Effective Hybrid Intrusion Detection System: A Layered Approach

Size: px
Start display at page:

Download "Effective Hybrid Intrusion Detection System: A Layered Approach"

Transcription

1 I. J. Computer Network ad Iformatio Security, 2015, 3, Published Olie February 2015 i MECS ( DOI: /ijcis Effective Hybrid Itrusio Detectio System: A Layered Approach Abebe Tesfahu, D. Lalitha Bhaskari AUCE (A), Adhra Uiversity, Visakhapatam, AP, Idia abesummit@yahoo.com, lalithabhaskari@yahoo.co.i Abstract Although there are differet techiques proposed for itrusio detectio i the literature, most of them cosider stadaloe misuse or aomaly itrusio detectio systems. However, by takig the advatages of both systems a better hybrid itrusio detectio system ca be developed. I this paper, we preset a effective hybrid layered itrusio detectio system for detectig both previously kow ad zero-day attacks. I particular, a two layer system that combies misuse ad aomaly itrusio detectio systems is proposed. The first layer cosists of misuse detector which ca detect ad block kow attacks ad the secod layer comprises of aomaly detector which ca efficietly detect ad block previously ukow attacks. The misuse detector is modeled based o radom forests classifier ad the aomaly detector is built usig baggig techique with esemble of oe-class support vector machie classifiers. Data pre-processig is doe usig automatic feature selectio ad data ormalizatio. Experimetal results show that the proposed itrusio detectio system outperforms other well-kow itrusio detectio systems i detectig both previously kow ad zero-day attacks. Idex Terms Itrusio, Hybrid, Misuse, Aomaly, Radom Forests, Performace. I. INTRODUCTION The iformatio commuicatio ifrastructure has highly improved the lives of moder society. However, this ifrastructure is always uder the threats of itrusio ad misuse. I order to prevet such threats the research ad idustry commuity have come up with differet threat detectio ad prevetio techologies. Oe of such techologies is Itrusio Detectio Systems (IDS). A itrusio detectio system moitors ad aalyzes the evets occurrig i a computer system or etwork eviromet ad alerts a huma operator to the presece of possible icidets that violate stadard security practices [1]. Based o the deploymet area itrusio detectio techologies could be categorized as Hostbased IDS (deployed at idividual computers) or Network-based IDS (deployed at etwork level). Accordig to the methods used for aalyzig the collected data, IDS ca also be categorized ito two broad categories: Misuse based detectio ad aomaly based detectio. Misuse based (sigature based) itrusio detectio system tries to detect malicious activities based o patters or sigatures of kow attacks. If a patter match is detected, a alarm is reported to the etwork admiistrator. Sice misuse based detectio system is specifically desiged for detectig kow attacks, it geerates low umber of false alarms. However, misuse based itrusio detectio systems could ot detect ovel attacks [2]. Aomaly based itrusio detectio refers to idetifyig evets that are aomalous with respect to the ormal system behavior. If the icomig etwork traffic patters do ot follow the ormal etwork traffic behavior, a alarm will be reported ad such patters are called aomalies or outliers [2]. Despite their capability i detectig ovel attacks aomaly based itrusio detectio systems suffer from high false positive rate. The misuse ad aomaly based itrusio detectio systems are complemetary [3]. Hece, by takig advatages of low false-positive rate by sigature-based itrusio detectio system ad the ability of aomaly detectio system to detect zero-day attacks some researchers itroduce a hybrid itrusio detectio system. Accordig to the fusio mechaisms of the two systems, hybrid itrusio detectio systems ca have layered or parallel architecture. M. A. Aydı et al. [4] proposed a hybrid IDS by sequetially combiig packet header aomaly detectio (PHAD) ad etwork traffic aomaly detectio (NETAD) with Sort. They used the aomaly detectors (PHAD ad NETAD) as a preprocessor for Sort. O the other had Depre et al. [5] proposed a parallel hybrid IDS architecture usig Self-Orgaizig Map as aomaly detector ad J.48 decisio tree for misuse detectio. I their proposed framework decisio support system is implemeted for combiig the detectio results of the two systems. Though, may itrusio detectio frameworks ad systems have bee developed by the research commuity, IDS performace ad zero-day attack detectio are still ope research issues ad challeges. Hece, by takig the advatage of low false alarm of misuse based itrusio detectio system ad the capability of detectig zero-day attacks by aomaly based itrusio detectio system i this paper we proposed a hybrid layered itrusio detectio system. We used radom forests classifier for misuse detectio ad esemble of oe-class support vector machie (1-SVM) with baggig for aomaly

2 36 Effective Hybrid Itrusio Detectio System: A Layered Approach detectio. I the proposed system automatic feature selectio ad data ormalizatio are used for data preprocessig. The misuse detectio model is built usig a traiig data cotaiig ormal profiles ad kow attacks ad for buildig the aomaly detector model we used oly ormal etwork traffic traiig data. The subsequet sectios of this paper are orgaized as follows. I sectio II we preset some theoretical backgroud iformatio about radom forests, oe-class SVM, ad data pre-processig techiques. Sectio III describes the proposed hybrid itrusio detectio system. The dataset used for the experimet ad performace evaluatio results will be discussed i sectio IV. Fially, we will coclude this research work i sectio V. A. Radom Forests II. THEORETICAL BACKGROUND As the developer of radom forests classifier, L. Breima, defied radom forests as esemble of may decisio trees ad each tree is developed usig a bootstrapped sample from the origial traiig data [6]. If the total umber of attributes is M, the for each tree oly m attributes are chose radomly (where m < M). For each tree radomess is itroduced i two ways: durig bootstrapped sample geeratio ad radom cadidate feature selectio at each ode of a tree. Oce the classifier is built, to classify a icomig test data, the iput vector of icomig data will be put dow to each of the trees i the forest. The majority vote from predictios of the esemble of trees is used to decide to which class the istace uder cosideratio belogs. Compared to a covetioal decisio trees radom forests classifier has better detectio accuracy [7, 13]. I the proposed system, the radom forest classifier is used for misuse detectio. A dataset cotaiig both ormal ad kow attacks is used to trai the radom forests classifier. B. Feature Selectio Oe of the major issues associated with large dataset, like etwork itrusio detectio dataset, is dimesioality problem. I the case of large dataset feature selectio is a crucial step for dimesioality reductio. Feature selectio is a process of data dimesioality reductio by determiig whether a feature is relevat or ot for a give problem. The target of feature selectio is to select feature vector that leads to large betwee-class distace ad small withi-class variace [8]. Usig effective features i desigig a classifier ot oly ca reduce the data size but also ca improve the performace of the classifier ad ehaces data uderstadig ad visualizatio [8]. Geerally, there are three types of feature selectio models: Filter, Wrapper ad Hybrid [15]. I wrapper model the feature selectio is depedet o the performace of the learig algorithm. O the other had, i filter model the quality of selected features is depedet oly o the statistical property of the data. I this paper filter type of feature selectio algorithm is implemeted usig Iformatio Gai (IG) of a attribute. As stated i [7] the iformatio gai for a give iput feature X with respect to the class attribute C ca be computed as follows: Where I( C; X ) H( C) H( C X ) (1) ( i 1 i 2 Ci H C) P( C c )log P( C ) (2) P( C ci ) is the probability that the class attribute c i occurs, ad m H( C X ) P( X c ) H( C X ) (3) i 1 i ci H(C) is etropy of C ad H( C X ) is the average coditioal etropy of C. I this paper, X defies idividual iput attributes i the traiig dataset, ad C defies class label (Normal or Attack). C. Oe Class Support Vector Machie A Support Vector Machie (SVM) is a learig systems based o mappig the traiig data ito a high dimesioal feature space usig some o-liear mappig fuctios. By projectig to a high dimesioal feature space a o-liear decisio boudary ca be built. Scholkopf et al. [10] motivated by SVM proposed oeclass SVM classificatio. The idea behid oe-class SVM is to determie a hyperplae that separates the required fractio of oe class traiig patters from the origi i the feature space F. I oe-class SVM there is a tradeoff betwee maximizig the distace betwee the origi ad the separatig plae ad a rejectio rate. It is ot always the case to fid the separatig hyperplae i the origial feature space. Hece, the fuctio Φ: X F is used for mappig the origial feature space to kerel space. The objective fuctio for oe-class SVM is formulated usig quadratic programmig miimizatio as follows mi Subjected to: ( 1 W 2 1 v 2 W, i, i 1 i ) W. ( xi ) i, i 0 i 1,2,..., Where x i is the i-th traiig istace, is the umber of traiig istaces, ρ is the margi, w is a ormal vector to the hyperplae, v represets fractio of outliers. For each traiig istace i, there is a slack variable ξ i associated with a pealty for rejectio. If the miimizatio problem i equatio 4 solved usig Lagrage multipliers i quadratic programig, the decisio fuctio oly depeds o the dot-product of the vectors i the feature space. Hece it is ot ecessary to (4)

3 Effective Hybrid Itrusio Detectio System: A Layered Approach 37 perform a explicit mappig to that space rather the dot product i the feature space ca be computed usig kerel fuctio K(x)=ϕ(x) T ϕ(x). Usig the Lagrage multipliers ad kerel trick the decisio fuctio for test data z will be as follows: z sg(( K( z, x )) ) i 1 i i F (5) α i is a Lagrage multiplier. Sice majority of α i are zero, the computatio of F(z) i equatio 5 is efficiet. If F(z) 0, the the test data z is similar to the traiig data ad classified to the class of the traiig class. Otherwise, the test data will be rejected as a outlier. K(z,x i ) is a kerel fuctio. There are differet types of kerel fuctio such as liear, polyomial, Gaussia radial basis, ad sigmoid. However, Gaussia radial basis fuctio (RBF) show i equatio 6 is the most commoly used fuctio for aomaly detectio. K z 2 z xi, x i e (6) The value of γ determies how much a support vector iflueces its eighbors. If γ is large, most of the traiig vectors will be support vectors. There will be few support vectors if the value of γ is small. D. Normalizatio I publicly available itrusio detectio dataset some of the features are omial ad others are ot ormalized. For learers that lear from statistical characteristics of features ormalizatio of data is a crucial pre-processig step. Data ormalizatio is the way of scalig the values of each attribute to fall withi a specific rage so that the effect of oe attribute should ot domiate the others. Feature based data ormalizatio ca be broadly categorized ito liear ad o-liear methods. For our system we used mi-max based liear data ormalizatio techique. The formula for mi-max based ormalizatio is show i equatio 7. X X mi max mi ' A (7) X ad X' are value to be ormalized ad the ormalized attribute value respectively. mi A ad max A are the miimum ad maximum possible values for attribute A before ormalizatio. For hadlig omial features for SVM, it is importat to covert them to umeric represetatio. Hsu [11] recommeded the coversio of omial features i to biary represetatio prior to usig them for SVM. III. PROPOSED HYBRID INTRUSION DETECTION SYSTEM The proposed hybrid layered itrusio detectio framework is show i Fig. 1. The iformatio gai (IG) based feature selectio module computes the iformatio gai of each attribute usig equatio 1. Oce the A A iformatio gai of each attribute is computed the ext step is to select optimal subset of features for the classifier. For optimal feature selectio we used Algorthim-1. I Algorthim-1 X is the origial feature vector ad IG is iformatio gai for the respective features. The selected feature vector is represeted by Y. T is some threshold value that used for selectig optimal features subset. T is depedet o the traiig data used for classificatio. Algorithm-1: Optimal Feature Subset Selectio Iput: X={X 1, X 2,,X m }, IG={IG 1, IG 2,, IG m } ad T Output: Y= {Y 1, Y 2,,Y } 1: IGTotal m i 1 IGi 2: X ' Descedig Sort( X, IG) 3: For i is from 1 to m do 4: IGi Wx' i IGTotal 5: Ed for 6: S 0 7: For i is from 1 to m ad S T do 8: S S Wx' i 9: i 10: Y i X ' i 11: Ed for As soo as the relevat features are idetified, the the feature selectio module will forward the data with the selected features to the misuse itrusio detector. The misuse detector is implemeted usig radom forests classifier. The radom forests classifier model is built usig traiig data which cotais both ormal ad kow attack patters. The radom forests classifier approach provides mechaisms for excludig well-kow attacks from beig reprocessed by the subsequet oeclass SVM based aomaly detector. Oly patters which are classified as ormal by the radom forests classifier are forwarded to aomaly detector module for fial decisio. The radom forests classifier-based misuse detector is autoomous. It ca block the detected attacks without waitig for the decisio of the aomaly detector. Such capability of the misuse detector somehow reduces the time required to detect kow attacks. If ulabeled etwork traffic istaces arrived to the proposed model, the those istaces classified as attack by the radom forests classifier would be blocked whereas those istaces classified as ormal by the radom forests classifier would be set to the ext level. Traiig data, which are classified as ormal by the radom forests classifier usig cross validatio, are used for feature selectio for the oe-class SVM classifier. Though the data classified as ormal by radom forests classifier is imbalaced (large umber of ormal profiles ad small umber of attacks), it is eough for selectig relevat features for idetifyig aomalies from ormal profiles.

4 38 Effective Hybrid Itrusio Detectio System: A Layered Approach The ext compoet, data ormalizatio module, will preprocess the icomig data to ehace the performace of oe-class SVM. Normalizatio is made usig equatio 7. I order to hadle omial values we coverted all omial attributes i to biary represetatio as recommeded by Hsu [11]. Update data Traiig Block Attack Yes Yes Network Traffic Data Traiig Data IG-based Feature selectio Misuse Radom forests Classifier Fig. 1. Proposed Hybrid Layered Itrusio Detectio System. No IG-based Feature selectio Aomaly Is attack? Esemble Oe-Class SVM Is attack? Normal traffic Test Data Detector Data ormalizatio Detector No The aomaly detector is built usig oly ormal traiig istaces which are also classified by the misuse detector as ormal. Istead of sigle oe-class SVM, to improve the performace of the aomaly detector, we proposed the use of esemble of oe-class SVM classifiers with bootstrap aggregatig techique. As it has bee doe i radom forests algorithm, each of the oeclass SVM classifiers is built usig a bootstrapped sample of traiig istaces. The decisio of each of these classifiers is aggregated ad a majority votig is doe for fial decisio. The aomaly detector will block detected attacks which were cosidered as ormal traffic by the misuse detector. The sigatures of these attacks will be used for updatig the origial traiig data. IV. EXPERIMENTS All the experimets i this paper are implemeted usig WEKA machie learig tool ad MATLAB 2013a. A. Dataset Descriptio The proposed system is evaluated usig publicly available NSL-KDD itrusio detectio dataset which is a ehaced versio of the KDD99 itrusio detectio dataset. KDD99 dataset is the oly well-kow ad publicly available data set i the area of itrusio detectio [14]. It is still widely used i evaluatig the performace of proposed itrusio detectio algorithms. O the KDD99 itrusio detectio dataset 78% of traiig istaces ad 75% of test istaces are duplicated. Hece the NSL-KDD dataset is geerated by removig redudat istaces i both the traiig ad test data of the KDD99 itrusio detectio dataset [12]. This dataset has 41 features ad oe class attribute. The traiig data cotais 24 types of attacks ad the testig data cotais extra 14 types of attacks. The attacks i this dataset are categorized i oe of the four attack categories (DoS, Probig, User to Root ad Remote to Local attacks) Though NSL-KDD dataset is ehaced versio of the KDD99 dataset we observed two basic problems i this dataset. First as show i Fig. 2 there are ambiguities i some records of the testig dataset. That is some records have same value for all the 41 features, however they are labeled to differet classes (oe as ormal ad the other as attack). The secod observatio we made is there is a feature called um_outbouds_cmds which has a value of zero for all the records i both the traiig ad testig data. This feature will ot have ay cotributio i idetifyig attacks from ormal profiles. Hece we made two improvemets i usig NSL-KDD dataset: we removed all ambiguous records ad the um_outbouds_cmds feature from the dataset. The distributio of the dataset used i this experimet is depicted i Table 1. B. Data Pre-processig After calculatig iformatio gai for each of the features i the traiig data, for the radom forests classifier we selected 20 features by applyig the optimal feature selectio algorithm with T=0.9. List of all the selected features with their iformatio gai value (IG) is show i Table 2. The radom forests classifier is built usig the selected features ad the KDDTrai+ full traiig data. For the esemble oe-class SVM classifiers 11 features are selected from the 20 features by applyig optimal feature selectio algorithm with T=0.9

5 Effective Hybrid Itrusio Detectio System: A Layered Approach 39 o the portio of traiig data which are classified as ormal by the radom forests classifier. The bootstrap traiig sample for each of the 1-SVM classifier is geerated from 20% of the ormal KDDTrai+ istaces which are also classified as ormal by the radom forests classifier. Record# ,udp,private,SF,105,105,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,2,0,0,0,0,1,0,0,255,255,1,0,0,0,0,0,0,0,ormal ,udp,private,SF,105,105,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,2,0,0,0,0,1,0,0,255,255,1,0,0,0,0,0,0,0,smpgetattack ,udp,private,SF,105,105,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,3,0,0,0,0,1,0,0,255,255,1,0,0.01,0,0,0,0,0,ormal ,udp,private,SF,105,105,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,3,0,0,0,0,1,0,0,255,255,1,0,0.01,0,0,0,0,0,smpgetattack Fig. 2. Sample ambiguous records i the NSL-KDD Test dataset Table 1. Experimet dataset distributio Data Normal Attack Traiig data 67,343 58,630 Test data 9,515 12,663 Table 2. Selected features list Rak Feature ame IG 1 srs_bytes Service dst_bytes Flag diff_srv_rate same_srv_rate Dst_host_srv_cout Dst_host_same_srv_rate Dst_host_diff_srv_rate Dst_host_serror_rate logged_i Dst_host_srv_serror_rate serror_rate Cout srv_serror_rate Dst_host_srv_diff_host_rate Dst_host_cout Dst_host_same_src_port_rate srv_diff_host_rate srv_cout C. Performace Measure I this paper attack detectio rate (DR), false positive rate (FPR) ad receiver operatig characteristic (ROC) curve are used for performace evaluatio ad compariso of classifiers. I the case of itrusio detectio, detectio rate is the ratio of the umber correctly detected attacks to the total umber of attacks. False positive rate is the ratio of the umber of ormal traffic data which are detected as attack to the total umber of ormal data. The ROC curve is used for comparig the proposed hybrid system with the idividual stadaloe radom forest based misuse detector ad aomaly based SVM biary classifier. Depre et al. [5] evaluated their proposed system usig cross validatio with the KDD99 traiig dataset. However, such way of evaluatio i itrusio detectio does t iclude ovel attacks i the test data. For evaluatig our system we used the test data which cotais 14 more attack types tha the traiig data. The performace of the proposed hybrid layered itrusio detectio system for the test data with differet attack distributios is show i Table 3. For these specific results Gaussia Basis kerel Fuctio (RBF) with parameter γ= 0.02 ad v =0.1 were used for oeclass SVM learer. As it ca be visualized from the ROC curve show i Fig. 3 the proposed system outperforms stadaloe radom forests-based misuse detector ad ordiary SVM-based aomaly detector. This ROC curve is geerated for 50% of the attacks i the NSL- KDDTest+ dataset. Attack detectio rate ad false positive rate for the proposed system ad some well-kow models usig full test data is show i Table 4. Attack detectio rate ad false positive rate for the proposed system is 92.13% ad 6.42% respectively. The result shows that compared to some well-kow methods the proposed system ca effectively detect attacks. Table 3. Performace of the proposed hybrid itrusio detectio system for the test data Attack distributio Detectio rate False Positive i test data rate 1% Attack % Attack % Attack % Attack % Attack % Attack % Attack % Attack

6 Detectio Rate (DR) 40 Effective Hybrid Itrusio Detectio System: A Layered Approach Proposed RF_1-SVM Radom Forests C-SVM False Postive Rate (FPR) Fig. 3. ROC curve for the test data with 50% attack distributio whe γ= 0.01 Model Table 4. Performace compariso for the full test data Attack Detectio Rate (DR) Naive Bayes J48 decisio tree Radom forests SVM(γ = 0.02 ) Proposed RF_1-SVM (γ=0.02 ad ν =0.1) V. CONCLUSION False Positive Rate (FPR) I this paper a hybrid layered IDS was preseted by combiig both misused ad aomaly itrusio detectio systems. The radom forests classifier was used to detect previously kow attacks. The aomaly detector, esemble of oe-class SVM classifiers, was built usig baggig techique. The proposed system addresses the problem of attack detectio for previously kow ad ukow attacks. The experimetal results show that the proposed system is very effective i improvig attack detectio rate with small false positive rate. We compared our approach with some well-kow methods ad foud that the proposed system ca effectively detect previously ukow attacks with a detectio rate improvemet of 18.73%. I usig publically available itrusio detectio datasets for traiig ad evaluatio of a proposed model care has to be take. Those ambiguous records i the dataset should be removed. The optimal feature subset selectio method preseted i this paper has ot oly cotributed for dimesioality reductio it also has cotributio for performace improvemet for both the misuse ad aomaly itrusio detectio systems. Though the developed system updates the traiig data with ew attack types, it is ot adaptive. Hece, i our future work, we pla to make the proposed system real time ad adaptive to cope with dyamic attack scearios. REFERENCES [1] Scarfoe, K., Mell, P., Guide to Itrusio Detectio ad Prevetio Systems (IDPS). NIST Special Publicatio , [2] M. H. Bhuya, D. K. Bhattacharyya, ad J. K. Kalita, Network Aomaly Detectio: Methods, Systems ad Tools, Commuicatios Surveys & Tutorials, IEEE press, vol. 16, o. 1, pp , [3] H.-J. Liao, C.-H. R. Li, Y.-C. Li, ad K.-Y. Tug, Itrusio Detectio System: A Comprehesive Review, Joural of Network ad Computer Applicatios, vol. 36, Issue 1, pp , [4] M. A. Aydı, A. H. Zaim, ad K. G. Ceyla, A Hybrid Itrusio Detectio System Desig for Computer Network Security, Computers ad Electrical Egieerig, vol. 35, o. 3, pp , [5] O. Depre, M. Topallar, E. Aarim, ad M. K. Ciliz, A Itelliget Itrusio Detectio System (IDS) for Aomaly ad Misuse Detectio i Computer Networks, Expert Systems with Applicatios, pp , [6] L. Breima, Radom Forests, Machie Learig, vol. 45, o. 1, pp. 5 32, [7] A. Tesfahu, ad D. L. Bhaskari, Itrusio Detectio Usig Radom Forests Classifier with SMOTE ad Feature Reductio, i Proc. of 2013 Iteratioal Coferece o Cloud & Ubiquitous Computig & Emergig Techologies, pp , [8] S. Theodoridis, ad K. Koutroumbas, Patter Recogitio, Academic press, [9] B. Scholkopf, R. Williamso, A. Smola, J. Shawe-Taylor, ad J. Platt, Support Vector Method for Novelty Detectio, NIPS, vol. 12, pp , 1999.

7 Effective Hybrid Itrusio Detectio System: A Layered Approach 41 [10] Z. Xue-qi, G. Chu-hua, ad L. Jia-ji, Itrusio Detectio System Based o Feature Selectio ad Support Vector machie, i Proc. of First Iteratioal Coferece o Commuicatios ad Networkig i Chia, pp. 1-5, Oct [11] Hsu, Chih-Wei, Chag, Chih-Chug, ad Chih-Je, A Practical Guide to Support Vector Classificatio, Natioal Taiwa Uiversity, [12] Tavallaee, E. Bagheri, W. Lu, ad A.A. Ghorbai A Detailed Aalysis of the KDD CUP 99 Data Set, i proc. of IEEE Symposium o Computatioal Itelligece for Security ad Defese Applicatios, pp. 1-6, [13] Zhag ad M. Zulkerie, Network Itrusio Detectio usig Radom Forests, School of Computig Quee s Uiversity, Kigsto Otario, [14] W. Lee, S. Stolfo, P. Cha, E. Eski, W. Fa, M. Miller, S. Hershkop, ad J. Zhag, Real Time Data Miig-based Itrusio Detectio, The 2001 DARPA Iformatio Survivability Coferece ad Expositio (DISCEX II), Aaheim, CA, Jue [15] Y. Che, Y. Li, X. Q. Cheg, ad L. Guo, Survey ad taxoomy of feature selectio algorithms i itrusio detectio system, i Proc. of the 2d SKLOIS coferece o Iformatio Security ad Cryptology, pp , Authors Profiles Abebe Tesfahu received his B.Sc. degree i Electrical ad Computer Egieerig ad M.Tech i Electroics ad Computer Egieerig from Addis Ababa Uiversity, Ethiopia. He is curretly a PhD cadidate i Adhra Uiversity, Visakhapatam, Idia. His research iterest icludes Network Security, Critical Ifrastructure Protectio, ad Machie learig. D. Lalitha Bhaskari is a Professor i the departmet of Computer Sciece ad Systems Egieerig, Adhra Uiversity, Visakhapatam, Idia. She is guidig more tha 15 PhD Scholars from various istitutes. Her mai research iterest icludes Network Security, Image Processig, Patter Recogitio, Stegaography ad Digital Watermarkig. Prof. D. Lalitha Bhaskari is a member of IEEE, IJSCI, CSI ad Associate Member of Istitute of Egieers.

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Spam Detection. A Bayesian approach to filtering spam

Spam Detection. A Bayesian approach to filtering spam Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Ordinal Classification Method for the Evaluation Of Thai Non-life Insurance Companies

Ordinal Classification Method for the Evaluation Of Thai Non-life Insurance Companies Ordial Method for the Evaluatio Of Thai No-life Isurace Compaies Phaiboo Jhopita, Sukree Sithupiyo 2 ad Thitivadee Chaiyawat 3 Techopreeurship ad Iovatio Maagemet Program Graduate School, Chulalogkor Uiversity,

More information

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing World Applied Scieces Joural 23 (11): 1418-1424, 2013 ISSN 1818-4952 IDOSI Publicatios, 2013 DOI: 10.5829/idosi.wasj.2013.23.11.950 DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

Confidence Intervals

Confidence Intervals Cofidece Itervals Cofidece Itervals are a extesio of the cocept of Margi of Error which we met earlier i this course. Remember we saw: The sample proportio will differ from the populatio proportio by more

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks , pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,

More information

Scalable Biomedical Named Entity Recognition: Investigation of a Database-Supported SVM Approach

Scalable Biomedical Named Entity Recognition: Investigation of a Database-Supported SVM Approach Scalable Biomedical Named Etity Recogitio: Ivestigatio of a Database-Supported SVM Approach Moa Solima Habib * ad Jugal Kalita Departmet of Computer Sciece Uiversity of Colorado, 1420 Austi Bluffs Pkwy

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III)

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III) COMPUSOFT, A iteratioal joural of advaced computer techology, 3 (3), March-2014 (Volume-III, Issue-III) ISSN:2320-0790 Adaptive Workload Maagemet for Efficiet Eergy Utilizatio o Cloud M.Prabakara 1, M.

More information

Firewall Modules and Modular Firewalls

Firewall Modules and Modular Firewalls Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis Cotrol Sciece ad Egieerig Volume 2013, Article ID 821315, 6 pages http://dx.doi.org/10.1155/2013/821315 Research Article Real-Time Detectio of Applicatio-Layer DDoS Attack Usig Time Series Aalysis Togguag

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

SPC on Ungrouped Data: Power Law Process Model

SPC on Ungrouped Data: Power Law Process Model Iteratioal Joural of Software Egieerig. ISSN 0974-3162 Volume 5, 1 (2014), pp. 7-16 Iteratioal Research Publicatio House http://www.irphouse.com SPC o Ugrouped Data: Power Law Process Model DR. R. Satya

More information

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm A Network Itrusios Detectio System based o a Quatum Bio Ispired Algorithm Omar S. Solima 1, Aliaa Rassem 2 1,2 Faculty of Computers ad Iformatio, Cairo Uiversity Abstract: Network itrusio detectio systems

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

How To Extract From Data From A College Course

How To Extract From Data From A College Course (IJACSA Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Vol., No. 6, 0 Miig Educatioal Data to Aalyze Studets Performace Briesh Kumar Baradwa Research Scholor, Sighaiya Uiversity, Raastha,

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Extracting Similar and Opposite News Websites Based on Sentiment Analysis

Extracting Similar and Opposite News Websites Based on Sentiment Analysis 202 Iteratioal Coferece o Idustrial ad Itelliget Iformatio (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sigapore Extractig Similar ad Opposite ews Websites Based o Setimet Aalysis Jiawei Zhag, Yukiko

More information

DATA MINING TO CLUSTER HUMAN PERFORMANCE BY USING ONLINE SELF REGULATING CLUSTERING METHOD

DATA MINING TO CLUSTER HUMAN PERFORMANCE BY USING ONLINE SELF REGULATING CLUSTERING METHOD Istabul, Turkey, May 7-30, 008. DATA MINING TO CLUSTE HUMAN PEFOMANCE BY USING ONLINE SELF EGULATING CLUSTEING METHOD ADEM KAAHOCA, DILEK KAAHOCA, OSMAN KAYA Bahcesehir Uiversity, Egieerig Faculty Computer

More information

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Sigal & Image Processig : A Iteratioal Joural (SIPIJ) Vol.2, No.2, Jue 2011 VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Amir Salarpour 1 ad Arezoo Salarpour 2 ad Mahmoud Fathi 2 ad MirHossei Dezfoulia

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

On the Periodicity of Time-series Network and Service Metrics

On the Periodicity of Time-series Network and Service Metrics O the Periodicity of Time-series Network ad Service Metrics Joseph T. Lizier ad Terry J. Dawso Telstra Research Laboratories Sydey, NSW, Australia {oseph.lizier, terry..dawso}@team.telstra.com Abstract

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

Data-Enhanced Predictive Modeling for Sales Targeting

Data-Enhanced Predictive Modeling for Sales Targeting Data-Ehaced Predictive Modelig for Sales Targetig Saharo Rosset Richard D. Lawrece Abstract We describe ad aalyze the idea of data-ehaced predictive modelig (DEM). The term ehaced here refers to the case

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao issam.kaddoura@liu.edu.lb amih Abdul-Nabi

More information

Totally Corrective Boosting Algorithms that Maximize the Margin

Totally Corrective Boosting Algorithms that Maximize the Margin Mafred K. Warmuth mafred@cse.ucsc.edu Ju Liao liaoju@cse.ucsc.edu Uiversity of Califoria at Sata Cruz, Sata Cruz, CA 95064, USA Guar Rätsch Guar.Raetsch@tuebige.mpg.de Friedrich Miescher Laboratory of

More information

Cantilever Beam Experiment

Cantilever Beam Experiment Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING

FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING Christoph Busch, Ralf Dörer, Christia Freytag, Heike Ziegler Frauhofer Istitute for Computer Graphics, Computer Graphics Ceter

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

Comparison of Support Vector Machine and Artificial Neural Network Systems for Drug/Nondrug Classification

Comparison of Support Vector Machine and Artificial Neural Network Systems for Drug/Nondrug Classification 1882 J. Chem. If. Comput. Sci. 2003, 43, 1882-1889 Compariso of Support Vector Machie ad Artificial Neural Network Systems for Drug/Nodrug Classificatio Evgey Byvatov, Uli Fecher, Jes Sadowski, ad Gisbert

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15 AdaLab AdaLab Adaptive Automated Scietific Laboratory (AdaLab) Adaptive Machies i Complex Eviromets Start Date: 1.4.15 Scietific Backgroud The Cocept of a Robot Scietist Computer systems capable of origiatig

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Linear and Nonlinear Trading Models with Gradient Boosted Random Forests and Application to Singapore Stock Market *

Linear and Nonlinear Trading Models with Gradient Boosted Random Forests and Application to Singapore Stock Market * Joural of Itelliget Learig Systems ad Applicatios, 2013, 5, 1-10 http://dx.doi.org/10.4236/jilsa.2013.51001 Published Olie February 2013 (http://www.scirp.org/joural/jilsa) 1 Liear ad Noliear radig Models

More information

FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL

FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL Hehua Chi a, Liahua Chi b *, Meg Fag a, Juebo Wu c a Iteratioal School of Software, Wuha Uiversity, Wuha 430079, Chia - hehua556@163.com b School of Computer

More information