Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation

Size: px
Start display at page:

Download "Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation"

Transcription

1 Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat , Assam moowar.tezu@gmail.com D. K. Bhattacharyya Dept. of Computer Sciece ad Egg Tezpur Uiversity Napaam, Tezpur 78408, Assam dkb@tezu.eret.i J. K. Kalita Dept. of Computer Sciece Uiversity of Colorado Colorado Sprigs, CO 8098, USA jkalita@uccs.edu Abstract Ivasio by Distributed Deial of Service (DDoS) is a serious threat to services offered o the Iteret. A low-rate DDoS attack allows legitimate etwork traffic to pass ad cosumes low badwidth. So, detectio of this type of attacks is very difficult i high speed etworks. Iformatio theory is popular because it allows quatificatios of the differece betwee malicious traffic ad legitimate traffic based o probability distributios. I this paper, we empirically evaluate several iformatio metrics, amely, artley etropy, Shao etropy, Reyi's etropy ad Geeralized etropy i their ability to detect low-rate DDoS attacks. These metrics ca be used to describe characteristics of etwork traffic ad a appropriate metric facilitates buildig a effective model to detect low-rate DDoS attacks. We use MIT Licol Laboratory ad CAIDA DDoS datasets to illustrate the efficiecy ad effectiveess of each metric for detectig maily low-rate DDoS attacks. bots or slave machies) cotrolled by oe etity (i.e., the master) []. The master ca sed malformed packets through a sychroized host (i.e., the slave) to the target host. owever, detectio of botets is hard ad a effective solutio eeds to moitor all machies that ca possibly become active bots i a botet. Keywords DDoS attack, iformatio metric, etwork traffic, low-rate, etropy I. INTRODUCTION DDoS attacks use a set of compromised hosts to make Iteret services uavailable. Attackers are cotiually improvig their ability to lauch future DDoS attacks by ifectig ususpectig hosts. These attacks ormally cosume a massive amout of resources from a server that makes the server iaccessible to legitimate users; they also cosume etwork badwidth by compromisig etwork traffic. DDoS attacks are cooperative distributed large scale attacks ad ca spread by both wired ad wireless etworks. ece, both idustry ad academia are iterested i defedig their etworks from DDoS attacks, esurig uiterrupted access by legitimate users. It is challegig to distiguish malicious traffic from legitimate traffic sice they are similar based o traffic behavior aloe. There are two types of traffic that ca ormally compromise a host or a etwork with DDoS attacks []. They are: (a) high-rate DDoS attack traffic, which is exceptioal ad similar to a flash crowd ad (b) low-rate DDoS attack traffic, which is similar to legitimate traffic. Sice both have characteristics of legitimate traffic, it is crucial to detect a DDoS attack ad remit withi a short time iterval. Most recet work aims to detect DDoS attacks lauched by botets. A botet is a large etwork of compromised hosts (i.e., Fig.. Direct attacks There are two ways to lauch DDoS floodig attacks: direct floodig attacks ad reflector-based floodig attacks []. I direct DDoS floodig attacks, the attacker seds a massive umber of packets to the victim host or server directly through multiple compromised hosts or machies as show i Figure. Direct DDoS floodig attack is further classified as: Networklayer DDoS attacks ad Applicatio-layer DDoS attacks. TCP flood, UDP flood, ICMP flood ad SYN flood are some commo examples of etwork-layer DDoS attacks ad TTP flood, TTPS flood ad FTP flood are examples of applicatio-layer DDoS attacks. I reflector-based DDoS floodig attacks, the attacker seds request to a reflector host to forward a massive amout of malicious traffic by spoofig IPs of victim host(s). As a result, the reflector hosts sed their replies to the victim host ad make the victim iaccessible by the legitimate users soo as show i Figure. ICMP ECO reply flood, SYN ACK RST flood, DNS flood ad smurf flood are some well-kow reflector-based attacks. Iformatio theory-based metrics are well established i detectig distributed DoS attacks. I iformatio theory, /4/$ IEEE

2 etropy is a popular ucertaity measure uites with a radom variable. Iformatio distace computes the variatio betwee various probability distributios. Kullback-Leibler divergece ad Shao's etropy are assumed to be the most useful methods i detectig malicious traffic based o IP address or packet size distributio statistics [3], [4]. Fig.. Idirect attacks I this paper, we cotribute i two ways: First, we discuss the most commo iformatio metrics that are used i detectig DDoS attacks with pros ad cos. Secod, we aalyze ad evaluate each iformatio metric from a attacker's viewpoit i the cotext of detectig low-rate DDoS attacks. We use victim-ed architecture for aalyzig iformatio metrics i detectig low-rate DDoS attacks. The rest of the paper is orgaized as follows: Sectio II discusses related research with a focus o the detectio of low-rate DDoS attacks. Sectio III discusses various iformatio metrics that are used to detect low-rate DDoS attacks withi short time itervals. It also icludes the complexity aalysis of the detectio method. owever, i Sectio IV, we report experimetal results ad discussio based o the use of iformatio metrics i detectig low-rate DDoS attacks. Fially, Sectio V presets coclusios with future work. II. RELATED RESEARC Detectio of attacks is crucial for ifrastructure etworks. So, both idustry ad academic researchers are costatly tryig to detect etwork attacks with high accuracy for at least two decades. There are maily two techiques to detect attacks: sigature-based ad aomaly-based. Sigature-based detectio mechaisms oly ca detect attacks, whose sigatures are kow. If ay attack is discovered, it should be used to trai the system. owever, a aomaly-based detectio system characterizes legitimate etwork behavior ad reports a alarm if it deviates from it. Iformatio metric is a statistical metric, which is icreasigly beig used i etwork aomaly detectio. Sheg et al. [5] discuss a measure, desiged, based o urst coefficiet to detect low-rate DDoS attacks. Experimetal results obtaied ad demostrate effectiveess i detectig low-rate DDoS attacks. Xiag et al. [4] preset two iformatio metrics: geeralized etropy ad iformatio distace to idetify low-rate DDoS attacks. They measure the differece of the iformatio metrics betwee ormal traffic ad malicious traffic. They test their metric usig real-life DDoS traffic traces ad show the reductio of false alarms with early stage detectio. Zhag et al. [6] preset a metric for flow-level etwork traffic, desiged based o Cogestio Participatio Rate (CPR) to detect ad filter low-rate DDoS attacks that geerate low-level cogestio i the etwork. If the CPR value is higher tha the user defied threshold, a etwork flow is classified as a low-rate DDoS attack ad the etwork allows subsequetly droppig all coected packets. The authors aalyze the effectiveess of the CPR-based approach to quatify the average CPR differece betwee legitimate TCP flows ad low-rate DDoS flows. It was show that the CPRbased approach ca differetiate betwee legitimate ad attack traffic. Experimets usig Iteret traffic-trace aalysis, s- simulator ad test-bed experimets establish the results. Tao ad Yu [7] preset a DDoS floodig attack detectio method usig a iformatio theoretic measure. It ca detect DDoS attacks withi a short time iterval ad is effective whe experimeted o real-life datasets. Fracois et al. [8] report the theoretical foudatio, architecture, ad algorithms to detect DDoS floodig attacks; their approach is kow as FireCol. FireCol cotais itrusio prevetio systems (IPSs) istalled by various Iteret service providers (ISPs). A virtual protectio rig is created by IPSs aroud the hosts to defed agaist DDoS floodig attacks by iterchagig the chose traffic iformatio. FireCol was evaluated usig both simulatios ad real datasets ad obtais effective results. It also supports cumulative deploymet i real etworks. A. Discussio Based o our survey, we have made the followig observatios. Oly few detectio methods focus o detectig lowrate DDoS attacks. As discussed, low-rate DDoS traffic is similar to legitimate traffic. So, detectio of such attacks is difficult ad challegig. Detectio methods are more cocetrated o packetlevel datasets. III. INFORMATION METRICS FOR DDOS DETECTION A iformatio metric measure may be used to overcome the limitatios of existig DDoS attack detectio methods. I this paper, we attempt to evaluate iformatio metrics for detectig low-rate DDoS attacks. The followig assumptios have bee made durig experimetatio. Routers have full cotrol o i-ad-out traffic flow.

3 We collect packet ad flow level traffic at the victimed after various types of floodig attacks are lauched. Durig processig, we sample the etwork traffic at 5 miute itervals ad also further sample ito 0 secods time itervals. All malicious traffic follows Poisso distributio ad ormal traffic follows Gaussia distributio. The symbols used to describe the iformatio metrics for detectig low-rate DDoS attacks are give i Table. Term x P T t i x i δ S E E i N TABLE I. etwork traffic data total probability SYMBOLS USED Defiitio time iterval take for processig i th time iterval withi T the etropy metric etropy metric of order i th istace withi x threshold for attack detectio sample traffic iformatio distace metric differece of etropy metric values betwee two samples, s i ad s j total umber of packets withi full time iterval T represets the smaller time iterval t withi T I iformatio theory, larger values of etropy are expected whe the iformatio variable is more radom. I cotrast, the etropy value is expected to be small whe the amout of ucertaity i the iformatio variable is small [3]. To quatify the radomess of a system, Reyi [9] itroduced a etropy metric of order as a mathematical geeralizatio of Shao etropy [0]. Let us cosider a discrete probability distributio, P = {p, p, p 3, p }, i.e., p =, p i 0. The the Reyi's i = etropy of order is defied as ( x ) = log i= i p i where 0,, p i 0. If the values of the p i 's are the same, the maximum etropy value kow as artley etropy [0] is achieved: () 0 ( x ) = log () Whe, coverges to Shao etropy [0]: x ) = p i log p i ( (3) i= If =, it is kow as collisio etropy or Reyi's quadratic etropy [9]. x ) = log p i i= ( (4) Fially, whe, (x) reaches the miimum iformatio etropy value. ece, we say that the geeralizatio of iformatio etropy is a o-icreasig fuctio of order, i.e., (x) (x), for <, > 0. Based o this aalysis of iformatio etropy metric, we cosider differet probability distributios for legitimate etwork traffic ad malicious traffic whe detectig low-rate DDoS attacks. We fid the differece betwee legitimate ad malicious traffic i low-rate attack situatios. The major steps are give i Algorithm. Algorithm The low-rate DDoS attacks detectio Iput: etwork traffic x with respect to time widow, T ad threshold, δ Output: alarm iformatio (attack or ormal) : iitializatio: Probability p(x i ), sample period, T=0, where i=,,3,, T= t, t, t 3,, t N, N is the full time iterval. : sample the etwork traffic x received from upstream router R based o samplig period T 3: compute probability distributio p i based o traffic features (i.e., sip, dip ad protocol) for each sample withi T samplig period of i th sample. 4: compute etropy metric (x) usig Equatio() for each sample withi samplig period T E i = ( s ) ( s ) (5) i j 5: check agaist variatio threshold E i δ, if so geerate alarm; otherwise, router sed ahead the packet to the extlevel routers. 6: go to step. A. Complexity Aalysis This aalysis mechaism takes O(T) time for each sample i detectig low-rate DDoS attacks, where T is the time iterval ad is the umber of istaces withi a sample. Thus, for each idividual order of iformatio metric, the time complexity of the method is liear for each sample with respect to the size of the dataset ad the umber of attributes. IV. EXPERIMENTAL RESULTS Performace evaluatio is importat for ay attack defese system. Performace for detectig DDoS attacks is maily depedet o (i) the approach, (ii) deploymet poit ad (iii)

4 whether it is possible to dyamically update attack traffic iformatio [], []. Whe desigig a DDoS attack defese mechaism, these issues should be take ito cocetratio to desig a better defese mechaism. I our experimets, two differet datasets, viz., MIT Licol Laboratory [3] ad CAIDA DDoS 007 [4] datasets are used to detect low-rate DDoS attacks. The MIT Licol Laboratory tcpdump data is real-time pure ormal data; it does ot cotai ay attack traffic. The CAIDA dataset cotais 5 miutes (i.e., 300 secods) of aoymized traffic of a DDoS attack o August 4, 007. These traffic traces store oly attack traffic to the victim ad respose from the victim; o-attack traffic has bee removed as much as possible. Accordig to Moore et al. [5], it is a high-rate attack if there are more tha 0,000 packets per secod over the etwork. If,000 attack packets per secod over the etwork coverig 60% of the attack traffic the it is kow as low-rate attack. A. Results We iitially sample the etwork traffic every 0 secods for 5 miutes, for aalysis. We apply the geeralized etropy measure of order, where is varied from 0 to 5 for our experimet. We also evaluate the geeralized iformatio distace of order, where is varied from to 4 for detectig low-rate DDoS attacks. All features i etwork traffic may ot play role i the detectio of malicious traffic. Therefore, we cosider oly three features: source IP, destiatio IP, ad protocol, for our experimets. The geeralized etropy values of order ad spacig betwee ormal traffic ad malicious traffic for the CAIDA dataset are show i Figure 3. metric of order for the CAIDA DDoS dataset is give i Figure 4. The threshold δ value is varied from to whe detectig low-rate DDoS attacks usig CAIDA datasets. Fig. 4. Spacig betwee ormal ad low-rate DDoS traffic whe usig geeralized etropy measure i the CAIDA dataset B. Discussio To detect low-rate DDoS attack traffic, it is importat to use a miimum umber of traffic features. Several detectio mechaisms use either distributio of IP addresses or packet sizes. I this paper, we evaluate iformatio metric measures to detect low-rate DDoS attacks i real-life DDoS dataset. The followig are some observatios. Iformatio etropy provides better result whe icreasig the order of geeralized etropy i detectig low-rate DDoS attacks. Iformatio metric produces better result i terms of complexity because it uses a miimum umber of parameters durig detectio. For geeralized etropy, the value of ca be adjusted easily for better spacig betwee ormal ad attack traffic. Fig. 3. Spacig betwee ormal ad malicious traffic i CAIDA dataset I the figure, we see that spacig betwee ormal ad lowrate attack traffic is lower tha the spacig i high-rate attack traffic. This is because low-rate attack traffic is similar to legitimate traffic. The spacig betwee legitimate or ormal traffic ad low-rate attack traffic usig the geeralized etropy V. CONCLUSION This work presets a empirical evaluatio of iformatio metrics whe detectig low-rate DDoS attacks. We iclude several iformatio etropy measures: artley etropy, Shao etropy, Reyi's etropy ad Reyi's geeralized etropy. The use of iformatio metric magifies the spacig betwee legitimate ad malicious traffic for low-rate DDoS attack detectio i real world etwork traffic. Moreover, these measures take miimum time to fid the spacig betwee the malicious ad legitimate traffic.

5 ACKNOWLEDGMENT This work is supported by Coucil of Scietific ad Idustrial Research (CSIR) ad Departmet of Iformatio Techology, Govermet of Idia. REFERENCES [] W. Wei, F. Che, Y. Xia, ad G. Ji, A Rak Correlatio Based Detectio agaist Distributed Reflectio DoS Attacks, IEEE Commuicatios Letters, vol. 7, o., pp , 03. [] M.. Bhuya,. J. Kashyap, D. K. Bhattacharyya, ad J. K. Kalita, Detectig Distributed Deial of Service Attacks: Methods, Tools ad Future Directios, The Computer Joural, vol. 57, o. 4, pp , 04. [3] S. Yu, W. Zhou, R. Doss, ad W. Jia, Traceback of DDoS Attacks Usig Etropy Variatios, IEEE Tras. Parallel Distributed Systems, vol., o. 3, pp. 4 45, March 0. [4] Y. Xiag, K. Li, ad W. Zhou, Low-Rate DDoS Attacks Detectio ad Traceback by Usig New Iformatio Metrics, IEEE Trasactios o Iformatio Foresics ad Security, vol. 6, o., pp , 0. [5] Z. Sheg, Z. Qifei, P. Xuezeg, ad Z. Xuhui, Detectio of Low-rate DDoS Attack Based o Self-Similarity, i d Iteratioal Workshop o Educatio Techology ad Computer Sciece (ETCS), vol., March 00, pp [6] C. Zhag, Z. Cai, W. Che, X. Luo, ad J. Yi, Flow Level Detectio ad Filterig of Low-rate DDoS, Comput. Netw., vol. 56, o. 5, pp , October 0. [7] Y. Tao ad S. Yu, DDoS Attack Detectio at Local Area Networks Usig Iformatio Theoretical Metrics, i th IEEE Iteratioal Coferece o Trust, Security ad Privacy i Computig ad Commuicatios (TrustCom), 03, pp [8] J. Fracois, I. Aib, ad R. Boutaba, FireCol: A Collaborative Protectio Network for the Detectio of Floodig DDoS Attacks, IEEE/ACM Trasactios o Networkig, vol. 0, o. 6, pp , 0. [9] A. R eyi, O Measures of Etropy Ad Iformatio, i Proc. of the 4th Berkeley Symposium o Mathematics, Statistics ad Probability, 960, pp [0] C. E. Shao, A Mathematical Theory of Commuicatio, Bell system techical joural, vol. 7, pp , 948. [] M.. Bhuya, D. K. Bhattacharyya, ad J. K. Kalita, AOCD: A Adaptive Outlier Based Coordiated Sca Detectio Approach, Iteratioal Joural of Network Security, vol. 4, o. 6, pp , 0. [], Network Aomaly Detectio: Methods, Systems ad Tools, IEEE Commuicatios Surveys Tutorials, vol. 6, o., pp , 04. [3] MIT Licol Laboratory Datasets, MIT LLS DDOS 0.., ideval/data/000data.html, 000, Massachusetts Istitute of Techology, Cambridge,MA. [4] CAIDA, The Cooperative Aalysis for Iteret Data Aalysis, 0. [5] D. Moore, C. Shao, D. J. Brow, G. M. Voelker, ad S. Savage, Iferrig Iteret Deial-of-service Activity, ACM Tras. Computer System, vol. 4, o., pp. 5 39, May 006.

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Monowar H. Bhuyan and Abhishek Kalwar Dept. of Computer Science & Engg. Kaziranga University, Jorhat-785006, Assam

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku

More information

The identification of key quality characteristics based on FAHP

The identification of key quality characteristics based on FAHP Iteratioal Joural of Research i Egieerig ad Sciece (IJRES ISSN (Olie: 2320-9364, ISSN (Prit: 2320-9356 Volume 3 Issue 6 ǁ Jue 2015 ǁ PP.01-07 The idetificatio of ey quality characteristics based o FAHP

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Exponential intuitionistic fuzzy entropy measure based image edge detection.

Exponential intuitionistic fuzzy entropy measure based image edge detection. Expoetial ituitioistic fuzzy etropy measure based image edge detectio. Abdulmajeed Alsufyai 1, Hassa Badry M. El-Owy 2 1 Departmet of Computer Sciece, College of Computers ad Iformatio Techology, Taif

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic. Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig

More information

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

A Method of Malicious Application Detection

A Method of Malicious Application Detection 5th Iteratioal Coferece o Educatio, Maagemet, Iformatio ad Medicie (EMIM 2015) A Method of Malicious Applicatio Detectio Xiao Cheg 1,a, Ya Hui Guo 2,b, Qi Li 3,c 1 Xiao Cheg, Beijig Uiv Posts & Telecommu,

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology 208 2d Iteratioal Coferece o Systems, Computig, ad Applicatios (SYSTCA 208) Research o Idetificatio Model of Fiacial Fraud of Listed Compay Based o Data Miig Techology Jiaqi Hu, Xiao Che School of Busiess,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

Web Text Feature Extraction with Particle Swarm Optimization

Web Text Feature Extraction with Particle Swarm Optimization 32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

BAYESIAN WITH FULL CONDITIONAL POSTERIOR DISTRIBUTION APPROACH FOR SOLUTION OF COMPLEX MODELS. Pudji Ismartini

BAYESIAN WITH FULL CONDITIONAL POSTERIOR DISTRIBUTION APPROACH FOR SOLUTION OF COMPLEX MODELS. Pudji Ismartini Proceedig of Iteratioal Coferece O Research, Implemetatio Ad Educatio Of Mathematics Ad Scieces 014, Yogyakarta State Uiversity, 18-0 May 014 BAYESIAN WIH FULL CONDIIONAL POSERIOR DISRIBUION APPROACH FOR

More information

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree Available olie at www.ijpe-olie.com vol. 13, o. 7, November 017, pp. 1159-1164 DOI: 10.3940/ijpe.17.07.p19.11591164 Text Feature Selectio based o Feature Dispersio Degree ad Feature Cocetratio Degree Zhifeg

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

A New Network-based Algorithm for Human Activity Recognition in Videos

A New Network-based Algorithm for Human Activity Recognition in Videos IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, A New Network-based Algorithm for Huma Activity Recogitio i Videos Weiyao Li, Yuazhe Che, Jiaxi Wu, Hali Wag, Bi Sheg, ad Hogxiag Li Abstract

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Enhancing Efficiency of Software Fault Tolerance Techniques in Satellite Motion System

Enhancing Efficiency of Software Fault Tolerance Techniques in Satellite Motion System Joural of Iformatio Systems ad Telecommuicatio, Vol. 2, No. 3, July-September 2014 173 Ehacig Efficiecy of Software Fault Tolerace Techiques i Satellite Motio System Hoda Baki Departmet of Electrical ad

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

DCMIX: Generating Mixed Workloads for the Cloud Data Center

DCMIX: Generating Mixed Workloads for the Cloud Data Center DCMIX: Geeratig Mixed Workloads for the Cloud Data Ceter XigWag Xiog, Lei Wag, WaLig Gao, Rui Re, Ke Liu, Che Zheg, Yu We, YiLiag Istitute of Computig Techology, Chiese Academy of Scieces Bech 2018, Seattle,

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Section 7.2: Direction Fields and Euler s Methods

Section 7.2: Direction Fields and Euler s Methods Sectio 7.: Directio ields ad Euler s Methods Practice HW from Stewart Tetbook ot to had i p. 5 # -3 9-3 odd or a give differetial equatio we wat to look at was to fid its solutio. I this chapter we will

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

An Anomaly Detection Method Based On Deep Learning

An Anomaly Detection Method Based On Deep Learning Sed Orders for Reprits to reprits@bethamsciece.ae 734 The Ope Automatio ad Cotrol Systems Joural, 05, 7, 734-739 A Aomaly Detectio Method Based O Deep Learig Ope Access Hog-li Deg *, Tao yag ad Jiag-i

More information

Analysis of Different Similarity Measure Functions and their Impacts on Shared Nearest Neighbor Clustering Approach

Analysis of Different Similarity Measure Functions and their Impacts on Shared Nearest Neighbor Clustering Approach Aalysis of Differet Similarity Measure Fuctios ad their Impacts o Shared Nearest Neighbor Clusterig Approach Ail Kumar Patidar School of IT, Rajiv Gadhi Techical Uiversity, Bhopal (M.P.), Idia Jitedra

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information