Traffic Classification Method Based On Data Stream Fingerprint
|
|
- Clementine Hodge
- 5 years ago
- Views:
Transcription
1 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence Chongqng Unversty of Posts and Telecommuncaton Chongqng, Chna College of Comuter Scence Chongqng Unversty of Posts and Telecommuncaton Chongqng, Chna 3 Chongqng Muncal Publc Securty Bureau Network Securty Cors Chongqng,Chna a chengkf@cqut.edu.cn, b539376@qq.com Keywords: Traffc classfcaton, Reny cross entroy, Data stream fngerrnt, Smlarty Abstract. Traffc classfcaton s a method for categorzng the comuter network traffc nto a number of traffc class based on varous features observed assvely from the traffc. n recent years, duo to the rad develoment of the nternet, as well as the rad ncrease of dfferent nternet alcaton, the requrement to dstngush between the dfferent alcatons s rsng. Many tradtonal methods lke ort based, ackets based and some alternate methods based on machne learnng aroaches have been used for the traffc classfcaton. n ths aer, a new traffc classfcaton method was roosed to utlze the data stream fngerrnt nformaton generated by an alcaton. The roosed new method s comared wth other network traffc classfcaton methods. The exermental results show that the classfcaton accuracy of the new method meet the actual needs. ntroducton n recent years, more and more new network alcatons aear, esecally n moble nternet area. n order to use the bandwdth effectvely and rovde better network servce, the traffc should be classfed accordng to the dfference of nternet alcaton. Tradtonal network classfcaton method based on ort, or the ayload for tradtonal web alcatons erforms well. However, wth the aearance of large numbers of new network alcatons, the accuracy of classfcaton for the tradtonal networks s lower and lower. n ths aer, a traffc classfcaton method based on data stream fngerrnt s ntroduced to mrove the classfcaton accuracy.. Related Work At resent, the manly used method for network traffc classfcaton are: P traffc classfcaton based on ort, P traffc classfcaton based on ayload, traffc classfcaton based on host behavor, P traffc classfcaton based on machne learnng.. Port based P traffc classfcaton Tradtonal classfcaton methods dentfy dfferent tyes of alcatons accordng to the well-known ort numbers(ana desgnated ort number). However, ths aroach has ts lmtatons, some alcatons may not have ther orts regstered wth ANA(for examle, eer to eer alcatons such as Naster and Kazaa). An alcaton may use some ordnary orts other than well-known orts to avod access control restrctons of oeratng system. Although ort-based traffc classfcaton s the fastest and smlest method, several studes have shown that t erforms oorly, less than 7% accuracy n classfyng flows[] [].. Payload based P traffc classfcaton Classfcaton method based on the ayload s known as examnng whether the ayload contans secal label for traffc classfcaton. Ths method s usually used for PP traffc detecton and network ntruson detecton. But ths method also has some defects: frstly, t can only classfy the 6. The authors - Publshed by Atlants Press 74
2 unencryted traffc, and has no effect on encryted traffc or rvate agreement. Secondly, the analyss of content on the alcaton layer drectly leads to the ssues of rvacy nfrngement..3 Traffc classfcaton based on host behavor Another new knd of method s based on the atterns of host behavor at the transort layer [3]. t ays attenton to all the traffc generated by a secfed host, and can accurately assocate each host wth the servces t rovdes or uses. Authors n [4] nvestgated some fundamental characterstcs of network alcatons, such as the huge network dameter and the resence of many hosts actng as both servers and clents, to classfy the network traffc. However, ths method s tme-consumng and cannot classfy a sngle flow, snce t must gather nformaton from server flows of each host before t can dentfy the role of a host..4 Traffc classfcaton based on machne learnng Wth the ncreasng demand of network classfcaton, newer methods relyng on traffc statstcal characterstcs was used to dentfy the alcaton [5][6]. Ths methods frstly assume that traffc generated by some knd of alcatons has some unque features. However, due to the need for large-scale data sets for statstcs, a traffc classfcaton method based on machne learnng s roosed n lterature [7]. n many cases they could be hardly used for real-tme network traffc classfcaton due to the comlexty of machne learnng algorthms [8][9]. 3. Methodology Ths aer sums u the advantages and dsadvantages of the current network traffc classfcaton methods, a new traffc classfcaton method based on data stream fngerrnt s roosed. The framework of the roosed method s descrbed n Fg., whch can be dvded nto mult-stes as follows: Ste : Collectng data acket and then constructng the sesson flow. Ste : Extractng the data stream fngerrnts n the sesson flow, and determnng whether the current rocess s n the learnng hase. f so, uttng the data stream fngerrnt nto the samle data stream fngerrnt database, then endng rocess. f not, go to the next ste. Ste 3: Calculatng the data stream fngerrnt dstrbuton robablty of the current ackets. Calculatng the smlarty between the current data stream dstrbuton robablty and the samle data stream fngerrnt n the database, and obtanng the fnal results. Fg. Framework of the roosed method 3. Pre-rocessng Pre-rocessng s manly used to collect the network ackets, and then usng the nsecton acket header nformaton to construct the sesson flow. A flow can be defne as successve P ackets havng the same 5-tule: source P, destnaton P, source ort, destnaton ort, and transort layer rotocol. 743
3 3. The data stream fngerrnt n ths aer, we use a set of ostve ntegers between and 55 to descrbe the ayload of a acket, whch can be exressed n Eq.(), where the varable Payload refers to the ayload data, [,,,, 55] s the element that s comosed of the varable Payload. We obtan the X robablty dstrbuton by accountng the number of X from the Payload. n ths aer, the robablty dstrbuton of X s called as Data Stream Fngerrnt (DSF). The DSF of a acket can be exressed n Eq.(), where = (,,,,,, ) s the robablty dstrbuton of the varable X. { 55} X Payload = 55 () DSF = X = X X X X X 55 () Smlarty of data stream fngerrnt n order to classfy the current network traffc, we need to comare the smlarty between current data stream fngerrnt and the tranng samle data stream fngerrnt. We use orders Reny cross entroy to comare the smlarty. orders Reny cross entroy s defned as Eq.(3):, = log q ( (3) Where and q are two dscrete stochastc varables, r and q r are the robablty functon of, q. One mortant roerty of Reny cross entroy s that f the dscrete stochastc varables have the same dstrbuton, then. Then the entroy measure n Eq.(3) s asymmetrc, whch means that (, ( q, ). But n our method, the symmetrc of Eq.(3) s sutable for the smlarty of data stream fngerrnt. So when chose =. 5, the Reny cross entroy can be rewrtten nto Eq.(4)..5, = log q ( (4) Method based on the Reny cross entroy to classfy a secfc traffc can be exressed as follow: N S = (, =.5 log = (,,,,, q = ( q,,,,, ) q q q N N = 55 N ) q (5) Where s one of the data stream fngerrnt samles n the database whle q s the data stream fngerrnt of the traffc whch wll be classfed. We can know from Eq.(5), f the and q have the same or smlarty data stream fngerrnt dstrbutons, the Reny cross entroy S wll be equal or close to. When the data stream fngerrnt dstrbutons of and q have the larger dfference, then 744
4 the Reny cross entroy S s farther from. So, we need to set a sutable threshold β. When S s classfed nto. β, q 4. Exerment 4.Exermental envronment The exermental envronment s owerful comuter confgured wth 4 ntel Core 5-4U and 4G RAM. n ths aer, we develoed a frontend module and a backend module based on the Lnux latform to mlement the traffc classfcaton method based on the data stream fngerrnt. The frontend module s used to extracted the data stream fngerrnt of network ackets. Whle the backend module s used to calculate the smlarty of data stream fngerrnt and rocess the result of classfcaton. Whle mlementng the traffc classfcaton exerment, frstly we let the frontend module and backend module to enter the learnng hase. n ths aer, the learnng hase tme s set to mnutes. At the same tme, the collected data durng the learnng hase s used as a tranng samle set. The set conssts of 45 data stream fngerrnts such as dns, ft, htt, htts, smt. 4.Performance Evaluaton When the learnng hase comleted, the two modules wll come to the testng hase. Ths hase s manly used to measure the smlarty between the data stream fngerrnt of the current ackets and the tranng samle set. n ths aer, the threshold of fngerrnt smlarty s selected as.. For the exermental uroses, the roosed new method s comared wth other methods lke Nave Bayes and Suort Vector Machne. The exermental results are shown n the Table. Table : Performance evaluaton Usng Memory Classfcaton Method Accuracy (%) Error (%) Tme (sec) (MB) Data Stream Fngerrnt Naïve Bayes Suort Vector Machne Results show that the roosed new traffc classfcaton method s lower than the other two methods n classfcaton accuracy. n the lterature [], the accuracy of the currently avalable network traffc classfcaton methods s from 88% to %, so the roosed method can be used n real alcaton. The accuracy of the roosed new method s low manly due to the followng two asects: Due to the roosed new traffc classfcaton method s manly aled to the classfcaton of network traffc n ublc laces, t s requred that the new method s able to real-tme classfcaton of the network traffc. So n the case where the accuracy of the classfcaton results meet avalable, we are more concerned about the tme consumton of the classfcaton rocess. n ths aer, the frontend module only extracts the data stream fngerrnt of the frst 5 ackets n a sesson flow. Ths results n some cases, the extracted data stream fngerrnt could not comletely reflect the fngerrnt feature of an entre sesson flow, and then decreases the classfcaton accuracy. 5. Concluson n ths aer, we roose a new traffc classfcaton method based on data stream fngerrnt of the ackets n a sesson flow. n the exermental stage, we only extract the data stream fngerrnt of the frst 5 ackets n a sesson flow as features to classfy network traffc. Ths results n a declne of the classfcaton accuracy. However, the exermental results show that the roosed method has the classfcaton accuracy above 9%. The testng results also verfy that the roosed method can 745
5 used for the traffc classfcaton. n future works, we wll collect the ackets n the network by usng the Posson samlng method. n ths way, the data stream fngerrnt characterstcs of the samled ackets can reflect the data stream fngerrnt characterstcs of an entre sesson flow. Then the classfcaton accuracy of our roosed new traffc method wll be further mroved. Acknowledgment The research resented n ths aer s suorted n art by the Scence and Technology Research Project of Chongqng Educaton Commttee(KJ444), the Technology Suort Demonstraton Project of Chongqng Educaton Cloud(cstcjcsf-jfzhX). References [] Erman J, Mahant A, Arltt M. Byte me: a case for byte accuracy n traffc classfcaton[c]//proceedngs of the 3rd annual ACM worksho on Mnng network data. ACM, 7: [] Moore A W, Paagannak K. Toward the accurate dentfcaton of network alcatons[m]//passve and Actve Network Measurement. Srnger Berln Hedelberg, 5: [3] Mega J, Murata Y, Hrasawa M, et al. Usng host roflng to refne statstcal alcaton dentfcaton[c]// NFOCOM, Proceedngs EEE. EEE, : [4] Constantnou F, Mavrommats P. dentfyng Known and Unknown Peer-to-Peer Traffc[C]// Network Comutng and Alcatons, 6. NCA 6. Ffth EEE nternatonal Symosum on. EEE, 6:93-. [5] Crott M, Dus M, Grngol F, et al. Traffc classfcaton through smle statstcal fngerrntng[j]. ACM SGCOMM Comuter Communcaton Revew, 7, 37(): 5-6. [6] Auld T, Moore A W, Gull S F. Bayesan neural networks for nternet traffc classfcaton[j]. Neural Networks, EEE Transactons on, 7, 8(): [7] Nguyen T T T, Armtage G. A survey of technques for nternet traffc classfcaton usng machne learnng[j]. Communcatons Surveys & Tutorals, EEE, 8, (4): [8] Taasw S, Guta A S. Flow-Based PP Network Traffc Classfcaton Usng Machne Learnng[C]// Cyber-Enabled Dstrbuted Comutng and Knowledge Dscovery (CyberC), 3 nternatonal Conference on. EEE, 3:4-46. [9] Elnaka A M, Mahmoud Q H. Real-tme traffc classfcaton for unfed communcaton networks[c]// Moble and Wreless Networkng (MoWNeT), 3 nternatonal Conference on Selected Tocs n. 3:-6. [] Donato W, Pescaé A, Danott A. Traffc dentfcaton engne: an oen latform for traffc classfcaton[j]. Network, EEE, 4, 8():
THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY
Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO
More informationRecognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network
Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we
More informationA Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet
IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun
More informationA new Algorithm for Lossless Compression applied to two-dimensional Static Images
A new Algorthm for Lossless Comresson aled to two-dmensonal Statc Images JUAN IGNACIO LARRAURI Deartment of Technology Industral Unversty of Deusto Avda. Unversdades, 4. 48007 Blbao SPAIN larrau@deusto.es
More informationKeywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.
Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng
More informationBroadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)
Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese
More informationWeight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic
JOURNAL OF NETWORKS, VOL. 5, NO. 5, MAY 577 Weght Based Multple Support Vector Machne Identfcaton of -to- Traffc Feng Lu, Zhtang L, Zhengbng Hu, Ljuan Zhou, Bn Lu, Junfeng Yu Department of Computer Scence
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationIndex Terms-Software effort estimation, principle component analysis, datasets, neural networks, and radial basis functions.
ISO 9001:2008 Certfed Internatonal Journal of Engneerng and Innovatve Technology (IJEIT The Effect of Dmensonalty Reducton on the Performance of Software Cost Estmaton Models Ryadh A.K. Mehd College of
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationE-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN
21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence
More informationRemote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information
Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationA Base Station-Coordinated Contention Resolution for IEEE PMP Networks
A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationClassification of Network Traffic via Packet-Level Hidden Markov Models
Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,
More informationAdvanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs
Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,
More informationWEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY
WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY Desgn Scence Track Xao Fang* College of Busness Admnstraton Unversty of Toledo Toledo, Oho xao.fang@utoledo.edu Paul J. Hu* School
More informationContour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b
Advanced Materals Research Vol. 874 (2014) 57-62 Onlne avalable snce 2014/Jan/08 at www.scentfc.net (2014) rans ech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.874.57 Contour Error of the 3-DoF
More informationII. RELATED WORK AND BACKGROUND
Comarson of Bluetooth Interconnecton Methods usng BlueProbe Sewook Jung, Alexander Chang, and Maro Gerla Deartment of Comuter Scence Unversty of Calforna, Los Angeles {sewookj, acmchang, gerla}@cs.ucla.edu
More informationUSEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS
USEFUL AUTHENTICATION MECHANISM FOR IEC 61850-BASED SUBSTATIONS Nastaran Abar M.H.Yaghmaee Davod Noor S.Hedaat Ahbar abar.nastaran@gmal.com yaghmaee@eee.org Hed_lan@yahoo.com ABSTRACT By ncreasng the use
More informationA Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
Ths artcle has been acceted for ublcaton n a future ssue of ths journal, but has not been fully edted. Content may change ror to fnal ublcaton. Ctaton nformaton: DOI 10.1109/TIFS.2016.2601070, IEEE Transactons
More informationDesign of Multimodal Biometrics Authentication using Feature Extraction and Fusion
Desgn of Multmodal Bometrcs Authentcaton usng Feature Extracton and Fuson 1 Ms.D. Indra Dev, 2 M. Karthga, ME CSE Deartment of Comuter Scence and Engneerng Trchy, Tamlnadu, Inda clf2001@gmal.com Deartment
More informationA CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION
A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationFeature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features
362 The Internatonal Arab Journal of Informaton Technology, Vol. 14, No. 3, May 2017 Feature Selecton Algorthm Based on Correlaton between Mut Metrc Network Traffc Flow Features Yongfeng Cu 1,2, Sh Dong
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationA Model for System Resources in Flexible Time-Triggered Middleware Architectures
A Model for System Resources n Flexble Tme-Trggered Mddleware Archtectures Adran Noguero 1, Isdro Calvo 2, Lus Almeda 3, and Una Gangot 2 1 Tecnala, Software Systems Engneerng Unt, Parque Tecnológco de
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationAnalytical Performance Analysis of Network- Processor-Based Application Designs
Analytcal Performance Analyss of Networ- Processor-Based Alcaton Desgns e Lu BMC Software Inc. Waltham, MA e Wang Unversty of Massachusetts Lowell, MA Abstract Networ rocessors (NP) are desgned to rovde
More informationSkew Estimation in Document Images Based on an Energy Minimization Framework
Skew Estmaton n Document Images Based on an Energy Mnmzaton Framework Youbao Tang 1, Xangqan u 1, e Bu 2, and Hongyang ang 3 1 School of Comuter Scence and Technology, Harbn Insttute of Technology, Harbn,
More informationA Novel TCP with Dynamic Burst-Contention Loss Notification over OBS Networks
A Novel TCP wth Dynamc Burst-Contenton Loss Notfcaton over OB Networks Basem hhada 1 and Pn-Han Ho 1, 1 D. R. Chraton chool of Comuter cence, Unversty of Waterloo, Waterloo, Canada Deartment of Electrcal
More informationRisk Assessment Using Functional Modeling based on Object Behavior and Interaction
Rsk Assessment Usng Functonal Modelng based on Object Behavor and Interacton Akekacha Tangsuksant, Nakornth Promoon Software Engneerng Lab, Center of Ecellence n Software Engneerng Deartment of Comuter
More informationTIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS
TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS Kestuts Jankauskas Kaunas Unversty of Technology, Deartment of Multmeda Engneerng, Studentu st. 5, LT-5368 Kaunas, Lthuana, kestuts.jankauskas@ktu.lt Abstract:
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationSemi-Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
IP-06850-00.R3 Sem-Suervsed Based Maxmum Margn Analyss for Interactve Image Retreval Lnng Zhang,, Student Member, IEEE, Lo Wang, Senor Member, IEEE and Wes Ln 3, Senor Member, IEEE School of Electrcal
More informationOverview. CSC 2400: Computer Systems. Pointers in C. Pointers - Variables that hold memory addresses - Using pointers to do call-by-reference in C
CSC 2400: Comuter Systems Ponters n C Overvew Ponters - Varables that hold memory addresses - Usng onters to do call-by-reference n C Ponters vs. Arrays - Array names are constant onters Ponters and Strngs
More informationA High-Accuracy Algorithm for Surface Defect Detection of Steel Based on DAG-SVM
Sensors & Transducers, Vol. 57, Issue 0, October 203,. 42-48 Sensors & Transducers 203 by IFSA htt://www.sensorsortal.com A Hgh-Accuracy Algorthm for Surface Defect Detecton of Steel Based on DAG-SVM,
More informationDeep Classification in Large-scale Text Hierarchies
Deep Classfcaton n Large-scale Text Herarches Gu-Rong Xue Dkan Xng Qang Yang 2 Yong Yu Dept. of Computer Scence and Engneerng Shangha Jao-Tong Unversty {grxue, dkxng, yyu}@apex.sjtu.edu.cn 2 Hong Kong
More informationA XML-Based Composition Event Approach as an Integration and Cooperation Middleware
A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationPCA Based Gait Segmentation
Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department
More informationA Classifier Ensemble of Binary Classifier Ensembles
Internatonal Journal of Electroncs Communcaton and Comuter Technology (IJECCT) Volume 1 Issue 1 Setember 2011 A Classfer Ensemble of Bnary Classfer Ensembles Hamd Parvn Comuter Engneerng, Islamc Azad Unversty,
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationOn the Two-level Hybrid Clustering Algorithm
On the Two-level Clusterng Algorthm ng Yeow Cheu, Chee Keong Kwoh, Zongln Zhou Bonformatcs Research Centre, School of Comuter ngneerng, Nanyang Technologcal Unversty, Sngaore 639798 ezlzhou@ntu.edu.sg
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationMOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH
بسم االله الرحمن الرحيم (الهي همه چيز را به تو مي سپارم ياريم كن) MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH JAVAD AKBARI TORKESTANI Deartment
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationUnder-Sampling Approaches for Improving Prediction of the Minority Class in an Imbalanced Dataset
Under-Samplng Approaches for Improvng Predcton of the Mnorty Class n an Imbalanced Dataset Show-Jane Yen and Yue-Sh Lee Department of Computer Scence and Informaton Engneerng, Mng Chuan Unversty 5 The-Mng
More informationJournal of Engineering Science and Technology Review 7 (3) (2014) Research Article
Jestr Journal of Engneerng cence and Technology Revew 7 (3) (2014) 151 157 Research Artcle JOURAL OF Engneerng cence and Technology Revew www.estr.org Traffc Classfcaton Method by Combnaton of Host Behavour
More informationGentle Early Detection Algorithm
Gentle Early etecton Algorthm Hussen Abdel-jaber 1, Mahmoud Abdeljaber 2, Hussen Abu Mansour 1, Malak El-Amr 1 1 Faculty of Comuter Studes, eartment of Informaton Technology and Comutng, Arab Oen Unversty,
More informationSegmentation and classification of medical images using texture-primitive features: Application of BAM-type artificial neural network
Orgnal Artcle 119 Segmentaton and classfcaton of medcal mages usng texture-rmtve features: Alcaton of BAM-tye artfcal neural network Neeraj Sharma, Amt K. Ray, Shru Sharma, K. K. Shukla 1, Satyajt Pradhan,
More informationAvailable online at ScienceDirect. Procedia Computer Science 94 (2016 )
Avalable onlne at www.scencedrect.com ScenceDrect Proceda Comuter Scence 94 (2016 ) 176 182 The 13th Internatonal Conference on Moble Systems and Pervasve Comutng (MobSPC 2016) An Effcent QoS-aware Web
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING
ACCUATE BIT ALLOCATION AND ATE CONTOL FO DCT DOMAIN VIDEO TANSCODING Zhjun Le, Ncolas D. Georganas Multmeda Communcatons esearch Laboratory Unversty of Ottawa, Ottawa, Canada {lezj, georganas}@ mcrlab.uottawa.ca
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationAn Efficient Travel Time Prediction Method using Cosine Similarity
An Effcent Travel Tme Predcton Method usng Cosne Smlarty Subrna Akter 1, Jamshed Alam Patwary2 Deartment of CSE Internatonal Islamc Unversty, Chttagong,Bangladesh Shamma Akter 3, Lutfun ahar4 Deartment
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA Method of Line Matching Based on Feature Points
JOURNAL OF SOFTWARE, VOL. 7, NO. 7, JULY 2012 1539 A Method of Lne Matchng Based on Feature Ponts Yanxa Wang and Yan Ma College of Comuter and Informaton Scence, Chongqng Normal Unversty, Chongqng, 400047,
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationParallel Implementation of Classification Algorithms Based on Cloud Computing Environment
TELKOMNIKA, Vol.10, No.5, September 2012, pp. 1087~1092 e-issn: 2087-278X accredted by DGHE (DIKTI), Decree No: 51/Dkt/Kep/2010 1087 Parallel Implementaton of Classfcaton Algorthms Based on Cloud Computng
More informationMultilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation
(IJACSA) Internatonal Journal of Advanced Comuter Scence and Alcatons, Vol. 3, No. 11, 01 Multlayer Neural Networs and Nearest Neghbor Classfer erformances for Image Annotaton Mustaha OUJAOURA Laboratory
More informationA User Selection Method in Advertising System
Int. J. Communcatons, etwork and System Scences, 2010, 3, 54-58 do:10.4236/jcns.2010.31007 Publshed Onlne January 2010 (http://www.scrp.org/journal/jcns/). A User Selecton Method n Advertsng System Shy
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Similarity Measure Method for Symbolization Time Series
Research Journal of Appled Scences, Engneerng and Technology 5(5): 1726-1730, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scentfc Organzaton, 2013 Submtted: July 27, 2012 Accepted: September 03, 2012
More informationA Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning
A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75
More informationFace Recognition by Fusing Binary Edge Feature and Second-order Mutual Information
Face Recognton by Fusng Bnary Edge Feature and Second-order Mutual Informaton Jatao Song, Bejng Chen, We Wang, Xaobo Ren School of Electronc and Informaton Engneerng, Nngbo Unversty of Technology Nngbo,
More informationFingerprint matching based on weighting method and SVM
Fngerprnt matchng based on weghtng method and SVM Ja Ja, Lanhong Ca, Pnyan Lu, Xuhu Lu Key Laboratory of Pervasve Computng (Tsnghua Unversty), Mnstry of Educaton Bejng 100084, P.R.Chna {jaja}@mals.tsnghua.edu.cn
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationEclectic Genetic Algorithm for Holistic Face Recognition in L Space
Proceedngs of the World Congress on Engneerng 2011 Vol II Eclectc Genetc Algorthm for Holstc Face Recognton n L Sace C. Vllegas, J. Clment, C.R. Murllo, A. Otero, C.R. Vllegas Abstract Several works regardng
More informationBayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model?
Bayesan Networks: Indeendences and Inference Scott Daves and Andrew Moore Note to other teachers and users of these sldes. Andrew and Scott would be delghted f you found ths source materal useful n gvng
More informationAn Approach for Congestion Control in Sensor Network Using Priority Based Application*
An Aroach for Congeston Control n Sensor Network Usng Prorty Based Alcaton* Md. Obadur Rahman Muhammad Mostafa Monowar Byung Goo Cho Choong Seon Hong Deartment of Comuter Engneerng, Kyung Hee Unversty
More informationVulnerability Identification and Classification Via Text Mining Bug Databases
Vulnerablty Identfcaton and Classfcaton Va Text Mnng Bug Databases Dumdu Wjayasekara, Mlos Manc Unversty of Idaho Idaho Falls, ID, USA dumdu.wjayasekara@gmal.com, msko@eee.org Mles McQueen Idaho Natonal
More informationSOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS
SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS Sergey A. PANFILOV, Ludmla V. LITVINTSEVA, Ilya S. ULYANOV, Kazuk TAKAHASHI, Sergue V. ULYANOV YAMAHA Motor
More informationResearch on Categorization of Animation Effect Based on Data Mining
MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na
More informationReliable Negative Extracting Based on knn for Learning from Positive and Unlabeled Examples
94 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 Relable Negatve Extractng Based on knn for Learnng from Postve and Unlabeled Examples Bangzuo Zhang College of Computer Scence and Technology, Jln Unversty,
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationNeural Networks in Statistical Anomaly Intrusion Detection
Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian , China.
07 nd Internatonal Conference on Computer Scence and Technology (CST 07 ISBN: 978--60595-46-5 Zero-Permsson Moble Devce Identfcaton Based on the Smlarty of Browser Fngerprnts Nan-hua KANG,, Mng-zh CHEN,,
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationImplementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status
Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More information