Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies
|
|
- Emily McGee
- 5 years ago
- Views:
Transcription
1 Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory School of Egieerig Sciece Simo Fraser Uiversity
2 Roadmap Itroductio: Border Gateway Protocol (BGP) Machie learig Feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 2
3 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig BGP feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 3
4 Itroductio: Border Gateway Protocol BGP s mai fuctio is to optimally route data betwee Autoomous Systems (ASes) AS: a collectio of BGP routers (peers) withi a sigle admiistrative domai Four types of BGP messages: ope, keepalive, update, ad otificatio BGP aomalies: Slammer, Nimda, Code Red I, routig miscofiguratios ISCAS 2018, Florece, Italy 4
5 Itroductio: Machie learig Machie learig models classify data usig a feature matrix Feature matrix: rows: data poits colums: feature values Algorithms: Logistic Regressio, Naïve Bayes, Support Vector Machie (SVM) SVM defies decisio boudary to geometrically lie midway betwee the support vectors ISCAS 2018, Florece, Italy 5
6 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig BGP feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 6
7 Feature extractio: BGP messages Extract 37 features Sample every miute durig a five-day period: the peak day of a aomaly two days prior ad two days after the peak day 7,200 samples for each aomalous evet: 5,760 regular samples (o-aomalous) 1,440 aomalous samples imbalaced dataset ISCAS 2018, Florece, Italy 7
8 BGP features Feature Defiitio Category 1 Number of aoucemets Volume 2 Number of withdrawals Volume 3 Number of aouced NLRI prefixes Volume 4 Number of withdraw NLRI prefixes Volume 5 Average AS-PATH legth AS-path 6 Maximum AS-PATH legth AS-path 7 Average uique AS-PATH legth AS-path 8 Number of duplicate aoucemets Volume 9 Number of duplicate withdrawals Volume 10 Number of implicit withdrawals Volume ISCAS 2018, Florece, Italy 8
9 BGP features Feature Defiitio Category 11 Average edit distace AS-path 12 Maximum edit distace AS-path 13 Iter-arrival time Volume Maximum edit distace =, where = (7,..., 17) Maximum AS-path legth =, where = (7,..., 15) AS-path AS-path 34 Number of IGP packets Volume 35 Number of EGP packets Volume 36 Number of icomplete packets Volume 37 Packet size (B) Volume ISCAS 2018, Florece, Italy 9
10 Feature extractio: BGP messages Border Gateway Protocol (BGP) eables exchage of routig iformatio betwee gateway routers usig update messages Collectios of BGP update message: Réseaux IP Europées (RIPE) uder the Routig Iformatio Service (RIS) project Route Views Available i multi-threaded routig toolkit (MRT) biary format ISCAS 2018, Florece, Italy 10
11 BGP aomalies Slammer: ifected Microsoft SQL servers through a small piece of code that geerated IP addresses at radom Nimda: exploited vulerabilities i the Microsoft Iteret Iformatio Services (IIS) web servers for Iteret Explorer 5 Code Red I: attacked Microsoft IIS web servers by replicatig itself through IIS server weakesses ISCAS 2018, Florece, Italy 11
12 Duratio of BGP evets Aomaly Date Aomaly (mi) Regular (mi) Slammer Jauary 25, ,331 Nimda September 18-20, ,521 3,679 Code Red I July 19, ,600 ISCAS 2018, Florece, Italy 12
13 Number of BGP aoucemets: Slammer ISCAS 2018, Florece, Italy 13
14 Number of BGP aoucemets: Nimda ISCAS 2018, Florece, Italy 14
15 Number of BGP aoucemets: Code Red I ISCAS 2018, Florece, Italy 15
16 Number of BGP aoucemets: Regular ISCAS 2018, Florece, Italy 16
17 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig Feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 17
18 Feature selectio Reduces redudacy amog features ad improves the classificatio accuracy Decisio tree algorithm was used for for feature selectio: oe of the most successful techiques for supervised classificatio learig It ca hadle both umerical ad categorical features Publicly available software tool: C5 ISCAS 2018, Florece, Italy 18
19 Feature selectio: decisio tree Dataset Traiig data Selected features Dataset 1 Slammer + Nimda 1 21, 23 29, Dataset 2 Slammer + Code Red I 1 22, 24 29, Dataset 3 Code Red I + Nimda 1 29, Either four (30, 31, 32, 33) or five (22, 30, 31, 32, 33) features are removed i the costructed trees maily because: features are umerical ad some are used repeatedly ISCAS 2018, Florece, Italy 19
20 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig Feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 20
21 Support Vector Machie SVM defies a separatig hyperplae i order to assig the target variables ito distict categories It is a o-probabilistic biary classifier Used for classificatio problems ad i patter recogitio applicatios Modified versio of logistic regressio ISCAS 2018, Florece, Italy 21
22 Support Vector Machie For a give dataset x with umber of traiig data, SVM fids the maximum margi hyperplae separatig differet classes of data:! =! #, % #,! # ' (, % # 1, 1,, = 1,2,, /! # : p-dimesioal iput vector % # : output value (1 or -1) Decisio vector separatig two classes is give by: 1 2 3! + 5 = : optimal weighig vector b: bias ISCAS 2018, Florece, Italy 22
23 Support Vector Machie For liearly separable traiig data, margis are defied as:! " # $ + & = 1! " # $ + & = 1 ISCAS 2018, Florece, Italy 23
24 Support Vector Machie SVM with liear kerel: correctly classified regular (circles) ad aomalous (stars) data poits as well as oe icorrectly classified regular (circle) data poit ISCAS 2018, Florece, Italy 24
25 Support Vector Machie Distace betwee the margis: 2/ $ % Objective fuctio: miimize $ % Let C be the regularizatio parameter that defies the separatio of two classes ad the error whe usig a traiig dataset. The hyperplae is acquired by miimizig the margis: ( & ' ()* + ( /, with costraits 1 ( 2 3 ( 1 + (, 6 = 1,, 9 1 ( : target value + ( : set of slack variables ISCAS 2018, Florece, Italy 25
26 Support Vector Machie: kerel trick Istead of calculatig each mappig, the kerel trick is used to directly calculate the ier product i the iput space The mappig defies feature space ad geerates a decisio boudary for iput data poits Usig the kerel trick reduces the complexity of the optimizatio problem that ow oly depeds o the iput space istead if the feature space ISCAS 2018, Florece, Italy 26
27 Support Vector Machie Istead of employig a miimizatio model, the problem be formulated usig Lagragia dual multiplier! as: & max % subject to: &'(,! & 1 2 % &'(, % -'(! &! -. &. - / &, / -, 0! = 1,2,, 9 ad %! 3. 3 = 0 & 3'( ISCAS 2018, Florece, Italy 27
28 Support Vector Machie SVM with the oliear kerel fuctio: the three-dimesioal space shows a hyperplae dividig regular (circles) ad aomalous (stars) data poits ISCAS 2018, Florece, Italy 28
29 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig Feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 29
30 Experimetal procedure Step 1: Use 37 features or select the most relevat features usig the decisio tree algorithm Step 2: Trai the SVM with liear, quadratic, or cubic kerels Step 3: Test the models usig various datasets Step 4: Evaluate the SVM kerels based o accuracy ad F-Score ISCAS 2018, Florece, Italy 30
31 Traiig ad test datasets Traiig dataset Test dataset Dataset 1 Slammer ad Nimda Code Red I Dataset 2 Nimda ad Code Red I Slammer ISCAS 2018, Florece, Italy 31
32 Experimetal procedure MATLAB 2017b Statistics ad Machie Learig Toolbox The performace of SVM with various kerels is evaluated usig combiatios of datasets SVM performace was measured based o accuracy ad F-Score The cofusio matrix is used to evaluate performace of classificatio algorithms True positive (TP) ad false egative (FN) are the umber of aomalous data poits that are classified as aomaly ad regular, respectively ISCAS 2018, Florece, Italy 32
33 Performace measures Accuracy: (TP+TN)/(TP+TN+FP+FN) F-Score sigifies harmoic mea betwee precisio ad sesitivity: 2 x (precisio x sesitivity)/(precisio + sesitivity) precisio: TP/(TP+FP) sesitivity: TP/(TP+FN) ISCAS 2018, Florece, Italy 33
34 SVM with liear kerel Liear kerel Accuracy (%) F-Score (%) Selected features , 23-29, Traiig dataset Test RIPE BCNET Test Dataset Dataset Dataset Dataset ISCAS 2018, Florece, Italy 34
35 SVM with oliear kerels Quadratic kerel Accuracy (%) F-Score (%) Selected features , 23-29, Traiig dataset Test RIPE BCNET Test Dataset Dataset Dataset Dataset ISCAS 2018, Florece, Italy 35
36 SVM with oliear kerels Cubic kerel Accuracy (%) F-Score (%) Selected features , 23-29, Traiig dataset Test RIPE BCNET Test Dataset Dataset Dataset Dataset ISCAS 2018, Florece, Italy 36
37 Roadmap Itroductio Border Gateway Protocol (BGP) Machie learig Feature extractio ad selectio Support vector machie ad kerels Experimetal procedure ad classificatio results Coclusios ad refereces ISCAS 2018, Florece, Italy 37
38 Coclusios SVM algorithm is oe of the most efficiet ML tools Kerels are used to trasform the iput data ito a high dimesioal space Their performace depeds o both the feature selectio ad the type of datasets Aalyzed BGP aomaly datasets are liearly separable SVM with liear kerel outperforms SVMs with quadratic ad cubic kerels ISCAS 2018, Florece, Italy 38
39 Refereces: sources of data RIPE RIS raw data [Olie]. Available: Uiversity of Orego Route Views project [Olie]. Available: BCNET [Olie]. Available: ISCAS 2018, Florece, Italy 39
40 Refereces: Q. Dig, Z. Li, S. Haeri, ad Lj. Trajković, Applicatio of machie learig techiques to detectig aomalies i commuicatio etworks: Datasets ad Feature Selectio Algorithms i Cyber Threat Itelligece, M. Coti, A. Dehghataha, ad T. Dargahi, Eds., Berli: Spriger, to appear. Q. Dig, Z. Li, S. Haeri, ad Lj. Trajković, Applicatio of machie learig techiques to detectig aomalies i commuicatio etworks: Classificatio Algorithms i Cyber Threat Itelligece, M. Coti, A. Dehghataha, ad T. Dargahi, Eds., Berli: Spriger, to appear. Q. Dig, Z. Li, P. Batta, ad Lj. Trajković, "Detectig BGP aomalies usig machie learig techiques," i Proc. IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics (SMC 2016), Budapest, Hugary, Oct. 2016, pp Y. Li, H. J. Xig, Q. Hua, X.-Z. Wag, P. Batta, S. Haeri, ad Lj. Trajković, Classificatio of BGP aomalies usig decisio trees ad fuzzy rough sets, i Proc. IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics, SMC 2014, Sa Diego, CA, October 2014, pp N. Al-Rousa, S. Haeri, ad Lj. Trajković, Feature selectio for classificatio of BGP aomalies usig Bayesia models," i Proc. Iteratioal Coferece o Machie Learig ad Cyberetics, ICMLC 2012, Xi'a, Chia, July 2012, pp N. Al-Rousa ad Lj. Trajković, Machie learig models for classificatio of BGP aomalies, i Proc. IEEE Cof. High Performace Switchig ad Routig, HPSR 2012, Belgrade, Serbia, Jue 2012, pp ISCAS 2018, Florece, Italy 40
Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies
Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser
More informationCommunication Networks: Traffic Data, Network Topologies, and Routing Anomalies
Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser
More informationData Mining and Machine Learning for Analysis of Network Traffic
Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,
More informationData Mining and Machine Learning for Analysis of Network Traffic
Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,
More informationMining Network Traffic Data
Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal
More informationMining Network Traffic Data
Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal
More informationData Mining and Machine Learning for Analysis of Network Traffic
Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,
More informationCommunication Networks: Traffic Data, Network Topologies, and Routing Anomalies
Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser
More informationClassification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets
Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, and Ljiljana Trajković Hebei University, Baoding,
More informationDesigning a learning system
CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try
More informationDesigning a learning system
CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please
More informationEuclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process
Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationResource Public Key Infrastructure for Secure Border Gateway Protocol
Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory
More informationComplex Networks: Traffic Data, Network Topologies, and Routing Anomalies
Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science
More informationProbabilistic Fuzzy Time Series Method Based on Artificial Neural Network
America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationNeuro Fuzzy Model for Human Face Expression Recognition
IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1
More informationarxiv: v2 [cs.ds] 24 Mar 2018
Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationDetecting BGP Anomalies Using Machine Learning Techniques
Detecting BGP Anomalies Using Machine Learning Techniques Student: Zhida Li. Instructor: Steve Whitmore Simon Fraser University Vancouver, British Columbia, Canada Email: zhidal@sfu.ca Abstract Border
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationNew Fuzzy Color Clustering Algorithm Based on hsl Similarity
IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper
More informationAn improved support vector machine based on particle swarm optimization in laser ultrasonic defect detection
A improved support vector machie based o particle swarm optimizatio i laser ultrasoic defect detectio School of Sciece, North Uiversity of Chia, aiyua, Shaxi 35, Chia xut98@63.com,hhp9@63.com,xywag@6.com,43497@qq.com
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationUsing Support Vector Machines for Direct Marketing Models
Iteratioal Joural of Egieerig ad Advaced Techology (IJEAT) ISSN: 2249 8958, Volume-4 Issue-4, April 2015 Usig Support Vector Machies for Direct Marketig Models A. Nachev, T. Teodosiev Abstract This paper
More informationLip Contour Extraction Based on Support Vector Machine
Lip Cotour Extractio Based o Support Vector Machie Author Pa, Xiaosheg, Kog, Jiagpig, Liew, Ala Wee-Chug Published 008 Coferece Title CISP 008 : Proceedigs, First Iteratioal Cogress o Image ad Sigal Processig
More informationSoftware Fault Prediction of Unlabeled Program Modules
Software Fault Predictio of Ulabeled Program Modules C. Catal, U. Sevim, ad B. Diri, Member, IAENG Abstract Software metrics ad fault data belogig to a previous software versio are used to build the software
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationDeep Joint Discriminative Learning for Vehicle Re-identification and Retrieval
Deep Joit Discrimiative Learig for Vehicle Re-idetificatio ad Retrieval Yuqi Li, Yaghao Li, Hogfei Ya, Jiayig Liu Pekig Uiversity 2017.09.18 Deep Joit Discrimiative Learig for Vehicle Re-idetificatio ad
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationFuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter
Fuzzy Membership Fuctio Optimizatio for System Idetificatio Usig a Eteded Kalma Filter Srikira Kosaam ad Da Simo Clevelad State Uiversity NAFIPS Coferece Jue 4, 2006 Embedded Cotrol Systems Research Lab
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationFundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le
Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical
More informationFuzzy Linear Regression Analysis
12th IFAC Coferece o Programmable Devices ad Embedded Systems The Iteratioal Federatio of Automatic Cotrol September 25-27, 2013. Fuzzy Liear Regressio Aalysis Jaa Nowaková Miroslav Pokorý VŠB-Techical
More informationEMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL
Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationCluster Analysis. Andrew Kusiak Intelligent Systems Laboratory
Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of
More informationA METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER
Proceedigs of the Sixth Iteratioal Coferece o Machie Learig ad Cyberetics, Hog Kog, 9- August 7 A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER AI-MIN YANG,, XIN-GUANG LI, LING-MIN JIANG,YONG-MEI
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationEigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1
Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces
More informationEigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1
Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationIntrusion Detection Method Using Protocol Classification and Rough Set Based Support Vector Machine
Computer ad formatio Sciece trusio Detectio Method Usig Protocol Classificatio ad Rough Set Based Support Vector Machie Xuyi Re College of Computer Sciece, Najig Uiversity of Post & Telecommuicatios Najig
More informationCSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University
CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically
More informationSOFTWARE usually does not work alone. It must have
Proceedigs of the 203 Federated Coferece o Computer Sciece ad Iformatio Systems pp. 343 348 A method for selectig eviromets for software compatibility testig Łukasz Pobereżik AGH Uiversity of Sciece ad
More informationOptimization of Multiple Input Single Output Fuzzy Membership Functions Using Clonal Selection Algorithm
Optimizatio of Multiple Iput Sigle Output Fuzzy Membership Fuctios Usig Cloal Selectio Algorithm AYŞE MERVE ACILAR, AHMET ARSLAN Computer Egieerig Departmet Selcuk Uiversity Selcuk Uiversity, Eg.-Arch.
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationLearning to Shoot a Goal Lecture 8: Learning Models and Skills
Learig to Shoot a Goal Lecture 8: Learig Models ad Skills How do we acquire skill at shootig goals? CS 344R/393R: Robotics Bejami Kuipers Learig to Shoot a Goal The robot eeds to shoot the ball i the goal.
More informationBayesian Network Structure Learning from Attribute Uncertain Data
Bayesia Network Structure Learig from Attribute Ucertai Data Wetig Sog 1,2, Jeffrey Xu Yu 3, Hog Cheg 3, Hogya Liu 4, Ju He 1,2,*, ad Xiaoyog Du 1,2 1 Key Labs of Data Egieerig ad Kowledge Egieerig, Miistry
More informationComparison of classification algorithms in the task of object recognition on radar images of the MSTAR base
Compariso of classificatio algorithms i the task of object recogitio o radar images of the MSTAR base A.A. Borodiov 1, V.V. Myasikov 1,2 1 Samara Natioal Research Uiversity, 34 Moskovskoe Shosse, 443086,
More informationAccuracy Improvement in Camera Calibration
Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z
More informationJournal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article
Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationMachine Learning Models for Classification of BGP Anomalies
Machine Learning Models for Classification of BGP Anomalies Nabil M. Al-Rousan and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Email: {nalrousa, ljilja}@sfu.ca Abstract Worms
More informationDescription of some supervised learning algorithms
Descriptio of some supervised learig algorithms Patrick Keekayoro patrick.keekayoro@outlook.com Statistical Cybermetrics Research Group Uiversity of Wolverhampto 1. Supervised learig Supervised machie
More informationHarris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c
Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi
More information4.2.1 Bayesian Principal Component Analysis Weighted K Nearest Neighbor Regularized Expectation Maximization
4 DATA PREPROCESSING 4.1 Data Normalizatio 4.1.1 Mi-Max 4.1.2 Z-Score 4.1.3 Decimal Scalig 4.2 Data Imputatio 4.2.1 Bayesia Pricipal Compoet Aalysis 4.2.2 K Nearest Neighbor 4.2.3 Weighted K Nearest Neighbor
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationAssignment Problems with fuzzy costs using Ones Assignment Method
IOSR Joural of Mathematics (IOSR-JM) e-issn: 8-8, p-issn: 9-6. Volume, Issue Ver. V (Sep. - Oct.06), PP 8-89 www.iosrjourals.org Assigmet Problems with fuzzy costs usig Oes Assigmet Method S.Vimala, S.Krisha
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationSearching a Russian Document Collection Using English, Chinese and Japanese Queries
Searchig a Russia Documet Collectio Usig Eglish, Chiese ad Japaese Queries Fredric C. Gey (gey@ucdata.berkeley.edu) UC Data Archive & Techical Assistace Uiversity of Califoria, Berkeley, CA 94720 USA ABSTRACT.
More informationOur second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.
Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for
More informationx x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the
COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,
More informationA Parallel DFA Minimization Algorithm
A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this
More informationThe Impact of Feature Selection on Web Spam Detection
I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67 Published Olie August 2012 i MECS (http://www.mecs -press.org/) DOI: 10.5815/ijisa.2012.09.08 The Impact of Feature Selectio o Web Spam Detectio Jaber
More informationOutline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs
Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio
More informationA Method of Malicious Application Detection
5th Iteratioal Coferece o Educatio, Maagemet, Iformatio ad Medicie (EMIM 2015) A Method of Malicious Applicatio Detectio Xiao Cheg 1,a, Ya Hui Guo 2,b, Qi Li 3,c 1 Xiao Cheg, Beijig Uiv Posts & Telecommu,
More informationDimension Reduction and Manifold Learning. Xin Zhang
Dimesio Reductio ad Maifold Learig Xi Zhag eeizhag@scut.edu.c Cotet Motivatio of maifold learig Pricipal compoet aalysis ad its etesio Maifold learig Global oliear maifold learig (IsoMap) Local oliear
More informationNew HSL Distance Based Colour Clustering Algorithm
The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics
More informationCriterion in selecting the clustering algorithm in Radial Basis Functional Link Nets
WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet
More informationDiego Nehab. n A Transformation For Extracting New Descriptors of Shape. n Locus of points equidistant from contour
Diego Nehab A Trasformatio For Extractig New Descriptors of Shape Locus of poits equidistat from cotour Medial Axis Symmetric Axis Skeleto Shock Graph Shaked 96 1 Shape matchig Aimatio Dimesio reductio
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationIntroduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP
Nature-Ispired Computig Hadlig Costraits Dr. Şima Uyar September 2006 Itroductio may practical problems are costraied ot all combiatios of variable values represet valid solutios feasible solutios ifeasible
More informationEnsemble-based Feature Selection Criteria
Esemble-based Feature Selectio Criteria Terry Wideatt 1, Matthew Prior 1, Niv Effro 2, Natha Itrator 2 1 Cetre for Visio, Speech ad Sigal Proc (CVSSP), Uiversity of Surrey, Guildford, Surrey, Uited Kigdom
More informationA new algorithm to build feed forward neural networks.
A ew algorithm to build feed forward eural etworks. Amit Thombre Cetre of Excellece, Software Techologies ad Kowledge Maagemet, Tech Mahidra, Pue, Idia Abstract The paper presets a ew algorithm to build
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationFuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms
Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp
More informationIntrusion Detection using Fuzzy Clustering and Artificial Neural Network
Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com
More informationLU Decomposition Method
SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio
More informationMobile terminal 3D image reconstruction program development based on Android Lin Qinhua
Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College
More informationA Martingale Framework for Concept Change Detection in Time-Varying Data Streams
A Martigale Framework for Cocept Chage Detectio i Time-Varyig Data Streams She-Shyag Ho sho@gmu.edu Departmet of Computer Sciece, George Maso Uiversity, 4400 Uiversity Drive, Fairfax, VA 22030 USA Abstract
More informationRegularized Orthogonal Local Fisher Discriminant Analysis
Regularized Orthogoal Local Fisher Discrimiat Aalysis Shuhua Xu Departmet of Maths Uiversity of Shaoxig City South Road, Shaoxig P.R Chia webqmm974@63.com Joural of Digital Iformatio Maagemet ABSRAC: Aimig
More informationA Comparative Study on Modeling Methods for Switched Reluctance Machines
Computer ad Iformatio Sciece Vol. 3, No. 2; May 21 A Comparative Study o Modelig Methods for Switched Reluctace Machies Shouju Sog & Weiguo iu School of Automatio, Northwester Polytechical Uiversity PO
More informationEnhancing Cloud Computing Scheduling based on Queuing Models
Ehacig Cloud Computig Schedulig based o Queuig Models Mohamed Eisa Computer Sciece Departmet, Port Said Uiversity, 42526 Port Said, Egypt E. I. Esedimy Computer Sciece Departmet, Masoura Uiversity, Masoura,
More informationApplication of Decision Tree and Support Vector Machine for Inspecting Bubble Defects on LED Sealing Glue Images
66 Applicatio of Decisio Tree ad Support Vector Machie for Ispectig Bubble Defects o LED Sealig Glue Images * Chua-Yu Chag ad Yi-Feg Li Abstract Bubble defect ispectio is a importat step i light-emittig
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationResearch on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology
208 2d Iteratioal Coferece o Systems, Computig, ad Applicatios (SYSTCA 208) Research o Idetificatio Model of Fiacial Fraud of Listed Compay Based o Data Miig Techology Jiaqi Hu, Xiao Che School of Busiess,
More informationCubic Polynomial Curves with a Shape Parameter
roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationStudy on effective detection method for specific data of large database LI Jin-feng
Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More information