Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article

Size: px
Start display at page:

Download "Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article"

Transcription

1 Jestr Journal of Engneerng cence and Technology Revew 7 (3) (2014) Research Artcle JOURAL OF Engneerng cence and Technology Revew Traffc Classfcaton Method by Combnaton of Host Behavour and tatstcal Approach Yng Hou 1,*, Ha Huang 1, Wenchao hao 1 and Heqng Huang 2 1 atonal gtal wtchng ystem Engneerng & Techologcal R& Center, ZhengZhou , Chna 2 Unversty of Kentucky,Lexngton, KY , UA Receved 2 February 2014; Accepted 27 July 2014 Abstract Traffc classfcaton, one of the most actve felds n Internet traffc research, s the substructure of network desgn and management. Generally, there are four technques to dentfy the traffc, port-based, payload-based, flow statstc-based, and host-based approaches. In ths paper, a hybrd method to classfy the traffc was proposed combnng the host behavour and the Affnty Propagaton (AP) algorthm. mple features n the statstcal process were selected at the frst stage of classfcaton; then, the ntal classfcaton results and the host behavour model were combned to generate the fnal results. The host behavour model was updated by the feedback of prevous classfcaton. The combnng classfcaton approach was evaluated on two real traces. The results ndcated that the proposed technque offered mproved performance compared wth BLIC and ndependent AP algorthms. Keywords: Traffc Classfcaton, Affnty Propagaton, tatstcal Feature, Host Behavour 1. Introducton The percepton of the traffc applcaton s the mportant means n the feld of network optmzng, resources allocaton and abnormal behavor detecton etc. It can be consdered as the foundaton of network management that contrbutes to deeply understand the nature of the network and effectvely master the state of the network. In recent years, a large number of new technologes have been ntroduced to serve the needs of ever ncreasng scale of the Internet and ts archtecture. Ths development has also posed sever challenges to the traffc classfcaton. The conventonal port-based approach s the fastest and smplest method to dentfy the applcatons of traffc. However, some modern applcatons whch select the ports randomly are extremely dffcult to be dentfed by the portbased approaches. Moreover, to trck frewalls, some applcatons conceal themselves by usng standard ports of other applcatons, such as port 80. The ports are determned by applcatons, and can be easly changed by the end host. Hence, the port-based approach s less relable [1]. The payload-based approaches, usually called eep Packet Inspecton (PI) [2], have been wdely appled n traffc dentfcaton feld, partcularly n network securty. These technques dentfy the applcatons by matchng the payload of packets and the characterstc strng assocated wth the applcatons, called applcaton sgnature. When a new applcaton appears, the sgnatures need to be found and labeled. The payload-based approaches are generally relable except the formdable prvacy and laws challenges. Besdes, the exploraton of the packets payload nduces heavy load and hgh cost. That lmts the general use on hgh-bandwdth * E-mal address: ndschy@139.com I: Kavala Insttute of Technology. All rghts reserved. lnks. And now many modern applcatons wth encrypted payloads lead to ths technology n van[3]. The flow statstc-based technques, also called eep Flow Inspecton (FI), recognze the applcatons through a classfer based on machne learnng methods. The classfer dentfes the applcaton based on the statstcal sgnatures of the traffc[4][5]. The statstcal sgnatures can be packet szes, connecton duratons, nter-packet delays, or drecton of the flow, etc. The machne learnng methods nclude supervsed algorthms, unsupervsed algorthms, and semsupervsed algorthms. In the supervsed algorthms, the classfer s bult on the tranng samples, whch have been labeled the applcatons. The unclassfed traffc s dentfed by matchng the statstcal sgnatures of the classfer establshed by the tranng sample. When a new applcaton appears, the classfer must be retraned. n unsupervsed algorthms, the classes needn t be predetermned. The algorthms construct dstnct classes (e.g., clusterng) of traffc and then assgn these classes to correspondng applcatons. In [6], McGregor et al. presented the clusterng algorthms (EM) to the dentfcaton process. Unsupervsed algorthm do not requre the nformaton of samples and can dentfy the obfuscated and encrypted traffc. In emalgorthm, The clusterng also plays key role and the tranng samples are taken nto account for the applcaton assgnment. The host-based approach s a new branch of traffc classfcaton. It explots the host behavor to resolve the classfcaton ssue. These algorthms apply the heurstcs theory to perform the classfcaton effectvely, especally for obfuscated traffc. ome of the recent studes have focused on ths aspect[7]. In [7], the socal network of a gven host s correlated wth ts transport-level nteractons to dentfy peer-to-peer applcaton. Wth the development of the Internet applcatons, a sngle traffc classfcaton technque can t acheve

2 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) acceptable accuracy[9]. The researchers have started to consder more general and effectve technques that use several classfers and combne the results of dfferent classfers by ntellgent hybrd algorthms. It s clamed that the combnaton of a set of classfers may compensate for the weakness of a sngle classfer n the classfcaton process[10]. uch a mult-classfer system can acheve hgher accuracy compared to a sngle classfer, and t s more robust to the varaton of the sample populaton, ncludng the nature and mx of applcatons. ome of the mult-classfer systems pay attenton to the combnaton of same classfers wth dfferent parameters; whle others combne several dfferent classfers (such as port-based classfer and flow statstcal classfer). The combnaton of mult classfers are usually based on votng, Bayesan probablty, or empster-hafer theory. The combnaton of mult classfers results n ncreased computatonal complexty. However, Alberto[9] has ndcated that assumng dfferent classfers n the combnaton can execute n parallel, the flexblty offered by combnaton classfers facltates the scalablty trade-offs, essental for onlne technques. In ths paper, a hybrd approach s proposed that combnes the host behavor and FI classfer to categorze Internet traffc. The proposed approach nvolves three maor steps. In the frst phase, the ntal classfcaton of the traffc s performed by an teratve statstcal algorthm called Affnty Propagaton (AP). As second step, the results of ntal classfcaton are refned wth the host behavor model. Fnally, the host behavor model s updated based on the classfcaton results. The rest of the paper s organzed as follows. ecton 2 ntroduces AP algorthm and the features selected n ths study. ecton 3 descrbes the methodology to portray the host behavor. ecton 4 descrbes the combnaton of the two methods. ecton 5 dscusses the experments and the evaluaton results. Fnally, concluson s presented n ecton 6. representatve ponts that have maxmum smlarty among a subset of ponts and test data s classfed by fndng the nearest representatve pont. If the smlarty s equal to the negatve value of the Eucldean dstance, the obectve functon of AP s consstent wth K-means; that mnmzes the quadratc sum dstance of the data pont to the nearest representatve pont. In AP algorthm, consderng all the data ponts as canddates of representatve pont, avods the lmtatons assocated wth selecton of the ntal representatve pont. It s smple and effcent due to the optmzaton obectve functon that propagates smlarty. Furthermore, t does not rely on the symmetrcal nature of the smlarty between the data ponts. The smlarty matrx of n sample ponts s the key structure of AP algorthm. All of the n sample ponts are consdered as canddate representatve pont (.e. potental cluster center). For each pont, a n n smlarty matrx n n s establshed to ndcate ts attracton to other ponts. 2 s (, ) X X ( ) ndcates the degree of X beng the representatve pont of X. Large s (,) means that there s more probablty of X beng a representatve pont. There are two messages delvered to each pont,.e., responsblty and avalablty. The parameter rk (, ) descrbes the degree of k beng the representatve pont of. Whle ak (, ) descrbes the degree of selectng the data pont k as ts representatve pont. The parameters rk (, ) and ak (, ) are set to 0 ntally and updated n turn. The update process s as follows: { } r (, ) s (, ) max ak (, ) + sk (, ) a (, ) k r + r mn 0, (, ) max(0, (, )),, k max(0, r (, )), (1) 2. AP algorthm AP algorthm[11] s an unsupervsed clusterng method based on the dssemnaton of the nearest neghbor nformaton. The goal of ths algorthm s to fnd the optmal A dampng factor λ s ntroduced to mprove the convergence of the algorthm. The weghtng update process s descrbed n equaton (2): { { k } () t ( t 1) ( t 1) r λ r + λ s a k + s k (, ) (, ) (1 ) (, ) max (, ) (, ) ( t 1) ( t 1) ( t 1) λ a (, ) + (1 λ) mn 0, r (, ) + max(0, r (, )), () t, k a (, ) (2) ( t 1) ( t 1) λ a (, ) + (1 λ) max(0, r (, )), 0 λ < 1 A cluster set CC { 1,... C k } and representatve ponts set ww {... w} are establshed after clusterng. When there are The teratve process gven n equaton (2) termnates when one of the followng condtons s fulflled: a) current teraton exceeds the maxmum number of teratons; b) the step sze s under a fxed threshold; c) the representatve ponts are stable. () () After the teratve process, arg max ( t t a (, ) + r (, ) ) s calculated, and X s selected as the representatve pont of X. 1 k some labeled samples, the applcaton wth the maxmum samples n a certan cluster s set to that cluster. When there are no samples n the cluster, the cluster s dentfed as unknown applcaton. The statstcal features n AP algorthm are shown n Table

3 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) Tab. 1 elected features of traffc classfcaton feasure port P 1~P pattern(b 1b 2 b ) descrpton transport-layer ports the frst packets sze communcaton pattern The transport layer port s not a maor feature n traffc classfcaton. However, t s stll one of the mportant features, especally n classfcaton of some of the tradtonal applcatons n Internet. Zhang[12] has proved by statstcal methods that t can get relatvely hgh classfcaton accuracy, by usng the features of the frst four packets. Packets sze s commonly used n traffc classfcaton. The communcaton pattern defned n [13] s used to descrbe the drecton of the frst packets (except the control packets, e.g., Y, RT, FI) and sgnfy by a bnary nteger bb 1 2 L b, b( ) ; ths sgnfes the drecton of th packet. The parameter b 1when the drecton of th packet s same as the Y drecton n TCP, otherwse b 0. Let 4, n general, the communcaton pattern of FTP s 0101, and that of HTTP may be Tab. 2 Communcaton pattern of four applcatons statstc n WIE data set pattern FTP HTTP BtTorrent eonkey Table 2 shows the communcaton pattern of the statstcs of four applcatons from WIE data set[14]. The FTP and HTTP are representatve applcatons of C/. It can be seen from the table that 92.84% of the patterns of FTP s 0101, and 74.39% of HTTP s BtTorrent and eonkey are P2P applcatons; ther patterns are manly 1010 and AP clusterng algorthm keeps lookng untl the hghest assgnment probablty exceed a predetermned threshold or the maxmum detecton number s reached. After all the clusters and the representatve ponts are establshed, the cluster s labeled as the class that has maxmum samples wth the same communcaton pattern. 3. Host behavor descrpton ome researchers have studed the host behavor on resdental networks n the feld of traffc measurement [15][16]. The applcatons that run at the host and generate the traffc are part of the host traffc profle. The traffc profle ndcates the preferred applcatons used on the host. nce the preferred nformaton of the host s relevant to the latter applcaton, t can help wth the classfcaton of the traffc. For nstance, a host browsng the Web s more prone to open consecutve HTTP connectons. A host s very lkely to receve POP3 flows when t s runnng POP3 mal server. The dentfcaton of a flow s fve-tuple nformaton: source IP address, source port number, destnaton IP address, destnaton port number, and protocol type. The source host of a flow s the host sendng the frst packet, whle the destnaton host s the one recevng t. F s denoted as a functon that assocates a flow between a source and destnaton to an applcaton A(). (or ) s denoted as the generc source (or destnaton) host of a flow. Thus, F and F are the functons that assgn the data flow to the applcaton A and A based solely on the traffc of the PF A be source and destnaton, respectvely. Let ( ) the probablty that the flow s of an applcaton A. Then, PF ( ) A means the probablty that the flow s of an applcaton A. The followng s the computaton of the probablty that a flow s of applcaton A(). (( ) ( ( ) ) ) ( ( )) ( ) I P( F A( ) ) * P( F A( ) ) P( F A( ) I ) 1 P( F A( ) ) * P( F A( ) ) P( F A( ) ) * P( F A( ) ) P F A P F A F A A A 1 Equaton (1) needs the nformaton of each host. In general, the montor passvely captures the flows between the two hosts and can only records the traffc of one of the two hosts of a flow. Assume a unform probablty for the host that the montor has no nformaton about t, and then the equaton (1) can be smplfed to: ( ) ( ( )) ( ) P F A P F A (4) or ( ) ( ( )) ( ) P F A P F A (5) Table 3 shows the dstrbuton of applcaton n a host as source and destnaton. Tab. 3 strbuton of applcaton n a host Applcatons FTP HTTP POP3 MTP H ource estnaton Th dstrbuton of applcaton of a host s updated after a new flow of the host s classfed. The process s as follow. Let P ( ( )) n 1 A denote the probablty of A(), calculated by the past (n-1) flows. When n-th flow s collected and classfed, PF ( ( n) A ( )) s the result. Then the probablty s of A() s computed as follows. (3) 153

4 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) Pn( A( )) β* Pn 1( A( )) + (1 β)* P( Fs( n) A( )), (6) 0 β 1 β s the regulatory factors and represents the proporton of that the past dstrbuton affects Pn ( A( )). When β s set to be close to 0, most recent flows affect Pn ( A( )). When β 0, P ( ( )) n A s completely decded by current flow. When β s set to be close to 1, Pn ( A( )) s calculated by applcatons of all prevous flows. Intally, all applcatons are assgned to be unform dstrbuton. When β 0, P( A( )) s completely decded by the prevous flows. We wll dscuss β n secton 5 accordng to the experments. It should be notced that, as descrbed n equaton (7), the source and destnaton of the host are computed respectvely. P( A( ) ) β* P ( A( ) ) + (1 β)* P( F ( n) A( ) ) n n 1 s or (7) P( A( ) ) β* P ( A( ) ) + (1 β)* P( F ( n) A( ) ), n n 1 s 0 β 1 Practcally, the montor usually stores the host systems nsde the IP network and some host systems outsde the network; e.g., obvous server of some applcatons to support the classfcaton of Internet flows. The dstrbuton of the host traffc, provdes a statstcal ndcaton of the preferred applcatons that s runnng at the host. n 5. Experments and results The proposed hybrd approach was evaluated on two real data traces. The frst trace was collected from XIA unversty, named XIA trace; t was collected on fve consecutve days from the ponts connected to Internet. The second one was WIE trace [14], obtaned from a traffc data repostory mantaned by the MAWI Workng Group of the WIE Proect, whch survey and analyss the traffc of Internet backbone. We use the traffc trace collected at samplepont-f. Each packet of the traces contans 40byte payload of anonymous user nformaton that s kept prvate here. The applcatons assocated wth the traffc were determned wth a deep packet nspecton method. The traffc assocated wth fve applcatons was collected and two new traces were obtaned. Each of the traces conssts of two sets, a tranng set and a testng set. The tranng set conssts of an equal number of flows per applcaton to ensure that there s no bas n the learnng phase. The detals of the two traces are llustrated n Table 4 and Table 5. Tab.4 etal of WIE trace applcaton tranng testng HTTP ,309 FTP ,536 POP ,974 eonkey ,943 BtTorrent , Combnaton Ths secton wll ntroduce the ways of ntegraton of AP results and host behavor algorthm. P(A()) s defned as the probablty that the flow s generated by applcaton A(). The PF ( A ( )) s the probablty that a flow arrves from the applcaton A() based on ther source or destnaton host and t s calculated n Eq. (3). P (A() s the AP cluster results. s the total number of classes got from AP clusterng algorthm. The classfcaton process s performed by computng the Eucldean dstance between the feature of the new flow and the representatve ponts. Accordng to the descrptons, P(A()) s expressed by the followng formulas: PF ( A ( )) P( A ( )) PA ( ( )) (8) PF ( A ( )) P( A ( )) 1 The assgnment probablty P(A()) s calculated by combnng the result of the ntal classfcaton usng AP clusterng method, and the result of the classfcaton of the host behavor. The pattern of the hosts can be used to predct the type of applcaton for the followng traffc. The assgnment probablty P(A()) s determned by only P (A() when the applcaton s new n the host. The host applcaton dstrbuton s updated before the followng dentfcaton steps wth hybrd probablty method. The approach predcts the traffc of a host by the applcaton pattern of that host. Compared wth other technques, t s smpler because t needs not research the relatons between dfferent hosts. All of the nformaton can be easly obtaned. Tab.5 etal of XIA trace applcaton tranng testng 5.1 Metrcs HTTP ,200 FTP ,003 POP ,328 eonkey ,902 BtTorrent ,013 The metrcs used to evaluate the performance of the combnaton approach are recall, precson, and overall accuracy. For applcaton, TP s denoted as the number of flows that are correctly classfed to applcaton. FP s the number of flows that are ncorrectly classfed to applcaton. F ndcates the number of flows of applcaton that are ncorrectly classfed to other applcatons. The metrcs are gven as follows. Recall of applcaton : Precson of applcaton : F-measure of applcaton : Overall accuracy: R TP/( TP + F ) (9) P TP/( TP + FP) (10) F 2* P* R /( P + R) (11) 154

5 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) OA m 1 m 1 ( TP + FP) TP (12) are plot n Fg. 2.The dfferent lnes n the plot correspond to the overall accuracy of the method wth dfferent β. In the above metrcs, recall and precson of an applcaton ndcates the classfcaton ablty of the model to ths applcaton. The F-measure sgnfes the comprehensve classfcaton ablty of the classfer to an applcaton. The overall accuracy s gven as the weghted average over all the applcatons and shows the overall classfcaton ablty of the classfer. 5.2 Regulatory factor β and precson The performance of the classfcaton method s dscussed when the host behavor s combned wth the results computed by the statstcal method. For Trace I, Fg. 1 plot F-measure of each applcaton, when 1 to 10 packets are used to extract classfcaton features, as we dscuss n ecton 3. In the plot, dfferent lnes correspond to the overall accuracy of the combnaton approach wth dfferent β. The fgures verfy the valdty of the combnaton approach. Fg. 1(a) plot F-measure of HTTP as a functon of the packets number respectvely. wth the number of the packets ncreasng, the precson of the classfer s mproved. When β 0.9, F-measure can acheve approxmate 90% only wth two packets. Even when β 0.1, means wth a small number of host nformaton, we acqures a very hgh accuracy. Entdonkey and BtTorrent are P2P applcatons. As s known to all, for the characterstcs of P2P applcatons, P2P traffc dentcaton s very mportant for IP to manage the network. Fg. 1(d) and Fg. 1(e) demonstrate that the combnatng approach also obtans good performances n case of P2P traffc dentfcaton. Fg.2 F-measure versus the number of packets (Trace II) Trace II s collected from local area network (LA). The number of hosts n the trace s smaller than that n Trace I. Then the host nformaton plays a vtal part n the classfcaton. From Fg.2, we can notce clearly the mportance of usng the host nformaton. For example, n Fg. 2(a), when β 0.9, after four packets, F-measure exceeds 98.6% and reach 99.36% wth ten packets. In Fg.2(d) and Fg.2(e), t can be observed that wth more packets we can obtan better precson, especally wth four and more packets. Ths s clear for all values from β 0.1 to β 1 Fg. 2(c) shows that when recent flows are set more weght, most of the POP3 traffc s correctly classfed. The analyss of the traffc shows that the POP3 traffc s predomnant n some hosts. That confrms the beneft of the host nformaton. Wth all values of β, the accuracy of POP3 dentfcaton s hgh. The expermental results of overall accuracy for Trace I and Trace II, versus the number of packets of the flows, are plot n Fg. 3 and Fg. 4. The dfferent lnes n the plot correspond to the overall accuracy of the method wth dfferent β. Fg.1 F-measure versus the number of packets (Trace I) For Trace II,The expermental results of F-measure of each applcaton, versus the number of packets of the flows, Fg.3 Overall accuracy versus the number of packets (Trace I) 155

6 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) Fg.4 Overall accuracy versus the number of packets (Trace II) The regulatory factor β can be understood as the rato of the two parts of the combnaton approach. When β 1, the behavor of the host s not used, whch means each applcaton of a host has a unform probablty. The results demonstrates that the accuracy mproves consderably when the pror applcaton dstrabuton of the hosts s used to udge the applcaton of current flows. When β 0.1, the host behavor s decded by the classfcaton results of the most recent flows. When β 0.9, the classfcaton results of flows durng a long perod characterze the host behavor. The overall accuracy of Trace I s 90.42% when β 0.9 and the number of packets s 10. From the fgures, we can see that the classfer gets the best performance when β 0.9. Accordng to the above results, n the followng experments, β s set to 0.9. When β 0.5, the overall accuracy of Trace I s 86.59% wth four packets and reach 87.48% after ten packets. When β 0.9, the overall accuracy of Trace I s 89.52% wth four packets and reach 90.42% after ten packets. When β 0.9, the overall accuracy of Trace II s 98.19% wth four packets and reach 99.61% after ten packets. The ncrease of number of packets does not brng an promnent mprovement of the precson. We can conclude that wth the frst four packets of each flow to calculate the statstcal features, the classfer can get hgh precson. It s worth of payng attenton to because that means the appoach can be used n on-lne traffc classfcaton. 5.3 scusson of tranng set F-measure of Trace I and Trace II are plotted n Fg. 4 and Fg. 5 respectvely, versus the number of flows n tranng set. Fg.5 F-measure versus number of flows n tranng set (Trace I) Fg.6 F-measure versus number of flows n tranng set (Trace II) It can be seen from Fg.5 and Fg.6 that F-measure fluctuates sgnfcantly when the tranng set s smaller than 600. The performance of the classfer s better when the packets number of the tranng sets ncreases. In Trace II, the proporton of the tranng set s hgher than that of Trace I, so that a hgher precson s obtaned. When there are 1000 n the tranng set, F-measure of all fve applcatons exceeds 96% and FTP s 99.1% n Trace II. t can be concluded that the rato of tranng set and test set affects the results of classfcaton. 5.4 Comparson of algorthms Based on Trace II, the proposed algorthm was compared wth BLIC and AP algorthms. The results are shown n Fg. 7. Fg.7 Comparsons of three algorthms overall accuracy The BLIC algorthm uses host model to classfy the applcatons; whereas, AP algorthm s based on the statstc parameters. The expermental results show that the combnaton of host behavor model and the statstcal methods sgnfcantly ncreases the overall accuracy. 6. Concluson Ths paper ntroduces a traffc classfcaton algorthm that combnes AP algorthm and host behavor. Accordng to the facts that the early applcaton of host can predct the latter traffc, the host applcaton dstrbuton s establshed. Then, ths dstrbuton s combned wth the ntal results obtaned from AP algorthm. The combnaton provdes the fnal results of traffc classfc aton. The proposed method was appled on two real data traces wth very promsng results. The results demonstrate that when ncreasng the sze of tranng data, the performance of the combnaton algorthm s mproved. The comparson wth BLIC and AP algorthm ndcates that the overall accuracy of the new approach s more satsfyng than that of the other two algorthms. In addton, snce the statstcal features selected n ths paper are easy to calculate, the approach offers the prospect of onlne classfcaton. 156

7 Yng Hou, Ha Huang, Wenchao hao and Heqng Huang/Journal of Engneerng cence and Technology Revew 7 (3) (2014) Acknowledgment The correspondng author of ths paper s Ha Huang, professor of atonal gtal wtchng ystem Engneerng & Techologcal R& Center. And ths research was fnancally supported by a research grant from the atonal atural cence Foundaton of Chnese government (o ) References 1. A.Callado, C.Kamensk, et al., A urvey on Internet Traffc Identfcaton, IEEE Communcatons urvey & tutorals, 11(3), 2009, pp A. Moore, K. Papagannak, Toward the accurate dentfcaton of network applcatons, Proceedngs of Passve and Actve Measurement, Boston, UA, 2005, pp T.T.T. guyen, G. Armtage, A urvey of Technques for Internet Traffc Classfcaton Usng Machne Learnng, IEEE Communcatons urvey & tutorals,10(4), 2008, pp M.Crott, M.us, F.Grngol, L.algarell, Traffc classfcaton through smple statstcal fngerprntng, ACM-gcomm Computer Communcaton Revew, 37(1), 2007, pp M. Jaber, C. Barakat, Enhancng applcaton dentfcaton by means of sequental testng, Proceedngs of 8th nternatonal IFIP-TC 6 etworkng Conference, Aachen, Germany, 2009, pp A. Mcgregor, M. Hall, P. Lorer, J. Brunskll, Flow clusterng usng machne learnng technques, Proceedngs of Passve and Actve Measurements, Antbes Juan-les-Pns, FRACE, 2004, pp T. Karaganns, K. Papagannak, M. Faloutsos, BLIC: Multlevel Traffc Classfcaton n the ark, Proceedngs of ACM IGCOMM, Phladelpha, UA, 2005, pp A. anott, A. Pescape, K. C. Claffy. Issues and Future rectons n Traffc Classfcaton, IEEE etwork, 26(1),2012,pp G. Aceto, A. anott, W. e onato, P. Antono, PortLoad: Takng the Best of Two Worlds n Traffc Classfcaton, Proceedngs of IEEE IFOCOM, an ego, UA, 2010, pp B. J. Frey,. ueck, Clusterng by Passng Messages between ata Ponts, cence, 315(5814), 2007,pp H.L.ZHAG, G. Lu, Machne Learnng Algorthms for Classfyng the Imbalanced Protocol Flows: Evaluaton and Comparson.Journal of oftware,23(6), 2012,pp Z. Yang, L.Z. L, etwork traffc classfcaton usng decson tree based on mnmum partton dstance, Journal on Communcaton, 33(3) 2012,pp the MAWI Workng Group of the WIE Proect. MAWI Workng Group Traffc Archve; Retreved June 3, 2014, from: M. Ilofotou, B. Gallagher, T. Elass-Rad, G. Xe, M. Faloutsos, Proflng-by-assocaton: a reslent traffc proflng soluton for the Internet backbone, Proceedngs of ACM CoEXT, Phladelpha, UA, M. Petrzyk, L. Plssonneau, G. Urvoy-Keller, T. En-aary, On proflng resdental customers, Proceedngs of 3rd IEEE Internatonal Traffc Montorng and Analyss Workshop, Venna, Austra, 2011, pp

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features

Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features 362 The Internatonal Arab Journal of Informaton Technology, Vol. 14, No. 3, May 2017 Feature Selecton Algorthm Based on Correlaton between Mut Metrc Network Traffc Flow Features Yongfeng Cu 1,2, Sh Dong

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

The Study of Remote Sensing Image Classification Based on Support Vector Machine

The Study of Remote Sensing Image Classification Based on Support Vector Machine Sensors & Transducers 03 by IFSA http://www.sensorsportal.com The Study of Remote Sensng Image Classfcaton Based on Support Vector Machne, ZHANG Jan-Hua Key Research Insttute of Yellow Rver Cvlzaton and

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering 015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

Incremental Learning with Support Vector Machines and Fuzzy Set Theory

Incremental Learning with Support Vector Machines and Fuzzy Set Theory The 25th Workshop on Combnatoral Mathematcs and Computaton Theory Incremental Learnng wth Support Vector Machnes and Fuzzy Set Theory Yu-Mng Chuang 1 and Cha-Hwa Ln 2* 1 Department of Computer Scence and

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Feature Selection as an Improving Step for Decision Tree Construction

Feature Selection as an Improving Step for Decision Tree Construction 2009 Internatonal Conference on Machne Learnng and Computng IPCSIT vol.3 (2011) (2011) IACSIT Press, Sngapore Feature Selecton as an Improvng Step for Decson Tree Constructon Mahd Esmael 1, Fazekas Gabor

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Announcements. Supervised Learning

Announcements. Supervised Learning Announcements See Chapter 5 of Duda, Hart, and Stork. Tutoral by Burge lnked to on web page. Supervsed Learnng Classfcaton wth labeled eamples. Images vectors n hgh-d space. Supervsed Learnng Labeled eamples

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines (IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Herarchcal Web Page Classfcaton Based on a Topc Model and Neghborng Pages Integraton Wongkot Srura Phayung Meesad Choochart Haruechayasak

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Pruning Training Corpus to Speedup Text Classification 1

Pruning Training Corpus to Speedup Text Classification 1 Prunng Tranng Corpus to Speedup Text Classfcaton Jhong Guan and Shugeng Zhou School of Computer Scence, Wuhan Unversty, Wuhan, 430079, Chna hguan@wtusm.edu.cn State Key Lab of Software Engneerng, Wuhan

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Three supervised learning methods on pen digits character recognition dataset

Three supervised learning methods on pen digits character recognition dataset Three supervsed learnng methods on pen dgts character recognton dataset Chrs Flezach Department of Computer Scence and Engneerng Unversty of Calforna, San Dego San Dego, CA 92093 cflezac@cs.ucsd.edu Satoru

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

From Comparing Clusterings to Combining Clusterings

From Comparing Clusterings to Combining Clusterings Proceedngs of the Twenty-Thrd AAAI Conference on Artfcal Intellgence (008 From Comparng Clusterngs to Combnng Clusterngs Zhwu Lu and Yuxn Peng and Janguo Xao Insttute of Computer Scence and Technology,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic JOURNAL OF NETWORKS, VOL. 5, NO. 5, MAY 577 Weght Based Multple Support Vector Machne Identfcaton of -to- Traffc Feng Lu, Zhtang L, Zhengbng Hu, Ljuan Zhou, Bn Lu, Junfeng Yu Department of Computer Scence

More information

Optimal Design of Nonlinear Fuzzy Model by Means of Independent Fuzzy Scatter Partition

Optimal Design of Nonlinear Fuzzy Model by Means of Independent Fuzzy Scatter Partition Optmal Desgn of onlnear Fuzzy Model by Means of Independent Fuzzy Scatter Partton Keon-Jun Park, Hyung-Kl Kang and Yong-Kab Km *, Department of Informaton and Communcaton Engneerng, Wonkwang Unversty,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(6):2860-2866 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A selectve ensemble classfcaton method on mcroarray

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Fuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System

Fuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Iustitia: An Information Theoretical Approach to High-speed Flow Nature Identification

Iustitia: An Information Theoretical Approach to High-speed Flow Nature Identification Iustta: An Informaton Theoretcal Approach to Hgh-speed Flow Nature Identfcaton Abstract Ths paper concerns the fundamental problem of dentfyng the content nature of a flow, namely text, bnary, or encrypted,

More information

Arabic Text Classification Using N-Gram Frequency Statistics A Comparative Study

Arabic Text Classification Using N-Gram Frequency Statistics A Comparative Study Arabc Text Classfcaton Usng N-Gram Frequency Statstcs A Comparatve Study Lala Khresat Dept. of Computer Scence, Math and Physcs Farlegh Dcknson Unversty 285 Madson Ave, Madson NJ 07940 Khresat@fdu.edu

More information

Experiments in Text Categorization Using Term Selection by Distance to Transition Point

Experiments in Text Categorization Using Term Selection by Distance to Transition Point Experments n Text Categorzaton Usng Term Selecton by Dstance to Transton Pont Edgar Moyotl-Hernández, Héctor Jménez-Salazar Facultad de Cencas de la Computacón, B. Unversdad Autónoma de Puebla, 14 Sur

More information

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Title: A Novel Protocol for Accuracy Assessment in Classification of Very High Resolution Images

Title: A Novel Protocol for Accuracy Assessment in Classification of Very High Resolution Images 2009 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information