Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security

Size: px
Start display at page:

Download "Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security"

Transcription

1 Journal of Computer Scence 3 (5): , 2007 ISSN Scence Publcatons Intellgent Voce-Based Door Access Control System Usng Adaptve-Network-based Fuzzy Inference Systems (ANFIS) for Buldng Securty Wahyud, Wnda Astut and Syazlawat Mohamed Intellgent Mechatroncs Systems Research Group, Department of Mechatroncs Engneerng Internatonal Islamc Unversty Malaysa, P.O. Box, 10, 50728, Kuala Lumpur Malaysa Abstract: Secure buldngs are currently protected from unauthorzed access by a varety of devces. Even though there are many knds of devces to guarantee the system safety such as PIN pads, keys both conventonal and electronc, dentty cards, cryptographc and dual control procedures, the people voce can also be used. The ablty to verfy the dentty of a speaker by analyzng speech, or speaker verfcaton, s an attractve and relatvely unobtrusve means of provdng securty for admsson nto an mportant or secured place. An ndvdual s voce cannot be stolen, lost, forgotten, guessed, or mpersonated wth accuracy. Due to these advantages, ths paper descrbes desgn and prototypng a voce-based door access control system for buldng securty. In the proposed system, the access may be authorzed smply by means of an enrolled user speakng nto a mcrophone attached to the system. The proposed system then wll decde whether to accept or reject the user s dentty clam or possbly to report nsuffcent confdence and request addtonal nput before makng the decson. Furthermore, ntellgent system approach s used to develop authorzed person models based on thers voce. Partcularly Adaptve-Network-based Fuzzy Inference Systems s used n the proposed system to dentfy the authorzed and unauthorzed people. Expermental result confrms the effectveness of the proposed ntellgent voce-based door access control system based on the false acceptance rate and false rejecton rate. Keywords: Access control, voce, ntellgent, artfcal neural network, securty INTRODUCTION The personal safety of the populaton n publc and prvate buldng has always been a concern n current daly lfe. Access control for buldngs represents an mportant tool for protectng both buldng occupants and the structure tself. One of the mportant securty systems n buldng securty s door access control. The door access control s a physcal securty that assures the securty of a room or buldng by means lmtng access to that room or buldng to specfc people and by keepng records of such accesses. The most wdespread authentcaton method for such system s based on smartcards. Smartcard lmts room or buldng access to only those people who hold an allocated smart card. However, there s dffculty to prevent another person from attanng and usng a legtmate person s card. The conventonal smartcard can be lost, duplcated, stolen, forgotten, or mpersonated wth accuracy. Due to the lmtatons of conventonal securty procedures, a range of bometrc verfcaton optons are currently under consderaton for securty system ncludng door access control[ 1,2]. In the bometrcs methods, the dea s to enable automatc verfcaton of dentty by computer assessment of one or more behavoral and/or physologcal characterstcs of a person. Recently bometrcs methods used for personal authentcaton utlze such features as the face, the voce, the hand shape, the fnger prnt and the rs [1,2]. Each method has ts own advantages and dsadvantages based on ther usablty and securty [3]. Among the bometrcs methods, voce has the hgh usablty characterstcs whch nclude the smplcty for the user, feelng of resstance, speed of authentcaton and level of false-rejecton rate [4]. In order to overcome the problems of the smartcard-based door access control, ths paper ntroduces an ntellgent voce-based door access control system for buldng securty. The proposed ntellgent voce-based access control system s a performance bometrc whch offers an ablty to provde postve verfcaton of dentty from an ndvdual s voce characterstcs to access secure locatons (e.g. offce, laboratory, home). In the Correspondng Author: Wahyud, Intellgent Mechatroncs Systems Research Group, Department of Mechatroncs Engneerng, Internatonal Islamc Unversty Malaysa, PO. Box, 10, 50728, Kuala Lumpur Malaysa 274

2 proposed system features are extracted from the person voce data and then an Adaptve-Network-based Fuzzy Inference Systems (ANFIS) s used to develop models of the authorzed persons based on the feature extracted from the authorzed person voces. Frst, the prototype of the door access control s descrbed. Next, the speaker verfcaton process used n the proposed system s dscussed n detal. Fnally, the performance of the proposed ntellgent voce-based door access control s evaluated expermentally for door control access n Intellgent Mechatroncs System Laboratory, Faculty of Engneerng, Internatonal Islamc Unversty Malaysa. and closng. The electromagnetc lock works on 12 volts DC power supply and t s set n normally close (NC) condton. Therefore, wthout command sgnal from the verfcaton system, the lock s always swtched on and the door remans closed. In the case a person s verfed by the proposed voce-based verfcaton as an authorzed user, the access s granted. The parallel port sends a sgnal to the electromagnetc lock drver, whch s shown n Fg. 3, so that the electromagnetc lock s demagnetzed. As a result the door can be opened by that authorzed person for a certan perod of tme. PROPOSED VOICE-BASED DOOR ACCESS CONTROL Proposed system descrpton: Fgure 1 shows the schematc dagram of the proposed ntellgent vocebased access control. The proposed system bascally conssts of three man components namely voce sensor, speaker verfcaton system and door access control. A low-cost mcrophone commonly used n the computer system s used as voce sensor to record the person voce. The recorded voce s then sent to the vocebased verfcaton system whch wll verfy the authentcty of the person based on hs/her voce. Fg. 2: Door wth electromagnetc lock Mcrophone Intellgent Voce-based Door Access Control Magnetc lock Voce-based Verfcaton A/D Port Drver System Fg. 1: Proposed ntellgent voce-based door access control system Fg. 3: Electromagnetc lock drver A personal computer (PC) of 1.5 MHz Pentum III The access control system n general makes four processor equpped wth sound card s used for speaker possble decsons; the authorzed person s accepted, verfcaton mplementaton. The sound card records the the authorzed person s rejected, the unauthorzed voce data based on the samplng frequency of 22 khz. In ths system, all of the voce data processng and person (mpostor) s accepted and the unauthorzed speaker verfcaton algorthms are mplemented n the person (mpostor) s rejected. The accuracy of the PC usng MATLAB and ts toolboxes. As a result access control system s then specfed based on the rate of the voce-based verfcaton, a decson sgnal whch n whch the system makes decson to reject the wll accept or reject the access wll be sent through the authorzed person and to accept the unauthorzed parallel port of the PC to the door access control. person. The quanttes to measure the rate of the access As shown n Fg. 2, an electromagnetc lock s control accuracy to reject the authorzed person s then attached n the door for controllng the door openng called as false rejecton rate (FRR) and that to measure 275

3 the rate of access control to accept the unauthorzed person s called to as false acceptance rate (FAR). Mathematcally, both rates are expressed as percentage usng the followng smple calculatons [5] : NFR FRR = x100% NFA (1) NFA FAR = x100% NIA (2) NFR and NFA are the numbers of false rejectons and false acceptance respectvely, whle NAA and NIA are the number of the authorzed person attempts and the numbers of mpostor person attempts. For achevng hgh securty of the door access control system, t s expected that the proposed system wll have both low FRR and low FAR. s requred to enter the clamed dentty and hs/her voce. Furthermore, the entered voce s processed and compared wth the clamed person model to verfy hs/her clam. In ths phase, there s a decson process n whch the system decdes whether the feature extracted from the gven voce matches wth the model of the clamed person. In order to gve a defnte answer of access acceptance or rejecton, a threshold s set. When degree of smlarty between a gven voce and the model s greater then threshold, the system wll accept the access, otherwse the system wll reject the person to access the buldng/room. Voce Clamed Identty Voce-based verfcaton system: It s well known that not only conveys a person message, voce of a person also ndcates the person dentty. Therefore, t can also be used n bometrc system. The use of the voce for bometrc measurement becomes more popular due to some reasons such as natural sgnal generaton, convenent to process or dstrbuted and applcable for remote access. Bascally there are two knds of vocebased recognton or speaker recognton. Speaker dentfcaton s one of the two form of speaker recognton, whle speaker verfcaton beng the other one [5]. In the speaker verfcaton system, the system decdes that a person s the one who he/she clams to be. On the other hand, speaker dentfcaton decdes the person among a group of persons. Speaker recognton s further dvded nto two categores, whch are textdependent and text-ndependent speaker recogntons. Text dependent speaker recognton recognzes the phrases that spoken, whereas n text-dentfcaton the speaker can utter any word. The most approprate method for voce-based door access control s based on the concept of speaker verfcaton snce the objectve n the access control s to accept or reject a person to enter a specfc buldng or room. Fgure 4 shows the basc structure of the proposed voce-based verfcaton system. As other methods of bometrc-based securty system, there are two phases n the proposed system. Frst phase s tranng or enrollment phase as shown n Fg. 4(a). In ths phase the authorzed persons are regstered and ther voces are recorded. The recorded voces are then extracted. The features extracted from the recorded voces are used the develop models of the authorzed persons. The second phase n the proposed system s testng or operatonal phase as depcted n Fg. 4(b). In ths phase a person who wants to access the buldng/room 276 Voce Feature Extracton Authorzed Person Modelng Authorzed Person Model Databse Feature Extracton Model Matchng Decson Acceptance/Rejecton Authorzed Person Model Databse a. Tranng phase b. Testng (operatonal) phase Fg. 4: Basc structure of voce-based verfcaton system Feature extracton: As shown n Fg. 4, feature extracton s one of the mportant processes n the proposed system. Feature extracton s the process of convertng the raw voce sgnal to feature vector whch can be used for classfcaton. Features are some quanttes, whch are extracted from preprocessed voce and can be used to represent the voce sgnal. In general, there are two types of feature extracton technque, namely; cepstral coeffcent feature based and prosodc-based feature such as; fundamental frequency and formant frequency. In ths paper, Perceptual Lnear Predcton (PLP) coeffcents are used as feature n the proposed system. Fgure 5 shows schematcally extracton process of the PLP coeffcent from the raw voce sgnal. Perceptual Lnear Predcton (PLP), smlar to LPC analyss, s based on the short-term spectrum of speech. In contrast to pure lnear predctve analyss f speech, PLP modfes the short-term spectrum of the speech by several psychophyscally based transformatons. In ths

4 method the spectrum s warped accordng to Bark scale. The PLP used an all-pole model to smooth the modfed power spectrum. The output cepstral coeffcents are then computed based on ths model [6]. Fg. 5: PLP coeffcent extracton process In summary, the PLP coeffcents are calculated based on the followng steps: Crtcal band analyss: Frstly, the voce data s framed and wndowed (usng avalable wndow functon such as hammng wndow) and then t s transformed nto frequency doman usng the Fast Fourer Transform (FFT). Then, the obtaned spectrum s warped from the radal frequency (ω) to the Bark frequency (Ω) scale usng the followng formula: ω ( ω ) = 6 ln π 2 ω π Ω (3) The power spectrum, S (Ω) of the warped spectrum s then calculated. Next, the convoluton operaton s carred out between the warped power spectrum S(Ω) and the power spectrum of a smulated crtcal-band maskng curve Ψ ( Ω ), whch has the followng form; 0, 10 Ψ ( Ω ) = 1, 10 0, 2.5( Ω ), 2.5( Ω 0.5 ) Ω < Ω < Ω < Ω < 2.5 Ω > 2.5 (4) The followng s the result of the convoluton operaton: 2.5 Θ( Ω ) = S( Ω Ω ) Ψ ( Ω ), = 1,2,,B (5) Ω = 1.3 where B s the number of the sample. The samplng ntervals are chosen so that when the crtcal bands are added together t equally represents the frequency scale. Equal-loudness pre-emphass: Frstly, an equalloudness curve s constructed. An approxmaton of ths curve for the frequency up to 5 khz s E ω ( ω x10 ) ( ) = ( ω + 6.3x10 ) ( ω x10 9 ) ω (6) And the followng equaton s the approxmaton for frequency hgher than 5 khz: E ω ( ω x10 ) ( ) = ( ω + 6.3x10 ) ( ω x10 )( ω x10 26 ) ω (7) Then, the smulated equal-loudness E(ω) s used to pre-emphass the sampled bark power spectrum Θ(Ω ). The followng s obtaned from the equal-loudness preemphass: L( Ω ( ω )) = E( ω ) Θ( Ω( ω )) (8) Intensty-loudness power converson: Here, a cubc root compresson of the ampltude s performed as follows: 1 / 3 φ ( ω ) = L( Ω ) (9) Inverse dscrete Fourer transform: The power spectrum that resulted from prevous ampltude compresson s converted back to tme doman usng nverse FFT (IFFT). Calculaton of the all-pole coeffcents: The autocorrelaton sgnal can be used to calculate the allpole coeffcents usng the well-known the Levnson- Durbn algorthm. Detal dscusson on the PLP coeffcent can be found n [6]. ANFIS-based speaker model: ANFIS proposed by Jang [7] s an archtecture whch functonally ntegrates the nterpretablty of a fuzzy nference system wth adaptablty of a neural network. Loosely speakng ANFIS s a method for tunng an exstng rule base of fuzzy system wth a learnng algorthm based on a collecton of tranng data found n artfcal neural network. Due to the use the less tunable of parameters of fuzzy system compared wth conventonal artfcal neural network, ANFIS s traned faster and more accurate than the conventonal artfcal neural network. An ANFIS whch corresponds to a Sugeno type fuzzy model of two nputs and sngle output s shown n Fg. 6. A rule set of frst order Sugeno fuzzy system s the followng form: Rule : If x s A and y s B then f = p x+q y+r. 277

5 In the perspectve of artfcal neural network, t s a feedfoward network consstng of 5 layers. Every node n the frst layer s an adaptve node wth the followng node functon Fg. 6: ANFIS archtecture [8] tranng data. A hybrd learnng algorthm s a popular learnng algorthm used to tran the ANFIS for ths purpose. In summary, the steps of buldng person model based on the voce data usng ANFIS are as follows: * Voce data collecton and feature extracton of the voce data. * Determnng the premse parameters. * Tranng of the ANFIS usng the nput pattern and desred output to obtan the consequent parameters. * Valdaton of the traned ANFIS usng tranng data. RESULTS µ A ( x ), = 1,2 O1, = (10) µ B 2( y ), = 3, 3 where x (or y) s the nput node and A (or B -2 ) s a lngustc label assocated wth ths node. In other words, O 1, s the membershp degree of a fuzzy set A (or B) to whch the nput x (or y) s quantfed. The membershp functon for A (or B) can be Gaussan functon, trangle membershp functon and others. The parameters of the membershp functon used n ths layer are termed as premse parameters. Second layer combnes the output of the frst layer so that t has the followng output: O2, = w = µ A ( x ) µ B ( y ) (11) Here each output represents the frng strength of a rule. Next layer, whch s thrd layer, normalzes the output of the prevous layer as follows; w O3, = w =, = 1,2 (12) w1 + w2 In the fourth layer, the followng output s calculated based on the thrd outputs: O4, = w f = w ( p x + q y + r ) (13) where f s functon whch s used n the frst order Sugeno type fuzzy system. Parameters n ths node (p, q and r ) are referred as consequent parameters. Fnally, the fnal output of the ANFIS s the last layer output and t s gven as O 5, = z = w f (14) The man objectve of the ANFIS desgn s to optmze the ANFIS parameters. There are two steps n the ANFIS desgn. Frst s desgn of the premse parameters and the other s consequent parameters tranng. There are several method proposed for desgnng the premse parameter such as grd partton, fuzzy c-means clusterng and subtractve clusterng [8]. Once the premse parameters are fxed, the consequent parameters are obtaned based on the nput-output 278 Expermental setup: In order to evaluate the effectveness of the proposed ntellgent voce-based door access control, the proposed system s nstalled at Intellgent Mechatroncs System Laboratory, Faculty of Engneerng, Internatonal Islamc Unversty Malaysa. Voces of nne (9) speakers from YOHO database are used n the experment. Three (3) speakers are consdered as the authorzed person to access the laboratory and the other sx (6) speakers are assumed as outsde mpostors. Each speaker, who s assumed as authorzed person, has to say word seven for 70 tmes where 20 voce data are used as tranng data and the other 50 voce data are used as testng data. Ths means the text-dependent speaker verfcaton system s used n the proposed system. The example of raw voce sgnal of the word seven for an authorzed person s shown n Fg. 7. To obtan the PLP coeffcents, the 17 crtcal-band flters are used, whch covers a 17 Bark frequency range. These flters are smulated by ntegratng the FFT spectrum of 20-ms Hammng-wndowed speech segments n whch the frame rate s 10-ms. Fgure 8 shows the 13 PLP coeffcents extracted from the voce sgnal shown n Fg. 7. Magntude Tme (msec) Fg. 7: Example of voce sgnal of authorzed people The effectveness of the proposed method n tranng phase s based upon tranng tme and the

6 classfcaton rate. Moreover, the effectveness of the proposed system n testng (operatonal) phase s evaluated based upon FRR and FAR. The FAR s Magntude Coeffcent Number Fg. 8: Extracted 13 PLP coeffcents Table 1: Model ANFIS 1 (r = 0.25) ANFIS 2 (r = 0.50) ANFIS 3 (r = 1.00) Tranng performances Authorzed Tranng Tme Person (sec) Person % Person % Person % Classfcaton Rate (%) Average % Person % Person % Person % Average % Person % Person % Person % Average % calculated based on the close set and open set. In the close test, the voce of an authorzed person makes up the dsgused voce to the other authorzed person. On the other hand, test on the two students who are regarded as outsde mpostors consttute open set test. Tranng of the ANFIS-based speaker models: The ANFIS-based speaker model s developed usng Fuzzy Logc Toolbox of MATLAB. In order to allow the ANFIS learn from the nput-output data avalable so that the consequent parameters are obtaned, frstly the structure of the ANFIS has to be desgned. Desgn of the ANFIS structure s done by determnng premse parameters. Here the subtractve clusterng method s used wth dfferent radus parameters. Once the premse parameters are obtaned, the ANFIS model s traned by usng hybrd learnng algorthm for 10 teratons. Table 1 shows the tranng tme and the classfcaton rate for all of the ANFIS-based speaker models for dfferent subtractve clusterng parameters. As shown n the table, all of the speaker models gve perfect classfcaton rates. There are no errors n dentfyng the authorzed persons based on the voce data used n tranng phase. However, the tranng tme s sgnfcantly dfferent for dfferent radus. A smaller radus causes a longer tranng tme. Ths s due to the fact that a smaller cluster radus wll usually yeld more, smaller clusters n the data and hence more rules. A more rules of ANFIS system result n a larger number of consequent parameters. As consequent, a longer tme s needed n tranng process to optmze the parameters. Hence, t can be concluded a larger radus are preferable to shorten the tranng tme. Table 2: Testng performances of ANFIS 1, Radus of 0.25 Authorzed FRR (%) FAR (%) Person Close Set Open Set Person Person Person Overall Table 2: Testng performances of ANFIS 2, Radus of 0.50 Authorzed FRR (%) FAR (%) Person Close Set Open Set Person Person Person Overall Table 3: Testng performances of ANFIS 3, Radus of 1.00 Authorzed FRR (%) FAR (%) Person Close Set Open Set Person Person Person Overall Testng of the ANFIS-based speaker models: Tables 2-4 show the performances of the ANFIS models when testng voce data s used. In term of both FAR and FRR, ANFIS 2 produces a better performance than the other models. Hence t can be concluded that ANFIS 2 s the best canddate as voce-based model n the proposed system. From the securty pont of vew, ANFIS 2 s the best model for protectng the laboratory from unauthorzed person (mpostors) snce t gves the lowest FAR. The overall FAR of the ANFIS 2 s smaller than 10%, whch s good enough for common securty system. In the case hgh level of securty s needed, further mprovement has to be done so that the proposed system produces a small FAR, whch s smaller than 1 %. However although the FRR of the ANFIS 2 s also the smallest, ts FRR s larger than 10 %. Although t does not nfluence the level of securty, a qute large value of FRR makes the access control system nconvenent for the authorzed person. Further mprovement needs to be done to mprove the level of usablty of the ANFIS-based model for access control system. 279

7 CONCLUSION Ths study has documented development of ntellgent voce-based door access control for buldng securty. The proposed system adopted Perceptual Lnear Predcton (PLP) coeffcents as the feature of the person voce and used Adaptve-Network-based Fuzzy Inference Systems (ANFIS) to develop authorzed person models based on ther voces. Expermental results showed that the proposed system produced a good securty performance, especally t gave a good false rejecton rate (FRR) and a good false acceptance rate (FAR) of the close set condton. However, further study has to be done to mprove ts FRR. REFERENCES 1. Kung, S.Y., M.W. Mak and S.H. Ln, Bometrc Authentcaton: Machne Learnng Approach. Prentce Hall. 2. Zhang, D.D., Automated Bometrcs: Technologes and Systems. Kluwer Academc Publsher. 3. Osadcw, L., P. Varshney and K. Veeramachanen, Improvng Personal Identfcaton Accuracy Usng Multsensor Fuson for Buldng Access Control Applcaton. In Proceedngs the Ffth Intl. Conf. Informaton Fuson, pp: Anonymous, Door-access-control System Based on Fnger-ven Authentcaton. Htach Revew. Avalable onlne at 5. Campbell, J.P., Speaker Recognton: a Tutoral. In Proc. IEEE., pp: Hermansky, H., Perceptual lnear predctve (PLP) analyss for speech. J. Acoustcs Socety Amercan, pp: Jang, J.S., Adaptve-network-based fuzzy nference system. IEEE Trans. on System, Man and Cybernetcs, pp: Jang, J.S.R., C. T. Sun and E. Mzutan, Neuro-Fuzzy and Soft Computng, Prentce Hall, Upper Saddle Rver, NJ, USA. 280

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble 1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, szhang12@llnos.edu Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In

More information

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A frequency decomposition time domain model of broadband frequency-dependent absorption: Model II

A frequency decomposition time domain model of broadband frequency-dependent absorption: Model II A frequenc decomposton tme doman model of broadband frequenc-dependent absorpton: Model II W. Chen Smula Research Laborator, P. O. Box. 134, 135 Lsaker, Norwa (1 Aprl ) (Proect collaborators: A. Bounam,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Forecasting and Modelling Electricity Demand Using Anfis Predictor

Forecasting and Modelling Electricity Demand Using Anfis Predictor Journal of Mathematcs and Statstcs 7 (4): 75-8, 0 ISSN 549-3644 0 Scence Publcatons Forecastng and Modellng Electrcty Demand Usng Anfs Predctor M. Mordjaou and B. Boudjema Department of Electrcal Engneerng,

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS. STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Biometric Signature Processing & Recognition Using Radial Basis Function Network

Biometric Signature Processing & Recognition Using Radial Basis Function Network Bometrc Sgnature Processng & Recognton Usng Radal Bass Functon Network Ankt Chadha, Neha Satam, and Vbha Wal Abstract- Automatc recognton of sgnature s a challengng problem whch has receved much attenton

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

New Solutions for Substation Sensing, Signal Processing and Decision Making

New Solutions for Substation Sensing, Signal Processing and Decision Making Proceedngs of the 37th Hawa Internatonal Conference on System Scences - 2004 New Solutons for Substaton Sensng, Sgnal Processng and Decson Makng M. Kezunovc, Fellow IEEE Texas A&M Unversty Department of

More information

Development of an intelligent system for tool wear monitoring applying neural networks

Development of an intelligent system for tool wear monitoring applying neural networks of Achevements n Materals and Manufacturng Engneerng VOLUME 14 ISSUE 1-2 January-February 2006 Development of an ntellgent system for tool wear montorng applyng neural networks A. Antć a, J. Hodolč a,

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

A Hybrid Model for Forecasting Sales in Turkish Paint Industry

A Hybrid Model for Forecasting Sales in Turkish Paint Industry Internatonal Journal of Computatonal Intellgence Systems, Vol.2, No. 3 (October, 2009), 277-287 A Hybrd Model for Forecastng Sales n Turksh Pant Industry Alp Ustundag * Department of Industral Engneerng,

More information

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,

More information

Detecting Credit Card Fraud using Periodic Features

Detecting Credit Card Fraud using Periodic Features Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

How To Create An Emoton Recognzer

How To Create An Emoton Recognzer Recognzng Low/Hgh Anger n Speech for Call Centers FU-MING LEE*, LI-HUA LI, RU-YI HUANG Department of Informaton Management Chaoyang Unversty of Technology 168 Jfong E. Rd., Wufong Townshp Tachung County,

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Context-aware Mobile Recommendation System Based on Context History

Context-aware Mobile Recommendation System Based on Context History TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.12, No.4, Aprl 2014, pp. 3158 ~ 3167 DOI: http://dx.do.org/10.11591/telkomnka.v124.4786 3158 Context-aware Moble Recommendaton System Based on Context

More information

Oxygen Saturation Measurement and Optimal Accuracy in Nair

Oxygen Saturation Measurement and Optimal Accuracy in Nair The Applcaton of Threshold De-nosng n Moble Oxygen Saturaton Montorng Software Tang Nng and Xu Zhenzhen School of Computer Scence and Technology, Donghua Unversty, Shangha, Chna 201620 tnwysyd@126.com

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Abstract. 1. Introduction

Abstract. 1. Introduction System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,

More information

Nyt academical Analysis of Network Traffc

Nyt academical Analysis of Network Traffc Journal of Informaton Assurance and Securty 4 (2009) 217-225 Ensemble Classfers for Network Intruson Detecton System Anazda Zanal 1, Mohd Azan Maarof 2 and St Maryam Shamsuddn 3 1,2 Informaton Assurance

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas

More information

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns A study on the ablty of Support Vector Regresson and Neural Networks to Forecast Basc Tme Seres Patterns Sven F. Crone, Jose Guajardo 2, and Rchard Weber 2 Lancaster Unversty, Department of Management

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System Mnng Feature Importance: Applyng Evolutonary Algorthms wthn a Web-based Educatonal System Behrouz MINAEI-BIDGOLI 1, and Gerd KORTEMEYER 2, and Wllam F. PUNCH 1 1 Genetc Algorthms Research and Applcatons

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Fast Fuzzy Clustering of Web Page Collections

Fast Fuzzy Clustering of Web Page Collections Fast Fuzzy Clusterng of Web Page Collectons Chrstan Borgelt and Andreas Nürnberger Dept. of Knowledge Processng and Language Engneerng Otto-von-Guercke-Unversty of Magdeburg Unverstätsplatz, D-396 Magdeburg,

More information

MyINS: A CBR e-commerce Application for Insurance Policies

MyINS: A CBR e-commerce Application for Insurance Policies Proceedngs of the 5th WSEAS Internatonal Conference on E-ACTIVITIES, Vence, Italy, November 20-22, 2006 373 MyINS: A CBR e-commerce Applcaton for Insurance Polces SITI SORAYA ABDUL RAHMAN, AZAH ANIR NORMAN

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

A spam filtering model based on immune mechanism

A spam filtering model based on immune mechanism Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

Towards Specialization of the Contract-Aware Software Development Process

Towards Specialization of the Contract-Aware Software Development Process Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland

More information

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 2, JUNE 2013 187 A Genetc Algorthm Based Approach for Campus Equpment Management System n Cloud Server Yu-Cheng Ln Abstract In ths paper, we proposed

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Sequential Optimizing Investing Strategy with Neural Networks

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Sequential Optimizing Investing Strategy with Neural Networks MATHEMATICAL ENGINEERING TECHNICAL REPORTS Sequental Optmzng Investng Strategy wth Neural Networks Ryo ADACHI and Akmch TAKEMURA METR 2010 03 February 2010 DEPARTMENT OF MATHEMATICAL INFORMATICS GRADUATE

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Fuzzy Control of HVAC Systems Optimized by Genetic Algorithms

Fuzzy Control of HVAC Systems Optimized by Genetic Algorithms Appled Intellgence 18, 155 177, 2003 c 2003 Kluwer Academc Publshers. Manufactured n The Netherlands. Fuzzy Control of HVAC Systems Optmzed by Genetc Algorthms RAFAEL ALCALÁ Department of Computer Scence,

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Audio Data Mining Using Multi-perceptron Artificial Neural Network

Audio Data Mining Using Multi-perceptron Artificial Neural Network 224 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.0, October 2008 Audo Data Mnng Usng Mult-perceptron Artfcal Neural Network Surendra Shetty, 2 K.K. Achary Dept of Computer

More information