Creating Adaptive Web Sites Through Usage-Based Clustering of URLs
|
|
- Natalie Carpenter
- 5 years ago
- Views:
Transcription
1 Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL Robert Cooley, Jaideep Srivastava Dept. of Computer Siene, University of Minnesota, Minneapolis, MN 1 Introdution Web personalization has quikly moved from an added value feature to a neessity, partiularly for large information servies and sites that generate revenue by selling produts. Web personalization an be viewed as using user preferenes profiles to dynamially serve ustomized ontent to partiular users. User preferenes may be obtained expliitly, or by passive observation of users over time as they interat with the system. Prinipal elements of Web personalization inlude modeling of Web objets (pages, et.) and subjets (users), mathing between and aross objets and/or subjets, and determination of the set of ations to be reommended for personalization. Existing approahes used by many Web-based ompanies, as well as approahes based on ollaborative filtering (e.g., GroupLens [HKBR99] and Firefly [SM95]), rely heavily on human input for determining the personalization ations. This type of input is often a subjetive desription of the users by the users themselves, and thus prone to biases. Furthermore, the profile is stati, and its performane degrades over time as the profile ages. Reently, a number of approahes have been developed dealing with speifi aspets of Web usage mining for the purpose of automatially disovering user profiles. For example, Perkowitz and Etzioni [PE98] proposed the idea of optimizing the struture of Web sites based o-ourrene patterns of pages within usage data for the site. Shehter et al [SKS98] have developed tehniques for using path profiles of users to predit future HTTP requests, whih an be used for network and proxy ahing. Spiliopoulou et al [SF99], Cooley et al [CMS99], and Buhner and Mulvenna [BM99] have applied data mining tehniques to extrat usage patterns from Web logs, for the purpose of deriving marketing intelligene. Shahabi et al [SZA97], Yan et al [YJGD96], and Nasraoui et al [NFJK99] have proposed lustering of user sessions to predit future user behavior. In this paper we desribe an approah to usage-based Web personalization taking into aount both the offline tasks related to the mining of usage data, and the online proess of automati Web page ustomization based on the mined knowledge. Speifially, we propose an effetive tehnique for apturing ommon user profiles based on assoiation-rule disovery and usage-based lustering. We also propose tehniques for ombining this knowledge with the urrent status of an ongoing Web ativity to perform realtime personalization. Finally, we provide an experimental evaluation of the proposed tehniques using real Web usage data. 2 Mining Usage Data for Web Personalization The overall proess of usage-based Web personalization an be divided into two omponents. The offline omponent is omprised of the data preparation tasks resulting in a user transation file, and the speifi usage mining tasks, whih in our ase inlude the disovery of assoiation rules and the derivation of URL lusters based on user aess patterns. One the mining tasks are aomplished, the frequent itemsets and the URL lusters are used by the online omponent of the arhiteture to provide dynami reommendations to users based on their urrent navigational ativity. The Web server keeps trak of the ative user session as the user browser makes HTTP requests. The reommendation engine onsiders the ative user session in onjuntion with the URL lusters to ompute a set of reommended URLs. The reommendation set is then added to the last requested page as a set of links before the page is sent to the lient browser. A generalized arhiteture for 1
2 Figure 1. General Arhiteture for Usage-Based Web Personalization usage-based personalization is depited in Figure 1. In this setion, we disuss the offline omponents of this arhiteture. The online ustomization proess is presented in the next setion. 2.1 Data Preparation Tasks A ritial step in effetively mining usage data for Web personalization is the leaning and transformation of aess log data, and the identifiation of a set of user sessions. Cleaning the server logs involves removing redundant referenes (e.g., image and sound files, multiple frames, and dynami pages that have the same template), leaving only one entry per page view. It is also neessary to filter the log files by mapping the referenes to the site topology indued by physial links between pages. Client-side and proxy level ahing often reate impediments to the identifiation of unique user sessions. For example, in a Web server log, all requests from a proxy server have the same identifier, even though the requests potentially represent more than one user. Tehniques suh as the use of lient-side ookies for user identifiation are not always pratial due to privay onerns of the users, or limitations of the apabilities of the Web server. In [CMS99] we proposed several simple heuristis using the referrer and agent fields of a Server log to identify user sessions and infer missing referenes with relative auray in the absene of additional information suh as ookies. The goal of transation identifiation is to dynamially reate meaningful lusters of referenes for eah user. Based on an underlying model of the user's browsing behavior, eah page referene an be ategorized as a ontent referene, auxiliary (or navigational) referene, or hybrid. In this way different types of transations an be obtained from the user session file, inluding ontent-only transations involving referenes to ontent pages, and navigation-ontent transations involving a mix of pages types. The details of 2
3 methods for transation identifiation are disussed in [CMS99]. Finally, the session file may be filtered to remove small transations and low support referenes (i.e., URL referenes that are not supported by a speified number of user transations). This type of support filtering is important in removing noise from the data, suh as transations orresponding to users who do not traverse the site. Given the preproessing steps outlined above, for the rest of this paper we assume that there is a set of n unique URLs U = {url 1, url 2,, url n }, appearing in the preproessed log, and a set of m user transations T = {t 1, t 2,, t m }, where eah t i T is a non-empty subset of U. 2.2 Usage Clustering Based on Frequent Itemsets Traditional ollaborative filtering tehniques are often based on mathing the urrent user's profile against lusters of similar profiles obtained by the system over time. Similar tehniques have been proposed for obtaining user profiles from Web usage data by lustering user sessions [SZAS97, YJGD96]. However, session lusters by themselves are not an effetive means of apturing an aggregated view of ommon user aess patterns. Eah session luster may potentially ontain thousands of user sessions involving hundreds of URL referenes. Furthermore, the omputation of similarity or distane between user session vetors in the ontext of Web usage mining is not a trivial task, sine feature weights based on the amount of time spent by a partiular user on a page, or the number of referenes to a page within a session, are generally not good behavioral indiators in Web transations. In ontrast to lustering user sessions, we diretly ompute overlapping lusters of URL referenes based on their o-ourrene patterns aross user transations. We all the URL lusters obtained in this way, usage lusters. Our experiments suggest that usage lusters tend to group together related items (based on user aess patterns) aross transations, even if these transations are themselves not deemed to be similar. This allows us to obtain lusters that potentially apture overlapping interests of different types of users. However, traditional lustering tehniques, suh as distane-based methods generally annot handle this type lustering. The reason is that instead of using URLs as features, the transations must be used as features, whose number is in tens to hundreds of thousands in a typial appliation. Furthermore, dimensionality redution in this ontext may not be appropriate, as removing a signifiant number of transations as features will result in losing too muh information. Assoiation Rule Hypergraph Partitioning (ARHP) tehnique [HKKM97, HKKM98] is well-suited for this task, sine it provides automati filtering apabilities, does not require distane omputations, and an be used in high-dimensional data sets without requiring dimensionality redution. The ARHP tehnique has been used suessfully in a variety of domains, suh as ontent-based ategorization of Web douments [HBG+99]. Assoiation rules apture the relationships among items based on their patterns of o-ourrene aross transations. In Web transations, assoiation rules apture relationships among URL referenes based on the navigational patterns of users. The assoiation rule disovery methods, suh as the Apriori algorithm [AS94], initially find groups of items (whih in this ase are the URLs appearing in the preproessed log) ourring frequently together in many transations. Suh groups of items are referred to as frequent item sets. Given a set I = {I 1, I 2,, I k } of frequent itemsets, the support of I i is the fration of transations ontaining I i, and is denoted by σ(i i ). Generally, a support threshold is speified before mining and is used by the algorithm for pruning the searh spae. An assoiation rule r is an expression of the form <X Y, σ r, α r >, where X and Y are sets of items, σ r is the support of X Y, and α r is the onfidene for the rule r given by σ(x Y) / σ(x). The frequent itemsets are used as hyperedges to form a hypergraph H = <V, E>, where V U and E I. A hypergraph is an extension of a graph where eah hyperedge an onnet more than two verties. The weights for hyperedges are omputed based on the onfidene of the assoiation rules involving the items in the frequent itemset. The hypergraph H is then partitioned into a set of lusters C = { 1, 2,, h }. The similarity among items is aptured impliitly by the assoiation rules. Eah luster is examined to filter out verties that are not highly onneted to the rest of the verties of the partition. The onnetivity of vertex v (a URL appearing in the frequent itemset) with respet to a luster is defined as follows: onn( v, ) = { e e, v e} { e e } 3
4 Connetivity measures the perentage of edges with whih a vertex is assoiated. A high onnetivity value suggests that the vertex has many edges, onneting a good proportion of the verties in the partition. The verties with onnetivity measure greater than a given threshold value are onsidered to belong to the luster. Additional filtering of non-relevant items an be ahieved using the support riteria in the assoiation rule disovery omponents of the algorithm. One the URL lusters have been omputed, a partial session for the urrent user an be assigned to a mathing luster. The onnetivity value of an item (URL) defined above is important beause it is used as the weight assoiated with that item for the luster. These weights are used as part of the reommendation proess when lusters are mathed against an ative user session. The details of the mathing and reommendation proess are disussed in the next setion. 3 Automati Customization Based on Usage Clusters The online omponent of the Web personalization system involves the omputation of a reommendation set for the urrent session, onsisting of links to pages that the user may want to visit based on similar usage patterns. The reommendation set essentially represents a "short-term" view of potentially useful links based on the user's navigational ativity through the site. These reommended links are then added to the last page in the session aessed by the user before that page is sent to the browser. We use a fixed-size sliding window over the ative session to apture the urrent user s history depth. A sliding window of size n over the ative session allows only the last n visited pages to influene the omputation of the reommendation set. This makes sense in the ontext of personalization sine most users go bak and forth while navigating a site to find independent piees of information. In many ases these subsessions have a length of no more than 2 or 3 referenes. The notion of a sliding session window is similar to the notion of N-grammars disussed in [Cha96]. We an determine the optimum window size based on the average user transation length identified during the preproessing stage. We also want to weight a URL reommendation higher, if it is farther away form the urrent ative session. To apture this notion, we maintain a direted graph, G, representing the topology of the site. The physial link distane between two URLs u 1 and u 2 is the length of a minimal path from u 1 to u 2 in this site graph. Now, the physial link distane between the ative session s and a URL u s is denoted by dist(u,s,g), whih is defined as the smallest physial link distane between u and any of the URLs in s. The link distane fator of u with respet to s is defined as ldf(u,s) = log(dist(u,s,g))+1. If the URL u is in the ative session, then ldf(u,s) is taken to be 0. We take the log of the link distane so that it does not ount too heavily ompared to item weights within lusters. Eah URL luster an be viewed as virtual user profile representing ommon aess patterns. One a new user starts a session, our goal is to math, at eah step, the partial user session with the usage lusters, and provide dynami reommendations to the user. Reall that the weight of URL u in a luster is the onnetivity value of the item within the luster, denoted by onn(u, ), as defined in the previous setion. We an therefore represent eah luster C, as a vetor G u, u,!, u, where > = 1 2 onn( urli, ), if urli u i = 0, otherwise The urrent ative session s is also represented as a (binary) vetor <s 1, s 2,, s n >, where s i = 1, if the user has aessed URL i in this session, and s i = 0, otherwise. The luster mathing sore is now omputed as follows: uk sk k math( s, ) = s ( u ) 2 k k Note that the mathing sore is normalized for the size of the lusters and the ative session. This orresponds to the intuitive notion that we should see more of the user's ative session before obtaining a better math with a larger luster representing a user profile. Given a luster and an ative session s, a reommendation sore, Re(s,u), is omputed for eah URL u in as follows: n 4
5 Re( s, u) = onn( u, ) math( s, ) ldf 0s, u5. If the URL u is in the urrent ative session, then its reommendation value is zero beause of the link distane fator. Finally, we an ompute the reommendation set, Reommend(s), for urrent ative session s by olleting from eah luster all URLs whose reommendation sore satisfies a minimum reommendation threshold ρ, i.e., Reommend ( s) = { u C, and Re( s, u ) ρ }. For eah URL that is ontributed i i by several lusters, we use its maximal reommendation sore from all of the ontributing lusters. 4 Experimental Results We used the aess logs from the University of Minnesota Computer Siene Web server to evaluate our personalization tehnique. The preproessed log (for February of 1999) was onverted into a session file omprising user transations and a total of 4001 unique URLs (before support filtering). We used the hypergraph partitioning algorithm as modified in [CC99] in order to take frequent itemsets as the input, and performed the lustering of URLs. The frequent itemsets were found using the tree projetion algorithm desribed in [AAP99]. Eah URL serves as a vertex in the hypergraph, and eah edge represents a frequent itemset with the weight of the edge taken as the interest for the set. Sine interest inreases dramatially with the number of items in a rule, the log of the interest is taken in order to prevent the larger rules from ompletely dominating the lustering proess. For the reommendation proess we hose a session window size of 2, sine the average session size was 2.4. The reommendation results are given for the sample path /researh=>/grad-info=>/registration-info. A summary of the results are given in Figure 2; additional experimental results and a demonstration site using the tehniques disussed in this paper an be found at Eah table in Figure 2 orresponds to one step in the user navigation through the path. In eah ase the urrent ative session window is given along with the top reommendations. A ut-off value of 0.30 was used for the reommendation sore. Eah row shows two onseutive reommendations. Note that in many ases the obvious reommendations assoiated with the URLs in the ative session window rank lower than URLs for pages that are farther away in the site graph. This variation is mainly due to the link distane fator disussed earlier. In eah ase the reommendation set is omposed of URLs from a number of mathing lusters. When /researh page is requested, the URLs for a number of popular researh groups are inluded. But, note that pages from graduate information and registrations setions are also inluded, sine many users (mainly graduate students) often have overlapping interests aross these setions. When /grad-info is requested, some of the frequently visited URLs assoiated with that page as well as related lass registration pages rank higher. Finally, when /registration-info is requested, a more foused set of reommendations results, not involving researh related pages. 5 Conlusions The ability to ollet detailed usage data at the level of individual mouse liks, provides Web-based ompanies with a tremendous opportunity for personalizing the Web experiene of lients. In e-ommere parlane this is being termed mass ustomization. Most urrent approahes to personalization by various Webbased ompanies rely heavily on human partiipation to ollet profile information about users. This suffers from the problems of the profile data being subjetive, as well getting out of date as the user preferenes hange over time. In this paper we have presented an arhiteture for automati Web personalization based on Web usage data. We introdued an effetive lustering tehnique using assoiation rule mining to learn overlapping user profiles, and disussed how the extrated knowledge an be used in real-time to provide navigational pointers for users. Our experimental results indiate that the tehniques disussed here are promising, and bear further investigation and development. Our future work in this area involves onduting experiments with various types of transations derived from user sessions, for example, to isolate speifi types of "ontent" pages in the reommendation proess. We also plan on inorporating lient-side agents to provide an additional level of personalization based on user preferenes. 5
6 Session Window: /researh Reommendation Sore Reommendation Sore /newsletter/newfaulty.html 0.73 /newsletter 0.65 /faulty 0.55 /researh/nmrg 0.55 /researh/softeng 0.55 /researh/airvl 0.51 /researh/mmdbms 0.48 /researh/agassiz 0.47 /personal-pages 0.37 /registration-info 0.35 /registration-info/spring99.html 0.32 /grad-info 0.30 /registration-info/sh99-00.html 0.30 /grad-researh 0.30 Session Window: /researh => /grad-info Reommendation Sore Reommendation Sore /faulty 0.59 /personal-pages 0.52 /newsletter/newfa.html 0.52 /newsletter 0.46 /grad-info/grad-handbook.html 0.45 /grad-info/ourse-guide.html 0.45 /grad-info/prospetive-grads.html 0.40 /registration-info 0.39 /researh/nmrg 0.39 /researh/softeng 0.39 /researh/airvl 0.36 /registration-info/spring99.html 0.35 /researh/mmdbms 0.34 /researh/agassiz 0.33 Session Window: /grad-info => /registration-info Reommendation Sore Reommendation Sore /faulty 0.51 /personal-pages 0.45 /grad-info/grad-handbook.html 0.45 /grad-info/ourse-guide.html 0.45 /grad-info/prospetive-grads.html 0.40 /registration-info/spring99.html 0.36 /registration-info/sh99-00.html 0.34 Figure 2. Reommendation Results for a Typial User Navigation Path Referenes [AAP99] [AS94] [BM99] Agarwal, R., Aggarwal, C., and Prasad, V., A tree projetion algorithm for generation of frequent itemsets. In Proeedings of High Performane Data Mining Workshop, Puerto Rio, Agrawal, R. and Srikant, R., Fast algorithms for mining assoiation rules. In Proeedings of the 20 th VLDB onferene, pp , Santiago, Chile, Buhner, A. and Mulvenna, M. D., Disovering internet marketing intelligene through online analytial Web usage mining. SIGMOD Reord, (4) 27, [Cha96] Charniak, E., Statistial language learning. MIT Press, [CC99] [CMS99] [CPY96] [HBG+99] [HKBR99] Clifton, C. and Cooley, R., TopCat: data mining for topi identifiation in a text orpus. In Proeedings of the 3rd European Conferene of Priniples and Pratie of Knowledge Disovery in Databases, Prague, Czeh Republi, Cooley, R., Mobasher, B., and Srivastava, J., Data preparation for mining World Wide Web browsing patterns. Journal of Knowledge and Information Systems, (1) 1, Chen, M. S., Park, J. S., and Yu, P. S., Data mining for path traversal patterns in a Web environment. In Proeedings of 16th International Conferene on Distributed Computing Systems, Han, E-H, Boley, D., Gini, M., Gross, R., Hastings, K., Karypis, G., Kumar, V., and Mobasher, B., More, J., Doument ategorization and query generation on the World Wide Web using WebACE. Journal of Artifiial Intelligene Review, January Herloker, J., Konstan, J., Borhers, A., Riedl, J.. An algorithmi framework for performing ollaborative filtering. To appear in Proeedings of the 1999 Conferene on Researh and Development in Information Retrieval, August
7 [HKKM97] [HKKM98] [NFJK99] [PE98] [SF99] [SKS98] [SM95] [SZAS97] [YJGD96] Han, E-H, Karypis, G., Kumar, V., and Mobasher, B., Clustering based on assoiation rule hypergraphs. In Proedings of SIGMOD 97 Workshop on Researh Issues in Data Mining and Knowledge Disovery (DMKD 97), May Han, E-H, Karypis, G., Kumar, V., and Mobasher, B., Hypergraph based lustering in highdimensional data sets: a summary of results. IEEE Bulletin of the Tehnial Committee on Data Engineering, (21) 1, Marh Nasraoui, O., Frigui, H., Joshi, A., Krishnapuram, R., Mining Web aess logs using relational ompetitive fuzzy lustering. To appear in the Proeedings of the Eight International Fuzzy Systems Assoiation World Congress, August Perkowitz, M. and Etzioni, O., Adaptive Web sites: automatilly synthesizing Web pages. In Proeedings of Fifteenth National Conferene on Artifiial Intelligene, Madison, WI, Spiliopoulou, M. and Faulstih, L. C., WUM: A Web Utilization Miner. In Proeedings of EDBT Workshop WebDB98, Valenia, Spain, LNCS 1590, Springer Verlag, Shehter, S., Krishnan, M., and Smith, M. D., Using path profiles to predit HTTP requests. In Proeedings of 7th International World Wide Web Conferene, Brisbane, Australia, Shardanand, U., Maes, P., Soial information filtering: algorithms for automating "word of mouth." In Proeedings of the ACM CHI Conferene, Shahabi, C., Zarkesh, A. M., Adibi, J., and Shah, V., Knowledge disovery from users Web-page navigation. In Proeedings of Workshop on Researh Issues in Data Engineering, Birmingham, England, Yan, T., Jaobsen, M., Garia-Molina, H., Dayal, U., From user aess patterns to dynami hypertext linking. In Proeedings of the 5 th International WWW Conferene, Paris,
Automatic Personalization Based on Web Usage Mining
Automatic Personalization Based on Web Usage Mining Bamshad Mobasher Dept. of Computer Science, DePaul University, Chicago, IL mobasher@cs.depaul.edu Robert Cooley, Jaideep Srivastava Dept. of Computer
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationCA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0
Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationSemi-Supervised Affinity Propagation with Instance-Level Constraints
Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationAutomated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.
EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt
More informationOvidSP Quick Reference Card
OvidSP Quik Referene Card Searh in any of several dynami modes, ombine results, apply limits, use improved researh tools, develop strategies, save searhes, set automati alerts and RSS feeds, share results...
More informationCOST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY
COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationDiscovery and Evaluation of Aggregate Usage Profiles for Web Personalization
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization Bamshad Mobasher 1, Honghua Dai, Tao Luo, Miki Nakagawa School of Computer Science, Telecommunications, and Information Systems
More informationSemantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information Management
Semanti Conept Detetion Using Weighted Disretization Multiple Correspondene Analysis for Disaster Information Management Samira Pouyanfar and Shu-Ching Chen Shool of Computing and Information Sienes Florida
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationSEGMENTATION OF IMAGERY USING NETWORK SNAKES
SEGMENTATION OF IMAGERY USING NETWORK SNAKES Matthias Butenuth Institute of Photogrammetry and GeoInformation, Leibniz Universität Hannover Nienburger Str. 1, 30167 Hannover, Germany butenuth@ipi.uni-hannover.de
More informationCisco Collaborative Knowledge
Ciso Collaborative Knowledge Ciso on Ciso: How Ciso Servies Upskilled 14,400 Employees and Transformed into a Consultative, Solutions-Selling Organization. It is estimated that by 2020, roughly four out
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationTrajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller
Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationAn Interactive-Voting Based Map Matching Algorithm
Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu
More informationAn Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks
JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationCA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5
Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationCA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1
Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationMining effective design solutions based on a model-driven approach
ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationCA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5
Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationCA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0
Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationA Survey in Web Page Clustering Techniques
A Survey in Web Page Clustering Techniques Antonio LaTorre, José M. Peña, Víctor Robles, María S. Pérez Department of Computer Architecture and Technology, Technical University of Madrid, Madrid, Spain,
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationCA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1
Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationA Subtractive Relational Fuzzy C-Medoids Clustering Approach To Cluster Web User Sessions from Web Server Logs
International Journal of Applied Engineering Researh ISSN 0973-456 Volume 1, Number 7 (017) pp. 114-1150 A Subtrative Relational Fuzzy C-Medoids Clustering Approah To Cluster Web User Sessions from Web
More informationCA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1
Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationRotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors
Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,
More informationPerformance Benchmarks for an Interactive Video-on-Demand System
Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationDynamic Backlight Adaptation for Low Power Handheld Devices 1
Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &
More informationSparse Certificates for 2-Connectivity in Directed Graphs
Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale
More informationA Fast Kernel-based Multilevel Algorithm for Graph Clustering
A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationVisualization of patent analysis for emerging technology
Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationRecommendation Subgraphs for Web Discovery
Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu
More informationSpace- and Time-Efficient BDD Construction via Working Set Control
Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationFuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis
Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationSVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections
SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationModel Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology
The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationMethods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems
Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,
More informationIMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION
Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial
More informationSelf-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization
Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in
More informationCA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0
Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationCA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1
Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationCluster Centric Fuzzy Modeling
10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we
More informationA radiometric analysis of projected sinusoidal illumination for opaque surfaces
University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationTUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM
TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information
More informationCA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2
CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For
More informationPROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS
Proeedings of ASE Turbo Expo 2 Power for Land, Sea, and Air June 16 19, 2, Atlanta, Georgia, USA GT2-871 PROBABILISTIC SURFACE DAAGE TOLERANCE ASSESSENT OF AIRCRAFT TURBINE ROTORS ihael P. Enright R. Craig
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationMemorandum. The report also includes appendices that include the information used to create the usability test and the artifacts generated from it.
Memorandum Date: April 28, 2013 To: : From: Subjet: Stephanie Coleman, Southern Polytehni State University Dr. Carol Barnum, Southern Polytehni State University 900ers Projet Team: Ann Beebe, Niole MLaughlin,
More informationA Descriptive Framework for the Multidimensional Medical Data Mining and Representation
Journal of Computer Siene 7 (4): 519-55, 011 ISSN 1549-3636 011 Siene Publiations A Desriptive Framework for the Multidimensional Medial Data Mining and Representation Veeramalai Sankaradass and Kannan
More informationOne Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?
One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,
More informationMulti-Channel Wireless Networks: Capacity and Protocols
Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:
More information