Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
|
|
- Sarah Pearson
- 7 years ago
- Views:
Transcription
1 161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN ; ISSN The Italan Assocaton of Chemcal Engneerng Onlne at DOI: 1.333/CET Applcaton of an Improved BP Neural Networ Model n Enterprse Networ Securty Forecastng Xun Chen *a, b, Lsheng Xu a, Meng Xu a a College of Geology and Envronment Central South Unversty, Changsha 4183, Chna; b Changsha Aeronautcal Vocatonal and Techncal College, Changsha 4114, Chna sy115baby@163.com In recent years, wth the rse of the global networ, the Internet technology as the core of large enterprse networ system s developng rapdly. It s wdely used n the feld of electronc commerce, nformaton servce, networ communcaton and other techncal means. At the same tme, the problem of networ securty has become ncreasngly promnent. Due to hstorcal and techncal reasons, the securty system of enterprse networ s stll very wea n Chna. The networ basc software and hardware s stll use a large number of foregn products, and the core of the networ securty technology cannot be fully mastered. So, the securty rss are obvous. Therefore, strengthenng the constructon of enterprse networ securty system and researchng the safe applcaton model has become the top prorty of our country's enterprse nformaton technology. Based on ths, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months. The score s.85,.88 and.91, whch s close to the actual value of networ securty. 1. Introducton In recent years, wth the rse of the global networ, the Internet technology as the core of large enterprse networ system s developng rapdly. It s wdely used n the feld of electronc commerce, nformaton servce, networ communcaton and other techncal means. At the same tme, the problem of networ securty has become ncreasngly promnent. Due to hstorcal and techncal reasons, the securty system of enterprse networ s stll very wea n Chna. The networ basc software and hardware s stll use a large number of foregn products, and the core of the networ securty technology can not be fully mastered. So, the securty rss are obvous. Therefore, strengthenng the constructon of enterprse networ securty system and researchng the safe applcaton model has become the top prorty of our country's enterprse nformaton technology. Networ securty rs predcton s an mportant component of networ securty awareness (Chna Internet Networ Informaton Center 1 and 13). At present, the most common methods of predcton are as follows. Grey theory method. In recent years, the applcaton of gray theory has been etended to many scentfc felds, such as envronment, clmate, health, medcal care, populaton and so on. In the area of networ securty, there are many research results ((Deng Julong (), Wang Cayn (13), Pu Tanyn (9), and Zheng Jelang (5)). The theory uses the sequences whch are generated by the orgnal sequence of the system to determne the best fttng curve, and t can effectvely deal wth the less data sample system. Tme seres method. Tme seres forecastng method reveals the rule of the phenomenon wth tme varaton, and ths rule s etended to the future, so as to realze the predcton of the phenomenon n the future (Yang Zhongjn (6), Guo Mngyue (9), Chang Tahua (1), and Zhang Jnghu (1)). Neural networ method. Neural networ s a nd of method to smulate human's cogntve process, whch s a nd of nonlnear dynamc system of nformaton dstrbuted storage and parallel processng. Its essence s a nd of Please cte ths artcle as: Chen X., Xu L.S., Xu M., 15, Applcaton of an mproved bp neural networ model n enterprse networ securty forecastng, Chemcal Engneerng Transactons, 46, DOI:1.333/CET154611
2 16 nonlnear functon that represents the relatonshp between the nput value and the output value. Forecastng methods based on neural networs have many advantages, such as good nonlnear, dstrbuted and selforganzng learnng. It has good practcal value n mult varable forecastng and nonlnear forecastng. But the neural networ s a blac bo forecastng method, whch can only be used to ft the system's nput and output data. Therefore, the relatonshp between nput value and the output value s not clearly descrbed, and the results cannot be eplaned reasonably (Tang Chenghua (9), Xe La, Ca (13) Zhpng (8) and Xu Fuyong (5)). Based on ths, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months.. Neural networ model BP algorthm not only has the nput layer node, the output layer node, but also has one or more hdden layer nodes. Frstly, the nput sgnal s propagated forward to the hdden layer node. After the functon of the ectaton functon, the output sgnal of the hdden layer node s transmtted to the output layer node. Fnally,we get the output results. The S type functon s usually selected as the node's ectaton functon, whch s shown below; 1 f( ) 1 e Q (1) Here, Q s the Sgmod parameter, whch s prmarly responsble for the form of the ectaton functon. The learnng process of the algorthm s composed of forward propagaton and bacward propagaton. In the process of forward propagaton, the nput nformaton s processed by the hdden layer and the nformaton s transmtted to the output layer. Each layer of neurons only affects the state of the neurons n the net layer. If the output layer cannot get the epected output value, the algorthm s transferred to the process of the bac propagaton. In ths process, the error sgnal s returned along the orgnal path. By modfyng the weghts of each layer, the system error can be mnmzed. Set up any networ contanng n nodes, the characterstcs of each node are Sgmod type. For smplcty, the networ has only one output value whch s y. The output value of th node s O. The number of sample s N, ( 1,,, N) node net. For a node, the nput value s and the output value s O, and the nput of the j th node s: j y, the output value of th W O () We defne the error functon as: 1 E y y N ( ˆ ) (3) 1 Where, y ˆ s the actual output value of the networ. Defne Therefore, E y yˆ ( ), net E E E E O O Wj net Wj net and O f ( net ) net. (4) When j s the output node, O yˆ
3 163 E yˆ ' ( y y ) f ( net ) yˆ net ˆ (5) When j s not the output node, E E O E f ' ( net ) net O net O (6) E E net E E W O W W O net O net O net (7) m m mj m mj m m m m m m m Therefore, f ' ( net ) W m mj m E W j O m (8) 3. Improvement of BP networ The settng of the ntal weght and the threshold of the memory. One of the man problems of the BP neural networ model s the slow convergence speed and the length of the teraton tme. Through a large number of practcal applcatons, the ntal weghts and thresholds of BP neural networ can be randomly selected, the convergence speed of BP neural networ s greatly affected by the method. Some scholars put forward the correspondng ntal weghts and threshold selecton method, and they have acheved some results n the feld of ther research. On ths bass, ths artcle proposes a new method of the ntal smooth weght and threshold of memory. Methods are as follows: w1 ( ) Rnd( ) 1 ( ) Rnd( ) (9) w ( ) Rnd( ) ( ) Rnd( ) (1) w 1( ) w( ) w () 1( ) ( ) () 3,4,, N (11) Where, The ntal weghts for the th BP networ operaton s operaton s, the termnaton weghts for the 1 th BP networ operaton s threshold for the 1 th BP networ operaton s Smulaton eperment and result analyss w, the threshold for the th BP networ w 1, and the termnaton 4.1 Networ securty evaluaton nde system Networ and nformaton system s a comple system engneerng, whch ncludes the eternal factors and the nternal factors, and they are mutually restrcted. Therefore, we must have a standard, unfed, objectve crtera to measure networ securty. Accordng to the domestc and foregn networ securty evaluaton standard, and the basc requrements of the networ and nformaton system securty, we should fully consder the varous factors that affectng the securty of the networ, such as physcal securty factor, operaton safety factor, nformaton securty factors, system securty polcy and safety techncal measures. Therefore, we gve the networ securty evaluaton nde system. As shown n table 1:
4 164 Table 1: The networ securty evaluaton nde system Frst level nde Second level nde safety nde Varable Equpment safety X1 physcal securty Envronmental safety X Meda securty X3 Rs analyss X4 operaton safety Access control measures Audt measures X5 X6 Emergency technology X7 networ securty nformaton securty Informaton transmsson securty Defense Technology Data ntegrty X8 X9 X1 Data encrypton X11 Applcaton software X1 system securty polcy User dentty authentcaton X13 Data remote bacup X14 safety measures techncal Securty audt functon Ant hacng measures X15 X16 4. Data pre-processng of networ securty nde Table 1 reflects the securty of computer networs from dfferent angles. As the dmensons of the varous ndcators are dfferent, so we cannot mae a drect comparson. In order to mae the nde have comparablty, and to speed up the convergence rate of the neural networ, ths paper has carred on the normalzed processng to each nde: 1) for qualtatve ndcators: usng epert scorng method to determne ts data, and we have a normalzed treatment of varous ndcators. ) for quanttatve ndcators: the followng formula s used to normalze. ma mn mn Where, the normalzed values for the th ndcator s, the mnmum value of the th ndcator s the mamum value of the th ndcator s ma. (1) mn, and 4.3 Smulaton eperment In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. As the neural networ model of ths paper s a 16-X-1 model, we carry out the tranng of the sample accordng to prncple. The prncple s that the number of nodes n the hdden layer s 3/4 of the number of nodes n the nput layer. We try to set the number of nodes n the hdden layer to 11,1 and 13. From the results of tranng, t can be nown that the number of hdden layer nodes s X=1, and the system fttng resdual s the smallest.
5 165 Fgure 1: The number of hdden layer nodes s 11 n neural networ tranng Fgure : The number of hdden layer nodes s 1 n neural networ tranng Fgure 3: The number of hdden layer nodes s 13 n neural networ tranng It can be seen from the test results of fgure 1-3, the node number and the ntal value n ths paper can effectvely shorten the convergence perod, accelerate the tranng speed, and mae the fttng precson of the resdual error reach the hghest. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months, the score s.85,.88 and.91, whch s close to the actual value of networ securty.
6 Conclusons In ths artcle, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In addton, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. References Ca Z.P., Lu F., 8, Securty rs probablty forecastng model based on neural networ [J].Computer scence, 35 (1): Chang T.H., Xu R.Z., Lv G.J., 1, Study on the method of networ securty stuaton predcton based on tme seres [J]. Practce and cognton of mathematcs, 4 (1): Chna Internet Networ Informaton Center. 13. Statstcal report on Internet development n Chna. 13. Chna Internet Networ Informaton Center. 1. Statstcal report on Internet development n Chna. 1. Deng J.L.,, Gray Theory [M]. Wuhan: Huazhong Unversty of Scence & Technology Press Co., Ltd. Guo M.Y., Xao Z.H., 9, Tme seres analyss and SAS applcaton [M]. Wuhan: Wuhan Unversty press. Insttute C S. 1/11 CSI Computer Crme and Securty Survey, Natonal Internet Emergency Center. 11 Chna Internet Networ Securty Report. tml. Pu T.Y., 9, Probe on the Networ Securty Stuatonal Awareness Model Based on the Gray Theory [D]. Changsha: Hunan Unversty. Tang C.H., Yu S.Z., 9, Method of Networ Securty Stuaton Predcton Based on Lelhood BP [J]. Computer Scence, 36(11): Wang C.Y., 13, Assessment of Networ Securty Stuaton Based on Grey Relatonal Analyss and Support Vector Machne [J]. Applcaton Research of Computer, 3(6): Xe L.X., Wang Y.C., Yu J.B., 13, Networ Securty Stuaton Awareness Based on Neural Networ [J]. Journal of Tsnghua Unversty: Scence and Technology, 53(1): Xu F.Y., Shen J., L J.Y., 15, based on Delph and ANN networ securty comprehensve evaluaton method research [J]. Mcrocomputer development, 15 (1): Yang Z.J., 6, Analyss and predcton of tme seres [J]. Chna Scence and technology nformaton, (14): Zhang J.H., Wang G., Wu N., 1, Applcaton of networ securty stuaton predcton method [J]. Computer smulaton, 9 (): Zheng J.L., 5, Research on networ nformaton securty assessment model based on Grey Theory [D]. Nanjng Unversty of Informaton Scence and Technology, 5 (5):
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationMATHEMATICAL ENGINEERING TECHNICAL REPORTS. Sequential Optimizing Investing Strategy with Neural Networks
MATHEMATICAL ENGINEERING TECHNICAL REPORTS Sequental Optmzng Investng Strategy wth Neural Networks Ryo ADACHI and Akmch TAKEMURA METR 2010 03 February 2010 DEPARTMENT OF MATHEMATICAL INFORMATICS GRADUATE
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationAn Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationLei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract
, pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal
More informationA COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION
A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,
More informationTime Delayed Independent Component Analysis for Data Quality Monitoring
IWSSIP 1-17th Internatonal Conference on Systems, Sgnals and Image Processng Tme Delayed Independent Component Analyss for Data Qualty Montorng José Márco Faer Sgnal Processng Laboratory, COE/Pol Federal
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationBUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr
Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo
More informationSelecting Best Employee of the Year Using Analytical Hierarchy Process
J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationDevelopment of an intelligent system for tool wear monitoring applying neural networks
of Achevements n Materals and Manufacturng Engneerng VOLUME 14 ISSUE 1-2 January-February 2006 Development of an ntellgent system for tool wear montorng applyng neural networks A. Antć a, J. Hodolč a,
More informationA study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns
A study on the ablty of Support Vector Regresson and Neural Networks to Forecast Basc Tme Seres Patterns Sven F. Crone, Jose Guajardo 2, and Rchard Weber 2 Lancaster Unversty, Department of Management
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationA heuristic task deployment approach for load balancing
Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of
More informationThe Network flow Motoring System based on Particle Swarm Optimized
The Network flow Motorng System based on Partcle Swarm Optmzed Neural Network Adult Educaton College, Hebe Unversty of Archtecture, Zhangjakou Hebe 075000, Chna Abstract The compatblty of the commercal
More informationLeón, Monterrey, Nuevo León, MÉXICO 4
Statstcal Characterzaton and Optmzaton of Artfcal Neural Networks n Tme Seres Forecastng: The One-Perod Forecast Case Caracterzacón Estadístca y Optmzacón de Redes Neuronales Artfcales para Pronóstco de
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationSet. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index
ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationA spam filtering model based on immune mechanism
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png
More informationModelling of Web Domain Visits by Radial Basis Function Neural Networks and Support Vector Machine Regression
Modellng of Web Doman Vsts by Radal Bass Functon Neural Networks and Support Vector Machne Regresson Vladmír Olej, Jana Flpová Insttute of System Engneerng and Informatcs Faculty of Economcs and Admnstraton,
More informationResearch on Privacy Protection Approach for Cloud Computing Environments
, pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton
More informationSemantic Link Analysis for Finding Answer Experts *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG
More informationOptimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms
Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred
More informationUsing Association Rule Mining: Stock Market Events Prediction from Financial News
Usng Assocaton Rule Mnng: Stock Market Events Predcton from Fnancal News Shubhang S. Umbarkar 1, Prof. S. S. Nandgaonkar 2 1 Savtrba Phule Pune Unversty, Vdya Pratshtan s College of Engneerng, Vdya Nagar,
More informationThe Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationCapacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationPartner selection of cloud computing federation based on Markov chains
COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty
More informationSciences Shenyang, Shenyang, China.
Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng
More informationA Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics
Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College
More informationCredit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationOptimal allocation of safety and security resources
397 A publcaton of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Eddy De Rademaeker, Bruno Fabano, Smberto Senn Buratt Copyrght 2013, AIDIC Servz S.r.l., ISBN 978-88-95608-22-8; ISSN 1974-9791
More informationAn Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
More informationData Mining Analysis and Modeling for Marketing Based on Attributes of Customer Relationship
School of athematcs and Systems Engneerng Reports from SI - Rapporter från SI Data nng Analyss and odelng for arketng Based on Attrbutes of Customer Relatonshp Xaoshan Du Sep 2006 SI Report 06129 Väö Unversty
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationA Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationCapturing Dynamics in the Power Grid: Formulation of Dynamic State Estimation through Data Assimilation
PNNL-2323 Prepared for the U.S. Department of Energy under Contract DE-AC5-76RL83 Capturng Dynamcs n the Power Grd: Formulaton of Dynamc State Estmaton through Data Assmlaton N Zhou Z Huang D Meng S Elbert
More informationResource Sharing Models and Heuristic Load Balancing Methods for
Resource Sharng Models and Heurstc Load Balancng Methods for Grd Schedulng Problems Wanneng Shu 1,2, Lxn Dng 2,3,*, Shenwen Wang 2,3 1 College of Computer Scence, South-Central Unversty for Natonaltes,
More informationSPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:
SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and
More informationResearch Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks
The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationBinomial Link Functions. Lori Murray, Phil Munz
Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher
More informationComparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions
Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda
More informationPreventive Maintenance and Replacement Scheduling: Models and Algorithms
Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the
More informationA Study on Security Technique of Cloud Data Processing in Electronic Commerce
Internatonal Journal of Securty and Its Applcatons, pp.283-290 http://dx.do.org/10.14257/sa.2014.8.2.29 A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationCONSTRUCTING A SALES FORECASTING MODEL BY INTEGRATING GRA AND ELM:A CASE STUDY FOR RETAIL INDUSTRY
Internatonal Journal of Electronc Busness Management, Vol. 9, o. 2, pp. 107-121 (2011) 107 COSTRUCTIG A SALES FORECASTIG MODEL BY ITEGRATIG GRA AD ELM:A CASE STUDY FOR RETAIL IDUSTRY Fe-Long Chen and Tsung-Yn
More informationHow To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
More informationProduct Quality and Safety Incident Information Tracking Based on Web
Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,
More informationAutomobile Demand Forecasting: An Integrated Model of PLS Regression and ANFIS
Automoble Demand Forecastng: An Integrated Model of PLS Regresson and ANFIS 1 SUN Bao-feng, 2 L Bo-ln, 3 LI Gen-dao, 4 ZHANG Ka-mng 1. College of Transportaton, sunbf@jlu.edu.cn 2. College of Transportaton,
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationMining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System
Mnng Feature Importance: Applyng Evolutonary Algorthms wthn a Web-based Educatonal System Behrouz MINAEI-BIDGOLI 1, and Gerd KORTEMEYER 2, and Wllam F. PUNCH 1 1 Genetc Algorthms Research and Applcatons
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationStudy on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model
Study on the Compettveness of the Software Outsourcng Industry n Jln Provnce Based on Damond Model LIU Lqn School of Busness Admnstraton, Changchun Unversty of Technology, Changchun, 130012 lulqn2002@xnhuanet.com
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationAutomated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
More informationOverview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationDifferent Methods of Long-Term Electric Load Demand Forecasting; A Comprehensive Review
Dfferent Methods of Long-Term Electrc Load Demand Forecastng; A Comprehensve Revew L. Ghods* and M. Kalantar* Abstract: Long-term demand forecastng presents the frst step n plannng and developng future
More informationImproved Mining of Software Complexity Data on Evolutionary Filtered Training Sets
Improved Mnng of Software Complexty Data on Evolutonary Fltered Tranng Sets VILI PODGORELEC Insttute of Informatcs, FERI Unversty of Marbor Smetanova ulca 17, SI-2000 Marbor SLOVENIA vl.podgorelec@un-mb.s
More information