Smart Home Security System Based on ANFIS
|
|
|
- Shawn Jacobs
- 10 years ago
- Views:
Transcription
1 Smart Home Securty System Based on ANFIS LeeJeong-G 1,Lee Sang-Hyun 2, Moon Kyung-Il 2 1 Korea Electroncs Technology Insttute, Korea 2 Dept. o Computer Engneerng, Honam Unversty, Korea 2 Dept. o Computer Engneerng, Honam Unversty, Korea {leesang64, kmoon}honam.ac.kr, [email protected] Abstract.A smart home or buldng s a home or buldng, usually a new one that s equpped wthspecal structured wrng to enable occupants to remotely control or program an array oautomated home electronc devces by enterng a sngle command. Conventonal securtysystems keep homeowners, and ther property, sae rom ntruders. Smart home securty has two aspects, nsde and outsde. Insde securty covers the concept o securng home rom threats lke re etc. whereas, outsde securty s meant to secure home aganst any burglar/ntruder etc. In ths paper, we suggest an adaptve network uzzy nerence system or home securty.to deal wth nonlnear outputs, the system s modeled by multple ANFIS, and the optmzaton o multple outputs s ormulated as a multple objectve decson makng. Keywords: Fuzzy logc, Multple ANFIS, Smart Home Securty 1 Introducton A smart homecare system usng smart phones, wreless sensors, web servers and IP webcams s proposed by Lejdekkers et al [5]. It provdes aclty to elderly people to check ther health and status and provdes an easy way to contact to hosptal n an emergency. Ghorbel et al have proposed the ntegraton o networkng and communcaton technologes n the smart homes concept dedcated to people wth dsabltes. It s based on the UPnP protocol to dscover and control devces ndoor and uses wreless technologes to enhance moblty [2]. Popescu et al have proposed a securty archtecture allowng dgtal rghts management n home networks consstng o consumer electronc devces [2]. In the proposed model, devces are allowed to establsh dynamc groups n an envronment where legally acqured copyrghted content are seamlessly transmtted between devces. They have clamed that connectvty between devces has a mnmal relance on publc key cryptographc operatons. Gao et al have suggested the concept o a sel-programmng thermostat that wthout any human nterventon creates a best possble setback schedule by sensng the possesson statstcs o a home [1]. The system montors possesson usng smple sensors n the home and the user denes the desred balance between energy and comort usng a sngle knob. It s observed that ths approach has an advantage ISA 2013, ASTL Vol. 21, pp , 2013 SERSC
2 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance over EnergyStar setback schedule approach by reducng the heatng and coolng demand by up to 15%. The purpose o ths paper s to portray as to how Adaptve Network Fuzzy Inerence System (ANFIS) encounters the challenges posed to the sensor based classcal smart home systems and propose a methodology or mplementaton o these networks to buld an adaptve and ntellgent system. Home securty has two aspects, nsde and outsde. Insde securty covers the concept o securng home rom threats lke re etc. whereas, outsde securty s meant to secure home aganst any burglar/ntruder etc. Ths work s amed to provde a multple ANFIS soluton or home securty that takes decson dynamcally usng the pervasve devces. Also ths soluton has the eature to ntmate securty analyss results anywhere n the world usng nternet. In secton 2, we revew brely the tools related to the smart home securty, and represent a structure o ntellgent nerence module at nsde/outsde home securty server. In secton 3, a multple ANFIS model s proposed to provde optmal home securty soluton. In ths proposed model, sensors are used to detect abnormaltes wthn the house or outsde the house. In secton 4, smulaton results by the suggested model are demonstrated, and compared wth smple uzzy logc based method. Also, concludng remarks are gven n the last secton. 2 Smart Home securty Structure From some tools related to the smart home securty, t s observed that the home securty models have consdered some lmted securty concerns. Thereore one securty model may be good n one stuaton but cannot provde the requred results n other stuatons. To provde optmal home securty soluton, a new model s requred. In ths model, sensors are used to detect abnormaltes wthn the house or outsde the house. There s a dedcated server or the sensors used to collect data nsde the house. Ths server s responsble to collect normaton transmtted by the sensors and then analyze to detect any abnormalty. Smlarly, a separate server s used to process the normaton transmtted by sensors located outsde the house. Both these servers are connected to a man server whch process the normaton provded by these servers. ANFIS tool s used to detect any abnormalty. In case a threat s detected then man server report about the threat to concern people usng nternet besdes settng the alarms on. Sx nput types are provded to the system. Multple sensors o each type are used to collect data. All nputs o same sensor type are provded to an ntal ANFIS nerence module, whch s responsble to calculate the threshold value. These calculated threshold value o each nput type s then provded to respectve server responsble or nsde or outsde securty. An overall threshold value o these sx ntal threshold values s separately calculated usng ANFIS module on nsde/outsde securty servers respectvely. Both nsde/outsde securty threshold values are provde to man server or analyss. Fnal decson s made based on these values. I any o the value s above the crtcal value then alarm sgnal s generated to respectve person/department. Usng ths method, t s possble to generate derent output alarms consderng the ntensty and relevance o threshold value to that specc 122
3 Smart Home Securty System Based on ANFIS person/department. Threshold values calculated at the nsde/outsde servers are collated at man server or decson makng process. Ater collaton process, threshold value s calculated and alarm sgnal type or each desred destnaton (polce, rescue staton, owner, et al) s calculated. Multple ANFIS s an extenson o the sngle output neuro-uzzy system ANFIS [4], or producng multple outputs. Smart home securty problem s a process wth multple outputs. Thereore, modelng and optmzaton o a process wth multple outputs s requred. A neuro-uzzy system can serve as a nonparametrc regresson tool, whch model the regresson relatonshp non-parametrcally wthout reerence to any pre-speced unctonal orm. Every sngle ANFIS n an multple ANFIS smulatesthe unctonal relatons, =1,,m. ANFIS can be consdered as anetwork presentaton o a TSK uzzy nerencesystem, and the -then rules n TSKare comprsed n the network structure. Tollustrate the archtecture o ANFIS, an examplewth a two-dmensonal nput s vsualzedn Fg.1. Fg. 1.ANFIS archtecture 3 An ANFIS desgn By means o the learnng process, multple ANFISobtans an estmaton o desred outputswth gven nputs. Let, =1,...,m, be the-th output o multple ANFIS, and they are estmateso multple responses y 1,...,y m, respectvely.to ndcate these estmates are unctonso the nput varables x, they wll bedenoted as (x), =1,...,m.Snce the system under dscusson has multpleresponses, the optmzaton o the systemn act nvolves the optmzaton o severalndvdual responses at the same tme.for all the system responses, they can be dvdednto three sets: (a) thelargerthebetter, denoted by L; (b) thesmallerthebetter, denotedby S; and 3) thenomnalthebest, denotedby N. We have ormulated ths optmzatonproblem as a multple objectve decsonmakng problem wth the ollowng orm: (1) mn max ( x), l L mn ( x), s S ( x) T, t N t l s t s. t. x B 123
4 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance HereT t s the nomnal target o the t-th response;and B s a easble regon o x. We ollow the dea ozmmermann's maxmn approach. Accordngto the maxmn approach, the above solutoncan be obtaned by maxmzng anoverall satsactory degree among all ndvdualobjectves. That s, or each objectve,t has ts own satsactory degree, andthe overall satsacton s an ntersecton o allndvdual satsactory degrees, where the ntersectons dened through a mn operator.the satsactory degree or each objectve sevaluated by userdened membershpuncton.each response's membershp unctonμ should be well chosen so as torelect ts characterstc. For the response belongedto the set o thelargerthebetter, tsdegree o satsacton reaches 1 when t s at = max x B{ ( x) } and then decreases monotoncally to 0 at = max x B{ ( x) }. Atypcal membershp uncton or, L, could be stated as (2) µ = ( ) /( 1, > 0, < ), For the response belonged to the set o thesmallerthebetter, we set the satsactorydegree to 1 when a response s at - andthen t decreases monotoncally to 0 at. Such type o membershp unctons canbe expressed as (3) µ = ( ) /( 1, 0, < ), > Smlarly, or the response o the set thenomnalthebest, the degree o satsactons maxmzed when t s at ts target T,and decreases as t s away rom T. The maxmum o λ cannot bedrectly solved by the use o dervatve-basedmethods due to unknown unctonal orms o. Dervatve-ree methods aredeally suted or solvng problems where dervatvenormaton s unavalable. Alternatvely,we can approxmate the dervatveswth numercal methods. 4 Smulaton results Home securty system s congured by sensor nodes connected to server. These sensor nodes nclude rado requency, ultrasonc, temperature, lght, sound and vdeo sensors. Threshold value or each nput s above 90% and or a vdeo sensor, used n outsde securty, dstance threshold s taken as 1 eet. I value s ncreased rom any threshold value then alarm s on, and noted to speced locaton through nternet. For a sample scenaro, where only three types o sensors are used namely vdeo, re and voce. Fve layers o neural networksresultng rom the ANFIS have been provded n gure 2.Eect othreshold values o nput sensors and ANFIS output Polce s somewhat lower than smple uzzy logc based one, and eect o 124
5 Smart Home Securty System Based on ANFIS threshold values o nput sensors and ANFIS output Rescue staton s somewhat hgher than smple uzzy method. Also, eect o threshold values o nput sensors and ANFIS output Owner s somewhat hgher than smple uzzy method. For example, n case o vdeo Sensor=88.2, Fre Sensor=89.5, and Voce Sensor=86.4, eect o threshold values o nput sensors and respectve ANFIS output s 78.8, 84.0 and Eect o threshold values o nput sensors and respectve uzzy logc based output s 81.9, 81.5 and Snce the outputs Owner and Rescue belongs to the set o thelargerthebetter, ts membershp uncton should takethe orm o (2); and the output Polce has anomnal target, so t wll take the membershpuncton (3). In order to determne thesemembershp unctons, the maxmum andmnmum or ndvdual output must be obtaned.maxmum and mnmum o outputs can be obtaned by ormulatng sngle objectveprogrammng problems or ndvdualresponses, and solvng the problems wth anydervatve-ree algorthm. Alternatvely, theycan also be subjectvely determned accordngto users' judgment or ther expectaton. In our scenaro, t s desred that the outputs o Owner and Rescue to be held between 92 and 98,thereore, t s reasonable to set 92 and 98 asthe mnmum and maxmum o ths output,respectvely. Smlarly, the mnmum and maxmum o Polce are set as 70 and 91, respectvely.in gure 3, 3D graph show the relatonshp betweenvoce sensors, re sensors and output threshold orrescue. Eect o threshold values s represented very well than smple uzzy logc based output. In gure 4, 3D graph show the relatonshp betweenvoce sensors, re sensors and output threshold orpolce. It s more reasonable than the relatonshp by smple uzzy logc. Fg. 2.ANFIS structure or sample scenaro 125
6 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance Fg. 3. Rescue surace or re and voce sensorfg. 4. Polce surace or re and voce sensor 5 Concludng Remarks Ths study used an adaptve network uzzy nerence system orsmart home securty. Ths system provdes the advantage omodelng a nonlnear and complcated systemwthout the need o ndng sutable unctonalorms or the system, and ts neural networklearnng ablty also equps multple ANFIS wthhgh ecency n smart home securty system modelng.proposed systemnherts the propertes o ANFIS and thus provdesntermedary values as compare to Boolean logc bvalueoutputs.however,snce we use the nonparametrc regressontool or multple ANFIS to model outputs, exactunctonal orms o outputs are not knownand hence dervatve-based optmzaton cannot be drectly appled to obtanthe optmal soluton. Reerences 1. Gao,G.,Whtehouse,K.: The Sel-ProgrammngThermostat: Optmzng Setback Schedules based on HomeOccupancy Patterns, Proceedngs o BuldSys 09, November 3,Berkeley, CA, USA (2009) 2. Ghorbel,M., Segarra,M., Kerdreux,J., Keryell,R., A.,Thepaut,and M. Mokhtar.: Networkng and Communcaton n SmartHome or People wth Dsabltes, Computers Helpng Peoplewth Specal Needs, Sprnger Berln / Hedelberg, 624, (2004) 3. Hou,J.,O Bren, D. C.: Vertcal handover-decson-makng algorthm usng uzzy logc or the ntegrated radoand OW system, IEEE Transactons on Wreless Communcatons,5(1), , (2006) 4. Jang,J. S. R.: ANFIS: Adaptve network based uzzy nerence system,ieee Transactons on Systems, Man andcybernetcs, 23(3), , (1993) 5.Lejdekkers,P., Gay,V., Lawrence,E.: Smart HomecareSystem or Health Tele-montorng, Proceedngs o the FrstInternatonal Conerence on the Dgtal Socety, IEEEComputer Socety(2007) 6. Popescu,B. C., Crspo,B., Tanenbaum,A. S.,Kamperman, F. L. A. J.: A DRM Securty Archtecture or HomeNetworks, Proceedngs o the 4th ACM workshop ondgtal rghts management, October 25, Washngton, DC,USA.(2004) 7. Reyhan,S. Z.,Mahdav,M.: User Authentcaton Usng Neural Network n Smart HomeNetworks, Internatonal Journal o Smart Home, 1(2), July (2007) 126
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem
Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.
Damage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
How To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely [email protected], {kozat, garash}@docomolabs-usa.com, [email protected]
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
An Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
Complex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],
J. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告
行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
Distributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
Fragility Based Rehabilitation Decision Analysis
.171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented
2. RELATED WORKS AND PROBLEM STATEMENT
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1245-1260 (2014) Short Paper Traffc Congeston Evaluaton and Sgnal Tmng Optmzaton Based on Wreless Sensor Networks: Issues, Approaches and Smulaton * School
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
Fuzzy Control of HVAC Systems Optimized by Genetic Algorithms
Appled Intellgence 18, 155 177, 2003 c 2003 Kluwer Academc Publshers. Manufactured n The Netherlands. Fuzzy Control of HVAC Systems Optmzed by Genetc Algorthms RAFAEL ALCALÁ Department of Computer Scence,
Dimming Cellular Networks
Dmmng Cellular Networks Davd Tpper, Abdelmounaam Rezgu, Prashant Krshnamurthy, and Peera Pacharntanakul Graduate Telecommuncatons and Networkng Program, Unversty of Pttsburgh, Pttsburgh, PA 1526, Unted
Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata [email protected] Slavko Krajcar Faculty of electrcal engneerng and computng
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Energy Conserving Routing in Wireless Ad-hoc Networks
Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark
CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht [email protected] 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks
, July 6-8, 2011, London, U.K. Fuzzy TOPSIS Method n the Selecton of Investment Boards by Incorporatng Operatonal Rsks Elssa Nada Mad, and Abu Osman Md Tap Abstract Mult Crtera Decson Makng (MCDM) nvolves
Ad-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
Multi-Period Resource Allocation for Estimating Project Costs in Competitive Bidding
Department of Industral Engneerng and Management Techncall Report No. 2014-6 Mult-Perod Resource Allocaton for Estmatng Project Costs n Compettve dng Yuch Takano, Nobuak Ish, and Masaak Murak September,
ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble
1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, [email protected] Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms
Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred
Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service
Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed
Safety and Reliability of Distributed Embedded Systems
Saety and Relablty o Dstrbuted Embedded Systems Techncal Report ESL 04-01 Smulaton o Vehcle Longtudnal Dynamcs Mchael Short Mchael J. Pont and Qang Huang Embedded Systems Laboratory Unversty o Lecester
A Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing
Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh
Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid
Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:
A Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
A powerful tool designed to enhance innovation and business performance
A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued
Activity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
Support vector domain description
Pattern Recognton Letters 20 (1999) 1191±1199 www.elsever.nl/locate/patrec Support vector doman descrpton Davd M.J. Tax *,1, Robert P.W. Dun Pattern Recognton Group, Faculty of Appled Scence, Delft Unversty
Oservce Vs. Sannet - Which One is Better?
o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 [email protected] Shh-Wen Chu nsttute of nformaton Management Natonal
Testing and Debugging Resource Allocation for Fault Detection and Removal Process
Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton
