as the threshold and for ths reason e-mals that users of ths group have not shown nterest to see them are consdered as spam that ths wll result n no need to send the mal for processng at a later stage. REFERENCES 1. Sponen, M., and Stuce, C, Effectve antspam strateges n companes: An nternatonal study. In Proceedngs of HICSS '06,2006, vol 6, PP Androutsopoulos, I., Karaletss, V., Sas, G., Spyropoulos, C., and Stamatopoulos, P., Palouras, G. Learnng to flter spam e-mal: A comparson of a nave bayesan and a memorybased approach. In H. Zaragoza, P. Gallnar, and M. Raman, edtors, Proceedngs of the Worshop on Machne Learnng and Textual Informaton Access, 4th European Conference on Prncples and Practce of Knowledge Dscovery n Databases,2000, pp Golbec, J., and Hendler, J. Reputaton networ analyss for emal flterng. In Proceedngs of the Frst Conference on Emal and Ant-Spam,2004, VOL Bhandar, N.M., and Kumar P., Rtfcal Neural Networ - A tool for Load Ratng of Masonry Arch Brdges,2006, Advances n Brdge Engneerng. 5. Menha M.B., Fundamentals of neural networs. Computatonal ntellgence, Internatonal MultConference of Engneers and Computer Scents, 2008,vol1. 6. Tang X., Hybrd Hdden Marov Model and Artfcal Neural Networ for Automatc Speech Recogonaton,2009 Pacfc-Asa Conference on Crcuts, Communcatons and Systems, pp Seyed Mostafa Ka.,Neural networs n Matlab.Tehran,2009, Kan Publcaton of Rayaneh Sabz. 386
Lecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationImplementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status
Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationBackpropagation: In Search of Performance Parameters
Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationSimulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010
Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationAn Anti-Noise Text Categorization Method based on Support Vector Machines *
An Ant-Nose Text ategorzaton Method based on Support Vector Machnes * hen Ln, Huang Je and Gong Zheng-Hu School of omputer Scence, Natonal Unversty of Defense Technology, hangsha, 410073, hna chenln@nudt.edu.cn,
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationReview of approximation techniques
CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationBAYESIAN MULTI-SOURCE DOMAIN ADAPTATION
BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationDecision Strategies for Rating Objects in Knowledge-Shared Research Networks
Decson Strateges for Ratng Objects n Knowledge-Shared Research etwors ALEXADRA GRACHAROVA *, HAS-JOACHM ER **, HASSA OUR ELD ** OM SUUROE ***, HARR ARAKSE *** * nsttute of Control and System Research,
More informationLecture 4: Principal components
/3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness
More information(1) The control processes are too complex to analyze by conventional quantitative techniques.
Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationArtificial Intelligence (AI) methods are concerned with. Artificial Intelligence Techniques for Steam Generator Modelling
Artfcal Intellgence Technques for Steam Generator Modellng Sarah Wrght and Tshldz Marwala Abstract Ths paper nvestgates the use of dfferent Artfcal Intellgence methods to predct the values of several contnuous
More informationA Semi-parametric Regression Model to Estimate Variability of NO 2
Envronment and Polluton; Vol. 2, No. 1; 2013 ISSN 1927-0909 E-ISSN 1927-0917 Publshed by Canadan Center of Scence and Educaton A Sem-parametrc Regresson Model to Estmate Varablty of NO 2 Meczysław Szyszkowcz
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationFace Recognition Based on Neuro-Fuzzy System
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.9 No.4, Aprl 2009 39 Face Recognton Based on Neuro-Fuzzy System Nna aher Makhsoos, Reza Ebrahmpour and Alreza Hajany Department of
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationVisual Thesaurus for Color Image Retrieval using Self-Organizing Maps
Vsual Thesaurus for Color Image Retreval usng Self-Organzng Maps Chrstopher C. Yang and Mlo K. Yp Department of System Engneerng and Engneerng Management The Chnese Unversty of Hong Kong, Hong Kong ABSTRACT
More informationData Mining: Model Evaluation
Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationCSCI 5417 Information Retrieval Systems Jim Martin!
CSCI 5417 Informaton Retreval Systems Jm Martn! Lecture 11 9/29/2011 Today 9/29 Classfcaton Naïve Bayes classfcaton Ungram LM 1 Where we are... Bascs of ad hoc retreval Indexng Term weghtng/scorng Cosne
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationSpam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection
E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton We-Chh Hsu, Tsan-Yng Yu E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton
More informationFusion Performance Model for Distributed Tracking and Classification
Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.
More informationAn Efficient Algorithm for PC Purchase Decision System
Proceedngs of the 6th WSAS Internatonal Conference on Instrumentaton, Measurement, Crcuts & s, Hangzhou, Chna, Aprl 15-17, 2007 216 An ffcent Algorthm for PC Purchase Decson Huay Chang Department of Informaton
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationBrief Study of Identification System Using Regression Neural Network Based on Delay Tap Structures
DOI V [ GSTF Journal on Computng (JoC), Vol. 3 No. 3, Dec 03 Bref Study of Identfcaton System Usng Regresson Neural Network Based on Delay Tap Structures Alvn Sahron Abstract ths nvestgaton ams to provde
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationA User Selection Method in Advertising System
Int. J. Communcatons, etwork and System Scences, 2010, 3, 54-58 do:10.4236/jcns.2010.31007 Publshed Onlne January 2010 (http://www.scrp.org/journal/jcns/). A User Selecton Method n Advertsng System Shy
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationThe Study of Remote Sensing Image Classification Based on Support Vector Machine
Sensors & Transducers 03 by IFSA http://www.sensorsportal.com The Study of Remote Sensng Image Classfcaton Based on Support Vector Machne, ZHANG Jan-Hua Key Research Insttute of Yellow Rver Cvlzaton and
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationParameter estimation for incomplete bivariate longitudinal data in clinical trials
Parameter estmaton for ncomplete bvarate longtudnal data n clncal trals Naum M. Khutoryansky Novo Nordsk Pharmaceutcals, Inc., Prnceton, NJ ABSTRACT Bvarate models are useful when analyzng longtudnal data
More informationINTELLECT SENSING OF NEURAL NETWORK THAT TRAINED TO CLASSIFY COMPLEX SIGNALS. Reznik A. Galinskaya A.
Internatonal Journal "Informaton heores & Applcatons" Vol.10 173 INELLEC SENSING OF NEURAL NEWORK HA RAINED O CLASSIFY COMPLEX SIGNALS Reznk A. Galnskaya A. Abstract: An expermental comparson of nformaton
More informationRecommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm
Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationAn Improved Neural Network Algorithm for Classifying the Transmission Line Faults
1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationPerformance Evaluation of an ANFIS Based Power System Stabilizer Applied in Multi-Machine Power Systems
Performance Evaluaton of an ANFIS Based Power System Stablzer Appled n Mult-Machne Power Systems A. A GHARAVEISI 1,2 A.DARABI 3 M. MONADI 4 A. KHAJEH-ZADEH 5 M. RASHIDI-NEJAD 1,2,5 1. Shahd Bahonar Unversty
More informationThe Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding
Internatonal Journal of Operatons Research Internatonal Journal of Operatons Research Vol., No., 9 4 (005) The Man-hour Estmaton Models & Its Comparson of Interm Products Assembly for Shpbuldng Bn Lu and
More informationBiological Sequence Mining Using Plausible Neural Network and its Application to Exon/intron Boundaries Prediction
Bologcal Sequence Mnng Usng Plausble Neural Networ and ts Applcaton to Exon/ntron Boundares Predcton Kuochen L, Dar-en Chang, and Erc Roucha CECS, Unversty of Lousvlle, Lousvlle, KY 40292, USA Yuan Yan
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationThree supervised learning methods on pen digits character recognition dataset
Three supervsed learnng methods on pen dgts character recognton dataset Chrs Flezach Department of Computer Scence and Engneerng Unversty of Calforna, San Dego San Dego, CA 92093 cflezac@cs.ucsd.edu Satoru
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationVISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
More informationEECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science
EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty
More informationA Method of Hot Topic Detection in Blogs Using N-gram Model
84 JOURNAL OF SOFTWARE, VOL. 8, NO., JANUARY 203 A Method of Hot Topc Detecton n Blogs Usng N-gram Model Xaodong Wang College of Computer and Informaton Technology, Henan Normal Unversty, Xnxang, Chna
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationTHE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS. Yuriy Zaychenko
206 5 Knowledge Dalogue - Soluton THE FUZZY GROUP ETHOD OF DATA HANDLING WITH FUZZY INPUTS Yury Zaycheno Abstract: The problem of forecastng models constructng usng expermental data n terms of fuzzness,
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationNeural Network Control for TCP Network Congestion
5 Amercan Control Conference June 8-, 5. Portland, OR, USA FrA3. Neural Network Control for TCP Network Congeston Hyun C. Cho, M. Sam Fadal, Hyunjeong Lee Electrcal Engneerng/6, Unversty of Nevada, Reno,
More informationAssociative Based Classification Algorithm For Diabetes Disease Prediction
Internatonal Journal of Engneerng Trends and Technology (IJETT) Volume-41 Number-3 - November 016 Assocatve Based Classfcaton Algorthm For Dabetes Dsease Predcton 1 N. Gnana Deepka, Y.surekha, 3 G.Laltha
More information