Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Size: px
Start display at page:

Download "Intrusion Detection using Fuzzy Clustering and Artificial Neural Network"

Transcription

1 Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia Abstract This paper presets the outlie of a hybrid Artificial Neural Network (ANN) based o fuzzy clusterig ad eural etworks for a Itrusio Detectio System (IDS). While eural etworks are effective i capturig the o-liearity i data provided, it also has certai limitatios icludig the requiremet of high computatioal resources. By clusterig the data, each ANN is traied o a particular subset of data, reducig time required ad achievig a higher detectio rate. The outlie of the implemeted algorithm is as follows: first the data is divided ito smaller homogeeous groups/ subsets usig a fuzzy clusterig techique. Subsequetly, a separate ANN is traied o each subset. Fially, Results of each ANN from step 2 is aggregated to form the fial output which will decide the classificatio of the data poit. Keywords: Artificial Neural Network, Itrusio Detectio System, Fuzzy clusterig Itroductio Itrusio detectio is a importat aspect i today s world where security is of utmost importace. A sigle itrusio i a etwork ca cause iformatio leaks or data modificatio which ca prove to be hazardous to ay compay or orgaizatio. A itrusio detectio system attempts to detect misuse or uauthorised access of a system or a etwork. A IDS does ot usually perform ay actio to prevet itrusios; its mai fuctio is to alert the system admiistrators that there is a possible security violatio; as such it is a proactive tool rather tha a reactive tool []. Itrusio detectio systems (IDS) ca be classified as: () Host based or Network based (2) Olie or Offlie (3) Misuse based or Aomaly based. A host based IDS makes use of log files from idividual computers, whereas a etwork based IDS captures packets from the etwork ad aalyses its cotets. A olie IDS is able to flag a itrusio while it s happeig whereas a offlie IDS aalyses records after the evet has occurred ad raises a flag idicatig that a security breach had occurred sice the last itrusio detectio check was performed. A Aomaly based IDS detects deviatio from ormal behaviour while misuse based IDS compare activities o the system with kow behaviours of attackers. This paper outlies a hybrid approach usig Artificial Neural Networks ad Fuzzy clusterig to detect itrusios i a etwork. The method outlied is etwork based which extracts features from packets i the etwork. The algorithm classifies the packet as ormal or the type of attack depedig upo the cotets of the packet. Attacks fall ito four mai categories: Deial of Service (DoS); User to Root (U2R); Remote to Local (R2L) ad Probe. The KDD repository was used to trai the algorithm. Neural etworks which are a class of machie learig algorithms used to classify data ca be used where the problem is too complex to be programmed by had. Istead, the eural etwork is traied to give more importace to the features that are the mai characteristics of a particular class i order to help the etwork classify the icomig data. Neural etworks have bee successfully implemeted [2] [3] [4] to detect itrusios. Neural etworks, however, require substatial amout of data to trai o, before they ca successfully classify icomig data. Due to this limitatio, the eural etwork is ot able to trai well o low frequecy attacks such as R2L ad U2R resultig i their lower detectio accuracy ISBN:

2 [5]. Differet hybrid approaches have bee explored i the past to overcome the drawbacks of ay oe idividual method [6] [7] [8]. The two approaches used i this paper viz. ANN ad Fuzzy clusterig are used so that they complemet each other. Neural Networks are good at beig able to classify usee data poits whereas fuzzy clusterig eables the algorithm to geeralize well. 2 Research Backgroud Various approaches usig ANN have bee used for IDS. The Neural Network Itrusio Detector (NNID) system proposed by Rya et al. [9] took ito accout the behaviour of idividual users ad created profiles for each user. The iput patter was the matched to the user profiles to idetify the user (A ode correspodig to a user with value >.5 is attributed to that user). A flag was raised if o match was foud ad the iput was cosidered as a aomaly. However, this required large amout of data to trai the etwork for each user. Isufficiet data for a user might lead to false positives for that user s behaviour o the etwork [9]. The NNID system had a aomaly detectio rate of 96% ad a false alarm rate of 7%. The Multi-layered Perceptro (MLP) by Caady [] usig backpropagatio algorithm modelled geeral use rather tha creatig user specific profiles. Traiig of the eural etwork required 26.3 hours to complete with approximately 98% match i the traiig dataset ad 97.5% match i the test dataset. I cotrast to the above two approaches that used backpropagatio algorithm, Silva, et al. [] used a Hammig Net to classify etwork evet i real time. The Hammig Net is a fast patter matcher that fids the most similar class, accordig to a pre-defied similarity threshold, providig great flexibility ad fault tolerace by fidig small attack variatios. O a average 7% of wellkow malicious iput data withi the payload file ecoutered its commo pair i the exemplar file ad is classified as suspicious iformatio. Lei ad Ghorbai [2] compared the performace of Self-Orgaizig Map (SOM) ad Improved Competitive Learig Networks (ICLN). While the accuracy obtaied for both SOM ad ICLN were similar, the computatio time for SOM was geerally higher tha that of ICLN (specifically, ICLN requires oe fourth the computatioal time of the SOM). The clusterig result is also idepedet of the umber of iitial euros which is ot the case i SOM. The results of the simulated aealig approach i Gao ad Tia s [3] paper show that the mea squared errors of traiig samples of improved simulated aealig eural etwork is smaller tha that of a backpropagatio etwork. Moreover the mea squared errors of testig samples of improved simulated aealig eural etwork is also smaller tha that of a backpropagatio etwork. Whe the umber of the traiig samples chage, we ca get the same result. It shows that the etwork itrusio detectio method based o improved simulated aealig eural etwork has higher stability, ad ca obtai higher detectio ad recogitio accuracy. The Probabilistic Neural Network (PNN) implemeted by Devaraju ad Ramakrisha [4] performs better tha Feed Forward Neural Network (FFNN) ad Radial Basis Neural Network (RBNN). However, PNN (accuracy = 8.38%) performs oly.2% better tha FFNN (accuracy = 8.4%) which is ot a sigificat differece. The accuracy of RBNN is 75.4%. These results are comparatively lower as compared to other algorithms implemeted i the other papers discussed above. The hybrid approach preseted i Wag et al. [5] usig fuzzy logic ad artificiaann eural etwork have obtaied a average accuracy of 96.7% which ca be cosidered as very successful. The fuzzy logic provides some flexibility to the ucertai ature of detectig itrusios [6]. The hybrid approach i this paper implemets fuzzy clusterig ad ANN. Fuzzy clusterig - a form of usupervised techique is used to divide the traiig data ito smaller groups/ subsets. ANNs are traied usig these subsets. Sice the size of data is reduced, the traiig time required to trai each ANN is also reduced. Aggregatig the results of these idividual ANNs by a fial aggregatig ANN helps icrease its detectio rate as ay misclassificatios made by idividual ANNs will be corrected by the fial aggregatig ANN. Thus the objective is to lower the traiig time required while icreasig the detectio rate of idetifyig attacks. 3 Problem Solutio Figure shows the geeral outlie of the method usig Fuzzy Clusterig ad Artificial Neural Network (FCANN). The dataset used for the experimets is the 999 KDD Cup dataset. This dataset cotais about five millio coectio records as traiig data ad about two millio ISBN:

3 coectio records as test data. It icludes a set of 4 features derived from each coectio ad a label which specifies the status of coectio records as either ormal or the specific type of attack. Radom records are take from the traiig set ad give to the fuzzy clusterig module (the first module). This module divides the traiig sets ito smaller clusters. Each cluster forms a subset to be give to every ANN i the ANN module (secod module). Each ANN trais o this subset to classify a record as oe of the five groups ormal, DoS, U2R, R2L ad Probe. This output is the give to the third module the fial aggregatig module. The aggregator ANN takes the outputs of the idividual ANN ad trais o them to reduce ay misclassificatios. This module gives the fial classificatio of the record. Module : Fuzzy Clusterig The traiig data is divided ito x umber of clusters such that there is homogeeity withi the clusters ad heterogeeity betwee clusters. Each data poit belogs to a particular cluster with the degree specified by its membership grade. The traiig set is thus divided ito several subsets decreasig the size ad complexity of each subset. The Fuzzy c-meas (FCM) clusterig algorithm origially itroduced by Bezdek [7] is used to divide the data ito several clusters. The FCM algorithm is based o the miimizatio of the followig objective fuctio [8] [9]: k J m = u ij m x i c j 2, j= i= < m < where, u deotes the degree of membership of data poit x fallig ito cluster ceter c ad m is the weightig expoet greater tha. The fuzzy clusterig module is composed of the followig steps:. Fix c ad m ad radomly iitialize x umber of cluster ceters. Iitialize membership matrix U to U() ad step k=. 2. At each step k, calculate the cluster ceters with the membership matrix U(k) c j = i= u ijx i i= u ij 3. Compute a updated membership matrix U(k+) u ij = k ( x i c j p= x i c p ) 2 m Fig Block diagram of fuzzy clusterig ad ANN for IDS 3. Traiig The FCANN algorithm ca be divided ito three submodules viz. fuzzy clusterig; ANN; ad fuzzy aggregatio. The followig sectios describe these three submodules i detail. 4. Compare U(k+) ad U(k). If U (q + ) U (q) < ε the stop. Otherwise set U(k) = U(k + ) ad retur to step 2. Oce the termiatio criteria is reached, the whole traiig set is divided ito x umber of subsets, each of which is give to a differet ANN for learig features specific to that subset. ISBN:

4 Module 2: Artificial Neural Network The ANN module cosists of a separate ANN for each cluster formed ad aims to lear the patters preset i every subset. A simple feed-forward etwork is used for each ANN which cosists of simple processig uits called odes ad weighted coectios betwee odes i adjacet layers. The ANN employed i our experimets uses three layers - iput, hidde ad output layer. Data is give at the iput layer ad is traversed through the eural etwork ad is classified ito oe of the five classes at the output layer. The five classes are: Normal, DoS, U2R, R2L ad Probe. To lear the weights of this multi-layered eural etwork we use the backpropagatio algorithm with the gradiet descet weight update rule. The gradiet descet aims to miimize the squared error betwee the ANN predicted output ad the actual target values. The error fuctio used is: E m = 2 (T k Y k ) 2 k The back propagatio algorithm used to trai the ANN is outlied as follows [2]:. Create a ANN with umber of iput odes correspodig to the umber of features i the dataset; the umber of output odes correspodig to the umber of output classes ad a appropriate umber of hidde layer odes. 2. Iitialize the weights to small radom umbers. 3. For every traiig example, forward propagate the iput through the etwork: a. Each hidde ode receives the weighted summatio of the iputs ad bias hid(j) = b j + x i w ij i= where j is the j th hidde uit ad i deoted the i th example b. This is the passed through a oliear activatio fuctio. A uipolar sigmoid activatio fuctio is used: f(x) = ( + exp( x)) c. Output of the hidde layers is the give to the output layer i a similar maer: y(k) = b k + x i w ik i= ad is passed through the activatio fuctio d. The output computed through the ANN is the compared to the target value ad the error is calculated usig the error fuctio 4. This error is the backpropagated through the ANN ad the weights updated accordig to the expressio: w(t + ) = w(t) η E(t)/ w(t) where t is the umber of epochs ad η is the learig rate. 5. The mometum parameter α (< α <) is used to accelerate the learig process w(t + ) = w(t) η E(t) w(t) + α w(t) 6. If the error E m < threshold defied the stop traiig. Else retur to step 3. Thus i the ANN module every idividual ANN is traied o its ow subset ad the resultig output is the give to the fial aggregatig ANN. Module 3: Fuzzy Aggregatio Oce the idividual ANNs have bee traied o their subsets, their results must be aggregated to reduce ay errors itroduced by idividual ANNs i the ANN module. To achieve this, aother ANN is used to lear ad remove errors made by the sub ANNs. The followig steps are used to accomplish this task [5]:. Forward propagate the whole traiig set through every sub ANN i module two. Each sub ANN will output its opiio as to which class the particular record must fall ito. 2. This output of ANN x (oe sub ANN i module two) is multiplied by its membership grade belogig to the cluster the sub ANN was traied o. ISBN:

5 3. The iput to the fial aggregatig ANN is 3.2 Testig Y iput = [y. U ; y 2. U 2 ; ; y. U ] The output is compared with the target output. The aggregatig ANN uses the same backpropagatio algorithm used for the idividual sub ANNs i the ANN module. Durig the stage of testig, the workig methodology of ANN module ad fuzzy aggregatio module is similar as described above. First, the membership grade is calculated based o the cluster cetres C. For a ew iput x i, the membership U is calculated based o C by: u ij = k ( x i c j p= x i c p ) 2 m Oce the membership of the iput data is determied, the data poit is give to the ext ANN module. The outputs of all the ANNs i module 2 are the aggregated usig the fial ANN to determie which class the iput should be classified as. The test data used has cases ot see by the etwork durig the traiig phase. Thus, the testig will ot oly test the system o previously see data but also o usee data. This makes the itrusio detectio task more realistic. The time take for traiig is to be oted dow for various combiatios of parameters (learig rate ad mometum). The test set will be preseted to the system with those parameters ad the detectio rate oted. The ideal combiatio is to have miimum traiig time ad maximum detectio rate for the test set. 4 Experimets ad Results 4. Experimet The software used to implemet the FCANN algorithm was MATLAB R28a o a Widows7 PC with i5 core 2.3 GHz CPU ad 4GB RAM. I the experimets, KDD CUP 999 [2] dataset is used which is a versio of the origial 998 DARPA itrusio detectio evaluatio program dataset. Radom selectio was used to reduce the size of the dataset. Table shows detailed iformatio of the umber of records used to trai the etwork. The kddcup data percet dataset was used for traiig. All the records belogig to U2R, R2L ad Probe attacks were selected due to their low frequecy i the dataset. 3, Normal records ad, DoS records were radomly selected [5]. Table Number ad distributio of traiig ad test dataset Coectio type Traiig dataset Number % of of records records Testig dataset Number % of of records records Normal , DoS, , U2R R2L , Probe The KDD dataset cotais 4 features ad the class of attack (or ormal). Symbolic value features such as protocol_type are coverted to umeric values to be give to the ANNs. The dataset is ormalized before beig used so that all feature values are i cosistet rages. The traiig data was divided ito 6 clusters i the fuzzy clusterig module [5]. Each subset was the give to its idividual ANN i the ANN module (2 d module). This ANN has 4 iput odes correspodig to the 4 features i the dataset; 5 output odes correspodig to the five classes viz. Normal; DoS; R2L; U2R ad Probe. The umber of hidde odes was determied usig the empirical formula I + O + α where I is the umber of iput odes, O is the umber of output odes ad α is take as due to the complexity of itrusio detectio [5]. Thus, the secod module ANN architecture is The output of the secod module is give to the fial aggregatig module. Thus the iput features to the fial aggregatig ANN is 5. The umber of output odes too will be 5 correspodig to the 5 output classes ad the umber of hidde layer odes are 3 calculated usig the formula stated above. The fial ANN architecture is ISBN:

6 Table 2 Traiig time take for various values of mometum ad learig rate Traiig time Learig Rate take (CPU secods) Mometum Test set detectio rate(%) Mometum Table 3 Test set detectio rate for various mometum ad learig rate values Learig Rate Results Table 2 shows the traiig time take i CPU secods for various values of mometum ad learig rate ad Table 3 shows the detectio rate over the test set o the traied eural etwork. The same radom dataset geerated was used for all the experimets. Figure 3 shows the test set detectio rate for error threshold of.. It ca be see from the figure that higher detectio rate is obtaied for higher learig rate ad lower mometum values. The geeral tred see i the traiig time take from Figure 2 is that as learig rate icreases (from. to ) the traiig time decreases. A higher learig rate leads to faster covergece to the global miima. Higher mometum also leads to lower traiig times as the covergece takes place i the right directio. ISBN:

7 Traiig Time 3 Test Accuracy 9 Traiig Time take (sec) Learig rate Mometum Accurcy (%) Learig rate Mometum Fig 2 3D plot for Traiig time take with error threshold of. Fig 3 3D plot for Test set detectio rate with error threshold of. To uderstad how the clusters are formed ad how they affect the performace of the ANN, the records belogig to each class i each cluster were idetified. The distributio of records i the 6 clusters formed is as show i Table 4. The detectio rate of the traiig ad test set, the cluster it belogs to ad the classes idetified by each ANN are show i Table 5. Table 4 Distributio of records i each cluster produced by the FCM algorithm Class Cluster Number Total Normal ,82 3, DoS 2,73 7, , U2R 5 52 R2L ,26 Probe, , ,7 ANN Table 5 Aalysis of ANN output i module 2 ad module 3 Traiig detectio rate (%) Cluster Test set detectio rate (%) Classes idetified DoS; Probe Normal; DoS; R2L; Probe Probe Normal; DoS; U2R; R2L; Probe DoS Normal; DoS; R2L; Probe Fial aggregatig ANN Normal; DoS; U2R; R2L; Probe ISBN:

8 The FCM algorithm clusters data such that the records withi each cluster are similar as ca be verified from Table 4. Cluster cotais oly Probe records ad cluster 3 cotais maily DoS records. Cluster 6 is the oly cluster that has sigificat amout of records from all classes. The values i Table 5 were take for learig rate =.8, mometum =.6 ad error threshold=.. These values were chose as they gave a good combiatio of low traiig time ad high detectio rate (refer Table 2 ad Table 3). Cluster which had all Probe records, gave a % traiig detectio rate but oly.34% i the test set. This is because the ANN traied o cluster received all Probe records ad hece it classified all records as Probe achievig % i traiig set. For the test set too, it classified all records as Probe givig it a very low detectio rate of.34% (the percetage of Probe records i test set). Exactly similar is the case for cluster 3 where the ANN classifies all icomig records as DoS. Sice 73.89% of the test set is made of DoS records, its test set detectio rate too is 73.9%. Though the detectio rate is high, it is merely due to the large umber of DoS records preset i the test set ad ot because the ANN has leart to classify correctly. This basically reders ANN 3 ad ANN 5 (belogig to cluster ad 3 respectively) redudat as it classifies all records as Probe ad DoS respectively. If the data withi each cluster is too homogeeous (belogig to the same class), the ANN will just flag ay data as belogig to that particular class. Due to this, the membership grades play a importat role as it effectively decides the iput values to the 5 odes of the fial aggregatig ANN. For this, the membership grade of the records belogig to the differet clusters must have sigificat differece to overcome the default output of each ANN. However, upo ispectio it was foud that the membership grades of the records do ot differ sigificatly from each other. This makes gettig the records classified correctly at the module 2 level more importat. Due to this, majority of the load i classifyig the record correctly falls o the fial aggregatig ANN. 5 Coclusio ad Future work I this paper, the FCANN algorithm was implemeted to detect etwork itrusios. The algorithm was implemeted with several combiatios of learig rate ad mometum to fid the best learig rate ad mometum combiatio which gives a lower traiig time ad higher detectio rate. The results of each module of the algorithm are aalysed to uderstad its workig. Results have show that homogeeity withi each cluster is ot preferable ad is ot a ideal way to divide the traiig data. Each ANN must receive records belogig to differet classes to get a better traiig at classifyig records. A ideal way to divide the data to achieve good results (low traiig ad high detectio rate) remais a ope problem for future research. Refereces [] W. W. Fu ad L. Cai, A Neural Network based Itrusio Detectio Data Fusio Model, i Third Iteratioal Joit Coferece o Computatioal Sciece ad Optimizatio, 2. [2] C. Zhag, J. Jiag ad M. Kamel, Itrusio Detectio usig hierarchical eural etworks, Patter Recogitio Letters, pp , 25. [3] X. Tog, Z. Wag ad H. Yu, A research usig hybrid RBF/ Elma eural etworks for itrusio detectio system secure model, Computer Physics Commuicatio, pp , 29. [4] S.-C. O. K. Y. Woil Kim, Itrusio Detectio Based o Feature Trasform Usig Neural Network, i Computatioal Sciece - ICCS 24, vol. 337, Spriger Berli Heidelberg, 24, pp [5] R. Beghdad, Critical study of eural etworks i detectig itrusios, Computers & Security, pp , 28. [6] G. Liu, Z. Yi ad S. Yag, A hierarchical itrusio detectio model based o the PCA eural etworks, Neurocomputig, pp , 27. [7] L. Re, Research of Web Data Miig based o Fuzzy Logic ad Neural Networks, i Sixth Iteratioal Coferece o Fuzzy Systems ad Kowledge Discovery, 26. [8] F. M.-P. F. J. M.-G. R. L.-F. J. A. G.-M.-A. D. M.-J. Ire Lorezo-Foseca, Itrusio detectio method usig Neural Networks based o the reductio of characteristics, i Bio-Ispired Systems: Computatioal ad Ambiet Itelligece, vol. 557, Spriger Berli Heidelberg, 29, pp [9] J. Rya, M.-J. Li ad R. Miikkulaie., Itrusio Detectio with Neural Networks., ISBN:

9 i AAAI Techical Report WS-97-7., 997. [] J. Caady, Artificial Neural Networks for Misuse Detectio, i Natioal Iformatio Systems Security Coferece (NISSC 98), Arligto, VA., 998. [] L. d. S. Silva, A. C. F. d. Satos, J. D. S. d. Silva ad A. Motes, A Neural Network Applicatio for Attack Detectio i Computer Networks., i ISBN , 24. [2] J. Zhog Lei ad A. Ghorbai, Network Itrusio Detectio usig a Improved Competitive Learig Neural Network, i Proceedigs of the secod aual coferece o commuicatio etworks ad services research (CNSR 4) ,, 24. [3] M. Gao ad J. Tia, Network Itrusio Detectio Method Based o Improved Simulated Aealig Neural Network, i Iteratioal Coferece o Measurig Techology ad Mechatroics Automatio, 29. [4] S. Devaraju ad D. S. Ramakrisha, Performace aalysis of itrusio detectio system usig various eural etwork classifiers, i IEEE-Iteratioal Coferece o Recet Treds i Iformatio Techology, ICRTIT, MIT, Aa Uiversity, Cheai, 2. [5] G. Wag, J. Hao, L. Huag ad J. Ma, A ew approach to itrusio detectio usig Artificial Neural Networks ad Fuzzy clusterig, Expert systems with applicatio, vol. 37, pp , 2. [6] N. B. Idris ad B. Shamugam, Artificial Itelligece techiques applied to Itrusio Detectio, i IEEE Idico 25 Coferece, Cheai, Idia, 25. [7] J. C. Bezdek, Patter Recogitio with Fuzzy Objective Fuctio Algorithms, 98. [8] J. C. Bezdek, R. Ehrlich ad W. Full, FCM: The Fuzzy c-meas clusterig algorithm, Computers & Geoscieces, vol., o. 2-3, pp. 9-23, 984. [9] C. L. Stephe, Fuzzy model idetificatio based o Cluster Estimatio, Joural of Itelliget ad Fuzzy systems, vol. 2, pp , 994. [2] T. M. Mitchell, Machie Learig, McGraw- Hill, 997. [2] KDD Cup 999, [Olie]. Available: dcup99.html. [Accessed August 22]. ISBN:

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

An Anomaly Detection Method Based On Deep Learning

An Anomaly Detection Method Based On Deep Learning Sed Orders for Reprits to reprits@bethamsciece.ae 734 The Ope Automatio ad Cotrol Systems Joural, 05, 7, 734-739 A Aomaly Detectio Method Based O Deep Learig Ope Access Hog-li Deg *, Tao yag ad Jiag-i

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Lecture 13: Validation

Lecture 13: Validation Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet

More information

Feature classification for multi-focus image fusion

Feature classification for multi-focus image fusion Iteratioal Joural of the Physical Scieces Vol. 6(0), pp. 4838-4847, 3 September, 0 Available olie at http://www.academicjourals.org/ijps DOI: 0.5897/IJPS.73 ISSN 99-950 0 Academic Jourals Full Legth Research

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter Fuzzy Membership Fuctio Optimizatio for System Idetificatio Usig a Eteded Kalma Filter Srikira Kosaam ad Da Simo Clevelad State Uiversity NAFIPS Coferece Jue 4, 2006 Embedded Cotrol Systems Research Lab

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

A new algorithm to build feed forward neural networks.

A new algorithm to build feed forward neural networks. A ew algorithm to build feed forward eural etworks. Amit Thombre Cetre of Excellece, Software Techologies ad Kowledge Maagemet, Tech Mahidra, Pue, Idia Abstract The paper presets a ew algorithm to build

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps Data-Drive Noliear Hebbia Learig Method for Fuzzy Cogitive Maps Wociech Stach, Lukasz Kurga, ad Witold Pedrycz Abstract Fuzzy Cogitive Maps (FCMs) are a coveiet tool for modelig of dyamic systems by meas

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Optimization of Multiple Input Single Output Fuzzy Membership Functions Using Clonal Selection Algorithm

Optimization of Multiple Input Single Output Fuzzy Membership Functions Using Clonal Selection Algorithm Optimizatio of Multiple Iput Sigle Output Fuzzy Membership Fuctios Usig Cloal Selectio Algorithm AYŞE MERVE ACILAR, AHMET ARSLAN Computer Egieerig Departmet Selcuk Uiversity Selcuk Uiversity, Eg.-Arch.

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Software Fault Prediction of Unlabeled Program Modules

Software Fault Prediction of Unlabeled Program Modules Software Fault Predictio of Ulabeled Program Modules C. Catal, U. Sevim, ad B. Diri, Member, IAENG Abstract Software metrics ad fault data belogig to a previous software versio are used to build the software

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

Performance Comparisons of PSO based Clustering

Performance Comparisons of PSO based Clustering Performace Comparisos of PSO based Clusterig Suresh Chadra Satapathy, 2 Guaidhi Pradha, 3 Sabyasachi Pattai, 4 JVR Murthy, 5 PVGD Prasad Reddy Ail Neeruoda Istitute of Techology ad Scieces, Sagivalas,Vishaapatam

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Analysis of Documents Clustering Using Sampled Agglomerative Technique

Analysis of Documents Clustering Using Sampled Agglomerative Technique Aalysis of Documets Clusterig Usig Sampled Agglomerative Techique Omar H. Karam, Ahmed M. Hamad, ad Sheri M. Moussa Abstract I this paper a clusterig algorithm for documets is proposed that adapts a samplig-based

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Investigating methods for improving Bagged k-nn classifiers

Investigating methods for improving Bagged k-nn classifiers Ivestigatig methods for improvig Bagged k-nn classifiers Fuad M. Alkoot Telecommuicatio & Navigatio Istitute, P.A.A.E.T. P.O.Box 4575, Alsalmia, 22046 Kuwait Abstract- We experimet with baggig knn classifiers

More information

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

Web Text Feature Extraction with Particle Swarm Optimization

Web Text Feature Extraction with Particle Swarm Optimization 32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER Proceedigs of the Sixth Iteratioal Coferece o Machie Learig ad Cyberetics, Hog Kog, 9- August 7 A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER AI-MIN YANG,, XIN-GUANG LI, LING-MIN JIANG,YONG-MEI

More information

Text Summarization using Neural Network Theory

Text Summarization using Neural Network Theory Iteratioal Joural of Computer Systems (ISSN: 2394-065), Volume 03 Issue 07, July, 206 Available at http://www.ijcsolie.com/ Simra Kaur Jolly, Wg Cdr Ail Chopra 2 Departmet of CSE, Ligayas Uiversity, Faridabad

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Image based Cats and Possums Identification for Intelligent Trapping Systems

Image based Cats and Possums Identification for Intelligent Trapping Systems Volume 159 No, February 017 Image based Cats ad Possums Idetificatio for Itelliget Trappig Systems T. A. S. Achala Perera School of Egieerig Aucklad Uiversity of Techology New Zealad Joh Collis School

More information

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Higher-order iterative methods free from second derivative for solving nonlinear equations

Higher-order iterative methods free from second derivative for solving nonlinear equations Iteratioal Joural of the Phsical Scieces Vol 6(8, pp 887-89, 8 April, Available olie at http://wwwacademicjouralsorg/ijps DOI: 5897/IJPS45 ISSN 99-95 Academic Jourals Full Legth Research Paper Higher-order

More information

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree Available olie at www.ijpe-olie.com vol. 13, o. 7, November 017, pp. 1159-1164 DOI: 10.3940/ijpe.17.07.p19.11591164 Text Feature Selectio based o Feature Dispersio Degree ad Feature Cocetratio Degree Zhifeg

More information

A New Bit Wise Technique for 3-Partitioning Algorithm

A New Bit Wise Technique for 3-Partitioning Algorithm Special Issue of Iteratioal Joural of Computer Applicatios (0975 8887) o Optimizatio ad O-chip Commuicatio, No.1. Feb.2012, ww.ijcaolie.org A New Bit Wise Techique for 3-Partitioig Algorithm Rajumar Jai

More information

15 UNSUPERVISED LEARNING

15 UNSUPERVISED LEARNING 15 UNSUPERVISED LEARNING [My father] advised me to sit every few moths i my readig chair for a etire eveig, close my eyes ad try to thik of ew problems to solve. I took his advice very seriously ad have

More information

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP)

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP) Heuristic Approaches for Solvig the Multidimesioal Kapsack Problem (MKP) R. PARRA-HERNANDEZ N. DIMOPOULOS Departmet of Electrical ad Computer Eg. Uiversity of Victoria Victoria, B.C. CANADA Abstract: -

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology 208 2d Iteratioal Coferece o Systems, Computig, ad Applicatios (SYSTCA 208) Research o Idetificatio Model of Fiacial Fraud of Listed Compay Based o Data Miig Techology Jiaqi Hu, Xiao Che School of Busiess,

More information

Exponential intuitionistic fuzzy entropy measure based image edge detection.

Exponential intuitionistic fuzzy entropy measure based image edge detection. Expoetial ituitioistic fuzzy etropy measure based image edge detectio. Abdulmajeed Alsufyai 1, Hassa Badry M. El-Owy 2 1 Departmet of Computer Sciece, College of Computers ad Iformatio Techology, Taif

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information