Web Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model

Size: px
Start display at page:

Download "Web Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model"

Transcription

1 Global Journal of Computer Science and Technology Volume 2 Iue 9 Verion.0 April 202 Type: Double Blind Peer Reviewed International Reearch Journal Publiher: Global Journal Inc. (USA) Online ISSN: & Print ISSN: Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model By K. Suneetha & Dr.M.Uha Rani Sree Vidyanekethan Engineering College/JNTU Abtract - Web page recommendation aim to predict the uer navigation through the help of web uage mining technique. Currently, reearcher focu their attention to develop a web page recommendation algorithm uing the well known pattern mining technique. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. To mine the weighted equential pattern, we have modified the prefixpan algorithm incorporating the weightage contraint uch a, pending time and recent viiting. Then, the weighted equential pattern are utilized to contruct the recommendation model uing the Patricia trie-baed tree tructure. Finally, the recommendation of the current uer i done with the help of markov model that i the probability theory enabling the reaoning and computation a intractable. For experimentation, the ynthetic dataet i utilized to analyze the performance of W-Prefixpan algorithm a well a web page recommendation algorithm. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm. Keyword : Web page recommendation, Weighted equential pattern, Prefixpan, Patricia-trie, Markov model. GJCST Claification: I.5.m Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Strictly a per the compliance and regulation of: 202. K. Suneetha & Dr.M.Uha Rani. Thi i a reearch/review paper, ditributed under the term of the Creative Common Attribution-Noncommercial 3.0 Unported Licene permitting all non-commercial ue, ditribution, and reproduction inany medium, provided the original work i properly cited.

2 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model K. Suneetha α & Dr.M.Uha Rani σ Abtract - Web page recommendation aim to predict the uer navigation through the help of web uage mining technique. Currently, reearcher focu their attention to develop a web page recommendation algorithm uing the well known pattern mining technique. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. To mine the weighted equential pattern, we have modified the prefixpan algorithm incorporating the weightage contraint uch a, pending time and recent viiting. Then, the weighted equential pattern are utilized to contruct the recommendation model uing the Patricia trie-baed tree tructure. Finally, the recommendation of the current uer i done with the help of markov model that i the probability theory enabling the reaoning and computation a intractable. For experimentation, the ynthetic dataet i utilized to analyze the performance of W-Prefixpan algorithm a well a web page recommendation algorithm. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm. Keyword : Web page recommendation, Weighted equential pattern, Prefixpan, Patricia-trie, Markov model. I. Introduction S equential pattern mining, an advance of aociation rule mining, i an imperative ubject of data mining, often applied for extracting the ueful information [9]. Sequential pattern mining algorithm deal with the problem of determining the frequent equence in a given databae [6]. Sequential pattern i a equence of itemet that often occur in a pecific order and thu, all item in the ame itemet are expected to encompa the ame tranaction time value or within a time gap. Each equence have a temporally ordered lit of event, wherein each event i a compilation of item (itemet) occurring imultaneouly. The temporal ordering among the event i induced by the abolute timetamp aociated with the event [0]. Generally, all the tranaction of a cutomer are collectively viewed a a equence, called cutomer - equence, where each Author α : Sr. Lecturer Dept. of MCA, SVEC, Tirupati Andhrapradeh, INDIA umauni.k@gmail.com Author σ : Aoc.Profeor & HEAD, Dept. of Computer Science, SPMVV, Tirupati, Andhrapradeh, INDIA muha_rohan@yahoo.com tranaction i repreented a an itemet in that equence and all the tranaction are cheduled in a particular order baed on the tranaction-time [8]. Recently, there ha been a ubtantial interet in uing equential mining approache to contruct web page recommendation ytem. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. The overall proce of page recommendation baed on Web uage mining conit of three phae: data preparation, mining of weighted equential pattern and recommendation. Data preparation: Thi tep conit of, (i) identifying the different uer eion from the uually very poor information available in web log file and (ii) recontructing the uer navigation path within the identified eion. Mining of weighted equential pattern: The traditional equential pattern mining problem i extended by allowing a weight to be aociated with each page in a uer eion to reflect interet of each page within the uer eion. In turn, thi provide with an opportunity to aociate a weight parameter with each page in a reulting equential pattern, which called a weighted equential pattern (WSP). Recommendation: After mining the weighted equential pattern, the patricia-baed tree i contructed. From the Patricia tree, a recommendation model i developed baed on markov model for prediction of uer to find web page they want to viit. II. Related work Literature preent a lot of web page recommendation algorithm baed on web ued mining, collaborative filtering, and rule-baed filtering. Here, we portray ome recent work preented in the literature for web page recommendation. Forati, R et al [3] have developed an effective and calable approach to deal with the web page recommendation problem. Here, a ditributed learning machine ha been employed to learn the performance of previou uer and to cluter the page baed on learned pattern. Dealing with unviited or recently added page wa one of the difficult and challenging tak in recommendation ytem. A they would never be April 202 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)

3 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I recommended, it i indipenable to provide a chance for thee eldom viited or recently added page to be incorporated in the recommendation et. By conidering thi problem, a Weighted Aociation Rule mining algorithm ha been preented for the recommendation purpoe. Alo, a HITS algorithm ha been exploited to extend the recommendation et. Furthermore, they have analyzed the propoed algorithm under variou etting, and revealed the efficiency of thi approach in enhancing the overall quality of web recommendation. Yicen Liu et al [5] have introduced an automatic tag recommendation algorithm that ha been employed in the large-cale and real-time data proce uccefully and efficiently. Mot of the prior reearche on tag uggetion have focued on initially, dicovering the relationhip between teting and training data and then, aigning the top ranked tag of the mot related training data to the teting object. But, they not paid any attention in determining the internal relationhip between the tag and weblog. In their current reearch, more than 43% of tag, which have been labeled by weblog uer, have really been employed in the body of the text. In the meantime, the term frequency ditribution, the paragraph frequency ditribution, and the firt occurrence poition of tag were diimilar from the one of non-tag in the text. A well, the tag of a weblog have been aigned in two tep. Initially, ome probability ditribution of the word attribute have been trained through the labeled training weblog, and ome keyword of a teting weblog have been extracted a one part of the tag baed on the probability ditribution. Subequently, with the aid of Latent Semantic Indexing (LSI) model, the other part of the tag have been obtained from the firt part one. Experiment conducted on an extenive tagging dataet of weblog 2 have confirmed that the average tagging time for a new weblog wa le than 0.02 ec, and more than 74% of teting weblog have been properly labeled by mean of the top 5 tag. An approach for recommendation of unviited page ha been preented by Forati, R et al []. They have focued on the recommender ytem baed on the uer navigational pattern and provided proper recommendation to cater to the current need of the uer. The group of uer with analogou browing pattern ha been identified by employing an offline data preproceing and clutering technique. The experiment conducted on real uage data from a commercial web ite have demontrated a coniderable enhancement in the recommendation efficiency of the propoed ytem. Web Peronalization i viewed a an application of data mining and machine learning approache to create model of uer behavior that can be applied to the tak of forecating the uer need and adapting future interaction with the eventual goal of enhanced uer atifaction. An extenive overview of intelligent method for Web Peronalization ha been preented by Sarabjot Singh Anand and Bamhad Mobaher [2]. They have tudied the tate-of-the-art in Web peronalization. Initially, a depiction of the peronalization proce and a claification of the current technique to Web peronalization have been preented. Alo, they have dicued the different ource of data available to peronalization ytem, the modeling technique utilized, and the current technique to analyze thee ytem. Numerou challenge faced by the reearcher in developing thee ytem and alo the olution to thee challenge propoed in literature have been decribed. They have concluded with a dicuion on the open challenge that mut be addreed by the reearch community if thi technology i to create a poitive impact on uer atifaction with the Web. Due to the increaing number of Web ite uch a e-buinee contain a huge number of page, uer find it very hard to wiftly reach their own target page. Thu, Hirohi Ihikawa et al [5] have propoed two approache to Web uage mining a a key olution to thee problem. Firt of all, an efficient recommendation ytem called the L-R ytem ha been depicted, which create uer model through claifying the Web acce log and by mining acce pattern baed on the tranition probability of page accee, and then, recommend the ignificant page to the uer baed on both the uer model and the Web content. The prototype ytem ha been analyzed and obtained the poitive effect. Secondly, another approach ha been employed for creating uer model that cluter the Web acce log baed on the acce pattern. Moreover, the uer model ait to find the unexpected acce path correponding to ill-formed Web ite deign. In addition, Daniel Mican and Nicolae Tomai [2] have propoed WRS, architecture for robut web application. Within the tructure, uage data wa being implicitly obtained by data collection ub-module. Here, the uage data ha been extracted, online and in real time, via a proactive technique. They have efficiently exploited aociation rule mining among both frequent and infrequent item for ucceful pattern dicovery. Thi wa due to the fact that the pattern dicovery module tranactionally procee uer' eion and employ incremental torage of rule. Alo, they have proved that the Wie Recommender Sytem (WRS) ha been traightforwardly implemented within any web application, becaue of the efficient integration of the three phae into an online tranactional proce. 202 Global Journal Inc. (US)

4 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model III. Propoed algorithm to web page recommendation baed on weighted equential acce pattern Web page recommendation i ignificant reearch over the pat decade due to it real world application. With the intention of real world applicability, we have developed an approach for web page recommendation uing weighted equential pattern and markov model. Here, the traditional equential pattern mining algorithm i modified ignificantly by incorporating the ignificant meaure to mine more ueful pattern. Then, the markov model decribed in [4] i ued to recommend the web page. The block diagram of the propoed approach for web page recommendation i given in Figure. The important tep for generating recommendation to the uer i a follow, Data Preproceing W-PrefixSpan for mining of weighted equential web acce pattern Building Pattern tree model Generation of recommendation uing markov model Block diagram Uer Web page recommendation Matching Markov model Hitoric Data Data Preproceing W_ Prefix pan for Weighted equential Fig. : Block diagram of the propoed approach to web page recommendation a) Data Preproceing Thi ection decribe the preproceing tep of web log file that i the input of the propoed web page recommendation approach. In general, the web log file conit of, IP addre, acce time, HTTP requet method ued, URL of the referring page and brower name (for an example, Web erver log file: [23/Feb/202:08:7:25] GET / HTTP/. IE/7.0 Window 07 ). The initial proce of the propoed web page recommendation approach i to preproce the R Tree Contruction web log file uch a way that the mining proce hould be applied. Here, we make ue of the equential pattern mining proce o there i a need to convert the web log file into the equential databae that hould be in the proper format to mine the weighted equential pattern. Uer Identification: Uer identification i an important tep for contructing the equential databae. IP addre and uer eion are utilized here to track a unique uer from the web log file. Unique IP addre i a new uer but at the ame time, the uer eion hould be fixed for particular time period. If the uer eion i reached to a particular duration for the ame IP addre, then the new eion i acted like new uer. Baed on thi, uer tranaction i formed from the web log file. Weighted Sequential databae generation: Once the uer tranaction are identified, the weighted equential databae i generated including the equence of web page viited by the uer, time pent by the uer on correponding web page and it recent information. Let aume the web log databae D having IP addre, acce time, HTTP requet method ued, URL of the referring page and brower name. After applying the data preproceing tep, we generate the weighted equential databae that i repreented a follow, W in which, i belong to the et of uer and j ignifie the et of page viited by the correponding uer. Here, every element of w contain three tuple w = ( p,, r ) in which the firt tuple belong to the web page, the econd one belong to the time pent within that page and the third one belong to whether it recent one or not. For example, w (, = p 20, 0) i a tuple, which denote that the uer pent 20 econd on page p and 0 ignifie that the page p i not recently acceed by the uer. b) W-Prefixpan for Mining of Weighted Sequential Web Acce Pattern Once the weighted equential databae i contructed, the mining procedure i carried out to find the intereting equential pattern. Here, PrefixSpan [7] i modified a W-PrefixSpan (Weighted-PrefixSpan) by incorporating the pending time and recent view into the mining procedure. The weightage meaure aumed in the propoed W-PrefixSpan algorithm i pending time and recent view. The two apect taken for providing the weightage of the equential pattern are, Spending time: One of the field in the web log data i the duration of the web page which i viewed by the uer. Generally, time pent by the uer within a particular page i neceary to identify the importance of web page. From the web page which having long duration, we can conclude that thi particular web page ha been referred by the uer in a long occaion 202 April 3 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)

5 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I becaue of it worth. Thu, the pending time i an important meaure for the reearcher who are attempting to identify the interet of the uer. So, if we incorporate the time duration into the mining of equential pattern, the intereting relationhip can be found out from the mined equential pattern that can be effectively applied to web page recommendation proce. Recent view: Another ignificant meaure taken for equential pattern mining i recent view that decribe whether the page i acceed recently or not. The reaon behind taking the recent view for mining the equential pattern i that the more importance hould be given for the web page which are acceed recently than the older one. The behavior of the uer urely vary depend on the time o the recent behavior of the uer i ignificant for finding the equence analyi. With the intention of behavior variation over time, the recent view i alo incorporated into the equential pattern mining algorithm to achieve a ubet of more intereting equential pattern (SR-Pattern). W-PrefixSpan algorithm: In thi ection, we decribe an efficient algorithm, W-PrefixSpan, for mining all the SR- pattern from weighted equence databae. The W-PrefixSpan algorithm i developed by modifying the eminent PrefixSpan algorithm, which ue the pattern growth methodology for mining the frequent equential pattern recurively. Let W = p,, r ), ( p,, r ), ( p,, r ) be ( n n n a data equence of weighted databaew, where p i web page, i a pending time and r ignifie the recent view. A equence W = ( p,, r), ( p2, 2, r2 ), ( p m, m, r m ) i aid to be a ub equence of W only if, () W i a ubequence of W, W W (2) t < t < < t 2 m where, t i the time at which p occurred in W, r m. A equence i aid to be SR equence W if and only if, () W i a ubequence of W, (2) the W-upport hould be atified. At firt, the weighted equential databae W i given to the propoed W-PrefixSpan algorithm that dicover the -length weighted equential pattern from the weighted equential databae by canning the databae once. The -SR pattern (pending time with recent view) which atify the predefined upport threhold are mined from the equential databae by imply canning the databae. The W-upport for the - length pattern i computed a follow, W _ up( p) N N p T I = i= N p T i= ( i) * R( i) R( i) Where, N Number of uer tranaction in the weighted equential databae NT Number of tranaction that contain the web page p, R(i) recent information N = T i I ( i) MT i= i i= Where, M T Total number of web page in one tranaction, i pending time Then, the projection databae i formed by projecting the collection of potfixe of mined -SR equence. In projection databae, ' n ' dijoint ubet are generated if the mined -SR pattern contain ' n ' number of equence. Then, the 2-length SR-pattern are mined from the projected databae by computing the weighted upport on the projected databae. Again, the projected databae i formed with the help of mined 2-SR pattern and thi proce i repeated recurively until all SR equential pattern are mined. The following provide a detailed explanation of the important tep involved in the propoed W-PrefixSpan algorithm. Input : A weighted equence databaew, and the minimum upport threhold min_w _ up. Output : The complete et of weighted-equential pattern β. Method : Call W-PrefixSpan (, 0, W ). Subroutine : W-PrefixSpan ( α,l, W α ) Parameter:α : SR-equential pattern; l : the length of α ; W α : the α -projected databae, if α ; otherwie, the weighted equence databae W. Method:. Scan W α once, find the et of SR- pattern uch that a) ' ' can be aembled to the lat element of α to form a SR-equential pattern; or b) can be appended to α to form a SRequential pattern. 2. For each SR- web page, append it to α to form a SR-equential pattern α '. 5. For each α ', contruct α' -projected databaew α, and call PrefixSpan ( α', l +, W ). α 202 Global Journal Inc. (US)

6 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model c) Building of Pattern Tree Model Once we mine the weighted equential pattern, the pattern tree i contructed uing the procedure defined in [4, 3]. Initially, trie-baed data tructure given in [] i ued to contruct the pattern tree for web page recommendation. Later, the modification wa done by [4, 3], who utilized the patricia-baed data tructure for web page recommendation due to the advantage of particia tructure over the trie tructure. Here, the procedure defined in [4, 3] i applied to the propoed approach for contructing tree tructure. The method for contructing the pattern tree in the propoed web page recommendation approach i a follow: ) Generate an empty root node, 2) Add the mot ub pattern in the SR-equential pattern et into a node next to the root node, 3) Inert the potfixe of pattern into child node only if the current pattern to be inerted i a uper pattern of inerted pattern, 4) Otherwie, current pattern i inerted into the node next to the root node, and 5) Step 3 and tep 4 i repeated for every pattern in the mined SR-pattern et. d) Generation of Recommendation Uing Markov Model Thi ection decribe the markov model utilized for web page recommendation. Here, we make ue of the markov model decribed in [4] that i ued in the identication of the next page to be acceed by the Web ite uer baed on the equence of previouly acceed page. Here, whenever a new uer come to get the recommendation, the equence path of the new uer i matched with the patricia-trie tructure. Then, the ubequent web page whether it may be from ame node or from it child node i retrieved. Now, the equence path of the new uer i ued to find the accurate recommendation uing the probability definition ued in the previou work [4]. Let the input equence viited by the uer be,, 2, n. At firt, the equence,,, 2, n i matched with the patricia-trie tructure that can provide the matched reult like,, 2, n, n +, k,, 2, n, n +, l and, 2, n, n +, m. Every equence ha the weighted upport value that i given in the node of contructed tree. Then, the probability of computation i carried out to find the mot important equence for the uer. The following equation provide the probability of etimated value for the matched reult. () n+ n (2) n+ n (3) n+ { n+ 2 n n+ m 2 n = { P( n+ = (, 2, n, n+, k ), 2, )} = { P( n+ = (, 2, n, n+, l ), 2, )} = P( = (,,,, ),, )} Thi probability, pro( n+ ), i etimated by uing all equence of all uer in tree tructure contructed from the weighted equential databae W. i j P( n = (, 2, n, n+, W _ up(, 2, n) W _ up(,,,, ) 2 n+ ),, + m 2 n = n Then, the final recommendation i baed on the following equation: () (2) (3) arg max{,, } IV. n+ = n+ n+ n+ m Reult and dicuion Thi ection preent the reult obtained from the experimentation and it detailed dicuion about the reult. The propoed approach of web page recommendation i experimented with the ynthetic dataet and the reult i evaluated with the preciion, applicability and hit ratio. a) Experimental Set Up and Dataet Decription The propoed web page recommendation approach i implemented in Java (jdk.6). Here, the ynthetic dataet i generated a like the ame format of real dataet and the performance of the propoed approach i evaluated with the evaluation metric. The generated ynthetic dataet i divided into two part uch a, Training dataet (It i ued for building the pattern tree model and tet dataet (It i ued for teting the web recommendation approach). b) Performance of the W-Prefixpan Algorithm Here, the performance of the W-prefixSpan algorithm i analyzed with the execution time, memory uage and pattern mined. At firt, the training data i given to the prefixspan and W-prefixSpan algorithm to mine the equential pattern and then, the mining performance of the algorithm are analyzed. The value obtained from the experimentation are plotted a graph, hown in figure 2, 3 and figure 4. Fig. 2 : Computation time ) April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)

7 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Reference référence referencia April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I Fig.3: Memory uage Fig.4 : Number of pattern mined The figure 2 how that the execution time of the W-prefixSpan algorithm i.5 Sec that i le compared with the time taken of the PrefixSpan algorithm. In memory uage, the W-prefixSpan algorithm needed only le than 50% memory compared with Prefixpan algorithm. Figure 4 how that number of pattern mined uing W-Prefixpan i high compared to Prefixpan algorithm. V. Concluion We have propoed a web page recommendation algorithm uing weighted equential pattern and markov model. Here, we have preented W-PrefixSpan algorithm that i developed by incorporating the weightage contraint uch a, pending time and recent viiting with the prefixpan algorithm. The mined weighted equential pattern are then utilized to contruct the recommendation model uing the patricia trie-baed tree tructure. At lat, markov model-baed recommendation i carried out for the current uer by matching the viiting path with the tree and markov model. The experimentation i done with the help of ynthetic dataet and the performance of W-Prefixpan algorithm a well a web page recommendation algorithm i analyzed. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm.. Baoyao Zhou, Siu Cheung Hui, Kuiyu Chang, "An Intelligent Recommender Sytem uing Sequential Web Acce Pattern", in proceeding of IEEE Conference on Cybernetic and Intelligent Sytem, Daniel Mican, Nicolae Tomai, "Aociation-Rule- Baed Recommender Sytem for Peronalization in Adaptive Web-Baed Application", Proceeding ICWE'0 Proceeding of the 0th international conference on Current trend in web engineering, pp.85-90, Forati, R., Meybodi, M.R., Rahbar, A. "An efficient algorithm for web recommendation ytem", IEEE/ACS International Conference on Computer Sytem and Application, pp , Faten Khalil, Jiuyong Li, Hua Wang, "Integrating Recommendation Model for Improved Web Page Prediction Accuracy", in Proceeding of the thirtyfirt Autralaian conference on Computer cience, Vol. 74, Hirohi Ihikawa, Manabu Ohta, Shohei Yokoyama, Junya Nakayama, Kaoru Katayama, "On the Effectivene of Web Uage Mining for Page Recommendation and Retructuring, Proceeding Revied Paper from the NODe 2002 Web and Databae-Related Workhop on Web, Web- Service, and Databae Sytem, pp , Jatin D Parmar and Sanjay Garg, "Modified Web Acce Pattern (mwap) Approach for Sequential Pattern Mining", Journal of computer Science, Vol. 6, No.2, pp.46-54, June Jian Pei, Jiawei Han, Mortazavi-Al B., Pinto H., Qiming Chen, Dayal U., Mei-Chun Hu, "PrefixSpan,: mining equential pattern efficiently by prefix-projected pattern growth", in Proceeding of 7th International Conference on Data Engineering, Qiankun Zhao and Sourav S. Bhowmick, "Sequential Pattern Mining: A Survey", Technical Report, CAIS, Nanyang Technological Univerity, Singapore, No.8, Sizu Hou, Xianfei Zhang, "Alarm Aociation Rule Baed on Sequential Pattern Mining Algorithm", In proceeding of the Fifth International Conference on Fuzzy Sytem and Knowledge Dicovery, vol. 2, pp , Shandong, Salvatore Orlando, Raffaele Perego and Claudio Silvetri, "A new algorithm for gap contrained equence mining", In Proceeding of the ACM Sympoium on Applied Computing, pp , Nicoia, Cypru, C.P. Sumathi,R. Padmaja Valli,T. Santhanam, "Automatic Recommendation of Web Page in Web 202 Global Journal Inc. (US)

8 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Uage Mining", (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 09,pp , Sarabjot Singh Anand, Bamhad Mobaher, "Intelligent Technique for Web Peronalization", ITWP 2003, LNAI 369, pp. -36, Springer-Verlag Berlin Heidelberg, Utpala Niranjan, R. B. V. Subramanyam and V. Khanaa, "Developing a Web Recommendation Sytem Baed on Cloed Sequential Pattern", Communication in Computer and Information Science, Vol. 0, no., pp. 7-79, Utpala Niranjan, R.B.V. Subramanyam, V.Khana, "An Efficient Sytem Baed On Cloed Sequential Pattern for Web Recommendation", IJCSI International Journal of Computer Science Iue, Vol. 7, Iue 3, No 4, May Yicen Liu, Mingrong Liu, Xing Chen, Liang Xiang, Qing Yang "Automatic Tag Recommendation for Weblog", International Conference on Information Technology and Computer Science, pp , April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)

9 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April 8 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Thi page i intentionally left blank 202 Global Journal Inc. (US)

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

A Basic Prototype for Enterprise Level Project Management

A Basic Prototype for Enterprise Level Project Management A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Combining Web Usage Mining and Fuzzy Inference for Website Personalization

Combining Web Usage Mining and Fuzzy Inference for Website Personalization Combining Web Uage Mining and Fuzzy Inference for Webite Peronalization Olfa Naraoui and Chritopher Petene Dept. of Electrical and Computer Engineering 206 Engineering Science Bldg. The Univerity of Memphi

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

Reporting Checklist for Nature Neuroscience

Reporting Checklist for Nature Neuroscience Correponding Author: Manucript Number: Manucript Type: Jeremy Elman NNBC48172A Brief Communication Reporting Checklit for Nature Neurocience # Figure: 2 # Figure: 5 # Table: 6 # Video: 0 Thi checklit i

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Performance Evaluation of search engines via user efforts measures

Performance Evaluation of search engines via user efforts measures IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Design of a Stewart Platform for General Machining Using Magnetic Bearings

Design of a Stewart Platform for General Machining Using Magnetic Bearings eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images 2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION

AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION A. Raouzaiou, S. Ioannou, K. Karpouzi, N. Tapatouli, S. Kollia 1, R. Cowie 2 1 Department of Electrical and Computer Engineering National Technical

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION

A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION ABSTRACT Najva Izadpanah Department of Computer Engineering, Ilamic Azad Univerity, Qazvin Branch, Qazvin, Iran In mot practical

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Architecture and grid application of cluster computing system

Architecture and grid application of cluster computing system Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,

More information

ESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010

ESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010 ESRP Stor Program EMC Celerra NX4 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion. Teted Date: 6/25/21 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-91

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

Parallel MATLAB at FSU: Task Computing

Parallel MATLAB at FSU: Task Computing Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Temporal Abstract Interpretation. To have a continuum of program analysis techniques ranging from model-checking to static analysis.

Temporal Abstract Interpretation. To have a continuum of program analysis techniques ranging from model-checking to static analysis. Temporal Abtract Interpretation Patrick COUSOT DI, École normale upérieure 45 rue d Ulm 75230 Pari cedex 05, France mailto:patrick.couot@en.fr http://www.di.en.fr/ couot and Radhia COUSOT LIX École polytechnique

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar

More information

Digifort Standard. Architecture

Digifort Standard. Architecture Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

ESRP Storage Program EMC Celerra NS-120 (1,500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010

ESRP Storage Program EMC Celerra NS-120 (1,500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010 ESRP Stora Program EMC Celerra NS-12 (1, Uer) Mailbox Reilien Stora Solution for Microoft Exchan 21 Teted with: ESRP Stora Verion 3. Teted Date: 3/2/21 EMC Corporation Corporate Headquarter Hopkinton,

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information