A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation
|
|
- Bruno Harvey
- 8 years ago
- Views:
Transcription
1 Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract. The changng nforaton technology akes data ncrease exponentally n all areas, the qualty of the huge aounts of data s the core probles. Data cleanng s an effectve technology to solve data qualty probles. Ths paper focuses on the duplcate data cleanng technques. It studes the qualty of the data fro the archtectural level, the nstance-level probles, the ult-source sngle-source probles, duplcated records cleanng applcaton platfor and the evaluaton crtera. In these studes, a proved novel detecton ethod adopts the fuzzy clusterng algorth wth the Levenshten dstance cobnaton to data cleanng.it can accurately and quckly detect and reove duplcate raw data. The proved ethod ncludes a slar duplcate records detecton process, the ajor syste fraework desgn, syste functon odules of the pleentaton process and results analyss n the paper. The precson and recall rates are hgher than several other data cleanng ethods. These coparsons confr the valdty of the ethod. The experental results exhbt that the proposed ethod s effectve n data detecton and cleanng process. Streszczene. Artykuł proponuje nowe etody czyszczena danych z uwzględnene lczby przypadków, welu źródeł, podwójnych rekordów nnych kryterów oceny. Ulepszona etoda detekcj wykorzystuje algoryt rozytego klastrowana w dystanse Levenshtena. W ten sposób szybko wykrywane są usuwane podwójne wersze danych. (Metoda detekcj podwójnych danych bazująca na rozyty klastrowanu) Keywords: Approxate Duplcate Data, Fuzzy Clusterng, Data Cleanng, Levenshten Dstance Słowa kluczowe: czyszczene danych, rozyte klastrowane. Introducton The changng nforaton technology akes data of all areas ncrease extreely fast, whch akes data becoe the focus. The accurate analyss of data s of sgnfcance because the decson, whch decson-akers ade, s hghly depend on t. However, the data receved fro external sources n the data warehouse s usually drty, ncoplete and nconsstent. There are two reasons: frstly, the lack of effectve data analyss technques; the second, the data s of not hgh qualty, dfferent data sources on the sae data ay volate the value of the data tself. The drty data n the DW (Data Warehouse) wll affect the accuracy of the extracted nforaton, akng all knds of data analyss, such as OLAP (On-Lne Analytcal Processng), data nng applcatons have abguous or wrong conclusons, akng decsons lose the support. Therefore, the qualty of DW data s a proble can t be gnored. Data cleanng s desgned to guarantee hgh qualty data, to elnate error data redundant data and nconsstent nforaton n data warehouse or database, whch can enhance the qualty of decson. Data cleanng a s not only on elnatng data errors, redundant and nconsstent nforaton, ts fundaental purpose s to unfed a varety of data sets fro dfferent, ncopatble rules, whch are the necessary eleents to construct DW and KDD (Knowledge Dscovery n Databases). Snce the data nconsstences wll be a varety of possbltes, and data s of a large aount, data anoaly detecton usually reles on hghly effcent data converson algorth [1]. Database technology and data s large aount are undergong a revoluton fro quantty to qualty. In the past, people coplete the data query and analyss n a seautoatc way. Those data cannot satsfy people s analyss and arguent of affars n varous felds hde behnd the data. KDD and data nng technques generate and develop based on the needs of the county, t also create uch new felds, such as research and applcaton n data warehouse technology [2]. Those technologes ake people use data effectvely on a ore convenent platfor, whch lad a sold foundaton for decson analyss. Intalzng the varous data of dfferent data sources s a very portant part n the KDD; t has an portant pact on the fnal result. Enttes of the real world n dfferent data sources often use dfferent syntax fors. The way to reove data of dfferent data sources s dffcult snce the data n dfferent fors ay lead to the stuaton of only-two or only-three result. The a large nuber of fact has proved that, slar to large-scale ntellgent systes, such as data nng syste, data pre-processng consttute 60% to 80% of the entre workload, the data cleanng s one of the part of data pre-processng, whch has a very portant role n the ntellgent syste. Therefore, the study on syste, whch could produce odel fro a large nuber of useful nforaton, becoes ncreasngly portant. Data cleansng s a work-related feld, whch work around specfc areas. The data-cleanng fraework for all odes s not avalable, whch akes the research of general data cleanng syste becoe a hot spot. The Study and Iproveent of Fuzzy Clusterng Algorth The Status of Fuzzy Clusterng Algorth Pattern recognton and achne recognton s regular n nosy or coplex envronents, whch s the search n data structure. In pattern recognton, the set of data s called a cluster. In realty, data s not evenly dstrbuted, so the rule or structure ay not be accurately defned. In other words, pattern recognton s an nexact scence. It s to deal wth soe fuzzy ssue. For exaple, the boundary between clusters ay be vague, and not certan, that s, a data ay belong to two or ore dfferent levels of cluster ebers. So the key ssue s to fnd a set of data ponts, whch s a cluster. The current study on fuzzy clusterng algorth located n the followng areas: the convergence local nu of the fuzzy c-eans clusterng algorth; creaton of dfferent types of objectve functons; dvdng the fuzzy space n dfferent ways; leadng the optal value of real world nto fuzzy clusterng algorth; nzng the dstance of fuzzy c-eans clusterng algorth; clusterng a large nuber types of data. Ths paper studes how to optze the ost classc fuzzy c-eans clusterng algorth n fuzzy clusterng algorth, and apply the proved algorth to the detecton of approxately duplcate data. Fuzzy c-eans Clusterng Algorth Fuzzy C-eans (FCM) clusterng algorth allows a group of data belongng to two or ore clusters. Ths ethod was rased by Dunn n 1973, and developed by Bezdek n 1981, and s coonly used n pattern recognton [3]. It s a clusterng algorth based on dvson, 26 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012
2 and t as at led the slarty between objects whch are dvded nto the sae class (ebers of group) to be axu, whereas the slarty between objects of dfferent classes nu. It s based on the objectve functon s nzng, whch lst as follows: N C (1) J u x c 1 j1 j 2 where s any real nuber greater than 1, whch was set to 2.00 by Bezdek. u s a j level of x eber cluster; x s the densonal easureents; C j s a densonal clusters, * center s to express the slarty between any crtera, any easureent center. The objectve functon whch fuzzy partton optzed through teratve functon lst as equaton (1), updatng ebers u and the cluster center C j : 1 (2) 2 (3) u x c c j k1 xck C N u 1 N 1 u x 1 The teraton stops when eet the equaton (4). (k1) k (4) ax u u where s between 0 and 1, k s the teraton step. The process converges to a local nu or saddle pont of J.The algorth has the followng steps: 1. transfor U nto atrx u, U (0) 2. the k-step, accordng to equaton(3),and calculate the atrx center vector c (k) 3. calculate U (k), U ( k 1) accordng to equaton (1) stop calculate If U ( k 1) U ( k), return to step 2. Ths algorth proposed n ths paper wll be leaded as the fundaental algorth to detect the slar and duplcate data nto the database cleanng. The Probles of the Exstng Algorth Research fro the above algorth, t knows that data s bound to each cluster s ebershp functon, whch represents the fuzzy way of the algorth. To acheve ths goal, t only needs to create a atrx naedu, a nuber between 0 and 1 representng connecton degree between the data and cluster canters. Gven a partcular data set, assung that s an axs dstrbuton. One-densonal data clusterng ebershp s shown n Fg.1, the connecton degree represent the locaton of slar data between slar data eber to a certan extent. In the FCM approach, the sae orgn does not belong to only one welldefned cluster, but t can be placed n ddle. In ths case, as the ebershp functon shown n Fg.2, represented wth a sooth curve, each base ay belong to dfferent groups of ebers. Fg.1 One-densonal data clusterng ebershp Fro the clusterng ebershp of FCM ethod s data n Fg.2, there are soe tradtonal clusterng algorths, whch have been appled to the detecton of slar or duplcate data by scholar, but there are soe probles [4]. In the appng process of character feld, f there exsts spaces n the d-pont, they wll lose the correspondng effectve feld nforaton. If DBSCAN algorth s used alone n dealng wth character data, the general s to add ASCII value of all character n turn, t can easly lead to sjudgeent. Such as bg and gbe, they can be consdered to be duplcate data, those two dfferent records ay be classfed nto the sae class, and the clusterng result obtaned n the cluster set s not entrely slar record. Fg.2 Data clusterng ethod FCM ebershp The Slar Duplcate Data Detecton Based on Fuzzy Clusterng Through research and analyss of the prevous secton, these wll have ore or less the exstence of proble by the use of a sngle algorth, and t wll affect the fnal result of data cleanng. Broadly speakng, data cleanng s the process of data sources, and akng the processed data effcent and useful; n the narrow sense, data cleanng specfcs the process to buld DW and data nng to ake the data source accurate coplete consstence after that the data source s relable [5]. Based on the coparson the prevous ethod, ths paper presents a new ethod of detectng slar or duplcate data. The ethod uses a cobnaton of the fuzzy c-eans clusterng algorth and the Levenshten dstance to process drty data, and gets the needed data accurately effectvely and quckly. So that slar or duplcate data wll all be throw nto trash. There are two steps n the ethod proposed n ths paper, frstly usng fuzzy c-eans clusterng algorth to gather the ebers of greatest slarty nto a class as far as possble together, and then copare the ebers of each class by Levenshten dstance, fnally delete the sae ebers of each class whch are naely slar data [6].Levenshten dstance s the splest edt dstance whch s a coonly used easure of the strng dstance. Ths ethod s the nterpretaton for nzng the nuber of operatons the fro the source strng to the destnaton strng by nsert (nsert characters n a poston of a strng), reove (delete one character for strng), replace (replace a character wth another character n the strng). Ths ethod has a wde range of applcatons n deternng the slarty of two strngs. Edt dstance s defned as follows: assung all strngs s created fro a lted set of characters. Two strngs such as T the length of the strng, are respectvely S, T. PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/
3 D (. represents the edt dstance between the frst characters of the strng S and the frst j. Characters of the strng T ; Obvously, D ( T,0.0) 0. D (. recursvely defned as follows: D(. D( 1, j 1) n D(, j 1) 1 D( 1, 1 the edt dstance of Strng S, Strng T : D( T ) D( S, T (5) ) 1 T tos j nsertt DelS Through the above defnton, you can wrte a progra to calculate the edt dstance between two strngs, the algorth's te coplexty s O( S T ). For exaple: transfor Strng s = "Acaday" nto a strng t = "Acadey", s s the source strng and t s the target strng, the operatons are shown n table 1: Table 1.Exaple edt dstance S t Operaton Acaday Acadey A caday A cadey Ac aday Ac adey Aca day Aca dey Acad ay Acad ey Acada y Acade y Replace a to Acada y Acade y Acada y Acade y Del Acaday Acadey If defne the cost of each edt operaton s 1, In Table 1 t shows, edt dstance between "Acaday" and "Acadey" s 2, calculate result of slarty after the standardzaton (to take a longer strng length) s 0.75.If defne the cost of each edt operaton s 1, that s the Levenshten dstance. Based on the above analyss, the edt dstance has a certan effect on atchng of the sspelled strngs. For exaple, edt dstance between "Coputer Network" and "Coputer Ntwork" s only 1 and slarty value s ; t also has soe effect on nserton and deleton of the short words, for exaple, edt dstance between "Lenovo" and "Lenovo Co" s 3 and the slarty value s Steps of the Iproved Algorth In ths paper, the proved algorth s dvded nto two phases: The frst phase: Clusterng the data sets by the fuzzy c- eans clusterng algorth, so that a large data set s dvded nto a nuber of sall classes (groups), ost of the slar or duplcate records s clustered nto dfferent sall classes. And duplcate records n each class are located closely postons, whch create a relatvely better condton for the accurate detecton of these records. The second phase: start second cluster, t anly prove the clusterng accuracy. Most of the slar or duplcate records are clustered nto dfferent sall classes n the frst stage, but no accurate results of detecton are acqured [7]. By usng the Levenshten dstance ethod n the second clusterng ethod, one can contrast the characterstcs of each eber one by one to fnd duplcate records, and ake test results ore accurate. The Feasblty of the Iproved Algorth If fuzzy c-eans clusterng s used ndvdually, te coplexty wll drectly related to the aount of nput data, ths wll lead to that ths algorth has a bg syste j overhead. In other words, after the frst cluster, t wll have a re-cluster on each class that contans slar or duplcate records, but the aount of nput data has not been reduced, the te overhead s stll large, and t wll be very slow to reach the convergence [8]. Then copare data by usng Levenshten dstance ethod ndvdually, the te coplexty s O ( n 2 ), t s not a good optsaton ethod, ether. Frstly, ths algorth does cluster analyss through the fuzzy c-eans, after the copleton of the frst cluster, another part of the error data whch are caused by the change of character poston are cluster nto a eber group (cluster). So t s needed for the Levenshten dstance ethod to do the re-cluster. We can know fro the prevous analyss, Levenshten dstance ethod has a certan effect on atchng the sspelled strngs. At the sae te, the nuber of each class s records has been relatvely sall after the frst cluster, so t does not really ncrease the coputng te. And there wll be soe ncrease n accuracy. Meanwhle, the ethod can not only ake up for shortcongs caused by detect the slar or duplcate data ndvdually, but also get ore precse results. The Ipleentaton of the Slar or Duplcate Data Detectng Method Based on Fuzzy Clusterng Desgn of Syste Process Ipleent data cleanng platfor through the prevous Iproved algorth, akng data of low qualty n the data warehouse can be cleaned by ths data cleanng platfor, akng the nforaton syste data ore accurate, consstent, to support the rght decsons [9]. Syste desgn process chart s shown n Fg.3. Orgnal Data Data cleanng strateges Matheatcal Statstcs Data Fg.3 Syste Desgn Process Property Cleanng Duplcaton of data cleanng The Data to eet data qualty requreents Steps of Ipleentaton Based on the above dscusson of data cleanng, the process of cleanng data can be dvded nto the followng steps; each step can be subdvded nto a nuber of tasks. These steps can be descrbed as Fg Data Preparaton Data analyss s the frst pvotal step of data preparaton. The an works of analyss are located n the source fle, dentfcaton and separaton of ndvdual data eleents. Data analyss akes t easy to do the transforaton, standardzaton and data atchng, because t allows coparsons between ndvdual data coponents, rather than between a lot of long and coplex strngs. It s needed to analyss the school logo, school nae and unt coponent nto a fxed forat packet n ths data source. Ths s a key step for detecton of duplcated records, and even for all of the data cleanng process. Data converson eans akng data of sae property have the sae data type by convertng, whch can also be called the type transforaton. If an applcaton stores data n a data type, ths forat of data ake sense n ths syste, but f these data are appled to a new syste, these data ay be unavalable, and even lead to errors. The an process s lst as follows: dentfy data sources, port the data to 28 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012
4 database engne. Accordng to data types, length, the value and dscrete values, frequency, dversty, unqueness, null values, typcal strng pattern of etadata and derved, provdng a exact pont of all knds propertes qualty probles. In ths paper, we regard null values, as the record s not coplete. And ncoplete records wll be ported nto the detecton odule to re-detect, only had ths off can the data be ported nto the data source and used. Do the class defnton of the sae type of thng, and then, each record s an object entty. After the class defnton, hypostatze the data source whch wll be processed, each record corresponds to a sngle object entty. 2. The pleentaton of fuzzy C-eans clusterng Step through the operaton on the data source data has been copleted the data analyss, converson, the process of standardzaton, and lack of data to do a prelnary cleanng, the sae type of data encapsulated nto classes, accordng to fuzzy c-eans clusterng algorth to gather type of analyss, allows the experental data source 4000 records are dvded nto two clusters x, x s uch saller than 4000, and ths x nuber of clusters n each cluster s bascally to slarty as possble between slar, as dfferences between dfferent classes. In short, the pleentaton of fuzzy c-eans clusterng algorths, large data sources can be dvded nto a relatvely sall data set, whch focused on a sall data set ost of the duplcated records. The steps of data processng, the dvson has good results, but for the boundary value, can not dstngush between good, the next step wll use the Levenshten dstance algorth further dentfcaton. 3. The pleentaton of Levenshten dstance ethod Copared usng Levenshten dstance algorth for each class of record for the second cluster, the step has been possble to repeat the record set slar to a class, so the records n each cluster slarty s relatvely hgh. Based on the foregong analyss of the Levenshten dstance, t deterne the slarty of two strngs, especally strngs to have sspelled words and between the nsert and reove the short sde there s a wde range of applcatons. The data table n the sae class labelled data clusterng copared one by one, untl the cluster fro the frst record to the last record so far. Then repeat for the second clusterng steps untl all the data n the data table coparng copleted. 4. Reove duplcate records It s well known that n our country everyone's ID nuber s unque on the network card's MAC address s unque, then our data n the database are unque to dfferent enttes. Follow the steps we need to thnk ore over the ebers of the sae class can be cleared out. In the cleanng process, you can use three dfferent ethods for a anual by a professonal decson based on experence and qualfcatons of what nforaton would be deleted. Progress to the second than the frst se-autoatc, and t randoly selected by calculatng the slarty to delete the data, the accuracy s hgher. The thrd type s autoatc, the coputer do t theselves, no need to worry about you, but can not guarantee accuracy. Durng ths step, you can based on the envronent, the scope, purpose and other selecton ethods on the lne. Sulaton and Analyss of Experental Results We evaluate the perforance of our proposed ethod (EELTC) va MATLAB. For splcty, an deal MAC layer and error-free councaton lnks are assued. The sulaton paraeters are gven n Table.2. Frst, we obtan axu length of furthest level (R0) whch s a predefned value and ust be set prarly. Table 2. The sulaton paraeter Paraeter Value Network sze 200*200 BS locaton 100,350 Nuber of Sensors 200 Intal Energy 0.5 J Eele 50 nj/bt εfs 2 10 pj/bt/ εp pj/bt/ EDA 5 nj/bt/sngnal Data Packet Sze 4000 bts ω t s In the broadcast-based ode, the nodes do not establsh gradents n the nterest broadcast phase. Instead, the agnetc charge s ncluded n the data beng dssenated. The recevng node can tell fro the charge carred n the data where the data s fro and whether to forward further down-strea. When a node receves data, t checks f t has any atchng entry. If t does, t copares the agnetc charge n the entry wth the agnetc charge of the data. If the forer s greater than the data, t sets the agnetc charge of the data t n the entry and then broadcasts the data. Ths eans the data s sent fro the node whose agnetc charge s lower than the nteredate node, and the nteredate node repeats ths process. Fg.4 Data propagaton wth colluson. The node receves duplcate data, or data whose agnetc charge s greater than that n the entry, the data wll be dscarded. In Fg.4 (a), the agnetc charge of every node s estab- lshed; the snk s charge s 7. In Fg.4 (b), when the source wants to send data to the snk, t wll broadcast the data to ts neghbor nodes. In Fg.4(c), the nodes wth charge strength 6 broadcast the data because the agnetc charge of the nodes s greater than that of the data. Thus, the snk receves the data. Fro the tools Menu, one can select the opton Sulate Lnk Breaks. In ths ode, f a lnk on the graph s clcked, the lnk s broken. If the algorth s a parent table drven one, where the alternatve parents are saved n lsts, the algorth drectly changes to the alternatve parent. If t s not case, the algorth re-routes the graph wthout usng the broken lnk n Fg.5. If the Sulate Lnk Breaks opton s not selected, for the algorths that generate parent tables, these tables can be dsplayed by clckng on the nodes. In Fg.5, Sulaton of lnk breaks. The lnk of node 12 towards the root node s broken. Wth the fuzzy Algorth, a re-routng takes place and any nodes change ther actve lnks shown n redon the left). On the other hand, as 2- SafeLnks Algorth s an algorth that creates parent tables, only the node loosng the lnk (node 12) changes ts actve lnk, the rest of the lnks (n black) rean the sae (on the rght). PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/
5 Fg.5 The generated routng trees wth dfferent algorths We copare the aount of energy consued by CHs n three protocols for 20 rounds (Fg.6). The energy consued by CHs per round n EELTC s uch lower than that n LEACH, and s alost the sae as EEUC. In LEACH because CHs send ther data to the BS va sngle hop councaton, the energy consupton s uch hgher. In EELTC and EEUC, CHs transt ther data to the BS va ult- hop, so a consderable aount of energy s saved. Fg.6 Mnu dstance between CHs We copare energy consupton just n setup phase wthout consderng energy consupton n steady state of three protocols n 20 rounds n Fg.7. EELTC saved consderable aount of energy by consderng of the te for each canddate to start broadcastng advertseent essage. EEUC protocol consued hgher energy than LEACH and EELTC because t has ore control overhead n setup phase. In EELTC clusters creaton and nter-cluster ulthop routng are accoplshed by a sngle ADV essage. But n EEUC ths s done by too any control essages exchange. Fnally, we exane the energy effcency of three protocols by evaluatng of the te untl the frst node des and the te untl the last node des. It s clear that EEUC ncreases network lfe te copared wth LEACH, and EEUC due to havng uch lower overhead and usng ulthop transsson data. Concluson Wth the developent of nforaton technology, data cleanng process has becoe an portant part of data ntegraton. Slar to the detecton of duplcate records n a data cleansng has been the focus of the study. Exstng duplcate record detecton algorth s slar n ost cases, Feld atchng algorth and the record atchng algorth s the core of ths approach. Exstng feld atchng algorth does not have the versatlty, and record atchng algorths usually fnd feld values usng weghted ethod to calculate the slarty of accuracy s poor.in ths paper, we develop an accurate and coprehensve energy odel for the front-end of a wreless netowork. For a dsjont ultpath confguraton whose patterned fal- ure reslence s coparable to that of braded ultpaths, the braded ultpaths have about 50% hgher reslence to solated falures and a thrd of the overhead for alternate path antenance.ths ore n-depth study of the exstng duplcated records detecton ethod to analyze the advantages and dsadvantages of varous detecton ethods. Exstng detecton ethods for calculatng the slarty values recorded shortcongs, the proved fuzzy clusterng algorth s ntroduced to prove the detecton of approxately duplcate records, for specfc ssues, constructed for the detecton of duplcated records cleanng platfor to prove a slar accuracy of detecton of duplcate records. REFERENCES [1] Stojenovc, X. Ln. Power-aware localzed routng n wreless networks, (2001) 12,No.11, [2] Huseyn Ozgur Tan, Ibrah Korpeogle. Power Effcent Data Gatherng and Aggregaton n Wreless Sensor Networks, (2003) 32,No.4, [3] Jan Yu,Mn-Shen Yang.A Generalzed Fuzzy Clusterng Regularzaton Model Wth Optalty Tests and Model Coplexty Analyss, IEEE Transactons on Fuzzy Systes, (2007) 15,No.5, [4] Chatzs, S.,Varvargou, T..Factor Analyss Latent Subspace Modelng and Robust Fuzzy Clusterng Usng t-dstrbutons, IEEE Transactons on Fuzzy Systes, (2009) 17, [5] M. Carde, J. Wu, M. Lu. Iprovng network lfete usng sensors wth adjustable sensng ranges, Sensor Networks, (2006) 10,No.2,41-49 [6] Luo H., Luo J., Lu Y.,, Das S. K..Adaptve Data Fuson for Energy Effcent Routng n Wreless Sensor Networks, IEEE Trans. on Coputers, (2006) 18,No.4, [7] Yao Shen, Yunze Ca, Xaong Xu.A shortest-path-based topology control algorth n wreless ulthop networks, Coputer Councaton Revew, (2007) 37,No.5, [8] M. Zunga, B. Krshnaachar. Analyzng the transtonal regon n low power wreless lnks, IEEE Secon 04, [9] K. Seada,M. Zunga,A. Hely,B.Krshnaachar,Energy effcent fowwardng strateges for geographc routng n wreless sensor networks,n ACM Sensys 04, Baltore, MD, Nov Authors: dr Lejang Guo, a Senor IEEE eber, the departent of Early Warnng Survellance Intellgence, Ar Force Radar Acadey, Wuhan, , Chna. E-al: radar_boss@163.co. dr We Wang, school of power and echancal engneerng,wuhan unversty,wuhan, ,Chna. E-al: leezbaby@163.co. Prof Fangxn Chen, the departent of Early Warnng Survellance Intellgence, Ar Force Radar Acadey, Wuhan,430019, Chna. E- al:pxal@sn.co. Fg.7 The aount of energy consued by CHs 30 PRZEGLĄD ELEKTROTECHNICZNY (Electrcal Revew), ISSN , R. 88 NR 1b/2012
CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng
More informationAn Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationA Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems
Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract
More informationTwo-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationLeast Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
More informationScan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
More informationII. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION
Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,
More informationQuality of Service Analysis and Control for Wireless Sensor Networks
Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as
More informationAn Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
More informationInternational Journal of Industrial Engineering Computations
Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationA Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationMaximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co
More informationHow Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
More informationA Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme
A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationVirtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationTraffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method
IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model
More informationAn Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System
201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng
More informationBANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationDescription of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t
Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationWeb Service-based Business Process Automation Using Matching Algorithms
Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research
More informationRevenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments
202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co
More informationBasic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationAn Enhanced K-Anonymity Model against Homogeneity Attack
JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationTheHow and Why of Having a Successful Home Office
Near Optal Onlne Algorths and Fast Approxaton Algorths for Resource Allocaton Probles Nkhl R Devanur Kaal Jan Balasubraanan Svan Chrstopher A Wlkens Abstract We present algorths for a class of resource
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationInternational Journal of Information Management
Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationTechnical Report, SFB 475: Komplexitätsreduktion in Multivariaten Datenstrukturen, Universität Dortmund, No. 1998,04
econstor www.econstor.eu Der Open-Access-Publkatonsserver der ZBW Lebnz-Inforatonszentru Wrtschaft The Open Access Publcaton Server of the ZBW Lebnz Inforaton Centre for Econocs Becka, Mchael Workng Paper
More informationINTRODUCTION TO MERGERS AND ACQUISITIONS: FIRM DIVERSIFICATION
XV. INTODUCTION TO MEGES AND ACQUISITIONS: FIM DIVESIFICATION In the ntroducton to Secton VII, t was noted that frs can acqure assets by ether undertakng nternally-generated new projects or by acqurng
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationOnline Algorithms for Uploading Deferrable Big Data to The Cloud
Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The
More informationResearch Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
More informationModeling and Assessment Performance of OpenFlow-Based Network Control Plane
ISSN (Onlne): 2319-7064 Index Coperncus Value (2013): 6.14 Ipact Factor (2013): 4.438 Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon
More informationGanesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA
238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,
More informationEnterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationThe CASIA Statistical Machine Translation System for IWSLT 2008
The CASIA Statstcal Machne Translaton Syste for IWSLT 2008 Yanqng He, Jajun Zhang, Maox L, Lcheng Fang, Yufeng Chen, Yu Zhou and Chengqng Zong Natonal Laboratory of Pattern Recognton, Insttute of Autoaton
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationTime Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters
Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More information1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationHosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
More informationThe Packing Server for Real-Time Scheduling of MapReduce Workflows
The Packng Server for Real-Te Schedulng of MapReduce Workflows Shen L, Shaohan Hu, Tarek Abdelzaher Unversty of Illnos at Urbana-Chapagn {shenl3, shu7, zaher}@llnos.edu Abstract Ths paper develops new
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationA Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost
Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton
More informationA Hybrid Approach to Evaluate the Performance of Engineering Schools
A Hybrd Approach to Evaluate the Perforance of Engneerng Schools School of Engneerng Unversty of Brdgeport Brdgeport, CT 06604 ABSTRACT Scence and engneerng (S&E) are two dscplnes that are hghly receptve
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationMaster s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks
Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014
More informationAn Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
More informationA NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana
REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT
More informationA P2P Approach for Business Process Modeling and Reuse
A P2P Approach for Busness Process Modelng and Reuse José A. Rodrgues Nt., Jano Morera de Souza, Geraldo Zbrão, Geraldo Xexéo, Eduardo Neves, Wallace A. Pnhero COPPE Unversdade Federal do Ro de Janero
More informationPacket Reorderng Analysis
On Montorng of End-to-End Packet Reorderng over the Internet Bn Ye 1 Anura P. Jayasuana 1 Nschal M. Pratla 2 1Coputer Networkng Research laboratory, Colorado State Unversty, Fort Collns, CO 8523, USA 2
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationThe Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.
Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationTailoring Fuzzy C-Means Clustering Algorithm for Big Data Using Random Sampling and Particle Swarm Optimization
Internatonal Journal of Database Theory and Alcaton,.191-202 htt://dx.do.org/10.14257/jdta.2015.8.3.16 Talorng Fuzzy -Means lusterng Algorth for Bg Data Usng Rando Salng and Partcle Swar Otzaton Yang Xanfeng
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationSecure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
More informationTourism Demand Forecasting by Improved SVR Model
Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationTransformation of Commercial Flows into Physical Flows of Electricity
Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More information2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet
2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationFREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationResearch of concurrency control protocol based on the main memory database
Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The
More information