Traffic Classification Method Based On Data Stream Fingerprint

Size: px
Start display at page:

Download "Traffic Classification Method Based On Data Stream Fingerprint"

Transcription

1 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence Chongqng Unversty of Posts and Telecommuncaton Chongqng, Chna College of Comuter Scence Chongqng Unversty of Posts and Telecommuncaton Chongqng, Chna 3 Chongqng Muncal Publc Securty Bureau Network Securty Cors Chongqng,Chna a chengkf@cqut.edu.cn, b539376@qq.com Keywords: Traffc classfcaton, Reny cross entroy, Data stream fngerrnt, Smlarty Abstract. Traffc classfcaton s a method for categorzng the comuter network traffc nto a number of traffc class based on varous features observed assvely from the traffc. n recent years, duo to the rad develoment of the nternet, as well as the rad ncrease of dfferent nternet alcaton, the requrement to dstngush between the dfferent alcatons s rsng. Many tradtonal methods lke ort based, ackets based and some alternate methods based on machne learnng aroaches have been used for the traffc classfcaton. n ths aer, a new traffc classfcaton method was roosed to utlze the data stream fngerrnt nformaton generated by an alcaton. The roosed new method s comared wth other network traffc classfcaton methods. The exermental results show that the classfcaton accuracy of the new method meet the actual needs. ntroducton n recent years, more and more new network alcatons aear, esecally n moble nternet area. n order to use the bandwdth effectvely and rovde better network servce, the traffc should be classfed accordng to the dfference of nternet alcaton. Tradtonal network classfcaton method based on ort, or the ayload for tradtonal web alcatons erforms well. However, wth the aearance of large numbers of new network alcatons, the accuracy of classfcaton for the tradtonal networks s lower and lower. n ths aer, a traffc classfcaton method based on data stream fngerrnt s ntroduced to mrove the classfcaton accuracy.. Related Work At resent, the manly used method for network traffc classfcaton are: P traffc classfcaton based on ort, P traffc classfcaton based on ayload, traffc classfcaton based on host behavor, P traffc classfcaton based on machne learnng.. Port based P traffc classfcaton Tradtonal classfcaton methods dentfy dfferent tyes of alcatons accordng to the well-known ort numbers(ana desgnated ort number). However, ths aroach has ts lmtatons, some alcatons may not have ther orts regstered wth ANA(for examle, eer to eer alcatons such as Naster and Kazaa). An alcaton may use some ordnary orts other than well-known orts to avod access control restrctons of oeratng system. Although ort-based traffc classfcaton s the fastest and smlest method, several studes have shown that t erforms oorly, less than 7% accuracy n classfyng flows[] [].. Payload based P traffc classfcaton Classfcaton method based on the ayload s known as examnng whether the ayload contans secal label for traffc classfcaton. Ths method s usually used for PP traffc detecton and network ntruson detecton. But ths method also has some defects: frstly, t can only classfy the 6. The authors - Publshed by Atlants Press 74

2 unencryted traffc, and has no effect on encryted traffc or rvate agreement. Secondly, the analyss of content on the alcaton layer drectly leads to the ssues of rvacy nfrngement..3 Traffc classfcaton based on host behavor Another new knd of method s based on the atterns of host behavor at the transort layer [3]. t ays attenton to all the traffc generated by a secfed host, and can accurately assocate each host wth the servces t rovdes or uses. Authors n [4] nvestgated some fundamental characterstcs of network alcatons, such as the huge network dameter and the resence of many hosts actng as both servers and clents, to classfy the network traffc. However, ths method s tme-consumng and cannot classfy a sngle flow, snce t must gather nformaton from server flows of each host before t can dentfy the role of a host..4 Traffc classfcaton based on machne learnng Wth the ncreasng demand of network classfcaton, newer methods relyng on traffc statstcal characterstcs was used to dentfy the alcaton [5][6]. Ths methods frstly assume that traffc generated by some knd of alcatons has some unque features. However, due to the need for large-scale data sets for statstcs, a traffc classfcaton method based on machne learnng s roosed n lterature [7]. n many cases they could be hardly used for real-tme network traffc classfcaton due to the comlexty of machne learnng algorthms [8][9]. 3. Methodology Ths aer sums u the advantages and dsadvantages of the current network traffc classfcaton methods, a new traffc classfcaton method based on data stream fngerrnt s roosed. The framework of the roosed method s descrbed n Fg., whch can be dvded nto mult-stes as follows: Ste : Collectng data acket and then constructng the sesson flow. Ste : Extractng the data stream fngerrnts n the sesson flow, and determnng whether the current rocess s n the learnng hase. f so, uttng the data stream fngerrnt nto the samle data stream fngerrnt database, then endng rocess. f not, go to the next ste. Ste 3: Calculatng the data stream fngerrnt dstrbuton robablty of the current ackets. Calculatng the smlarty between the current data stream dstrbuton robablty and the samle data stream fngerrnt n the database, and obtanng the fnal results. Fg. Framework of the roosed method 3. Pre-rocessng Pre-rocessng s manly used to collect the network ackets, and then usng the nsecton acket header nformaton to construct the sesson flow. A flow can be defne as successve P ackets havng the same 5-tule: source P, destnaton P, source ort, destnaton ort, and transort layer rotocol. 743

3 3. The data stream fngerrnt n ths aer, we use a set of ostve ntegers between and 55 to descrbe the ayload of a acket, whch can be exressed n Eq.(), where the varable Payload refers to the ayload data, [,,,, 55] s the element that s comosed of the varable Payload. We obtan the X robablty dstrbuton by accountng the number of X from the Payload. n ths aer, the robablty dstrbuton of X s called as Data Stream Fngerrnt (DSF). The DSF of a acket can be exressed n Eq.(), where = (,,,,,, ) s the robablty dstrbuton of the varable X. { 55} X Payload = 55 () DSF = X = X X X X X 55 () Smlarty of data stream fngerrnt n order to classfy the current network traffc, we need to comare the smlarty between current data stream fngerrnt and the tranng samle data stream fngerrnt. We use orders Reny cross entroy to comare the smlarty. orders Reny cross entroy s defned as Eq.(3):, = log q ( (3) Where and q are two dscrete stochastc varables, r and q r are the robablty functon of, q. One mortant roerty of Reny cross entroy s that f the dscrete stochastc varables have the same dstrbuton, then. Then the entroy measure n Eq.(3) s asymmetrc, whch means that (, ( q, ). But n our method, the symmetrc of Eq.(3) s sutable for the smlarty of data stream fngerrnt. So when chose =. 5, the Reny cross entroy can be rewrtten nto Eq.(4)..5, = log q ( (4) Method based on the Reny cross entroy to classfy a secfc traffc can be exressed as follow: N S = (, =.5 log = (,,,,, q = ( q,,,,, ) q q q N N = 55 N ) q (5) Where s one of the data stream fngerrnt samles n the database whle q s the data stream fngerrnt of the traffc whch wll be classfed. We can know from Eq.(5), f the and q have the same or smlarty data stream fngerrnt dstrbutons, the Reny cross entroy S wll be equal or close to. When the data stream fngerrnt dstrbutons of and q have the larger dfference, then 744

4 the Reny cross entroy S s farther from. So, we need to set a sutable threshold β. When S s classfed nto. β, q 4. Exerment 4.Exermental envronment The exermental envronment s owerful comuter confgured wth 4 ntel Core 5-4U and 4G RAM. n ths aer, we develoed a frontend module and a backend module based on the Lnux latform to mlement the traffc classfcaton method based on the data stream fngerrnt. The frontend module s used to extracted the data stream fngerrnt of network ackets. Whle the backend module s used to calculate the smlarty of data stream fngerrnt and rocess the result of classfcaton. Whle mlementng the traffc classfcaton exerment, frstly we let the frontend module and backend module to enter the learnng hase. n ths aer, the learnng hase tme s set to mnutes. At the same tme, the collected data durng the learnng hase s used as a tranng samle set. The set conssts of 45 data stream fngerrnts such as dns, ft, htt, htts, smt. 4.Performance Evaluaton When the learnng hase comleted, the two modules wll come to the testng hase. Ths hase s manly used to measure the smlarty between the data stream fngerrnt of the current ackets and the tranng samle set. n ths aer, the threshold of fngerrnt smlarty s selected as.. For the exermental uroses, the roosed new method s comared wth other methods lke Nave Bayes and Suort Vector Machne. The exermental results are shown n the Table. Table : Performance evaluaton Usng Memory Classfcaton Method Accuracy (%) Error (%) Tme (sec) (MB) Data Stream Fngerrnt Naïve Bayes Suort Vector Machne Results show that the roosed new traffc classfcaton method s lower than the other two methods n classfcaton accuracy. n the lterature [], the accuracy of the currently avalable network traffc classfcaton methods s from 88% to %, so the roosed method can be used n real alcaton. The accuracy of the roosed new method s low manly due to the followng two asects: Due to the roosed new traffc classfcaton method s manly aled to the classfcaton of network traffc n ublc laces, t s requred that the new method s able to real-tme classfcaton of the network traffc. So n the case where the accuracy of the classfcaton results meet avalable, we are more concerned about the tme consumton of the classfcaton rocess. n ths aer, the frontend module only extracts the data stream fngerrnt of the frst 5 ackets n a sesson flow. Ths results n some cases, the extracted data stream fngerrnt could not comletely reflect the fngerrnt feature of an entre sesson flow, and then decreases the classfcaton accuracy. 5. Concluson n ths aer, we roose a new traffc classfcaton method based on data stream fngerrnt of the ackets n a sesson flow. n the exermental stage, we only extract the data stream fngerrnt of the frst 5 ackets n a sesson flow as features to classfy network traffc. Ths results n a declne of the classfcaton accuracy. However, the exermental results show that the roosed method has the classfcaton accuracy above 9%. The testng results also verfy that the roosed method can 745

5 used for the traffc classfcaton. n future works, we wll collect the ackets n the network by usng the Posson samlng method. n ths way, the data stream fngerrnt characterstcs of the samled ackets can reflect the data stream fngerrnt characterstcs of an entre sesson flow. Then the classfcaton accuracy of our roosed new traffc method wll be further mroved. Acknowledgment The research resented n ths aer s suorted n art by the Scence and Technology Research Project of Chongqng Educaton Commttee(KJ444), the Technology Suort Demonstraton Project of Chongqng Educaton Cloud(cstcjcsf-jfzhX). References [] Erman J, Mahant A, Arltt M. Byte me: a case for byte accuracy n traffc classfcaton[c]//proceedngs of the 3rd annual ACM worksho on Mnng network data. ACM, 7: [] Moore A W, Paagannak K. Toward the accurate dentfcaton of network alcatons[m]//passve and Actve Network Measurement. Srnger Berln Hedelberg, 5: [3] Mega J, Murata Y, Hrasawa M, et al. Usng host roflng to refne statstcal alcaton dentfcaton[c]// NFOCOM, Proceedngs EEE. EEE, : [4] Constantnou F, Mavrommats P. dentfyng Known and Unknown Peer-to-Peer Traffc[C]// Network Comutng and Alcatons, 6. NCA 6. Ffth EEE nternatonal Symosum on. EEE, 6:93-. [5] Crott M, Dus M, Grngol F, et al. Traffc classfcaton through smle statstcal fngerrntng[j]. ACM SGCOMM Comuter Communcaton Revew, 7, 37(): 5-6. [6] Auld T, Moore A W, Gull S F. Bayesan neural networks for nternet traffc classfcaton[j]. Neural Networks, EEE Transactons on, 7, 8(): [7] Nguyen T T T, Armtage G. A survey of technques for nternet traffc classfcaton usng machne learnng[j]. Communcatons Surveys & Tutorals, EEE, 8, (4): [8] Taasw S, Guta A S. Flow-Based PP Network Traffc Classfcaton Usng Machne Learnng[C]// Cyber-Enabled Dstrbuted Comutng and Knowledge Dscovery (CyberC), 3 nternatonal Conference on. EEE, 3:4-46. [9] Elnaka A M, Mahmoud Q H. Real-tme traffc classfcaton for unfed communcaton networks[c]// Moble and Wreless Networkng (MoWNeT), 3 nternatonal Conference on Selected Tocs n. 3:-6. [] Donato W, Pescaé A, Danott A. Traffc dentfcaton engne: an oen latform for traffc classfcaton[j]. Network, EEE, 4, 8():

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we

More information

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

A new Algorithm for Lossless Compression applied to two-dimensional Static Images

A new Algorithm for Lossless Compression applied to two-dimensional Static Images A new Algorthm for Lossless Comresson aled to two-dmensonal Statc Images JUAN IGNACIO LARRAURI Deartment of Technology Industral Unversty of Deusto Avda. Unversdades, 4. 48007 Blbao SPAIN larrau@deusto.es

More information

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures. Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng

More information

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2) Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese

More information

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic JOURNAL OF NETWORKS, VOL. 5, NO. 5, MAY 577 Weght Based Multple Support Vector Machne Identfcaton of -to- Traffc Feng Lu, Zhtang L, Zhengbng Hu, Ljuan Zhou, Bn Lu, Junfeng Yu Department of Computer Scence

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Index Terms-Software effort estimation, principle component analysis, datasets, neural networks, and radial basis functions.

Index Terms-Software effort estimation, principle component analysis, datasets, neural networks, and radial basis functions. ISO 9001:2008 Certfed Internatonal Journal of Engneerng and Innovatve Technology (IJEIT The Effect of Dmensonalty Reducton on the Performance of Software Cost Estmaton Models Ryadh A.K. Mehd College of

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN 21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Classification of Network Traffic via Packet-Level Hidden Markov Models

Classification of Network Traffic via Packet-Level Hidden Markov Models Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,

More information

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,

More information

WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY

WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY Desgn Scence Track Xao Fang* College of Busness Admnstraton Unversty of Toledo Toledo, Oho xao.fang@utoledo.edu Paul J. Hu* School

More information

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b Advanced Materals Research Vol. 874 (2014) 57-62 Onlne avalable snce 2014/Jan/08 at www.scentfc.net (2014) rans ech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.874.57 Contour Error of the 3-DoF

More information

II. RELATED WORK AND BACKGROUND

II. RELATED WORK AND BACKGROUND Comarson of Bluetooth Interconnecton Methods usng BlueProbe Sewook Jung, Alexander Chang, and Maro Gerla Deartment of Comuter Scence Unversty of Calforna, Los Angeles {sewookj, acmchang, gerla}@cs.ucla.edu

More information

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS USEFUL AUTHENTICATION MECHANISM FOR IEC 61850-BASED SUBSTATIONS Nastaran Abar M.H.Yaghmaee Davod Noor S.Hedaat Ahbar abar.nastaran@gmal.com yaghmaee@eee.org Hed_lan@yahoo.com ABSTRACT By ncreasng the use

More information

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Ths artcle has been acceted for ublcaton n a future ssue of ths journal, but has not been fully edted. Content may change ror to fnal ublcaton. Ctaton nformaton: DOI 10.1109/TIFS.2016.2601070, IEEE Transactons

More information

Design of Multimodal Biometrics Authentication using Feature Extraction and Fusion

Design of Multimodal Biometrics Authentication using Feature Extraction and Fusion Desgn of Multmodal Bometrcs Authentcaton usng Feature Extracton and Fuson 1 Ms.D. Indra Dev, 2 M. Karthga, ME CSE Deartment of Comuter Scence and Engneerng Trchy, Tamlnadu, Inda clf2001@gmal.com Deartment

More information

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features

Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features 362 The Internatonal Arab Journal of Informaton Technology, Vol. 14, No. 3, May 2017 Feature Selecton Algorthm Based on Correlaton between Mut Metrc Network Traffc Flow Features Yongfeng Cu 1,2, Sh Dong

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Model for System Resources in Flexible Time-Triggered Middleware Architectures

A Model for System Resources in Flexible Time-Triggered Middleware Architectures A Model for System Resources n Flexble Tme-Trggered Mddleware Archtectures Adran Noguero 1, Isdro Calvo 2, Lus Almeda 3, and Una Gangot 2 1 Tecnala, Software Systems Engneerng Unt, Parque Tecnológco de

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Analytical Performance Analysis of Network- Processor-Based Application Designs

Analytical Performance Analysis of Network- Processor-Based Application Designs Analytcal Performance Analyss of Networ- Processor-Based Alcaton Desgns e Lu BMC Software Inc. Waltham, MA e Wang Unversty of Massachusetts Lowell, MA Abstract Networ rocessors (NP) are desgned to rovde

More information

Skew Estimation in Document Images Based on an Energy Minimization Framework

Skew Estimation in Document Images Based on an Energy Minimization Framework Skew Estmaton n Document Images Based on an Energy Mnmzaton Framework Youbao Tang 1, Xangqan u 1, e Bu 2, and Hongyang ang 3 1 School of Comuter Scence and Technology, Harbn Insttute of Technology, Harbn,

More information

A Novel TCP with Dynamic Burst-Contention Loss Notification over OBS Networks

A Novel TCP with Dynamic Burst-Contention Loss Notification over OBS Networks A Novel TCP wth Dynamc Burst-Contenton Loss Notfcaton over OB Networks Basem hhada 1 and Pn-Han Ho 1, 1 D. R. Chraton chool of Comuter cence, Unversty of Waterloo, Waterloo, Canada Deartment of Electrcal

More information

Risk Assessment Using Functional Modeling based on Object Behavior and Interaction

Risk Assessment Using Functional Modeling based on Object Behavior and Interaction Rsk Assessment Usng Functonal Modelng based on Object Behavor and Interacton Akekacha Tangsuksant, Nakornth Promoon Software Engneerng Lab, Center of Ecellence n Software Engneerng Deartment of Comuter

More information

TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS

TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS Kestuts Jankauskas Kaunas Unversty of Technology, Deartment of Multmeda Engneerng, Studentu st. 5, LT-5368 Kaunas, Lthuana, kestuts.jankauskas@ktu.lt Abstract:

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Semi-Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Semi-Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IP-06850-00.R3 Sem-Suervsed Based Maxmum Margn Analyss for Interactve Image Retreval Lnng Zhang,, Student Member, IEEE, Lo Wang, Senor Member, IEEE and Wes Ln 3, Senor Member, IEEE School of Electrcal

More information

Overview. CSC 2400: Computer Systems. Pointers in C. Pointers - Variables that hold memory addresses - Using pointers to do call-by-reference in C

Overview. CSC 2400: Computer Systems. Pointers in C. Pointers - Variables that hold memory addresses - Using pointers to do call-by-reference in C CSC 2400: Comuter Systems Ponters n C Overvew Ponters - Varables that hold memory addresses - Usng onters to do call-by-reference n C Ponters vs. Arrays - Array names are constant onters Ponters and Strngs

More information

A High-Accuracy Algorithm for Surface Defect Detection of Steel Based on DAG-SVM

A High-Accuracy Algorithm for Surface Defect Detection of Steel Based on DAG-SVM Sensors & Transducers, Vol. 57, Issue 0, October 203,. 42-48 Sensors & Transducers 203 by IFSA htt://www.sensorsortal.com A Hgh-Accuracy Algorthm for Surface Defect Detecton of Steel Based on DAG-SVM,

More information

Deep Classification in Large-scale Text Hierarchies

Deep Classification in Large-scale Text Hierarchies Deep Classfcaton n Large-scale Text Herarches Gu-Rong Xue Dkan Xng Qang Yang 2 Yong Yu Dept. of Computer Scence and Engneerng Shangha Jao-Tong Unversty {grxue, dkxng, yyu}@apex.sjtu.edu.cn 2 Hong Kong

More information

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

A Classifier Ensemble of Binary Classifier Ensembles

A Classifier Ensemble of Binary Classifier Ensembles Internatonal Journal of Electroncs Communcaton and Comuter Technology (IJECCT) Volume 1 Issue 1 Setember 2011 A Classfer Ensemble of Bnary Classfer Ensembles Hamd Parvn Comuter Engneerng, Islamc Azad Unversty,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

On the Two-level Hybrid Clustering Algorithm

On the Two-level Hybrid Clustering Algorithm On the Two-level Clusterng Algorthm ng Yeow Cheu, Chee Keong Kwoh, Zongln Zhou Bonformatcs Research Centre, School of Comuter ngneerng, Nanyang Technologcal Unversty, Sngaore 639798 ezlzhou@ntu.edu.sg

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH بسم االله الرحمن الرحيم (الهي همه چيز را به تو مي سپارم ياريم كن) MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH JAVAD AKBARI TORKESTANI Deartment

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Under-Sampling Approaches for Improving Prediction of the Minority Class in an Imbalanced Dataset

Under-Sampling Approaches for Improving Prediction of the Minority Class in an Imbalanced Dataset Under-Samplng Approaches for Improvng Predcton of the Mnorty Class n an Imbalanced Dataset Show-Jane Yen and Yue-Sh Lee Department of Computer Scence and Informaton Engneerng, Mng Chuan Unversty 5 The-Mng

More information

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article Jestr Journal of Engneerng cence and Technology Revew 7 (3) (2014) 151 157 Research Artcle JOURAL OF Engneerng cence and Technology Revew www.estr.org Traffc Classfcaton Method by Combnaton of Host Behavour

More information

Gentle Early Detection Algorithm

Gentle Early Detection Algorithm Gentle Early etecton Algorthm Hussen Abdel-jaber 1, Mahmoud Abdeljaber 2, Hussen Abu Mansour 1, Malak El-Amr 1 1 Faculty of Comuter Studes, eartment of Informaton Technology and Comutng, Arab Oen Unversty,

More information

Segmentation and classification of medical images using texture-primitive features: Application of BAM-type artificial neural network

Segmentation and classification of medical images using texture-primitive features: Application of BAM-type artificial neural network Orgnal Artcle 119 Segmentaton and classfcaton of medcal mages usng texture-rmtve features: Alcaton of BAM-tye artfcal neural network Neeraj Sharma, Amt K. Ray, Shru Sharma, K. K. Shukla 1, Satyajt Pradhan,

More information

Available online at ScienceDirect. Procedia Computer Science 94 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 94 (2016 ) Avalable onlne at www.scencedrect.com ScenceDrect Proceda Comuter Scence 94 (2016 ) 176 182 The 13th Internatonal Conference on Moble Systems and Pervasve Comutng (MobSPC 2016) An Effcent QoS-aware Web

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

ACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING

ACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING ACCUATE BIT ALLOCATION AND ATE CONTOL FO DCT DOMAIN VIDEO TANSCODING Zhjun Le, Ncolas D. Georganas Multmeda Communcatons esearch Laboratory Unversty of Ottawa, Ottawa, Canada {lezj, georganas}@ mcrlab.uottawa.ca

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information

An Efficient Travel Time Prediction Method using Cosine Similarity

An Efficient Travel Time Prediction Method using Cosine Similarity An Effcent Travel Tme Predcton Method usng Cosne Smlarty Subrna Akter 1, Jamshed Alam Patwary2 Deartment of CSE Internatonal Islamc Unversty, Chttagong,Bangladesh Shamma Akter 3, Lutfun ahar4 Deartment

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Method of Line Matching Based on Feature Points

A Method of Line Matching Based on Feature Points JOURNAL OF SOFTWARE, VOL. 7, NO. 7, JULY 2012 1539 A Method of Lne Matchng Based on Feature Ponts Yanxa Wang and Yan Ma College of Comuter and Informaton Scence, Chongqng Normal Unversty, Chongqng, 400047,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment TELKOMNIKA, Vol.10, No.5, September 2012, pp. 1087~1092 e-issn: 2087-278X accredted by DGHE (DIKTI), Decree No: 51/Dkt/Kep/2010 1087 Parallel Implementaton of Classfcaton Algorthms Based on Cloud Computng

More information

Multilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation

Multilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation (IJACSA) Internatonal Journal of Advanced Comuter Scence and Alcatons, Vol. 3, No. 11, 01 Multlayer Neural Networs and Nearest Neghbor Classfer erformances for Image Annotaton Mustaha OUJAOURA Laboratory

More information

A User Selection Method in Advertising System

A User Selection Method in Advertising System Int. J. Communcatons, etwork and System Scences, 2010, 3, 54-58 do:10.4236/jcns.2010.31007 Publshed Onlne January 2010 (http://www.scrp.org/journal/jcns/). A User Selecton Method n Advertsng System Shy

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Similarity Measure Method for Symbolization Time Series

A Similarity Measure Method for Symbolization Time Series Research Journal of Appled Scences, Engneerng and Technology 5(5): 1726-1730, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scentfc Organzaton, 2013 Submtted: July 27, 2012 Accepted: September 03, 2012

More information

A Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning

A Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75

More information

Face Recognition by Fusing Binary Edge Feature and Second-order Mutual Information

Face Recognition by Fusing Binary Edge Feature and Second-order Mutual Information Face Recognton by Fusng Bnary Edge Feature and Second-order Mutual Informaton Jatao Song, Bejng Chen, We Wang, Xaobo Ren School of Electronc and Informaton Engneerng, Nngbo Unversty of Technology Nngbo,

More information

Fingerprint matching based on weighting method and SVM

Fingerprint matching based on weighting method and SVM Fngerprnt matchng based on weghtng method and SVM Ja Ja, Lanhong Ca, Pnyan Lu, Xuhu Lu Key Laboratory of Pervasve Computng (Tsnghua Unversty), Mnstry of Educaton Bejng 100084, P.R.Chna {jaja}@mals.tsnghua.edu.cn

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Eclectic Genetic Algorithm for Holistic Face Recognition in L Space

Eclectic Genetic Algorithm for Holistic Face Recognition in L Space Proceedngs of the World Congress on Engneerng 2011 Vol II Eclectc Genetc Algorthm for Holstc Face Recognton n L Sace C. Vllegas, J. Clment, C.R. Murllo, A. Otero, C.R. Vllegas Abstract Several works regardng

More information

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model?

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model? Bayesan Networks: Indeendences and Inference Scott Daves and Andrew Moore Note to other teachers and users of these sldes. Andrew and Scott would be delghted f you found ths source materal useful n gvng

More information

An Approach for Congestion Control in Sensor Network Using Priority Based Application*

An Approach for Congestion Control in Sensor Network Using Priority Based Application* An Aroach for Congeston Control n Sensor Network Usng Prorty Based Alcaton* Md. Obadur Rahman Muhammad Mostafa Monowar Byung Goo Cho Choong Seon Hong Deartment of Comuter Engneerng, Kyung Hee Unversty

More information

Vulnerability Identification and Classification Via Text Mining Bug Databases

Vulnerability Identification and Classification Via Text Mining Bug Databases Vulnerablty Identfcaton and Classfcaton Va Text Mnng Bug Databases Dumdu Wjayasekara, Mlos Manc Unversty of Idaho Idaho Falls, ID, USA dumdu.wjayasekara@gmal.com, msko@eee.org Mles McQueen Idaho Natonal

More information

SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS

SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS Sergey A. PANFILOV, Ludmla V. LITVINTSEVA, Ilya S. ULYANOV, Kazuk TAKAHASHI, Sergue V. ULYANOV YAMAHA Motor

More information

Research on Categorization of Animation Effect Based on Data Mining

Research on Categorization of Animation Effect Based on Data Mining MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na

More information

Reliable Negative Extracting Based on knn for Learning from Positive and Unlabeled Examples

Reliable Negative Extracting Based on knn for Learning from Positive and Unlabeled Examples 94 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 Relable Negatve Extractng Based on knn for Learnng from Postve and Unlabeled Examples Bangzuo Zhang College of Computer Scence and Technology, Jln Unversty,

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Neural Networks in Statistical Anomaly Intrusion Detection

Neural Networks in Statistical Anomaly Intrusion Detection Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian , China.

College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian , China. 07 nd Internatonal Conference on Computer Scence and Technology (CST 07 ISBN: 978--60595-46-5 Zero-Permsson Moble Devce Identfcaton Based on the Smlarty of Browser Fngerprnts Nan-hua KANG,, Mng-zh CHEN,,

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information