Application of Relevance Vector Machines in Real Time Intrusion Detection
|
|
- Sibyl Russell
- 6 years ago
- Views:
Transcription
1 (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Applcaton of Relevance Vector Machnes n Real Tme Intruson Detecton Naveen N.C, Assocate Professor, Department of ISE, R V College of Engneerng, Bangalore and Research Scholar, Dept of CSE, SRM Unversty, Chenna, Inda Dr Natarajan.S, Professor, Department of ISE P E S I T, Bangalore, Inda Dr Srnvasan.R, Professor Emertus, Department of Computer Scence and Engneerng, M S R I T, Bangalore, Inda Abstract In the recent years, there has been a growng nterest n the development of change detecton technques for the analyss of Intruson Detecton. Ths nterest stems from the wde range of applcatons n whch change detecton methods can be used. Detectng the changes by observng data collected at dfferent tmes s one of the most mportant applcatons of network securty because they can provde analyss of short nterval on global scale. Research n explorng change detecton technques for medum/hgh network data can be found for the new generaton of very hgh resoluton data. The advent of these technologes has greatly ncreased the ablty to montor and resolve the detals of changes and makes t possble to analyze. At the same tme, they present a new challenge over other technologes n that a relatvely large amount of data must be analyzed and corrected for regstraton and classfcaton errors to dentfy frequently changng trend. In ths research paper an approach for Intruson Detecton System (IDS) whch embeds a Change Detecton Algorthm wth Relevance Vector Machne (RVM) s proposed. IDS are consdered as a complex task that handles a huge amount of network related data wth dfferent parameters. Current research work has proved that kernel learnng based methods are very effectve n addressng these problems. In contrast to Support Vector Machnes (SVM), the RVM provdes a probablstc output whle preservng the accuracy. The focus of ths paper s to model RVM that can work wth large network data set n a real envronment and develop RVM classfer for IDS. The new model conssts of Change Pont (CP) and RVM whch s compettve n processng tme and mprove the classfcaton performance compared to other known classfcaton model lke SVM. The goal s to make the system smple but effcent n detectng network ntruson n an actual real tme envronment. Results show that the model learns more effectvely, automatcally adjust to the changes and adjust the threshold whle mnmzng the false alarm rate wth tmely detecton. Keywords- Intruson Detecton; Change Pont Detecton; Relevance Vector Machne; Outler Detecton. I. INTRODUCTION Reasonable level of securty s provded by statc defense mechansms such as frewalls and software updates. Dynamc mechansms can also be used to acheve securty such as IDS and Network Analyzers (NA). The man dfference between IDS and NA s that IDS ams to acheve the specfc goal of detectng attacks whereas NA ams to determne the changng trends n network of computers [1] [18]. Earler work emphaszed that data can be obtaned by three ways usng real traffc, santzed traffc and smulated traffc. But n real tme fast response wth reduced false postves to external events wthn an extremely short tme s demanded and expected [19]. Therefore, an alternatve algorthm to mplement real tme learnng s mperatve for crtcal applcatons for fast changng envronments. Even for offlne applcatons, speed s stll a need, and a real tme learnng algorthm that reduces tranng tme and human effort to nearly zero would always be of consderable value. Mnng data n real tme s stll a bg challenge [21]. IDS nvolve automatc dentfcaton of unusual actvty by collectng data, and comparng t wth reference data. An assumpton of IDS s that a network s normal behavor s dstnct from abnormal or ntrusve behavor, whch can be a result of varous attack/s. In ths research work, flow analyss s used for network traffc analyss whch searches for behavoral characterstcs n a flow. There are varous characterstcs such as transferred bytes, packets, flow length, nter-arrval tmes, nter-packet gaps, etc that are montored and computed. Data that s collected from flows can be used on hgh-speed networks as there s no deep packet nspecton. In ths paper a hybrd approach for mprovng the performance of detecton algorthm by buldng more ntellgence to the system s proposed. In ths drecton CP detecton s consdered for dscoverng change ponts f propertes of network behavor change. CP s the change n characterstcs that occur very fast wth respect to the samplng perod of the measurements, f not nstantaneously. The detecton of changes refers to tools that help to decde whether such a change has occurred n the characterstcs or not. Outler Detecton s a major step n Data Mnng (DM) problem whch dscovers abnormal or devatng data ponts wth respect to dstrbuton n data [20]. Outlers are often consdered as an error or nose although they may carry very mportant nformaton. A real tme detecton system s one n whch network ntruson detecton happens whle an attack s occurrng. A real tme IDS captures the present network traffc data whch s on lne data. Bayesan learnng algorthms, lke RVM allow the user to specfy a probablty dstrbuton over possble parameter values from the learned classfer. Ths wll provde one soluton to the over fttng problem as the algorthm can use pror dstrbuton to regularze the classfer P a g e
2 (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, II. RELATED WORK Research shows that many Machne Learnng (ML) technques can be used for data classfcaton. It s presented that popular supervsed learnng technques gves hgh detecton accuracy for IDS. A wde range of real world applcatons are dscussed n the communty of Statstcal Analyss and DM [3] [13]. Statstcal technques usually assume an underlyng dstrbuton of data and requre the elmnaton of data nstances contanng nose. Statstcal methods though computatonally ntense can be appled to analyze the data [4]. Statstcal methods are wdely used to buld behavor based IDS. The behavor of the system s measured by a number of varables sampled over tme such as the resource usage duraton, the number of processors, memory dsk resources consumed durng that sesson etc. The model keeps averages of all the varables and detects whether thresholds are exceeded based on the standard devaton of the varable. Very few on lne (real tme) network IDS approaches are proposed untl now. Lao and Vemur [5] develop a real tme IDS usng Self Organzng Maps (SOM) and preprocess ther dataset wth 10 features for each data record contanng nformaton of 50 packets. M. Al-Subae [6] uses Hdden Markov Models over Neural Networks n anomaly ntruson detecton to classfy normal network actvty and attack usng a large tranng dataset. The approach was evaluated by analyzng how t affected the classfcaton results. Ben Amor [7] desgns a real tme IDS usng Naïve Bayes and Decson Trees and the results show that the Nave Bayes gves hgher detecton speed and detecton rate than the Decson Trees. Authors n [8] [14] propose a hybrd ntellgent systems usng Decson Trees (DT), SVM and Fuzzy SVM for anomaly detecton (unknown or new attacks). The results show that the hybrd DT SVM approach mproves the performance for all the classes when compared to a SVM approach. SVM proposed by (Burges 1998, Cortes and Vapnk 1995) s a supervsed learnng algorthm that s used ncreasngly n IDS. The classfcaton performance of SVM model s better than the classfcaton methods, such as ANN [9]. The beneft of SVMs s that they learn very effectvely wth hgh dmensonal data. Rung Chng Chen [10] uses Rough Set Theory (RST) and SVM to detect ntrusons. Intally, RST s used to preprocess the data and reduce the dmensons. Later, the features selected by RST are sent to SVM model to learn and test. Ths method proves to be effectve and also decreased the space densty of data. The SVM s one of the most successful classfcaton algorthms n the DM area [17]. RVM, proposed by Tppng [11] s a sparse machne learnng algorthm that s smlar to the SVM n many respects. It s capable of delverng a fully probablstc output and t s proved to have nearly dentcal performance to, f not better than, that of SVM n several benchmarks. D He [12] proposes an IDS approach based on the RVM where a Chebyshev chaotc map s ntroduced as the nner tranng nose sgnal. The result shows that the approach can reach hgher detecton probabltes under dfferent knds of ntrusons and the computatonal complexty reduces effcently. L Ru [16] mproves the generalzaton performance of RVM by an ncremental relevance vector machne algorthm and the results are better than RVM and SVM. Ths guarantees the relablty of usng RVM based approach for desgnng IDS. RVM has a better generalzaton performance than SVM due to the less support vectors. III. METHODOLOGY Over 90% of Internet traffc uses the Transmsson Control Protocol (TCP). Because of ts wdespread use and ts mpressve growth, the research focuses on the detecton of anomalous behavor wthn TCP traffc. Explorng the TCP packet attrbutes would enable a classfer to dentfy normal and abnormal actvty on a packet-by-packet bass. From these attrbutes, a decson tree s bult whch wll enable to dentfy and classfy dfferent attacks and volatons. The process of buldng a classfer model usng RVM s depcted n Fg. 1. Stage 1 Stage 2 Real Tme Data Traffc Data Data Preprocessng Log Fle CPOD Algorthm Outlers Vector Fgure 1. Archtecture of the model Stage 3 Classfer Inference Usng RVM Log Fle Alarm Unt A. Dataset Descrpton The frst stage of the mplementaton nvolves n tranng the system. For the present problem data s collected from the campus network to measure the accuracy and attacks. Data such collected s preprocessed and used to detect change pont n network performance characterstcs. Traffc n the network results n contnuous change as the user s logn and make use of Internet. For capturng the packets n real tme JPCAP and WINPCAP tool s used to collect the nformaton that s beng transmtted. JPCAP provdes facltes to capture and save raw packets lve. It can automatcally dentfy packet types and can generate correspondng Java objects for Ethernet, IPv4, IPv6, ARP/RARP, TCP, UDP, and ICMPv4 packets. Packets can also be fltered accordng to the user requrement. JPCAP s developed on LIBPCAP / WINPCAP, whch s mplemented n C and Java and s the ndustry-standard tool for lnk-layer network access. In Wndows envronment WINPCAP allows applcatons to capture and transmt network packets bypassng the protocol stack. The network data s collected from the nterface whch s capable of capturng nformaton flowng wthn the local network. For example, anomales can be detected on a sngle machne, a group of network a swtch or a router. For the current research work the TCP/IP packet s collected n real tme from the research lab network and dumped for further process. The Data Preprocessng phase handles the converson of raw packet or connecton data nto a 49 P a g e
3 (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, format that algorthms can utlze and store the results n the knowledge base. Rather than operatng on a raw network dump fle, the algorthm uses summary nformaton to perform the analyss. Data s preprocessed to generate summary lnes about each connecton found n the dump fle. The resultng summary fle s then parsed and processed by the algorthm to gve a count to each data/each tme pont, wth a hgher score ndcatng a hgh possblty of beng an outler/a change pont. The Log Fle stores the data as rules produced by the detecton algorthm for further mnng process. It may also hold nformaton for the preprocessor, such as patterns for recognzng attacks and converson templates. Ths Tranng Data s responsble for generatng the ntal rule sets that needs to be used for devaton analyss. It can be trggered automatcally based on tme or the amount of pre-processed data avalable. The proposed Outler Detecton Algorthm examnes the network data and creates a descrpton of dfferences and stores n the outler vectors for further reference. If a devaton s detected t sgnals the alarm unt. A strategy for nvokng the devaton analyzer s by queryng perodcally the outler vectors for the new profles. Also the profler may sgnal when a new profle s added and the Alarm Unt s responsble for nformng the admnstrator when the devaton analyzer reports unusual behavor n the network stream. Ths can be n the form of SMS, e-mals, console alerts, log entres etc. In the data preprocessng step as shown n Fgure 1, packets are captured usng JPCAP lbrary and nformaton s extracted that ncludes IP header, TCP header, UDP header, and ICMP header from each packet. After that, the packet nformaton s parttoned and formed nto a record by aggregatng nformaton every 30 mnutes. Each record conssts of data features consdered as the key sgnature features representng the man characterstcs of network data and actvtes. IV. PROPOSED ALGORITHM A. Change Pont Outler Detecton (CPOD): To llustrate the problem, network data collected s observed wth threshold values n the college local area network at regular ntervals of tme wndow for a certan perod of tme. Most of the threshold varatons may be statstcally regular, but once a whle there may be an outler pont.e. a marked devaton from the prevous data. In general detectng such outlers s mportant because they may be caused by an anomaly wthn the network or from the external envronment. B. CP Dstrbuton Snce the CP can occur randomly and at dfferent tmes the current model assumes that the number of CP m s fxed and treated as an unknown random varable. If there are n observatons whch are denoted by o 1,o 2,..., o n, and a set of CP denoted by 0 < c 1 < c 2 < < c m < n, where the number of CP m s unknown t s assumed that the CP occur at dscrete tme, 1,..., n 1.From ths a pror dstrbuton of the CP s consdered. C. Samplng stage for CP 1. At tme n the algorthm starts 2. N data collected s sampled for tme t wthout attack 3. Wthn ths data sample f any CP s detected t s saved as a tranng data wth parameter W 4. These values are updated to the tranng database Ths algorthm has a computatonal cost of O(n). The followng are the requrements of CPOD algorthm. The statstcs should be on lne meanng an outler has to be detected as t appears. A change pont has to be detected wthn some constant number of observatons after the change happens. Specfc assumptons regardng dstrbutons are not done and hence the detecton can be adaptve to a nonstatonary tme seres and robust to a wde varety of dstrbutons. D. The CPOD Algorthm We denote a data sequence as {x : = 1, 2,... N}, s the tme varable, p denotes the number of data ponts to be observed before ntatng analyss. Cx denotes the current data pont n the tme seres beng consdered for analyss. t and s denotes the thresholds for change pont and outler detecton respectvely. Threshold value s the mean magntude of fluctuaton allowed n the data ponts wthn whch they won t be classfed. Wndow sze w, v denotes the number of data ponts to consder for computng the medan and meanng respectvely. The algorthm chooses medan over a small wndow, as t s less senstve to outlers and helps n localzng the devaton. w < v n all cases, (w/v) < 0.5 s found optmal. We mantan a vector to sgnfy the classfcaton state of each data pont. States could be {0,1,2,3} where 0 means nether outler nor change pont, 1 means outler, 2 means outler wth hgh probablty that prevous pont was the change pont, and 3 means the change pont done from prevous two observatons. If the thresholds are well tuned, CPOD can detect maxmum outlers and change ponts n a tme seres. CPOD Algorthm (Input : p,s,t,w,v) Step 1: The teraton for all data ponts s done after ntalzng =p+1 ( > p p < w < v < (N )) Step 2: The medan and mean over the wndows v, w s computed respectvely as n (1) and (2) ~ w x 1 C x~ = Mean of values n wndow v x v C = x 1 (2) (1) 50 P a g e
4 (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Step 3: Score1 s the rato of absolute dfference between the current data pont from the medan to the mean amplfed by the threshold and calculated as Score 1 = ( Cx - C x~ * t) / C x and (3) Score 2 s the normalzed rato of two dstance magntudes.e. the medan from mean and the mean from the current data pont and calculated as x~ x Score 2 = ( C - C )/ ( C x - C x~ ) * 100 (4) The medan s over the short term wndow w and mean over the longer term wndow v. By takng rato, makes the score robust to fluctuatons that may happen n the mean over a long term. We heurstcally found w/v < 0.5 to be the best choce. The resoluton of detecton s dependent on the threshold. If Score1 > Score2, we classfy the pont as an outler. Score2 s used as a data-dependent cutoff to classfy Score1 as outler or not. Score1 s senstve to mean and to the devaton of current data pont from medan. Score2 s senstve to devaton of current pont from mean and to devaton of mean from medan. In wndow v, Score1 wll be greater than Score2, wth the presence of outlers or wth data ponts subsequent to a change pont. Step 4: A stronger possblty of current data pont beng an outler or CP s ndcated f Score1 s hgher than Score2. To classfy the current data pont as CP an addtonal check s made to fnd f the pont les beyond a certan band around the medan represented as LL and UL. The classfcaton state s then saved n vector V. Score 1 Score Score 2 2 ( Cx ( LL Cx LL Cx UL ) : V UL ) : V 0 1 Step 5: State nformaton n vector V s used to classfy outler and CP. If the current pont has a hgher Score1 as ndcated n V the past three states are consdered for classfcaton. Vector V s s used to express the sum state of V,V -1 and V -2. V s stores state of the current data pont wth respect to past two data ponts. If the value of V s s 3 t ndcates that outlers were detected n the past and current pont could be the change pont. We test the prevous states to make sure there was no change pont detected n the past two data ponts. If detected then the CP s nferred as an outler. Smlarly f the value of V s s 1 then t s possble that current pont s an outler as shown n (6) and (7). V = 1 : V s = (V + V 1 + V 2 ) (6) = 0 : V s = 0 V s = 3 (V s 1 = 1 (V s 1 (5) = 3 V s = 3) : V 2 s = 1 (7) = 1) : V s = V s + V s - 1 = 1 V s 2 Fnally Cx s classfed dependng on the values of V s. If the state of current pont s 0, then there s no sgnfcant devaton. If the current pont s 1 or 2 and the current data pont devates more than s% threshold t s nferred as an outler and sgnfes a hgher possblty of Cx - 1 beng a CP. If the state of current pont s 3, wth accuracy t s nferred that two ponts pror to current one s the CP. V s = 0 : No change, adapt LL, UL to C x~ (8) = (1 2) ( Cx > (Cx + s % Cx ) ) : Outler > 2 : Change pont, adapt LL, UL to change Step 6: The classfcaton of outlers and change ponts as sgnfed n the V s vector s reported. The scores and state elements of vector V, V s for past data ponts N, N-1 and N-2 are perssted. Persstence of medan and mean over the wndow szes whle classfyng current data pont enables onlne mplementaton. Table I Lst of Network Dataset Features Collected 1. appname 2. totalsourcebytes 3. totaldestnatonbytes 4. totaldestnatonpackets 5. totalsourcepackets 6. sourcepayloadasbase64 7. sourcepayloadasutf 8. destnatonpayloadasbase6 9. destnatonpayloadasutf 10. drecton 11. sourcetcpflagsdescrpton 12. destnatontcpflagsdescrpton 13. source 14. protocolname 15. sourceport 16. destnaton 17. destnatonport 18. startdatetme 19. stopdatetme RVM s currently of much nterest n the research communty as they provde a number of advantages. RVM s based on a Bayesan formulaton of a lnear model wth an approprate pror that results n a sparse data representaton. As a result, they can generalze well and provde nferences at very low computatonal cost. Many applcatons lke object detecton and classfcaton, target detecton n mages, classfcaton of mcro calcfcatons from mammograms etc are developed. RVM produces a functon whch s comprsed of a set of kernel functons also known as bass functons and a set of weghts. Ths functon represents a model for the system presented to the learnng process from a set of tranng data set. The kernels and weghts calculated by the learnng process and the model functon defned by the weghted sum of kernels are fxed. From ths set of tranng vectors the RVM selects a sparse subset of nput vectors whch are deemed to be relevant by the probablstc learnng scheme. Ths s used for buldng a functon that estmates the output of the system from the nputs. These relevant vectors are used to form the bass functons and comprse the model functon. In the classfcaton phase each of the network data selected from the feature selecton phase s classfed as normal data or attack data. Ths phase conssts of two man dataset whch are used for tranng and testng. The log fle contans four weeks of tranng data and one week of testng data. A total of 19 features are captured as lsted n Table I. Durng the frst phase tranng s performed usng RVM wth a set of network records wth known answer classes. Based on the tranng the IDS model can 51 P a g e
5 classfy the data n each record nto normal network actvty or man attack types. Then the model s tested wth new or untraned dataset where each record was captured n a real tme envronment n the college research lab. For an nput vector x, an RVM classfer models the Probablty dstrbuton of ts class labeled C ε (1, +1} usng logstc regresson as ( ) (9) ( ) where f RVM (x) the classfer functon s gven by, f RVM (x) = α K(x,x ) (10) where K(.,.) s a kernel functon, and x, = 1,2,...,N, are tranng samples. The parameters α, 1, 2,..., N, n f RVM (x) are determned usng Bayesan estmaton, ntroducng a sparse pror on α The parameters α are assumed to be statstcally ndependent obeyng a zero-mean Gaussan dstrbuton wth varance λ -1, used to force them to be hghly concentrated around zero, leadng to very few nonzero terms n f RVM (x). (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, V. EXPERIMENTAL RESULTS Sample statstcs of IP addresses and ther count observed n our research laboratory for a tme perod of 30 mnutes specfed as wndow w 1, w 2, w 3. Fgure 2. Plot of real tme data and detecton of change pont and outlers Table II Sample statstcs of IP addresses Source IP Tme Tme Tme Address Wndow w 1 Wndow w 2 Wndow w (a) Average Packet count n the course of a day For the real tme statstcs the data was collected for one week and the graph s as shown n Fgure 2 and 3. (b) Traffc Statstcs n the course of a month Fgure 3. Plot of real tme data collected for 2 weeks Table III Comparson between RVM and SVM models Model SVM Number of tranng data Number of vectors Testng Performance P a g e
6 (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, RVM Table III shows the comparson between the SVM and RVM models. The value of testng performance from RVM model s effectvely same as that of SVM wth lesser support vectors. The performance of the RVM s also better than the SVM. VI. CONCLUSION In ths research work a soluton for classfyng outlers and change ponts from real tme data s proposed whch s addressed n two parts: scorng and classfcaton. Scores are computed that reflect outlers and ncrementally dscover to keep the state of outlers n data seres. The algorthm s characterzed n ts property to address outlers and change ponts at the same tme. Ths enables to deal wth frequent and fast changes n the source. The current mplementaton and usage ndcates the success of the algorthm. Ths gves a unfyng vew of outler detecton and change pont detecton n real tme network data. Usage of RVM shows a compettve accuracy mantanng ts sparseness ablty. Expermental results show that the RVM model acheves essentally the same performance wth a much sparser model as a prevously developed SVM model. The much reduced computatonal complexty n RVM makes t more feasble for real tme processng whle desgnng IDS. The proposed method s compettve wth respect to processng tme and allows the use of selected tranng data set. The result shows an mprovement n RVM classfcaton performance. In ths work, the desgn and successful mplementaton of a system wth outler detecton was done. REFERENCES [1] Oln Hyde, Machne Learnng For Cyber Securty at Network Speed & Scale, 1 st Publc Edton: October 11, 2011 [2] Iftkhar Ahmad, Azween Abdullah and Abdullah Alghamd, Towards the Selecton of Best Neural Network System for Intruson Detecton, Internatonal Journal of the Physcal Scences Vol. 5(12), October, 2010, pp [3] Fabo Pacfc, Change Detecton Algorthms: State of the Art, v1.2, Earth Observaton Laboratory, Tor Vergata Unversty, Rome, Italy, Feb 28, 2007 [4] G. Mohammed Nazer, A. Arul Lawrence Selvakumar, Current Intruson Detecton Technques n Informaton, European Journal of Scentfc Research, EuroJournals Publshng, Inc. 2011, pp [5] Lao Y, Vemur VR. Use of K-nearest Neghbor Classfer for Intruson Detecton. Computers & Securty 2002;21: [6] M. Al-Subae and M. Zulkernne. Effcacy of Hdden Markov Models Over Neural Networks n Anomaly Intruson Detecton. In 30th Annual Internatonal Computer Software and Applcatons Conference (COMPSAC 06), pages , [7] N. Ben Amor, S. Benferhat and Z. Eloued. Nave Bayes vs Decson Trees n Intruson Detecton Systems. In SAC 04: Proceedngs of the 2004 ACM symposum on Appled computng, pages , New York, NY, USA, ACM. ISBN [8] Sandhya Peddabachgar,Ajth Abraham, Crna Grosanc,Johnson Thomas, Oklahoma State Unversty, Modelng Intruson Detecton System Usng Hybrd Intellgent Systems, Journal of Network and Computer Applcatons, Elsever Ltd, 2005 [9] Zhqang ZHANG, Janzhong CUI, Network Intruson Detecton Based on Robust Wavelet RVM Algorthm, Journal of Informaton & Computatonal Scence, 2011, pp [10] Rung-Chng Chen, Ka-Fan Cheng, Cha-Fen Hseh, Usng Rough Set and Support Vector Machne for Network Intruson Detect, Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol 1, No 1, Aprl 2009 [11] M. Tppng, "Sparse Bayesan Learnng and the Relevance Vector Machne", Journal of Machne Learnng Research, 2001, pp [12] D He, Shangha Jao Tong Unversty, Improvng the Computer Network Intruson Detecton Performance Usng the Relevance Vector Machne wth Chebyshev Chaotc Map, IEEE, 2011 [13] Reza Sadoddn, Al A. Ghorban, An Incremental Frequent Structure Mnng Framework for Real-Tme Alert Correlaton, Computers & Securty, 2009, pp [14] Shaohua Teng, Hongle Du, Naq Wu, We Zhang, Jangy Su, A Cooperatve Network Intruson Detecton Based on Fuzzy SVMs, Journal of Networks, Vol. 5, No. 4, Aprl 2010 [15] Phurvt Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsrpnyo, Practcal Real-Tme Intruson Detecton Usng Machne Learnng Approaches, Computer Communcatons, 2011, pp [16] L Ru, Computer Network Attack Evaluaton Based on Incremental Relevance Vector Machne Algorthm, Journal of Convergence Informaton Technology, JCIT, Volume7, Number1, January 2012 [17] Javer M. Moguerza and Alberto Munoz, Support Vector Machnes wth Applcatons, Statstcal Scence, 2006, Vol. 21, No. 3, pp [18] Chenfeng Vncent Zhou, Chrstopher Lecke, Shanka Karunasekera, A Survey of Coordnated Attacks and Collaboratve Intruson Detecton, Computers & Securty, 2010, [19] Georgos P. Spathoulas, Sokrats K. Katskas Reducng False Postves n Intruson Detecton Systems, Computers & Securty, 2010, pp [20] Anna Koufakou, Mchael Georgopoulos, A Fast Outler Detecton Strategy for Dstrbuted Hgh-Dmensonal Data Sets wth Mxed Attrbutes, Data Mnng Knowledge Dscovery, 2010, pp [21] Wu, S., & Yen, E., Data mnng-based ntruson detectors, Expert Systems wth Applcatons, 2009, pp P a g e
Support Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationFuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches
Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of
More informationData Mining: Model Evaluation
Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationAssociative Based Classification Algorithm For Diabetes Disease Prediction
Internatonal Journal of Engneerng Trends and Technology (IJETT) Volume-41 Number-3 - November 016 Assocatve Based Classfcaton Algorthm For Dabetes Dsease Predcton 1 N. Gnana Deepka, Y.surekha, 3 G.Laltha
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationAnnouncements. Supervised Learning
Announcements See Chapter 5 of Duda, Hart, and Stork. Tutoral by Burge lnked to on web page. Supervsed Learnng Classfcaton wth labeled eamples. Images vectors n hgh-d space. Supervsed Learnng Labeled eamples
More informationSome Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.
Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,
More informationA Robust Method for Estimating the Fundamental Matrix
Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.
More informationSVM-based Learning for Multiple Model Estimation
SVM-based Learnng for Multple Model Estmaton Vladmr Cherkassky and Yunqan Ma Department of Electrcal and Computer Engneerng Unversty of Mnnesota Mnneapols, MN 55455 {cherkass,myq}@ece.umn.edu Abstract:
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationInvestigating the Performance of Naïve- Bayes Classifiers and K- Nearest Neighbor Classifiers
Journal of Convergence Informaton Technology Volume 5, Number 2, Aprl 2010 Investgatng the Performance of Naïve- Bayes Classfers and K- Nearest Neghbor Classfers Mohammed J. Islam *, Q. M. Jonathan Wu,
More informationAn Anti-Noise Text Categorization Method based on Support Vector Machines *
An Ant-Nose Text ategorzaton Method based on Support Vector Machnes * hen Ln, Huang Je and Gong Zheng-Hu School of omputer Scence, Natonal Unversty of Defense Technology, hangsha, 410073, hna chenln@nudt.edu.cn,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationAn Improved Neural Network Algorithm for Classifying the Transmission Line Faults
1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationNeural Networks in Statistical Anomaly Intrusion Detection
Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationLearning Non-Linearly Separable Boolean Functions With Linear Threshold Unit Trees and Madaline-Style Networks
In AAAI-93: Proceedngs of the 11th Natonal Conference on Artfcal Intellgence, 33-1. Menlo Park, CA: AAAI Press. Learnng Non-Lnearly Separable Boolean Functons Wth Lnear Threshold Unt Trees and Madalne-Style
More informationUnsupervised Learning and Clustering
Unsupervsed Learnng and Clusterng Why consder unlabeled samples?. Collectng and labelng large set of samples s costly Gettng recorded speech s free, labelng s tme consumng 2. Classfer could be desgned
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationFeature Selection as an Improving Step for Decision Tree Construction
2009 Internatonal Conference on Machne Learnng and Computng IPCSIT vol.3 (2011) (2011) IACSIT Press, Sngapore Feature Selecton as an Improvng Step for Decson Tree Constructon Mahd Esmael 1, Fazekas Gabor
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationFusion Performance Model for Distributed Tracking and Classification
Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.
More informationClassification Based Mode Decisions for Video over Networks
Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationThree supervised learning methods on pen digits character recognition dataset
Three supervsed learnng methods on pen dgts character recognton dataset Chrs Flezach Department of Computer Scence and Engneerng Unversty of Calforna, San Dego San Dego, CA 92093 cflezac@cs.ucsd.edu Satoru
More informationOnline Detection and Classification of Moving Objects Using Progressively Improving Detectors
Onlne Detecton and Classfcaton of Movng Objects Usng Progressvely Improvng Detectors Omar Javed Saad Al Mubarak Shah Computer Vson Lab School of Computer Scence Unversty of Central Florda Orlando, FL 32816
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationWe Two Seismic Interference Attenuation Methods Based on Automatic Detection of Seismic Interference Moveout
We 14 15 Two Sesmc Interference Attenuaton Methods Based on Automatc Detecton of Sesmc Interference Moveout S. Jansen* (Unversty of Oslo), T. Elboth (CGG) & C. Sanchs (CGG) SUMMARY The need for effcent
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationA Statistical Model Selection Strategy Applied to Neural Networks
A Statstcal Model Selecton Strategy Appled to Neural Networks Joaquín Pzarro Elsa Guerrero Pedro L. Galndo joaqun.pzarro@uca.es elsa.guerrero@uca.es pedro.galndo@uca.es Dpto Lenguajes y Sstemas Informátcos
More information(1) The control processes are too complex to analyze by conventional quantitative techniques.
Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationApplication of Clustering Algorithm in Big Data Sample Set Optimization
Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton
More informationA Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning
A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationDetecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
Detectng Compounded Anomalous SNMP Stuatons Usng Cooperatve Unsupervsed Pattern Recognton Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es
More informationAPPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET
APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More information