A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *

Size: px
Start display at page:

Download "A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *"

Transcription

1 Internatonal Journal of Computatonal Scence (Prnt) (Onlne) Global Informaton Publsher 27, Vol., No., A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano, A. M. Fanell, and M. A. Torsello * Department of Informatcs, Unversty of Bar, Va Orabona, Bar, Italy {castellano,fanell,torsello}@d.unba.t Abstract. Due to the growng varety and quantty of nformaton avalable on the Web, there s urgent need for developng web-based applcatons capable of adaptng ther servces to the needs of the users. Ths s the man ratonale behnd the flourshng area of Web recommendaton, that fnds n Soft Computng technques a vald tool to handle uncertanty n web usage data and develop web-based applcatons talored on users preferences. In ths context, we propose a neuro-fuzzy strategy that combnes soft computng technques to develop a Web recommendaton system that dynamcally suggests nterestng URLs for the current user. As a prelmnary step, user access logs are analyzed to dentfy user sessons. Then, groups of users whch exhbt a common browser behavor (.e. user profles) are dscovered by applyng a fuzzy clusterng algorthm to the user sessons. Fnally, a knowledge extracton process s carred out to derve assocatons between user profles and relevant Web pages to be suggested to users. In partcular, a hybrd approach based on the combnaton of the fuzzy reasonng and the connectonst paradgm s proposed n order to derve knowledge from sesson data and represent t n the comprehensble form of fuzzy rules. The derved knowledge s ultmately used to dynamcally suggest lnks to Web pages udged nterestng for the current user. Keywords: Web Personalzaton, Web usage mnng, Web recommendaton, Clusterng, Neuro-fuzzy. * Correspondng Author. Tel.: , Fax: , Emal: torsello@d.unba.t. 27

2 Internatonal Journal of Computatonal Scence Introducton The growng quantty of nformaton and applcatons avalable on the World Wde Web has recently mposed some knd of personalzaton for the Web nformaton space []. Web personalzaton may be useful n several contexts to offer a varety of functonaltes, such as customzaton, task performance support, personalzed gudance, etc. In partcular, personalzaton gudance allows to assst the user n gettng quckly the nformaton he s seekng n a ste, wthout askng for t explctly. One man example of gudance functons s represented by lnk recommendaton whch conssts n the suggeston of a set of lnks to pages of a ste accordng the preferences and the necesstes of users [2]. Generally speakng, Web recommendaton may be ntended as the process of meetng or predctng the nterests of users by provdng them wth the nformaton or servces that they need [3], [4]. The scentfc lterature ncludes a varety of technques that have been employed to perform Web recommendaton [3]. Partcularly, three man approaches can be dentfed: content-based flterng, rulebased flterng and collaboratve flterng. Among these, the most wdely adopted s collaboratve flterng [4], [5], [6], [7], [8] whch s based on the dea to match the preferences of a current user about specfc obects (e.g. web pages) wth those of smlar users, n order to produce recommendatons on other obects not yet rated by the current user. In a Web recommendaton system, two prncpal tasks can be dstngushed: the dscovery of knowledge about the user s preferences by analyzng Web data and the effectve recommendaton process. Typcally, to execute the task of knowledge dscovery, Web Usage Mnng (WUM) methodology s employed. WUM conssts n explotng statstcal and data mnng technques n order to derve patterns of user navgatonal behavor startng from Web usage data [9], []. In the effectve recommendaton process, the extracted knowledge s used to provde recommendatons to the users, such as addng hyperlnks to the last Web page requested by the user, dependng on the type of user. Web usage data are characterzed by vagueness and mprecson. The use of tradtonal machne learnng technques n WUM may often result neffcent and nadequate to handle the uncertanty underlyng data about Web nteractons. As consequence, Soft Computng technques (.e. fuzzy logc, neural networks, neuro-fuzzy systems, etc.) can be properly appled n order to face the mprecson and partal truths characterzng the recommendaton process []. In ths paper, we propose a Web recommendaton approach for dynamc lnk suggeston explotng Soft Computng technques as tools for WUM. Specfcally, we nvestgate the use of a neuro-fuzzy strategy to develop a collaboratve flterng approach. A fuzzy clusterng algorthm s appled to determne user profles by groupng preprocessed Web usage data nto sesson categores. Then, a hybrd approach based on the combnaton of the fuzzy reasonng wth a neural network s employed n order to derve fuzzy rules useful to provde dynamcal predctons about Web pages to be suggested to the current user, accordng to the user profles prevously dentfed. The rest of the paper s organzed as follows. In Secton 2 the methodology underlyng the proposed recommendaton approach s formulated and the nvolved tasks are descrbed. In Secton 3 28

3 prelmnary smulaton results on a smple Web ste are reported and analyzed. Secton 4 concludes the paper. 2 The Web recommendaton approach The proposed Web recommendaton approach nvolves a number of tasks, as llustrated n Fg.. Specfcally, two man tasks are performed: User Proflng and Recommendaton. User proflng s the task of dscoverng a number of user categores startng from sesson data derved by preprocessng log fles. Precsely, the dentfed user sessons are used to create models of vstor behavor that are successvely grouped nto user profles by a fuzzy clusterng strategy. Startng from the extracted user profles and the avalable sesson data, a knowledge base expressed n the form of fuzzy rules s extracted va a neuro-fuzzy learnng strategy. Such knowledge base s exploted durng the recommendaton task to dynamcally suggest lnks to Web pages udged nterestng for the current user. In the followng subsectons, we descrbe n more detal all the tasks nvolved n the proposed approach. User Proflng Modelng vstor behavor Preprocessng log data Extractng user profles by fuzzy clusterng Log Creatng recommendaton rules by neuro-fuzzy learnng Recommendng lnks Recommendaton Fg.. Workng scheme of the proposed Web recommendaton approach 29

4 Internatonal Journal of Computatonal Scence 2. Modelng the vstor behavor from preprocessed log data The frst step of the user proflng task s amed to derve a model of the vstor behavor. To acheve ths, we properly preprocess log data representng all the requests made by the vstors of a Web ste. Log data preprocessng leads to dentfy a number of sgnfcant user sessons that can be useful for modelng the user navgatonal behavor. Preprocessng of access log fles s performed by means of LODAP (LOg DAta Preprocessor), a software tool that we have presented n [2]. The tool analyzes usage data stored n log fles to produce statstcs about the browsng behavor of the users vstng the Web ste. Partcularly, LODAP structures the requests made by the connected users nto user sessons by dentfyng the sequence of pages accessed by each vstor. LODAP preprocesses log data nto three steps: data cleanng, data structuraton and data flterng. Durng data cleanng, Web log data are cleaned from the useless nformaton n order to retan only records correspondng to the explct requests of the users that can be effectvely exploted to derve models of the user navgatonal behavor. Precsely, LODAP removes records related to faled and corrupted requests, records of requests for multmeda obects (such as mages, vdeos, sounds, ecc.) and records correspondng to vsts made by Web robots. After data cleanng, only nformaton concernng accesses to pages of the Web ste are retaned. We formally defne the set of such pages as P = { p, p2,..., p np }. Data structuraton dentfes user sessons by groupng the unstructured requests made by a same user for dfferent pages. To extract user sessons, the dentfcaton of dstnct users s a problem whch has to be addressed. For Web stes requrng user regstraton, dfferent users can be dentfed by explotng the nformaton concernng the user logn contaned n log fles. When the user logn s not avalable, LODAP smply consders each IP address as a dfferent user (beng aware that an IP address mght be used by several users). The set of all users (IP) s defned by U = { u,,..., u2 u nu } and a user sesson s defned as the set of accesses orgnatng from the same user (IP) wthn a predefned tme perod. Formally, a user sesson s represented as a trple s = u, t, p where u U represents the user dentfer, t s the total tme access of the -th sesson, p s the set of all pages requested durng the -th sesson. More n detal, p = ( p, t, N ), ( p2, t2, N 2 ),..., ( pn, tn, N n ) where p k s the k-th URL vsted durng the -the sesson, t k s the total access tme to page p k and N k represents the number of accesses to page p k durng the -th sesson. Summarzng, after data structuraton, a collecton S = s, s2,..., s n s of n s sessons s dentfed from the log data. Fnally, LODAP executes a page flterng and a sesson flterng process n order to retan only the most vsted pages and the most sgnfcant user sessons. Page flterng elmnates two knds of requests: requests for very low support URLs,.e. requests to pages whch do not appear n a suffcent number of sessons, and requests for very hgh support URLs,.e. requests to pages whch appear n nearly all sessons. Sesson flterng removes all user sessons that nclude a very low number of vsted URLs. Hence, after data flterng, only m page requests (wth m np ) and only n sessons (wth n ns ) are retaned. 3

5 Once user sessons have been dentfed by LODAP, vstor behavor models are created by defnng a measure expressng the nterest degree of the users for each vsted page durng a sesson. In lterature several measures have been consdered to estmate how much the user s nterested n a page of the Web ste [3], [], [4]. In our approach, we measure the nterest degree for a page as the average access tme on that page. Precsely, the nterest degree for the -th page n the -th user sesson s defned as: t ID = N where t s the overall tme spent by the user on the -th page and N s the number of accesses to that page durng the -th sesson. Hence, we model the vstor behavor of each user through a pattern of nterest degrees for all pages vsted by that user. Snce the number of pages vsted by dfferent users may vary, vstor behavor patterns may have dfferent dmensons. To obtan a homogeneous behavor model for all users, we translate behavor patterns nto vectors havng the same dmenson equal to the number m of pages retaned by LODAP after page flterng. In partcular, the behavor of the -th user ( =,..., n ) s modeled by a vector b = b b,..., b where ( ), 2 m ID f page p s accessed n sesson s b = otherwse Summarzng, we model the vstor behavors by a n m matrx B = [ b ] where each entry represents the nterest degree of the -th user for the -th page. Based on ths matrx, vstors wth smlar preferences can be successvely clustered together nto user profles, as descrbed n the followng subsecton. 2.2 Extractng profles of vstor behavor The second step of the user proflng task concerns the extracton of a number of user profles by applyng a clusterng process to the matrx of nterest degrees prevously derved. Precsely, vstors exhbtng a common browsng behavor are grouped together nto the same cluster (.e. user profle). Snce user profles are rarely well separated (a user can exhbt nterests characterzng dfferent user profles), the use of tradtonal clusterng algorthms result often nadequate to extract user profles expressng the actual user behavor. Conversely, fuzzy clusterng algorthms seems to be partcularly suted n ths context snce they enable the creaton of overlappng clusters, so that users wth dfferent nterests may belong to several profles to a dfferent extent. In our approach, the well-known Fuzzy C-Means (FCM) clusterng algorthm [5] s appled n order to group behavor vectors b nto overlappng clusters representng user profles. Brefly, the FCM algorthm fnds C clusters based on the mnmzaton of the followng obectve functon: n C 2 F u α α = c b v c, α = c= 3

6 Internatonal Journal of Computatonal Scence where α s any real number greater than, u c s the degree of membershp of the behavor vector b to the c-th cluster, v c s the center of the c-th cluster. The FCM algorthm works as follows:. Intalze U = [ u c ] =,..., n c=,..., C matrx,u () ( τ ) 2. At τ -th step: calculate the center vectors V = v as 3. Update 4. If ( τ ) U accordng to: ( τ) ( τ ) U U < ε, wth < As a result, the FCM algorthm provdes: c=,..., C A fuzzy partton matrx = [ ] u c v = c = ( ),.., c c= C n α ucb = n α uc = C c b v k = b vk 2 α < ε, STOP; otherwse return to step 2. U where u c represents the membershp degree of the u c =,..., n behavor vector b to the c-th cluster. C clusters wth prototype vectors v c, c =,..., C. Each cluster prototype v c = ( vc, vc2,..., vcm) represents a user profle descrbng the typcal navgatonal behavor of a group of users wth smlar nterests. 2.3 Creatng recommendaton rules After user proflng, the proposed Web personalzaton approach nvolves a recommendaton process that employs the extracted user profles to create recommendaton rules that assocate relevance degrees of URLs to each vstor profle. Such rules represent the knowledge base to be used n the ultmate onlne process of lnk recommendaton. Each recommendaton rule expresses a fuzzy relaton between a behavor vector b = ( b, b2,..., bm ) and relevance of URLs n the followng form: IF ( b s A k ) AND AND ( b m s A mk ) THEN (relevance of URL s y k ) AND AND (relevance of URL m s y mk ) for k =,.., K where K s the number of rules, A k ( =,, m ) are fuzzy sets wth Gaussan membershp functons defned over the nput varables b and y k are fuzzy sngletons expressng the relevance degree of the th URL. The man advantage of usng a fuzzy knowledge base for recommendaton s the readablty of the extracted knowledge. Actually, fuzzy rules can be easly understood by human users snce they can be expressed n a lngustc fashon by labellng fuzzy sets wth lngustc terms such as LOW, 32

7 MEDIUM, HIGH. Hence, a fuzzy rule for recommendaton can assume the followng lngustc form: IF (the degree of nterest for URL s LOW) AND AND (the degree of nterest for URL m s HIGH) THEN (recommend URL wth relevance.3) AND AND (recommend URL m wth relevance.8) In our approach, the creaton of recommendaton rules s performed through a hybrd strategy based on the combnaton of fuzzy reasonng wth a specfc neural network that encodes n ts structure the dscovered knowledge n form of fuzzy rules. The archtecture of the network (depcted n fg. 2) s composed of three layers computng respectvely: membershp degree to fuzzy sets; fullfllment degree for each fuzzy rule; nferred output. Unts n the frst layer L receve a behavor vector ( b, b2,..., b m ) and evaluate the Gaussan membershp functons representng fuzzy sets. In ths layer, unts are arranged n K groups, one for each fuzzy rule. The k-th group contans m unts correspondng to the fuzzy sets whch defne the premse part of the k-th rule. In detal, each unt n L receves the nterest degree for the -th page b, =... m and computes ts membershp value to fuzzy set A k as follows: ( b ) 2 () x k Ok = exp, =,..., m k =,..., K 2 σ k where x k and σ k are the center and the wdth of the Gaussan functon, representng the adustable parameters of the unt. The second layer L 2 contans K unts that compute the fulfllment degree of each rule. In ths layer, no modfable parameter s assocated wth the unts. The output s derved by computng the rule actvaton strength, as follows: (2) n O k = O k where x k and σ k are the center and the wdth of the Gaussan functon, representng the adustable parameters of that unt. The thrd layer L 3 provdes the outputs of the network,.e. the relevance values of the m web pages. Each output results from the nference of rules, accordng to the followng formula: = () O K = = (3) k = K O k (3) k O y (3) k k, =,..., m Connectons between layer L 2 and L 3 are weghted by the fuzzy sngletons set of free parameters for the neural network. y k that represent a 33

8 Internatonal Journal of Computatonal Scence b O b 2 O 2 K b m O m Fg. 2. Archtecture of the neuro-fuzzy network In order to learn sgnfcant recommendaton rules, the network s traned on a set of nputoutput samples descrbng the assocaton between user sessons and preferred URLs. Precsely, the tranng set s a collecton of n nput-output vectors: (, ) =,..., T= b r where the nput vector b represents the behavor vector of the -th user, and the desred output vector r expresses the relevance degrees assocated to the m URLs for the -th vstor. To compute such relevance degrees, we explot nformaton embedded n the profles extracted through fuzzy clusterng. Precsely, for each behavor vector b we consder ts membershp values { u c } n the fuzzy partton matrx U. Then, we dentfy the two top matchng profles c=,..., C c, c2 {,.., C} as those wth the hghest membershp values. The relevance degrees n the output 2 m r = r, r,..., r are hence calculated as follows: r = u v + u v for =,..., m and vector ( ) n c c c c2 =,..., n. Once the tranng set has been constructed, the neural network can enter the learnng phase to extract the knowledge embedded nto tranng set and represent t as a collecton of fuzzy rules. The learnng s artculated n two steps. The frst step s based on an unsupervsed learnng, based on a rval penalzed mechansm, whch provdes a clusterng of the behavor vectors and the defnton of an ntal fuzzy rule base. In ths step, the structure and the parameters of fuzzy rules are dentfed. Successvely, the obtaned knowledge base s refned by a supervsed learnng process. Here, fuzzy rule parameters are tuned va supervsed learnng to mprove the accuracy of the derved knowledge. Maor detals on the algorthms underlyng the learnng strategy can be retreved n [6]. 34

9 2.4 Recommendng lnks The ultmate task of personalzaton s the onlne recommendaton of lnks to Web pages udged nterestng for the current user of the Web ste. Specfcally, when a new user accesses the Web ste, an on-lne module matches hs current partal sesson aganst the fuzzy rules currently avalable n the knowledge base and derves a vector of relevance degrees by means of a fuzzy nference process. Formally, when a new user has access to the Web ste, an actve user s current sesson s created n the form of a vector b. Each tme the user requests a new page, the vector s updated. To mantan the actve sesson, a sldng wndow s used to capture the most recent user s behavor. Thus the partal actve sesson of the current user s represented as a vector b = ( b,..., bm ) where some values are equal to zero, correspondng to unexplored pages. Based on the set of K rules generated through the neural learnng descrbed above, the recommendaton module provdes URL relevance degrees by means of the followng fuzzy reasonng procedure: () Calculate the matchng degree of current behavor vector b to the k-th rule, for k =,.., K by means of product operator: n μk ( b ) = = μ k ( b ) (2) Calculate the relevance degree r for the -th URL as: r K r k k = = K k = μ μ k k ( b ) ( b ), =... m Ths nference process provdes the relevance degree for all the consdered m pages, ndependently on the actual navgaton of the current user. In order to perform dynamc lnk suggeston, the recommendaton module frstly dentfes URLs that have been not vsted by the current user,.e. all pages such that b =. Then, among unexplored pages, only those havng a relevance degree r greater than a properly defned threshold α are recommended to the user. In practce, a lst of lnks s dynamcally ncluded n the page currently vsted by the user. 3 Smulaton results and analyss To test the proposed Web recommendaton approach, a prelmnary expermental sesson has been carred out by consderng the log fles of a sample Web ste. The log fles contan user requests coverng a tme perod of two weeks, for a total of 3 requests. Frst of all, LODAP has been appled to dentfy user sessons by preprocessng the avalable log data. In data cleanng step, LODAP removed all the useless requests, such as accesses to multmeda obects, robot s requests, faled and corrupt requests, leadng to 95 sgnfcant requests. In the data structuraton step, LODAP dentfed user sessons by groupng such requests. Specf- 35

10 Internatonal Journal of Computatonal Scence cally, the requests orgnatng from the same IP address durng an establshed tme perod of 25 mnutes were grouped nto a sesson. A collecton of 25 sessons were dentfed ncludng requests for 5 dstnct pages. Then, page and sesson flterng were appled to select the most vsted pages and the most sgnfcant user sessons. In partcular, to perform page flterng, LODAP counts for each page p, the number NS of dfferent sessons that nclude a request for p. LODAP performed very low support flterng by removng all pages that satsfed NS < ε, where ε s equal to % the quantty NS = max NS. Very hgh support flterng was executed =,...,5 by deletng all pages such that NS > NS ε. In the sesson flterng step, all user sessons contanng a low number of vsted URLs were removed. Precsely, a threshold η = 4 was fxed whch represents the mnmum number of dstnct pages that a user sesson should contan to be retaned sgnfcant. Hence, sesson flterng removed all user sessons s whch satsfed the condton NP < η, where NP s the number of dstnct URLs vsted n that sesson. At the end of preprocessng, a number of 2 user sessons were dentfed and dstnct pages were retaned. For the sake of brevty, we ndcate the selected pages by the letters A, B, C, D, E, F, G, H, I and J. Once user sessons were dentfed, vstor behavor models were derved by calculatng the nterest degrees of each user for each page, leadng to a 2x behavor matrx. Next, the FCM algorthm was appled to the behavor matrx n order to obtan clusters of users wth smlar navgatonal behavor correspondng to the user profles. To evaluate the valdty of the clusterng process, two dfferent ndexes wdely used n lterature were adopted: the Dunn s ndex and the Daves-Bouldn ndex [7]. The Dunn s ndex D s defned as: where ( X, ) δ D = mn mn C C max k C ( X, X ) { ( )} Δ X δ X represents the ntercluster dstance between clusters X e Δ X k represents the ntracluster dstance of cluster X k and C s the number of clusters. The goal s to maxmze ntercluster dstances whlst mnmzng ntracluster dstances. Hence, large values of Dunn s ndex correspond to a good cluster partton. The Daves-Bouldn valdaton ndex DB s defned as: k ( X ) + Δ( X ) ( ) X, X X, ( ) where ( ) X ( ( C Δ DB = max C = δ δ X,, Δ X ), Δ X ) are defned as above. In ths case, small ndex values correspond to good clusters. We carred out several runs of the FCM by settng dfferent values of the number of clusters (C=3,, 2). To obtan more relable results, each run was repeated tmes and the average values of the valdty measures were consdered. Fgures 3 and 4 depct the average values of the Dunn s and the Daves-Bouldn ndexes for dfferent numbers of clusters. It can be seen that the best partton was obtaned wth C = 6, because t provdes the best values for both ndexes. 36

11 Based on the prototypes of the sx clusters, a collecton of sx user profles was derved. In Table, for each user profle the pages wth hghest nterest degree are ndcated. It can be noted that some pages (e.g. pages I and D) characterze more than a profle, thus showng the mportance of usng fuzzy clusterng for user proflng. The next step was the creaton of recommendaton rules startng from the extracted user profles. A neural network wth nputs (correspondng to the components of the behavor vector) and outputs (correspondng to the relevance values of the Web pages) was consdered. The nternal layer of the network contans 6 unts that compute the fulfllment degree of each rule. The network was traned on a tranng set of 4 nput-output samples derved from the avalable 2 behavor patterns and from the 6 user profles, as descrbed n Secton 2.3. The remanng 6 samples were used for testng. The tranng of the network was stopped when the error on the tranng set dropped below., correspondng to a testng error of.3. The derved fuzzy rule base was ntegrated nto the onlne recommendaton module to nfer the relevance degree of each URL for the current user. These relevance degrees were ultmately used to suggest a lst of lnks to unexplored pages retaned nterestng to the current user. To perform lnk recommendaton, the navgatonal behavor of the current user was observed durng a sldng wndow of 3 mnutes n order to derve the behavor pattern correspondng to hs partal vst. Such behavor pattern was used as nput to the fuzzy rule nference process that computes the relevance degrees for all the consdered pages. Then, among the unexplored pages, only those havng a relevance degree greater than α =.7 were ncluded n the lst of lnks to be suggested. How to dynamcally present lnk to the nterestng pages wthn the currently vsted page s an aspect stll under nvestgaton D values cluster number Fg. 3. Dunn s ndex values 37

12 Internatonal Journal of Computatonal Scence,9,8,7,6 DB values,5,4,3,2, cluster number Fg. 4. Daves-Bouldn s ndex values Table. The extracted user profles by settng C=6 User Profles Pages characterzng the profle A (.82), D(.48), I(.8) 2 C(.86), F(.83), I(.75) 3 B(.86), I(.8) 4 D(.88), G(.85), J(.82) 5 E(.88), J(.84) 6 A(.84), D(.45), H(.82) 4 Conclusons A Web recommendaton approach based on the combnaton of Soft Computng technques has been presented. We nvestgated the use of a hybrd approach onng the advantages of neural networks and fuzzy reasonng n order to develop a recommendaton system that dynamcally suggests nterestng lnks to the current user on the bass of fuzzy rules. The frst task of our Web recommendaton approach s the creaton of user profles that synthesze the nterests of users wth smlar browsng behavor. We perform ths task by a fuzzy clusterng algorthm that enables creaton of overlappng clusters, so that a user, accordng to hs browsng behavor, can belong to more than a profle wth dfferent membershp degrees. The sutable number of profles s determned by usng cluster valdty measures. The second task s the creaton of a set of fuzzy rules that assocate relevance degrees of URLs to each vstor profle. Expermental results on the sesson data of a smple Web ste showed the effectveness of the proposed approach and encourage ts applcaton to more complex Web domans. Currently, we are expermentng the approach on hgh-dmensonal sesson data to evaluate how the proposed approach scales wth the number of pages. 38

13 References. Nasraou, O.: World Wde Web Personalzaton. In J. Wang (ed), Encyclopeda of Data Mnng and Data Warehousng, Idea Group (25) 2. Perrakos, D. G., Palouras, G., Papatheodorou, C., and Spyropoulos, C. D. : Web usage mnng as a tool for personalzaton: A survey. User Modelng and User-Adapted Interacton 3 (23) Ernak, M., Vazrganns, M.: Web mnng for web personalzaton. ACM TOIT 3 (23) Mulvenna, M., Anand, S., and Buchner, A.: Personalzaton on the net usng web mnng. CACM 43 (2) Suryavansh, B.S., Shr, N., Mudur, S.P.: An effcent technque for mnng usage profles usng relatonal fuzzy subtractve clusterng. Proc. of the 25 Int. Workshop on Challenges n Web Informaton Retreval and Integraton (WIRI 5) (25) Herlocker J., Borchers, A., and Redl, J.: An algorthmc framework for performng collaboratve flterng. In Proceedngs of the 999 Conference on Research and Development n Informaton Retreval (999) 7. Konstan, J., Mller, B., Maltz, D., Herlocker, J., Gordon, L., and Reld, J.: GroupLens: applyng collaboratve flterng to usenet news. Communcatons of the ACM 3 (997) 8. Shardanand, U., and Maes, P.: Socal nformaton flterng: algorthms for automatng word of mouth. In Proc. of the ACM CHI Conference (995) 9. Sarwar, B.M., Karyps, G., Konstan, J.A., and Redl, J.: Analyss of recommender algorthms for e- commerce. In Proc. of the 2 nd ACM E-commerce Conference. Mnnesota, USA (2). Srvastava, J., Cooley, R., Deshpande, M., and Tan, P.-T.: Web usage mnng: Dscovery and applcatons of usage patterns from Web data. SIGKDD Exploratons, :2 (2). Fras-Martnez, E., Magoulas, G., Chen, S., and Macrede, R.: Modelng human behavor n useradaptve systems: Recent advances usng soft computng technques. Expert Systems wth Applcatons 29 (25) Castellano, G., Fanell, A. M., Torsello, M. A.: LODAP: a LOg DAta Preprocessor for mnng Web browsng patterns. In Proc. of the 6th WSEAS Internatonal Conference on Artfcal Intellgence, Knowledge Engneerng and Data Base (AIKED 27), Corfu, Greece, February 6-9 (27) 3. Shun, L., Jee-Hyong, L., Keon-Myung, L., YOUN, H. Y.: Fuzzy category and fuzzy nterest for web user understandng. In Proc. Of the Internatonal conference on computatonal scence and ts applcatons. Sngapore (25) 4. Hofgesang, P. I.: Relaevance of tme spent on Web pages. In Proc. Of the th Web Knowledge Dscovery and Data Mnng (25) 5. Bezdek, J.C.: Pattern recognton wth fuzzy obectve functon algorthms. Plenum Press, New York (98) 6. Castellano, G., Castello, C., Fanell, A.M., and Mencar, C.: Knowledge dscoverng by a neurofuzzy modellng framework. Fuzzy sets and Systems 49 (25) M. Halkd, Y. Batstaks, M. Vazrganns,: Cluster Valdty Methods:Part II, n SIGMOD Record, September 22 39

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Using Content-Based Filtering for Recommendation 1

Using Content-Based Filtering for Recommendation 1 Usng Content-Based Flterng for Recommendaton 1 Robn van Meteren 1 and Maarten van Someren 2 1 NetlnQ Group, Gerard Brandtstraat 26-28, 1054 JK, Amsterdam, The Netherlands, robn@netlnq.nl 2 Unversty of

More information

Implementations of Web-based Recommender Systems Using Hybrid Methods

Implementations of Web-based Recommender Systems Using Hybrid Methods Internatonal Journal of Computer Scence & Applcatons Vol. 3 Issue 3, pp 52-64 2006 Technomathematcs Research Foundaton Implementatons of Web-based Recommender Systems Usng Hybrd Methods Janusz Sobeck Insttute

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Context-aware Mobile Recommendation System Based on Context History

Context-aware Mobile Recommendation System Based on Context History TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.12, No.4, Aprl 2014, pp. 3158 ~ 3167 DOI: http://dx.do.org/10.11591/telkomnka.v124.4786 3158 Context-aware Moble Recommendaton System Based on Context

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Modelling of Web Domain Visits by Radial Basis Function Neural Networks and Support Vector Machine Regression

Modelling of Web Domain Visits by Radial Basis Function Neural Networks and Support Vector Machine Regression Modellng of Web Doman Vsts by Radal Bass Functon Neural Networks and Support Vector Machne Regresson Vladmír Olej, Jana Flpová Insttute of System Engneerng and Informatcs Faculty of Economcs and Admnstraton,

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 1 2011 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

Gaining Insights to the Tea Industry of Sri Lanka using Data Mining

Gaining Insights to the Tea Industry of Sri Lanka using Data Mining Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 2008 Vol I Ganng Insghts to the Tea Industry of Sr Lanka usng Data Mnng H.C. Fernando, W. M. R Tssera, and R. I. Athauda

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Searching for Interacting Features for Spam Filtering

Searching for Interacting Features for Spam Filtering Searchng for Interactng Features for Spam Flterng Chuanlang Chen 1, Yun-Chao Gong 2, Rongfang Be 1,, and X. Z. Gao 3 1 Department of Computer Scence, Bejng Normal Unversty, Bejng 100875, Chna 2 Software

More information

Testing CAB-IDS through Mutations: on the Identification of Network Scans

Testing CAB-IDS through Mutations: on the Identification of Network Scans Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es

More information

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven

More information

Interpreting Patterns and Analysis of Acute Leukemia Gene Expression Data by Multivariate Statistical Analysis

Interpreting Patterns and Analysis of Acute Leukemia Gene Expression Data by Multivariate Statistical Analysis Interpretng Patterns and Analyss of Acute Leukema Gene Expresson Data by Multvarate Statstcal Analyss ChangKyoo Yoo * and Peter A. Vanrolleghem BIOMATH, Department of Appled Mathematcs, Bometrcs and Process

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

An Inductive Fuzzy Classification Approach applied to Individual Marketing

An Inductive Fuzzy Classification Approach applied to Individual Marketing An Inductve Fuzzy Classfcaton Approach appled to Indvdual Marketng Mchael Kaufmann, Andreas Meer Abstract A data mnng methodology for an nductve fuzzy classfcaton s ntroduced. The nducton step s based

More information

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

Detecting Credit Card Fraud using Periodic Features

Detecting Credit Card Fraud using Periodic Features Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Dynamic Fuzzy Pattern Recognition

Dynamic Fuzzy Pattern Recognition Dynamc Fuzzy Pattern Recognton Von der Fakultät für Wrtschaftswssenschaften der Rhensch-Westfälschen Technschen Hochschule Aachen zur Erlangung des akademschen Grades enes Doktors der Wrtschafts- und Sozalwssenschaften

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

Web Spam Detection Using Machine Learning in Specific Domain Features

Web Spam Detection Using Machine Learning in Specific Domain Features Journal of Informaton Assurance and Securty 3 (2008) 220-229 Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Hassan Najadat 1, Ismal Hmed 2 Department of Computer Informaton Systems Faculty

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Data Visualization by Pairwise Distortion Minimization

Data Visualization by Pairwise Distortion Minimization Communcatons n Statstcs, Theory and Methods 34 (6), 005 Data Vsualzaton by Parwse Dstorton Mnmzaton By Marc Sobel, and Longn Jan Lateck* Department of Statstcs and Department of Computer and Informaton

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

GENESYS BUSINESS MANAGER

GENESYS BUSINESS MANAGER GENESYS BUSINESS MANAGER e-manager Onlne Conference User Account Admnstraton User Gude Ths User Gude contans the followng sectons: Mnmum Requrements...3 Gettng Started...4 Sgnng On to Genesys Busness Manager...7

More information

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms

Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms Internatonal Journal of Appled Informaton Systems (IJAIS) ISSN : 2249-0868 Foundaton of Computer Scence FCS, New York, USA Volume 7 No.7, August 2014 www.jas.org Cluster Analyss of Data Ponts usng Parttonng

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

Customer Lifetime Value Modeling and Its Use for Customer Retention Planning

Customer Lifetime Value Modeling and Its Use for Customer Retention Planning Customer Lfetme Value Modelng and Its Use for Customer Retenton Plannng Saharon Rosset Enat Neumann Ur Eck Nurt Vatnk Yzhak Idan Amdocs Ltd. 8 Hapnna St. Ra anana 43, Israel {saharonr, enatn, ureck, nurtv,

More information

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System Mnng Feature Importance: Applyng Evolutonary Algorthms wthn a Web-based Educatonal System Behrouz MINAEI-BIDGOLI 1, and Gerd KORTEMEYER 2, and Wllam F. PUNCH 1 1 Genetc Algorthms Research and Applcatons

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

HYBRID DECISION-MAKING SYSTEM. Ryszard Michalski, Arkadiusz Rychlik, Sławomir Wierzbicki

HYBRID DECISION-MAKING SYSTEM. Ryszard Michalski, Arkadiusz Rychlik, Sławomir Wierzbicki TEKA Kom. Mot. Energ. Roln., 2005, 5, 144-151 HYBRID DECISION-MAKING SYSTEM Ryszard Mchalsk, Arkadusz Rychlk, Sławomr Werzbck Department of Operaton of Vehcles and Machnes, Warma and Mazury Unversty Summary.

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

Fast Fuzzy Clustering of Web Page Collections

Fast Fuzzy Clustering of Web Page Collections Fast Fuzzy Clusterng of Web Page Collectons Chrstan Borgelt and Andreas Nürnberger Dept. of Knowledge Processng and Language Engneerng Otto-von-Guercke-Unversty of Magdeburg Unverstätsplatz, D-396 Magdeburg,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Product Approximate Reasoning of Online Reviews Applying to Consumer Affective and Psychological Motives Research

Product Approximate Reasoning of Online Reviews Applying to Consumer Affective and Psychological Motives Research Appled Mathematcs & Informaton Scences An Internatonal Journal 2011 NSP 5 (2) (2011), 45S-51S Product Approxmate Reasonng of Onlne Revews Applyng to Consumer Affectve and Psychologcal Motves Research Narsa

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

Scatter search approach for solving a home care nurses routing and scheduling problem

Scatter search approach for solving a home care nurses routing and scheduling problem Scatter search approach for solvng a home care nurses routng and schedulng problem Bouazza Elbenan 1, Jacques A. Ferland 2 and Vvane Gascon 3* 1 Département de mathématque et nformatque, Faculté des scences,

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Pre-allocation Strategies of Computational Resources in Cloud Computing using Adaptive Resonance Theory-2

Pre-allocation Strategies of Computational Resources in Cloud Computing using Adaptive Resonance Theory-2 Pre-allocaton Strateges of Computatonal Resources n Cloud Computng usng Adaptve Resonance Theory-2 Dr.T. R. Gopalakrshnan Nar 1, P Jayarekha 2 1 Drector, Research and Industry Incubaton Centre(RIIC), DSI,

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information