Intrusion Detection Method Using Protocol Classification and Rough Set Based Support Vector Machine

Size: px
Start display at page:

Download "Intrusion Detection Method Using Protocol Classification and Rough Set Based Support Vector Machine"

Transcription

1 Computer ad formatio Sciece trusio Detectio Method Usig Protocol Classificatio ad Rough Set Based Support Vector Machie Xuyi Re College of Computer Sciece, Najig Uiversity of Post & Telecommuicatios Najig 003, Chia Ruchua Wag College of Computer Sciece, Najig Uiversity of Post & Telecommuicatios Najig 003, Chia State Key Lab. for Novel Software Techology, Najig Uiversity, Najig 0093, Chia Heju Zhou College of Computer Sciece, Najig Uiversity of Post & Telecommuicatios Najig 003, Chia Abstract order to improve the efficiecy of support vector itrusio detectio, we first do protocol Classificatio for the itrusio data, the refie its characteristic by rough set reductio. By usig these procedures, we propose a itrusio detectio method usig protocol classificatio ad rough set based support vector machie. The method is divided ito traiig ad testig processes. the process of traiig, we first do protocol classificatio for the traiig data, ad the do rough set refiemet. The refied characteristics are stored as the pre-defied process, ad fially the usage of support vector machie for data reductio traiig, the traiig model will be stored i accordace with the agreemet. the testig process, the data is classified accordig to protocol classificatio ad the start the characteristics reductio procedure accordig to protocol classificatio. Fially, make a decisio usig the Support Vector Machies that correspodig to the agreemet. The experimetal results based o KDDCUP'99 data show that the method is the method is faster ad the detectio accuracy is comparable compared with the SVM without usig protocol classificatio ad usig all characteristic. Keywords: trusio detectio, Support Vector Machie, Rough set. troductio Support Vector Machie, refer to Vapik, 995, Burges, 996, P.-67, is based o structured risk miimizatio ad statistic theory. t overcomes the shortcomig such as difficult to hadle of small samples, high dimesio, over-matchig, local miimizatio problems etc, that exists i the covetioal methods like atural etwork. Therefore, it is a ew high performace learig method, ad it has bee widely applied i itrusio detectio face reorgaizatio, voice processig ad so o. trusio detectio is essetially a classificatio problem. t ca be viewed as a classificatio process for test samples of traiig models. However, the costructio of itrusio detectio model eeds to do learig for thousads of samples; there are tes of characteristics for every sample. Moreover, samples have the property of differet structure. f we put the etire characteristic ito itrusio detectio, SVM will have to solve complex a quadratic programmig problem. Therefore, the method is iefficiet. Actually, certai depedet relatioship exists i the high dimesio characteristics, therefore, how to fid this depedece, ad the compress the data so as to reduce the dimesio, are sigificat for shorte SVM traiig time, detectio time, ad choosig the optimal parameter (Mukkamala, Jaoski &.Sug, 00, P , Sug, 405-4, Li &.Cuigham, P.90-98). (Frohlich, Chapelle & B.Scholkopf, 003, P.4-48), the geetic algorithm is 00

2 Computer ad formatio Sciece November, 009 adopted to optimize the model ad characteristic chose. (Roberto, Guofei & Weke, CDM'06), -grams is chose to choose the host computer character ad costruct a combied SVM detector. (Sug, P.405-4), the weighted SVM W is adopted to order ad choose the characteristic, ad by deletig the low iflueced characteristics so as to fid the most efficiet two kids of methods. These kids of methods have made cosiderable progress; however, these methods are always distillig the characteristic from all the data. Actually, the itrusio detectio usually uses the leak of the protocol, ad for every kid of protocol, the itrusio data has differet characteristic. For differet protocols, if differet characteristic is used, the method will more powerful, ad hece it will be helpful for improvig the learig efficiecy of the model. Rough sets (Pawlak, 98, P ) is a frequetly used method for distillig the characteristics, it is efficiet i decreasig the dimesio of data. this paper, we propose to combie the protocol classificatio ad rough sets methods, ad so as to produce a itrusio detectio method that is based o protocol classificatio ad rough set SVM. By classifyig the data based o data protocol, ad reductio, we ca give the traiig ad detectio model. Usig the KDDCUP 99 itrusio data, we verify the method.. Classify Support Vector Machie (Vapik, 995, Burges, 998, P.-67) Suppose {( x, y ),( x, y ),,( x, y )} L is a group of sample data, with x R d, y i i {, + }. We wat to fid the optimal partitio plae y = W X + b, which is equivalet to solve the covex quadratic Burges programmig problem: N T mi imize w w + C ξi wb,, ξi i= T st y ( w X + b) + ξ 0, ξ 0, i N i i i i Where w is the ormal vector of hyperplae, b is the deviatio, while C a puish fuctio parameter i the case of icomplete itegral, ad ξ is a relaxatio parameter i the case of relaxig i the costrait coditios. By itroducig the Lagrage multiplier: T Lp = w aiyi( w Xi + b) + ai aξ i i The do partial differetial for Lp : i= i= i () () Lp = 0 w= aixiyi w i= Lp = 0 ay i i = 0 b i= Lp = 0 0 ai c ξ i order to obtai ai, we covert the origial problem i to a dual problem, ad itroduce kerel fuctio K (,) : (3) max imize Q = a a a y y K( X, X ) D i i j i j i j i i, j i i i = i= st 0 a C, a y 0, i N (4) By solvig (4) we ca obtai ai, the submit it ito (3) we have: w= a X Y. As the quadratic programmig i i i i = problem satisfy the KKT coditio, so we have b= y y a K( X, X ), with a is a coefficiet larger tha 0. As j i i i j i i = oly whe a > 0, it has effect o the value of QD. Therefore, we call the support vector correspodig to a > 0 as the i i support vector of Xi. The we ca get the decisio fuctio f ( X) = sg( * y a K( X, X) b) i i i + i = 0

3 Computer ad formatio Sciece 3. Rough Sets Rough sets are proposed by Z.Pawlak i 98, it is a data miig method which ca be used to study the icompleteess of data, ad ucertaity of kowledge. The basic idea of data reductio by usig rough set theory ca be outlied as follows: it fid the decisio regulatio by the depedece relatioship betwee the sample attribute ad the decisio attribute; the judge the importace by the degree of ifluece of attribute to the decisio. By these procedures, the uimportat attribute ca be removed, so as to achieve the classificatio ability of reduce the data characteristic ad preserve the data ature. Defiitio. formatio system is a four umber set =<S,A,V,F>, with U is the oempty sample set, ad A is the attribute set, ad V is the attribute value regio, ad F is the map, which ca give a value from V for every sample attribute A i S. For the traiig sample, there is some classificatio marks, such as the 4 dimesioal itrusio sample of KDDCUP 99 is ormal, abormal ad so o. These attributes are called decisio attributes. By itroducig the decisio attribute, we ca obtai the decisio graph by the iformatio system. Defiitio. The decisio graph of iformatio system is a four umber set T=<S,A&{d}, V, F>, with A be the sample attribute, ad its value a is called as coditio attribute, ad d is the decisio attribute. Defiitio 3. discrimiate relatioship ca be described as follows, i the decisio graph DT, with B A, for ay sample i S, we have F( a) = F( a ' ), the such a relatioship is called the iseparable relatioship betwee A ad its subset B (B-idiscrimiate relatio), deoted by ND ( B), where ND ( B) refers to the idiscrimiate relatioship of attribute, i.e. the sample ca ot be discerible from attribute B. The decisio idiscrimiate relatioship ca be costructed based o the cocept. Defiitio 4. The idiscrimiate relatioship of decisio is refer to the followig fact, i ND ( B), we have F( x, d) = F( x ', d), deoted by ND ( B, d). Defiitio 5. The decisio reductio refers to that i DT; we seek the smallest attribute set such that ND ( B, d) = ND ( A, d) holds. l Though the decisio reductio is a NP hard problem, there exist may fast reductio algorithms; this topic is beyod the discussio of this paper. Decisio graph ca be established by the decisio graph discrimiate matrix. Defiitio 6. Suppose M is the decisio graph discrimiate matrix costructed based o DT, the elemet Mij o the (i, j) positio is defied as follows, M { aa A f( xi ) f( xj )} f( xi, d) f( xj, d) = { ij 0 f ( x i, d ) = f ( x j, d ) By classifyig the data protocol, ad costruct a decisio graph for every group of data, the reduce the decisio graph usig the reductio algorithms, the we ca obtai the differet data set reduced from differet data protocol. 4. The SVM itrusio detectio method usig protocol classificatio ad rough Set the former ivestigatio of rough set data reductio, the protocol is idiscrimiate ad the reductio is for all the data. There are two shortcomigs i these approaches: firstly, all the data is strogly differet structured, study the data usig SVM, we eed to itroduce a ew computatio method for distace. O the other side, itrusio usually takes the leak of the differet structured data. The idiscrimiate protocol is just a broad detectio method, it does ot cosider the differet characteristic i differet data, ad hece these methods are ot aimed. We propose the SVM itrusio detectio method usig protocol classificatio ad rough sets, it is able to remove the shortcomigs i the origial methods, ad is able to improve the detectio time ad the accuracy. Classifyig the protocol, usig the rough set to reduce the data, the do traiig to the reduced data, i.e. the correspodig SVM iput. The obtaied traiig model is the SVM detector correspodig to differet protocol. The SVM itrusio detectio method usig protocol classificatio ad rough sets ca be described as the followig Fig. Fig, the real lie illustrates the traiig process, the traiig data is classified accordig to protocol. Three differet kids of itrusio data is divided, deoted by TCP, UDP, ad CMP. The carryig out the rough sets study for these three kids of itrusio data, the studyig procedure is deoted by T, U, ad. The reduced characteristic after study is used as the SVM study iput; o the other had, the reduced regularizatio is stored as the pre-defiitio process, deoted by reductio T, reductio U ad reductio. Three SVM study apparatus will become three detector models after study; they are stored as three detectors T, U ad. Figure, the dash lie deotes the detectio process of the test data. The test data first classified by the protocol, the the reductio procedures are started based o differet protocol data, the reduced data is iputted ito correspodig detector, ad the test results come from the detector. The 0

4 Computer ad formatio Sciece November, 009 SVM itrusio detectio method usig protocol classificatio ad rough sets ca be described as the followig algorithm: Step : put the traiig data, start protocol classificatio, the data is divided ito TCP, UDP, AND, CMP accordig to differet data protocol; ad they are stored i database. Step : Start the rough sets study machie, reduce three kids of data separably,the obtai their ow reduced characteristic set T, U ad. The costruct a SQL setece based o the characteristic set, which is stored as the pre-defiitio process. Fially, the reduced traiig data is iputted ito the correspodig SVM study machie. Step 3: Start the SVM study machie T, U ad, the obtai their ow decisio fuctio by study. f ( X) = sg( y a K( X, X) + b), stored as detector U, T, ad. i i i i = Step 4: For the iput data X to be detect, first do protocol classificatio, the start the pre-defied rough sets reductio process accordig to classificatio. Step 4: put the reduced data ito the correspodig SVM detector, the output the detectio results through the SVM detector, ormal is deoted by +, ad abormal is deoted by Experimet 5. The tested data KDDCUP 99 is obtaied i the real et work. t ca be used to simulate the 5 classes icludig 3 differet kids of data arisig from attack, these data ca be used as experimetal data i data miig. The 0% subset of the data has 4940 records, ad each record has 4 characteristics, which icorporate the cotiuous, discrete ad text data. We ca put a ote at the ed of each record to show whether the data is ormal. Therefore, such kid of data set is a classical multi-protocol multi-attack differet structured data set. By classifyig the protocol for the ormal ad attack situatios, the results are illustrated i Figure as follows Statistical results show that TCP protocol records are 90064, ad CMP protocol records are 8360, ad UDP protocol records are the TCP protocol classificatio, there are all differet kids of attack, ad DoS attack most frequetly. the UDP ad CMP protocol, the RL ad UL attack almost ever appear. For the UDP protocol, the abormal data icludes DoS ad Probe. For the CMP protocol the DoS attack has 80 thousads records. The abormal data is maily DoS data. After protocol classificatio, we begi to do test from selected traiig data ad test data, the test results are outlied as follows, (). TCP test data: Choosig records from the TCP data set, where the ormal data is 80 items; ad abormal data is 798 items (DOS has 6560 items, Prob has 4 items, RL has 88 items, UL has 8 items). (). UDP test data: Choosig 073 records from the UDP data set, where the ormal data has 9586 items, ad abormal data has 587 items (DoS has 489 items, Prob has 98 items). (3). CMP test data: Choosig 8353 records from the CMP data set, where the ormal data has 8 items, ad abormal data has 85 items (DoS has 805 items, ad Prob has 0 items). Takig 70% data radomly from the test data set for traiig; the leavig other 30% for test. 5. The reductio of the test data Reducig the data by meas of Rosetta tool Komorowski, 997, P , ad form differet reductio set from the 4 reduced characteristic. The characteristic set reduced from TCP, UDP ad CMP are outlied i the followig Figure 3, Figure 4 ad Figure 5. Choosig two groups of characteristic set, for example, take the first ad the eighth from TCP, ad take the sixth ad the 30th from UDP, ad take the sixth ad the eighth from CMP. By reducig the characteristic for the correspodig traiig data ad test data, we ca obtai the traiig data ad the test data after characteristic reductio. Compare with the characteristic with the oes give i Sug P.405-4, we ca see our approach has less characteristic ad easier to deal with, ad fially the test result shows that the our method ca preserve high accuracy ad much faster. 5.3 Data traiig ad detectio the test, we choose RBF fuctio f( x, x ) = exp( ( x x )/ σ ) as the SVM kerel, ad adopt 5-Fold Cross i j i j Validatio, embedded i the LibSVM software by Chihje. The test is i three steps, firstly, we use grid search (grid.py commad) to compute the optimal puish parameter C ad σ, the obtai the traiig model by trai the traiig data 03

5 Computer ad formatio Sciece usig the optimal parameter. ad fially test usig the traied data. Take the example usig 000 TCP traiig data ad 9000 test data, the parameter search is outlied i Figure 6. The optimal value isc = 5, σ = By usig these two parameters to trai the 000 TCP data, we obtai trai.txt.model. The we use this model to do test for these data. Fially, we obtai the traiig time, the detectio time, ad the accuracy. For compariso reasos, the itrusio data ad detectio is divided ito three situatios. The first is to do test o the classified data by the complete characteristic. The secod is to do test o the classified data by the reduced characteristic. The third is to do test o the uclassified data. The fial test results are outlied i Figure, Figure ad Figure 3. Comparig Figure ad Figure 3, we ca discover that the traiig time ad the detectio time is shorte by usig protocol classificatio, moreover, the detectio accuracy is ot damaged. Comparig Figure ad Figure, we ca see that usig characteristic reductio ad ot usig characteristic reductio has similar accuracy, however, the detectio time ad traiig time is saved obviously by usig the characteristic reductio. Therefore, our coclusio is as follows, protocol classificatio alog with characteristic reductio eed less time, while usig the complete characteristic eed much more time, further more time is eeded if protocol classificatio ad characteristic reductio are all ot carried out. 6. Cocludig remarks this paper, we propose to use iteret protocol classifyig the itrusio data, ad use rough sets to reduce uclassified data, ad the do traiig for the reduced data, ad fially produce a traiig model. the test procedure, we first do protocol classificatio for the data, the do test for the model after traiig. We do some tests o the KDDCUP 09 data uder three cases, the test results show that the ew method produce more accuracy results, ad eed less traiig ad test time. By theoretical aalysis, the reaso is as follows: as we have adopted protocol classificatio, which elimiate the difficulty caused by the ustructured protocol character, this reduces the time eeded i dealig with data. O the other had, as itrusio is due to the hole of protocol, so it is more targeted ad the accuracy is ot damaged because of the characteristic decrease. The future work will be implemet a itrusio detectio system based o the algorithm proposed i this paper. This will ot oly cosider the protocol classificatio, but also eed to cosider that real iteret itrusio actually a usupervised character classificatio. Furthermore, it also eeds multi-class classificatio techique research. Refereces [DB/OL]. Burges C. (998). A tutorial o support vector machies for patter recogitio, Data Miig ad Kowledge Discover. No..P Chihje L. LBSVM: a library for SVMs (Versio.6) Frohlich H., Chapelle O., & Scholkopf B. (003). Feature selectio for support vector machies by meas of geetic algorithm. : Proceedigs of 5th EEE teratioal Coferece o Tools with Artificial telligece. No.3-5. P Komorowski J.O., & ROSETTA. (997). A rough set toolkit for aalysis of data. Fifth teratioal Workshop o Rough Sets ad Soft Computig. Tokyo,Japa. P Li Y., &.Cuigham A. A New Approach to Fuzzy-Neural System Modelig. EEE Trasactios o Fuzzy Systems, No.3. P Mukkamala S., Jaoski G., & Sug H.(003). trusio Detectio Usig Neural Networks ad Support Vector Machies. Proceedigs of EEE teratioal Joit Coferece o Neural Networks, P Pawlak Z. (98). Rough sets. teratioal Joural of formatio ad Computer Scieces. No., P Roberto P., Guofei, G., & Weke L. (006). Usig a Esemble of Oe-Class SVM Classifiers to Harde Payload-based Aomaly Detectio Systems. Proceedigs of the Sixth teratioal Coferece o Data Miig (CDM'06). Sug A. (998). Rakig mportace of put Parameters of Neural Networks. Expert Systems with Applicatios. No. 5. P Vapik V. (995). The ature of statistical learig theory. New York: Spriger-Verlag. 04

6 Computer ad formatio Sciece November, 009 Table. Experimetal result with protocol differece but without reductio protocal best c,σ Traiig time Test time Test correct rate TCP c=5, σ = s.6s % UDP c=8, σ = s.3s % CMP c=8.00, σ = s.4s % Table. Experimetal results with protocol differece ad reductio protocal Feature set Best c, σ Traiig time Test time Test correct rate TCP c=048, σ = % 8 c=3768, σ = % UDP 6 c=048, σ = % 30 c=048, σ = % CMP 6 c=5, σ = % 8 c=3, σ = % Table 3. Experimetal results without protocol differece ad reductio Data set best c, σ Traiig time Test time Test correct rate c=5, σ = % 073 c=8, σ = % 8353 c=64, σ = % 05

7 Computer ad formatio Sciece Figure. The SVM itrusio detectio method usig protocol classificatio ad rough sets KDDCUP 0 UL RL 0 Normal&Attack Prob DoS CMP UDP TCP Normal Data Record Figure. KDDCUP 99 itrusio data protocol classificatio. NO Feature set after Reductio support legth 3,4,6,4,3,4,7,8,3,3,33,36, ,4,6,8,3,4, 7,8,3,3,33,36, ,4,6,4,3,4, 7,8,3,3,33,36, ,4,6,3,4, 7,8,3,3,33,35,36, ,4,6,3,4, 7,8,3,3,33,35,36, ,4,6,8,3, 4,7,8,3,3,33,36, ,4,6,0,3, 4,7,8,3,33,35,36,37, ,4,6,3, 4,7,8,3,3,34,35,36,37, ,4,6,0,3, 4,7,8,3,33,35,36,37, ,4,6,0,,8,3, 4,7,8,3,3,34,35,36,37, ,4,6,0,,4,3, 4,7,8,3,3,34,35,36,37, Figure 3. TCP reduced characteristic. 06

8 Computer ad formatio Sciece November, 009 NO Feature set after Reductio support legth 3,5 00 5,4, ,6, ,3, ,34, ,33, ,3, ,6, ,8, ,3, ,8, ,3, ,30, ,3, ,34, ,33, ,9, ,8,9, ,8,3, ,5,3, ,6,30, ,33,35, ,3,34, ,6,9, ,8,30, ,8,30, ,3,3, ,4,30, ,9,3, ,6,3, ,30,3, ,33,35, ,30,3, ,6,9, ,9,3, ,4,33, ,4,9, Figure 4. UDP reduced characteristic. 07

9 Computer ad formatio Sciece NO Feature set after Reductio support legth 5,3 00 5, ,3,3, ,3,3, ,4,3, ,4,3, ,4,3, ,4,33,36, ,4,33,34, Figure 5. CMP reduced characteristic. Figure 6. Parameter search of TCP traiig data 08

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology 208 2d Iteratioal Coferece o Systems, Computig, ad Applicatios (SYSTCA 208) Research o Idetificatio Model of Fiacial Fraud of Listed Compay Based o Data Miig Techology Jiaqi Hu, Xiao Che School of Busiess,

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

An improved support vector machine based on particle swarm optimization in laser ultrasonic defect detection

An improved support vector machine based on particle swarm optimization in laser ultrasonic defect detection A improved support vector machie based o particle swarm optimizatio i laser ultrasoic defect detectio School of Sciece, North Uiversity of Chia, aiyua, Shaxi 35, Chia xut98@63.com,hhp9@63.com,xywag@6.com,43497@qq.com

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Lip Contour Extraction Based on Support Vector Machine

Lip Contour Extraction Based on Support Vector Machine Lip Cotour Extractio Based o Support Vector Machie Author Pa, Xiaosheg, Kog, Jiagpig, Liew, Ala Wee-Chug Published 008 Coferece Title CISP 008 : Proceedigs, First Iteratioal Cogress o Image ad Sigal Processig

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Fuzzy Linear Regression Analysis

Fuzzy Linear Regression Analysis 12th IFAC Coferece o Programmable Devices ad Embedded Systems The Iteratioal Federatio of Automatic Cotrol September 25-27, 2013. Fuzzy Liear Regressio Aalysis Jaa Nowaková Miroslav Pokorý VŠB-Techical

More information

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree Available olie at www.ijpe-olie.com vol. 13, o. 7, November 017, pp. 1159-1164 DOI: 10.3940/ijpe.17.07.p19.11591164 Text Feature Selectio based o Feature Dispersio Degree ad Feature Cocetratio Degree Zhifeg

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Application of Decision Tree and Support Vector Machine for Inspecting Bubble Defects on LED Sealing Glue Images

Application of Decision Tree and Support Vector Machine for Inspecting Bubble Defects on LED Sealing Glue Images 66 Applicatio of Decisio Tree ad Support Vector Machie for Ispectig Bubble Defects o LED Sealig Glue Images * Chua-Yu Chag ad Yi-Feg Li Abstract Bubble defect ispectio is a importat step i light-emittig

More information

A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem

A Method for Solving Balanced Intuitionistic Fuzzy Assignment Problem P. Sethil Kumar et al t. Joural of Egieerig Research ad Applicatios SSN : 2248-9622, Vol. 4, ssue 3( Versio 1), March 2014, pp.897-903 RESEARCH ARTCLE OPEN ACCESS A Method for Solvig Balaced tuitioistic

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp

More information

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences Miig from Quatitative Data with Liguistic Miimum Supports ad Cofideces Tzug-Pei Hog, Mig-Jer Chiag ad Shyue-Liag Wag Departmet of Electrical Egieerig Natioal Uiversity of Kaohsiug Kaohsiug, 8, Taiwa, R.O.C.

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

A new algorithm to build feed forward neural networks.

A new algorithm to build feed forward neural networks. A ew algorithm to build feed forward eural etworks. Amit Thombre Cetre of Excellece, Software Techologies ad Kowledge Maagemet, Tech Mahidra, Pue, Idia Abstract The paper presets a ew algorithm to build

More information

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators Theory of Fuzzy Soft Matrix ad its Multi Criteria i Decisio Makig Based o Three Basic t-norm Operators Md. Jalilul Islam Modal 1, Dr. Tapa Kumar Roy 2 Research Scholar, Dept. of Mathematics, BESUS, Howrah-711103,

More information

Investigating methods for improving Bagged k-nn classifiers

Investigating methods for improving Bagged k-nn classifiers Ivestigatig methods for improvig Bagged k-nn classifiers Fuad M. Alkoot Telecommuicatio & Navigatio Istitute, P.A.A.E.T. P.O.Box 4575, Alsalmia, 22046 Kuwait Abstract- We experimet with baggig knn classifiers

More information

An Anomaly Detection Method Based On Deep Learning

An Anomaly Detection Method Based On Deep Learning Sed Orders for Reprits to reprits@bethamsciece.ae 734 The Ope Automatio ad Cotrol Systems Joural, 05, 7, 734-739 A Aomaly Detectio Method Based O Deep Learig Ope Access Hog-li Deg *, Tao yag ad Jiag-i

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

The identification of key quality characteristics based on FAHP

The identification of key quality characteristics based on FAHP Iteratioal Joural of Research i Egieerig ad Sciece (IJRES ISSN (Olie: 2320-9364, ISSN (Prit: 2320-9356 Volume 3 Issue 6 ǁ Jue 2015 ǁ PP.01-07 The idetificatio of ey quality characteristics based o FAHP

More information

Lecture 13: Validation

Lecture 13: Validation Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

Web Text Feature Extraction with Particle Swarm Optimization

Web Text Feature Extraction with Particle Swarm Optimization 32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,

More information

Assignment Problems with fuzzy costs using Ones Assignment Method

Assignment Problems with fuzzy costs using Ones Assignment Method IOSR Joural of Mathematics (IOSR-JM) e-issn: 8-8, p-issn: 9-6. Volume, Issue Ver. V (Sep. - Oct.06), PP 8-89 www.iosrjourals.org Assigmet Problems with fuzzy costs usig Oes Assigmet Method S.Vimala, S.Krisha

More information

(3) The denominator is ineffective for making decisions. Because C is the same for all values.on the other hand due to our independent feature set

(3) The denominator is ineffective for making decisions. Because C is the same for all values.on the other hand due to our independent feature set ORIGINAL ARTICLE Received 17 Ja. 2014 Accepted 30 Ja. 2014 2014, Sciecelie Publicatio www.sciece-lie.com 2322-5114 Joural of World s Electrical Egieerig ad Techology J. World. Elect. Eg. Tech. 3(1): 01-05,

More information

Bayesian Network Structure Learning from Attribute Uncertain Data

Bayesian Network Structure Learning from Attribute Uncertain Data Bayesia Network Structure Learig from Attribute Ucertai Data Wetig Sog 1,2, Jeffrey Xu Yu 3, Hog Cheg 3, Hogya Liu 4, Ju He 1,2,*, ad Xiaoyog Du 1,2 1 Key Labs of Data Egieerig ad Kowledge Egieerig, Miistry

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER Proceedigs of the Sixth Iteratioal Coferece o Machie Learig ad Cyberetics, Hog Kog, 9- August 7 A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER AI-MIN YANG,, XIN-GUANG LI, LING-MIN JIANG,YONG-MEI

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Feature Selection for Change Detection in Multivariate Time-Series

Feature Selection for Change Detection in Multivariate Time-Series Feature Selectio for Chage Detectio i Multivariate Time-Series Michael Botsch Istitute for Circuit Theory ad Sigal Processig Techical Uiversity Muich 80333 Muich, Germay Email: botsch@tum.de Josef A. Nossek

More information

A Wrapper-Based Combined Recursive Orthogonal Array and Support Vector Machine for Classification and Feature Selection

A Wrapper-Based Combined Recursive Orthogonal Array and Support Vector Machine for Classification and Feature Selection Moder Applied Sciece; Vol. 8, No. ; 24 ISSN 93-844 E-ISSN 93-852 Published by Caadia Ceter of Sciece ad Educatio A Wrapper-Based Combied Recursive Orthogoal Array ad Support Vector Machie for Classificatio

More information

A Comparative Study of Positive and Negative Factorials

A Comparative Study of Positive and Negative Factorials A Comparative Study of Positive ad Negative Factorials A. M. Ibrahim, A. E. Ezugwu, M. Isa Departmet of Mathematics, Ahmadu Bello Uiversity, Zaria Abstract. This paper preset a comparative study of the

More information

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network A Polyomial Iterval Shortest-Route Algorithm for Acyclic Network Hossai M Akter Key words: Iterval; iterval shortest-route problem; iterval algorithm; ucertaity Abstract A method ad algorithm is preseted

More information

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System Mappig Publishig ad Mappig Adaptatio i the Middleware of Railway Iformatio Grid ystem You Gamei, Liao Huamig, u Yuzhog Istitute of Computig Techology, Chiese Academy of cieces, Beijig 00080 gameiu@ict.ac.c

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

On-line cursive letter recognition using sequences of local minima/maxima. Robert Powalka

On-line cursive letter recognition using sequences of local minima/maxima. Robert Powalka O-lie cursive letter recogitio usig sequeces of local miima/maxima Summary Robert Powalka 19 th August 1993 This report presets the desig ad implemetatio of a o-lie cursive letter recogizer usig sequeces

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Image based Cats and Possums Identification for Intelligent Trapping Systems

Image based Cats and Possums Identification for Intelligent Trapping Systems Volume 159 No, February 017 Image based Cats ad Possums Idetificatio for Itelliget Trappig Systems T. A. S. Achala Perera School of Egieerig Aucklad Uiversity of Techology New Zealad Joh Collis School

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Searching a Russian Document Collection Using English, Chinese and Japanese Queries

Searching a Russian Document Collection Using English, Chinese and Japanese Queries Searchig a Russia Documet Collectio Usig Eglish, Chiese ad Japaese Queries Fredric C. Gey (gey@ucdata.berkeley.edu) UC Data Archive & Techical Assistace Uiversity of Califoria, Berkeley, CA 94720 USA ABSTRACT.

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information