A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation

Size: px
Start display at page:

Download "A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation"

Transcription

1 Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract. The changng nforaton technology akes data ncrease exponentally n all areas, the qualty of the huge aounts of data s the core probles. Data cleanng s an effectve technology to solve data qualty probles. Ths paper focuses on the duplcate data cleanng technques. It studes the qualty of the data fro the archtectural level, the nstance-level probles, the ult-source sngle-source probles, duplcated records cleanng applcaton platfor and the evaluaton crtera. In these studes, a proved novel detecton ethod adopts the fuzzy clusterng algorth wth the Levenshten dstance cobnaton to data cleanng.it can accurately and quckly detect and reove duplcate raw data. The proved ethod ncludes a slar duplcate records detecton process, the ajor syste fraework desgn, syste functon odules of the pleentaton process and results analyss n the paper. The precson and recall rates are hgher than several other data cleanng ethods. These coparsons confr the valdty of the ethod. The experental results exhbt that the proposed ethod s effectve n data detecton and cleanng process. Streszczene. Artykuł proponuje nowe etody czyszczena danych z uwzględnene lczby przypadków, welu źródeł, podwójnych rekordów nnych kryterów oceny. Ulepszona etoda detekcj wykorzystuje algoryt rozytego klastrowana w dystanse Levenshtena. W ten sposób szybko wykrywane są usuwane podwójne wersze danych. (Metoda detekcj podwójnych danych bazująca na rozyty klastrowanu) Keywords: Approxate Duplcate Data, Fuzzy Clusterng, Data Cleanng, Levenshten Dstance Słowa kluczowe: czyszczene danych, rozyte klastrowane. Introducton The changng nforaton technology akes data of all areas ncrease extreely fast, whch akes data becoe the focus. The accurate analyss of data s of sgnfcance because the decson, whch decson-akers ade, s hghly depend on t. However, the data receved fro external sources n the data warehouse s usually drty, ncoplete and nconsstent. There are two reasons: frstly, the lack of effectve data analyss technques; the second, the data s of not hgh qualty, dfferent data sources on the sae data ay volate the value of the data tself. The drty data n the DW (Data Warehouse) wll affect the accuracy of the extracted nforaton, akng all knds of data analyss, such as OLAP (On-Lne Analytcal Processng), data nng applcatons have abguous or wrong conclusons, akng decsons lose the support. Therefore, the qualty of DW data s a proble can t be gnored. Data cleanng s desgned to guarantee hgh qualty data, to elnate error data redundant data and nconsstent nforaton n data warehouse or database, whch can enhance the qualty of decson. Data cleanng a s not only on elnatng data errors, redundant and nconsstent nforaton, ts fundaental purpose s to unfed a varety of data sets fro dfferent, ncopatble rules, whch are the necessary eleents to construct DW and KDD (Knowledge Dscovery n Databases). Snce the data nconsstences wll be a varety of possbltes, and data s of a large aount, data anoaly detecton usually reles on hghly effcent data converson algorth [1]. Database technology and data s large aount are undergong a revoluton fro quantty to qualty. In the past, people coplete the data query and analyss n a seautoatc way. Those data cannot satsfy people s analyss and arguent of affars n varous felds hde behnd the data. KDD and data nng technques generate and develop based on the needs of the county, t also create uch new felds, such as research and applcaton n data warehouse technology [2]. Those technologes ake people use data effectvely on a ore convenent platfor, whch lad a sold foundaton for decson analyss. Intalzng the varous data of dfferent data sources s a very portant part n the KDD; t has an portant pact on the fnal result. Enttes of the real world n dfferent data sources often use dfferent syntax fors. The way to reove data of dfferent data sources s dffcult snce the data n dfferent fors ay lead to the stuaton of only-two or only-three result. The a large nuber of fact has proved that, slar to large-scale ntellgent systes, such as data nng syste, data pre-processng consttute 60% to 80% of the entre workload, the data cleanng s one of the part of data pre-processng, whch has a very portant role n the ntellgent syste. Therefore, the study on syste, whch could produce odel fro a large nuber of useful nforaton, becoes ncreasngly portant. Data cleansng s a work-related feld, whch work around specfc areas. The data-cleanng fraework for all odes s not avalable, whch akes the research of general data cleanng syste becoe a hot spot. The Study and Iproveent of Fuzzy Clusterng Algorth The Status of Fuzzy Clusterng Algorth Pattern recognton and achne recognton s regular n nosy or coplex envronents, whch s the search n data structure. In pattern recognton, the set of data s called a cluster. In realty, data s not evenly dstrbuted, so the rule or structure ay not be accurately defned. In other words, pattern recognton s an nexact scence. It s to deal wth soe fuzzy ssue. For exaple, the boundary between clusters ay be vague, and not certan, that s, a data ay belong to two or ore dfferent levels of cluster ebers. So the key ssue s to fnd a set of data ponts, whch s a cluster. The current study on fuzzy clusterng algorth located n the followng areas: the convergence local nu of the fuzzy c-eans clusterng algorth; creaton of dfferent types of objectve functons; dvdng the fuzzy space n dfferent ways; leadng the optal value of real world nto fuzzy clusterng algorth; nzng the dstance of fuzzy c-eans clusterng algorth; clusterng a large nuber types of data. Ths paper studes how to optze the ost classc fuzzy c-eans clusterng algorth n fuzzy clusterng algorth, and apply the proved algorth to the detecton of approxately duplcate data. Fuzzy c-eans Clusterng Algorth Fuzzy C-eans (FCM) clusterng algorth allows a group of data belongng to two or ore clusters. Ths ethod was rased by Dunn n 1973, and developed by Bezdek n 1981, and s coonly used n pattern recognton [3]. It s a clusterng algorth based on dvson, 26 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012

2 and t as at led the slarty between objects whch are dvded nto the sae class (ebers of group) to be axu, whereas the slarty between objects of dfferent classes nu. It s based on the objectve functon s nzng, whch lst as follows: N C (1) J u x c 1 j1 j 2 where s any real nuber greater than 1, whch was set to 2.00 by Bezdek. u s a j level of x eber cluster; x s the densonal easureents; C j s a densonal clusters, * center s to express the slarty between any crtera, any easureent center. The objectve functon whch fuzzy partton optzed through teratve functon lst as equaton (1), updatng ebers u and the cluster center C j : 1 (2) 2 (3) u x c c j k1 xck C N u 1 N 1 u x 1 The teraton stops when eet the equaton (4). (k1) k (4) ax u u where s between 0 and 1, k s the teraton step. The process converges to a local nu or saddle pont of J.The algorth has the followng steps: 1. transfor U nto atrx u, U (0) 2. the k-step, accordng to equaton(3),and calculate the atrx center vector c (k) 3. calculate U (k), U ( k 1) accordng to equaton (1) stop calculate If U ( k 1) U ( k), return to step 2. Ths algorth proposed n ths paper wll be leaded as the fundaental algorth to detect the slar and duplcate data nto the database cleanng. The Probles of the Exstng Algorth Research fro the above algorth, t knows that data s bound to each cluster s ebershp functon, whch represents the fuzzy way of the algorth. To acheve ths goal, t only needs to create a atrx naedu, a nuber between 0 and 1 representng connecton degree between the data and cluster canters. Gven a partcular data set, assung that s an axs dstrbuton. One-densonal data clusterng ebershp s shown n Fg.1, the connecton degree represent the locaton of slar data between slar data eber to a certan extent. In the FCM approach, the sae orgn does not belong to only one welldefned cluster, but t can be placed n ddle. In ths case, as the ebershp functon shown n Fg.2, represented wth a sooth curve, each base ay belong to dfferent groups of ebers. Fg.1 One-densonal data clusterng ebershp Fro the clusterng ebershp of FCM ethod s data n Fg.2, there are soe tradtonal clusterng algorths, whch have been appled to the detecton of slar or duplcate data by scholar, but there are soe probles [4]. In the appng process of character feld, f there exsts spaces n the d-pont, they wll lose the correspondng effectve feld nforaton. If DBSCAN algorth s used alone n dealng wth character data, the general s to add ASCII value of all character n turn, t can easly lead to sjudgeent. Such as bg and gbe, they can be consdered to be duplcate data, those two dfferent records ay be classfed nto the sae class, and the clusterng result obtaned n the cluster set s not entrely slar record. Fg.2 Data clusterng ethod FCM ebershp The Slar Duplcate Data Detecton Based on Fuzzy Clusterng Through research and analyss of the prevous secton, these wll have ore or less the exstence of proble by the use of a sngle algorth, and t wll affect the fnal result of data cleanng. Broadly speakng, data cleanng s the process of data sources, and akng the processed data effcent and useful; n the narrow sense, data cleanng specfcs the process to buld DW and data nng to ake the data source accurate coplete consstence after that the data source s relable [5]. Based on the coparson the prevous ethod, ths paper presents a new ethod of detectng slar or duplcate data. The ethod uses a cobnaton of the fuzzy c-eans clusterng algorth and the Levenshten dstance to process drty data, and gets the needed data accurately effectvely and quckly. So that slar or duplcate data wll all be throw nto trash. There are two steps n the ethod proposed n ths paper, frstly usng fuzzy c-eans clusterng algorth to gather the ebers of greatest slarty nto a class as far as possble together, and then copare the ebers of each class by Levenshten dstance, fnally delete the sae ebers of each class whch are naely slar data [6].Levenshten dstance s the splest edt dstance whch s a coonly used easure of the strng dstance. Ths ethod s the nterpretaton for nzng the nuber of operatons the fro the source strng to the destnaton strng by nsert (nsert characters n a poston of a strng), reove (delete one character for strng), replace (replace a character wth another character n the strng). Ths ethod has a wde range of applcatons n deternng the slarty of two strngs. Edt dstance s defned as follows: assung all strngs s created fro a lted set of characters. Two strngs such as T the length of the strng, are respectvely S, T. PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/

3 D (. represents the edt dstance between the frst characters of the strng S and the frst j. Characters of the strng T ; Obvously, D ( T,0.0) 0. D (. recursvely defned as follows: D(. D( 1, j 1) n D(, j 1) 1 D( 1, 1 the edt dstance of Strng S, Strng T : D( T ) D( S, T (5) ) 1 T tos j nsertt DelS Through the above defnton, you can wrte a progra to calculate the edt dstance between two strngs, the algorth's te coplexty s O( S T ). For exaple: transfor Strng s = "Acaday" nto a strng t = "Acadey", s s the source strng and t s the target strng, the operatons are shown n table 1: Table 1.Exaple edt dstance S t Operaton Acaday Acadey A caday A cadey Ac aday Ac adey Aca day Aca dey Acad ay Acad ey Acada y Acade y Replace a to Acada y Acade y Acada y Acade y Del Acaday Acadey If defne the cost of each edt operaton s 1, In Table 1 t shows, edt dstance between "Acaday" and "Acadey" s 2, calculate result of slarty after the standardzaton (to take a longer strng length) s 0.75.If defne the cost of each edt operaton s 1, that s the Levenshten dstance. Based on the above analyss, the edt dstance has a certan effect on atchng of the sspelled strngs. For exaple, edt dstance between "Coputer Network" and "Coputer Ntwork" s only 1 and slarty value s ; t also has soe effect on nserton and deleton of the short words, for exaple, edt dstance between "Lenovo" and "Lenovo Co" s 3 and the slarty value s Steps of the Iproved Algorth In ths paper, the proved algorth s dvded nto two phases: The frst phase: Clusterng the data sets by the fuzzy c- eans clusterng algorth, so that a large data set s dvded nto a nuber of sall classes (groups), ost of the slar or duplcate records s clustered nto dfferent sall classes. And duplcate records n each class are located closely postons, whch create a relatvely better condton for the accurate detecton of these records. The second phase: start second cluster, t anly prove the clusterng accuracy. Most of the slar or duplcate records are clustered nto dfferent sall classes n the frst stage, but no accurate results of detecton are acqured [7]. By usng the Levenshten dstance ethod n the second clusterng ethod, one can contrast the characterstcs of each eber one by one to fnd duplcate records, and ake test results ore accurate. The Feasblty of the Iproved Algorth If fuzzy c-eans clusterng s used ndvdually, te coplexty wll drectly related to the aount of nput data, ths wll lead to that ths algorth has a bg syste j overhead. In other words, after the frst cluster, t wll have a re-cluster on each class that contans slar or duplcate records, but the aount of nput data has not been reduced, the te overhead s stll large, and t wll be very slow to reach the convergence [8]. Then copare data by usng Levenshten dstance ethod ndvdually, the te coplexty s O ( n 2 ), t s not a good optsaton ethod, ether. Frstly, ths algorth does cluster analyss through the fuzzy c-eans, after the copleton of the frst cluster, another part of the error data whch are caused by the change of character poston are cluster nto a eber group (cluster). So t s needed for the Levenshten dstance ethod to do the re-cluster. We can know fro the prevous analyss, Levenshten dstance ethod has a certan effect on atchng the sspelled strngs. At the sae te, the nuber of each class s records has been relatvely sall after the frst cluster, so t does not really ncrease the coputng te. And there wll be soe ncrease n accuracy. Meanwhle, the ethod can not only ake up for shortcongs caused by detect the slar or duplcate data ndvdually, but also get ore precse results. The Ipleentaton of the Slar or Duplcate Data Detectng Method Based on Fuzzy Clusterng Desgn of Syste Process Ipleent data cleanng platfor through the prevous Iproved algorth, akng data of low qualty n the data warehouse can be cleaned by ths data cleanng platfor, akng the nforaton syste data ore accurate, consstent, to support the rght decsons [9]. Syste desgn process chart s shown n Fg.3. Orgnal Data Data cleanng strateges Matheatcal Statstcs Data Fg.3 Syste Desgn Process Property Cleanng Duplcaton of data cleanng The Data to eet data qualty requreents Steps of Ipleentaton Based on the above dscusson of data cleanng, the process of cleanng data can be dvded nto the followng steps; each step can be subdvded nto a nuber of tasks. These steps can be descrbed as Fg Data Preparaton Data analyss s the frst pvotal step of data preparaton. The an works of analyss are located n the source fle, dentfcaton and separaton of ndvdual data eleents. Data analyss akes t easy to do the transforaton, standardzaton and data atchng, because t allows coparsons between ndvdual data coponents, rather than between a lot of long and coplex strngs. It s needed to analyss the school logo, school nae and unt coponent nto a fxed forat packet n ths data source. Ths s a key step for detecton of duplcated records, and even for all of the data cleanng process. Data converson eans akng data of sae property have the sae data type by convertng, whch can also be called the type transforaton. If an applcaton stores data n a data type, ths forat of data ake sense n ths syste, but f these data are appled to a new syste, these data ay be unavalable, and even lead to errors. The an process s lst as follows: dentfy data sources, port the data to 28 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012

4 database engne. Accordng to data types, length, the value and dscrete values, frequency, dversty, unqueness, null values, typcal strng pattern of etadata and derved, provdng a exact pont of all knds propertes qualty probles. In ths paper, we regard null values, as the record s not coplete. And ncoplete records wll be ported nto the detecton odule to re-detect, only had ths off can the data be ported nto the data source and used. Do the class defnton of the sae type of thng, and then, each record s an object entty. After the class defnton, hypostatze the data source whch wll be processed, each record corresponds to a sngle object entty. 2. The pleentaton of fuzzy C-eans clusterng Step through the operaton on the data source data has been copleted the data analyss, converson, the process of standardzaton, and lack of data to do a prelnary cleanng, the sae type of data encapsulated nto classes, accordng to fuzzy c-eans clusterng algorth to gather type of analyss, allows the experental data source 4000 records are dvded nto two clusters x, x s uch saller than 4000, and ths x nuber of clusters n each cluster s bascally to slarty as possble between slar, as dfferences between dfferent classes. In short, the pleentaton of fuzzy c-eans clusterng algorths, large data sources can be dvded nto a relatvely sall data set, whch focused on a sall data set ost of the duplcated records. The steps of data processng, the dvson has good results, but for the boundary value, can not dstngush between good, the next step wll use the Levenshten dstance algorth further dentfcaton. 3. The pleentaton of Levenshten dstance ethod Copared usng Levenshten dstance algorth for each class of record for the second cluster, the step has been possble to repeat the record set slar to a class, so the records n each cluster slarty s relatvely hgh. Based on the foregong analyss of the Levenshten dstance, t deterne the slarty of two strngs, especally strngs to have sspelled words and between the nsert and reove the short sde there s a wde range of applcatons. The data table n the sae class labelled data clusterng copared one by one, untl the cluster fro the frst record to the last record so far. Then repeat for the second clusterng steps untl all the data n the data table coparng copleted. 4. Reove duplcate records It s well known that n our country everyone's ID nuber s unque on the network card's MAC address s unque, then our data n the database are unque to dfferent enttes. Follow the steps we need to thnk ore over the ebers of the sae class can be cleared out. In the cleanng process, you can use three dfferent ethods for a anual by a professonal decson based on experence and qualfcatons of what nforaton would be deleted. Progress to the second than the frst se-autoatc, and t randoly selected by calculatng the slarty to delete the data, the accuracy s hgher. The thrd type s autoatc, the coputer do t theselves, no need to worry about you, but can not guarantee accuracy. Durng ths step, you can based on the envronent, the scope, purpose and other selecton ethods on the lne. Sulaton and Analyss of Experental Results We evaluate the perforance of our proposed ethod (EELTC) va MATLAB. For splcty, an deal MAC layer and error-free councaton lnks are assued. The sulaton paraeters are gven n Table.2. Frst, we obtan axu length of furthest level (R0) whch s a predefned value and ust be set prarly. Table 2. The sulaton paraeter Paraeter Value Network sze 200*200 BS locaton 100,350 Nuber of Sensors 200 Intal Energy 0.5 J Eele 50 nj/bt εfs 2 10 pj/bt/ εp pj/bt/ EDA 5 nj/bt/sngnal Data Packet Sze 4000 bts ω t s In the broadcast-based ode, the nodes do not establsh gradents n the nterest broadcast phase. Instead, the agnetc charge s ncluded n the data beng dssenated. The recevng node can tell fro the charge carred n the data where the data s fro and whether to forward further down-strea. When a node receves data, t checks f t has any atchng entry. If t does, t copares the agnetc charge n the entry wth the agnetc charge of the data. If the forer s greater than the data, t sets the agnetc charge of the data t n the entry and then broadcasts the data. Ths eans the data s sent fro the node whose agnetc charge s lower than the nteredate node, and the nteredate node repeats ths process. Fg.4 Data propagaton wth colluson. The node receves duplcate data, or data whose agnetc charge s greater than that n the entry, the data wll be dscarded. In Fg.4 (a), the agnetc charge of every node s estab- lshed; the snk s charge s 7. In Fg.4 (b), when the source wants to send data to the snk, t wll broadcast the data to ts neghbor nodes. In Fg.4(c), the nodes wth charge strength 6 broadcast the data because the agnetc charge of the nodes s greater than that of the data. Thus, the snk receves the data. Fro the tools Menu, one can select the opton Sulate Lnk Breaks. In ths ode, f a lnk on the graph s clcked, the lnk s broken. If the algorth s a parent table drven one, where the alternatve parents are saved n lsts, the algorth drectly changes to the alternatve parent. If t s not case, the algorth re-routes the graph wthout usng the broken lnk n Fg.5. If the Sulate Lnk Breaks opton s not selected, for the algorths that generate parent tables, these tables can be dsplayed by clckng on the nodes. In Fg.5, Sulaton of lnk breaks. The lnk of node 12 towards the root node s broken. Wth the fuzzy Algorth, a re-routng takes place and any nodes change ther actve lnks shown n redon the left). On the other hand, as 2- SafeLnks Algorth s an algorth that creates parent tables, only the node loosng the lnk (node 12) changes ts actve lnk, the rest of the lnks (n black) rean the sae (on the rght). PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/

5 Fg.5 The generated routng trees wth dfferent algorths We copare the aount of energy consued by CHs n three protocols for 20 rounds (Fg.6). The energy consued by CHs per round n EELTC s uch lower than that n LEACH, and s alost the sae as EEUC. In LEACH because CHs send ther data to the BS va sngle hop councaton, the energy consupton s uch hgher. In EELTC and EEUC, CHs transt ther data to the BS va ult- hop, so a consderable aount of energy s saved. Fg.6 Mnu dstance between CHs We copare energy consupton just n setup phase wthout consderng energy consupton n steady state of three protocols n 20 rounds n Fg.7. EELTC saved consderable aount of energy by consderng of the te for each canddate to start broadcastng advertseent essage. EEUC protocol consued hgher energy than LEACH and EELTC because t has ore control overhead n setup phase. In EELTC clusters creaton and nter-cluster ulthop routng are accoplshed by a sngle ADV essage. But n EEUC ths s done by too any control essages exchange. Fnally, we exane the energy effcency of three protocols by evaluatng of the te untl the frst node des and the te untl the last node des. It s clear that EEUC ncreases network lfe te copared wth LEACH, and EEUC due to havng uch lower overhead and usng ulthop transsson data. Concluson Wth the developent of nforaton technology, data cleanng process has becoe an portant part of data ntegraton. Slar to the detecton of duplcate records n a data cleansng has been the focus of the study. Exstng duplcate record detecton algorth s slar n ost cases, Feld atchng algorth and the record atchng algorth s the core of ths approach. Exstng feld atchng algorth does not have the versatlty, and record atchng algorths usually fnd feld values usng weghted ethod to calculate the slarty of accuracy s poor.in ths paper, we develop an accurate and coprehensve energy odel for the front-end of a wreless netowork. For a dsjont ultpath confguraton whose patterned fal- ure reslence s coparable to that of braded ultpaths, the braded ultpaths have about 50% hgher reslence to solated falures and a thrd of the overhead for alternate path antenance.ths ore n-depth study of the exstng duplcated records detecton ethod to analyze the advantages and dsadvantages of varous detecton ethods. Exstng detecton ethods for calculatng the slarty values recorded shortcongs, the proved fuzzy clusterng algorth s ntroduced to prove the detecton of approxately duplcate records, for specfc ssues, constructed for the detecton of duplcated records cleanng platfor to prove a slar accuracy of detecton of duplcate records. REFERENCES [1] Stojenovc, X. Ln. Power-aware localzed routng n wreless networks, (2001) 12,No.11, [2] Huseyn Ozgur Tan, Ibrah Korpeogle. Power Effcent Data Gatherng and Aggregaton n Wreless Sensor Networks, (2003) 32,No.4, [3] Jan Yu,Mn-Shen Yang.A Generalzed Fuzzy Clusterng Regularzaton Model Wth Optalty Tests and Model Coplexty Analyss, IEEE Transactons on Fuzzy Systes, (2007) 15,No.5, [4] Chatzs, S.,Varvargou, T..Factor Analyss Latent Subspace Modelng and Robust Fuzzy Clusterng Usng t-dstrbutons, IEEE Transactons on Fuzzy Systes, (2009) 17, [5] M. Carde, J. Wu, M. Lu. Iprovng network lfete usng sensors wth adjustable sensng ranges, Sensor Networks, (2006) 10,No.2,41-49 [6] Luo H., Luo J., Lu Y.,, Das S. K..Adaptve Data Fuson for Energy Effcent Routng n Wreless Sensor Networks, IEEE Trans. on Coputers, (2006) 18,No.4, [7] Yao Shen, Yunze Ca, Xaong Xu.A shortest-path-based topology control algorth n wreless ulthop networks, Coputer Councaton Revew, (2007) 37,No.5, [8] M. Zunga, B. Krshnaachar. Analyzng the transtonal regon n low power wreless lnks, IEEE Secon 04, [9] K. Seada,M. Zunga,A. Hely,B.Krshnaachar,Energy effcent fowwardng strateges for geographc routng n wreless sensor networks,n ACM Sensys 04, Baltore, MD, Nov Authors: dr Lejang Guo, a Senor IEEE eber, the departent of Early Warnng Survellance Intellgence, Ar Force Radar Acadey, Wuhan, , Chna. E-al: radar_boss@163.co. dr We Wang, school of power and echancal engneerng,wuhan unversty,wuhan, ,Chna. E-al: leezbaby@163.co. Prof Fangxn Chen, the departent of Early Warnng Survellance Intellgence, Ar Force Radar Acadey, Wuhan,430019, Chna. E- al:pxal@sn.co. Fg.7 The aount of energy consued by CHs 30 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng

More information

An Electricity Trade Model for Microgrid Communities in Smart Grid

An Electricity Trade Model for Microgrid Communities in Smart Grid An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract

More information

Two-Phase Traceback of DDoS Attacks with Overlay Network

Two-Phase Traceback of DDoS Attacks with Overlay Network 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng

More information

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one

More information

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,

More information

Quality of Service Analysis and Control for Wireless Sensor Networks

Quality of Service Analysis and Control for Wireless Sensor Networks Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as

More information

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,

More information

International Journal of Industrial Engineering Computations

International Journal of Industrial Engineering Computations Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Maximizing profit using recommender systems

Maximizing profit using recommender systems Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Virtual machine resource allocation algorithm in cloud environment

Virtual machine resource allocation algorithm in cloud environment COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model

More information

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System 201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng

More information

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Web Service-based Business Process Automation Using Matching Algorithms

Web Service-based Business Process Automation Using Matching Algorithms Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research

More information

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments 202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

An Enhanced K-Anonymity Model against Homogeneity Attack

An Enhanced K-Anonymity Model against Homogeneity Attack JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

TheHow and Why of Having a Successful Home Office

TheHow and Why of Having a Successful Home Office Near Optal Onlne Algorths and Fast Approxaton Algorths for Resource Allocaton Probles Nkhl R Devanur Kaal Jan Balasubraanan Svan Chrstopher A Wlkens Abstract We present algorths for a class of resource

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters 01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

International Journal of Information Management

International Journal of Information Management Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Technical Report, SFB 475: Komplexitätsreduktion in Multivariaten Datenstrukturen, Universität Dortmund, No. 1998,04

Technical Report, SFB 475: Komplexitätsreduktion in Multivariaten Datenstrukturen, Universität Dortmund, No. 1998,04 econstor www.econstor.eu Der Open-Access-Publkatonsserver der ZBW Lebnz-Inforatonszentru Wrtschaft The Open Access Publcaton Server of the ZBW Lebnz Inforaton Centre for Econocs Becka, Mchael Workng Paper

More information

INTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION

INTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION XV. INTODUCTION TO MEGES AND ACQUISITIONS: FIM DIVESIFICATION In the ntroducton to Secton VII, t was noted that frs can acqure assets by ether undertakng nternally-generated new projects or by acqurng

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Online Algorithms for Uploading Deferrable Big Data to The Cloud

Online Algorithms for Uploading Deferrable Big Data to The Cloud Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The

More information

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School

More information

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane ISSN (Onlne): 2319-7064 Index Coperncus Value (2013): 6.14 Ipact Factor (2013): 4.438 Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon

More information

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA 238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

The CASIA Statistical Machine Translation System for IWSLT 2008

The CASIA Statistical Machine Translation System for IWSLT 2008 The CASIA Statstcal Machne Translaton Syste for IWSLT 2008 Yanqng He, Jajun Zhang, Maox L, Lcheng Fang, Yufeng Chen, Yu Zhou and Chengqng Zong Natonal Laboratory of Pattern Recognton, Insttute of Autoaton

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

The Packing Server for Real-Time Scheduling of MapReduce Workflows

The Packing Server for Real-Time Scheduling of MapReduce Workflows The Packng Server for Real-Te Schedulng of MapReduce Workflows Shen L, Shaohan Hu, Tarek Abdelzaher Unversty of Illnos at Urbana-Chapagn {shenl3, shu7, zaher}@llnos.edu Abstract Ths paper develops new

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton

More information

A Hybrid Approach to Evaluate the Performance of Engineering Schools

A Hybrid Approach to Evaluate the Performance of Engineering Schools A Hybrd Approach to Evaluate the Perforance of Engneerng Schools School of Engneerng Unversty of Brdgeport Brdgeport, CT 06604 ABSTRACT Scence and engneerng (S&E) are two dscplnes that are hghly receptve

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT

More information

A P2P Approach for Business Process Modeling and Reuse

A P2P Approach for Business Process Modeling and Reuse A P2P Approach for Busness Process Modelng and Reuse José A. Rodrgues Nt., Jano Morera de Souza, Geraldo Zbrão, Geraldo Xexéo, Eduardo Neves, Wallace A. Pnhero COPPE Unversdade Federal do Ro de Janero

More information

Packet Reorderng Analysis

Packet Reorderng Analysis On Montorng of End-to-End Packet Reorderng over the Internet Bn Ye 1 Anura P. Jayasuana 1 Nschal M. Pratla 2 1Coputer Networkng Research laboratory, Colorado State Unversty, Fort Collns, CO 8523, USA 2

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Tailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization

Tailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization Internatonal Journal of Database Theory and Alcaton,.191-202 htt://dx.do.org/10.14257/jdta.2015.8.3.16 Talorng Fuzzy -Means lusterng Algorth for Bg Data Usng Rando Salng and Partcle Swar Otzaton Yang Xanfeng

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

Tourism Demand Forecasting by Improved SVR Model

Tourism Demand Forecasting by Improved SVR Model Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

Transformation of Commercial Flows into Physical Flows of Electricity

Transformation of Commercial Flows into Physical Flows of Electricity Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information