A FEATURE SELECTION AGENT-BASED IDS
|
|
- Shona Fields
- 8 years ago
- Views:
Transcription
1 A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: , emal: ABSTRACT: Ths paper ntroduces an Intruson Detecton System (IDS) based on the use of several Artfcal Intellgence (AI) technques. The anomalous detecton ssue s approached from a feature selecton pont of vew, where a connectonst model s appled as a data analyss technque n an IDS. By explotng the strengths of connectonst archtectures n recognton, classfcaton and generalzaton, ths work shows the benefts of applyng connectonst models and agent technology to the Intruson Detecton (ID) feld. Ths work s based on the fact that proectonst systems have never been appled to the IDS feld and network securty untl ths research proect. It helps network admnstrators to decde f anomalous stuatons are real ntrusons or not. To cover the more complex stuatons related to segment-dvded networks, we ntroduce a new approach based on a dstrbuted archtecture where dfferent software agents cooperate to detect anomalous SNMP (Smple Network Management Protocol) stuatons n a bg-sze network. KEYWORDS: connectonst models, unsupervsed learnng, ntruson detecton systems, mult-agent systems INTRODUCTION Computer securty actons are amed to prevent and detect unauthorzed use of computers or computer networks. IDS have become one of the most mportant securty tool. They are hardware or software systems that montor the events occurrng n a computer system or network, analysng them to dentfy securty problems. They have become a necessary addtonal tool to the securty nfrastructure as the number of network attacks has ncreased very fast durng the last years. IDS have been prevously bult by hand. AI technques can decrease the effort needed to buld IDS and can also mprove ther performance. Some technques are used to mplement IDS (such as state-transton dagrams, expert systems, petr nets, sgnature verfcaton, etc.). Among them, connectonst models have been dentfed as a very promsng method of addressng the ID problem due to two man features: they are sutable to detect day-0 attacks and they have the ablty to classfy patterns (attack classfcaton, alert valdaton, etc.). Up to now, there have been several attends to apply connectonst models [1] (such as Self-Organsng Maps [2], [3] or Elman Networks [4]) to the network securty feld. Ths paper presents an IDS based on a connectonst archtecture whch has never been appled to the ID problem before ths research. Ths archtecture s called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL), and has been shown [5], [6], [7], [8] a very effectve one to perform the data analyss process (see Fgure 1). The actual demands of effectveness and complexty have caused the development of new computng paradgms. One of these new paradgms are agent and mult-agent systems. A software agent can be defned as a system wth capacty of adaptaton and provded wth mechansms allowng t to decde what to do (accordng to ther obectves) [9]. Ths knd of systems has been prevously used n the feld of IDS [10], [11]. PROBLEM OVERVIEW A protocol n a computer network context s a specfcaton that descrbes low-level detals of host-to-host nterfaces or hgh-level exchanges between applcaton programs. Among all the mplemented network protocols we have focused our effort n the study of SNMP because an attack based on ths protocol may severely compromse the system securty. SNMP was dentfed as one of the top fve most vulnerable servces (n order of mportance) by CISCO [12].
2 In the short-term, SNMP was orented to manage nodes n the Internet communty [13]. That s, t s used to control routers, brdges, and other network elements, readng and wrtng a wde varety of nformaton about the devces: operatng system, verson, routng tables, default TTL (Tme To Lve) and so on. Some of ths data can be extremely senstve. The IAB (Internet Actvtes Board) recommended that all IP (Internet Protocol) and TCP (Transmsson Control Protocol) mplementatons were network manageable [14]. The mplementaton of the Internet Management Informaton Base (MIB) and at least one of the management protocols lke SNMP s the consequence of ths suggeston. The MIB can be roughly defned as a database that contans nformaton about some elements or devces that can be network-controlled. Ths database s used by SNMP to store nformaton about the elements that t controls. There are some dangerous anomalous stuatons related to SNMP [8], such as port sweep and MIB nformaton transfer. SEGMENTED SNMP (AGENT APPROACH) An SNMP Agent s the operatonal role assumed by an SNMP party (generally a devce controlled by ths protocol) when t performs SNMP management operatons n response to receved SNMP messages [16]. An SNMP Proxy Agent s an SNMP Agent that performs management operatons by communcatng wth another logcally remote party. In the case of a segmented network, logcally remote means that each party s located n a dfferent network segment. The transparency prncple [16] defnes the behavor of an SNMP party and says that the manner n whch one SNMP party processes SNMP protocol messages receved from another SNMP party s entrely transparent to the latter. Implct n ths prncple s the requrement that, throughout ts nteracton wth a Proxy Agent, a management staton s suppled wth no nformaton about the nature or progress of the proxy mechansms by whch ts requests are realzed. That s, t should seem to the management staton as f t were nteractng va SNMP drectly wth the proxed devce. THE MULTI-AGENT IDS MODEL To upgrade the connectonst IDS model prevously developed [8], t s splt out nto dfferent software agents [9] workng together n order to detect the ntrusve actons defned above. Corporatve networks can be very bg-sze ones, where computers are set up nto dfferent network segments, manly caused by the IP address lmtatons. Here s where a dstrbuted IDS can take advantage. By usng ths knd of IDS (where a lstener entty capture the traffc travellng along each dfferent network segment), the model s able to dentfy all the anomales caused n a segment-dvded network. Otherwse, only the anomales caused n the segment where the IDS s located could be dentfed. All the dfferent SNMP anomalous stuatons can be produced n every dfferent segment (where SNMP Agents are set up). In order to detect all these stuatons we propose ths dstrbuted agent-based IDS. It s shown n Fgure 1 and conssts on two dfferent knds of agents: - Snffer Agent (): each segment (n whch the network s dvded) s controlled by an agent of ths knd. - IDS Agent (IDS-A): there s only one agent of ths knd, whch s n charge of processng the nformaton sent by Snffer Agents and alertng the network admnstrator. Ths structure allows the system to use the source and destnaton IP address n such a way that every Agent could know from whch network segment the packet s comng. Snffer Agents carry out two man functons: - Network Traffc Capture Functon: one of the network nterfaces of the host where the Snffer Agent s located s set up as promscuous mode. It captures all the packets travellng along ths network segment. - Data Pre-processng Functon: the captured data s selected, pre-processed and sent to the IDS Agent. The nformaton analysed by these Agents s obtaned from the packets that travel along the network. The necessary data for the traffc analyss s contaned on the captured packets headers. Ths data can be obtaned usng a network analyser. The study of SNMP s the reason why only packets based on UDP (User Datagram Protocol) are selected. Ths means that n terms of TCP/IP (Transmsson Control Protocol/Internet Protocol) protocol stack, the model captures only the packets usng UDP at transport layer and IP at network layer. So n addton to the SNMP packets, the data sets contan traffc related to other protocols nstalled n our network, lke NETBIOS and BOOTPS.
3 Durng the Data Pre-processng Functon (Fgure 1), a data selecton of all the nformaton captured s performed. So the varables used are: tmestamp, protocol ID, source port, destnaton port, source IP address, destnaton IP address and packet sze. Only the pre-processed data s sent to the IDS Agent. Network Segment 1 Network Traffc Capture Data Pre-processng Network Segment 2 IDS-A Data Analyss (CMLHL) Network Segment 3 Intellgent process IDS-A Snffer Agent IDS Agent Network Admnstrator Fgure 1: Structure of the Agent-Based IDS Once the pre-processed data s receved n the IDS Agent, a connectonst model (see Equatons 1 to 5) s appled to analyse the data and dentfy anomalous patterns. Wth ths dstrbuted structure, ths Agent s capable of dentfyng anomalous stuatons concernng to dfferent network segments. That s, an anomalous stuaton can affect SNMP Agents located n dfferent segments. The IDS Agent can be equpped wth dfferent mechansms to abort an attack. That s, after dentfyng an anomalous stuaton, t can carry out concrete actons to abort the attack (such as deactvatng SNMP). Fnally, the network admnstrator s alerted about the anomalous stuatons that are happenng (or had happened) along all the segments n whch the network s dvded. THE UNSUPERVISED CONNECTIONIST IDS MODEL Exploratory Proecton Pursut (EPP) [17], [18], [19], [20] s a statstcal method for solvng the complex problem of dentfyng structure n hgh dmensonal data. It s based on the proecton of the data onto a lower dmensonal subspace n whch ts structure s searched by eye. It s necessary to defne an ndex to measure the varyng degrees of nterest generated by each proecton. Subsequently, the data s transformed by maxmzng the ndex and the assocated nterest. From a statstcal pont of vew the most nterestng drectons are those that are as non-gaussan as possble.
4 The Data Analyss step performed by the IDS Agent (Fgure 1) s based on the use of a neural EPP model called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL) [21], [22], [23]. It was ntally appled to the feld of Artfcal Vson [21], [22] to dentfy local flters n space and tme. Here, we have appled t to the feld of Computer Securty. It s based on Maxmum Lkelhood Hebban Learnng (MLHL) [19], [20] addng lateral connectons [21], [22], whch have been derved from the Rectfed Gaussan Dstrbuton [24]. The resultant net can fnd the ndependent factors of a data set but do so n a way that captures some type of global orderng n the data set. Consder an N-dmensonal nput vector, x, and an M-dmensonal output vector, y, wth lnkng nput to output and let η be the learnng rate. CMLHL can be expressed as: W beng the weght N y = W x, = 1 (1) Lateral connectons are appled: y ( t + ) = [ y (t) + τ( b Ay) ] + 1 A s a symmetrc matrx used to modfy the response to the data whose effect s based on the relaton between the dstances among the output neurons. It s based on the Cooperatve Dstrbuton [24], but to speed learnng up, t can be smplfed to [25]: ( 2 ( ) M ) A(, ) = δ cos π / (3) (2) The actvaton ( e ) s fed back through the same weghts and subtracted from the nput: Weght update: e = x M = 1 W y, p 1 ( e ) e ΔW = η. y. sgn (5) (4) Where: η s the learnng rate, τ s the strength of the lateral connectons, b s the bas parameter and p s a parameter related to the energy functon [19], [20], and δ s the Kronecker delta. COMPARISON WITH OTHER TECHNIQUES The proecton method called MLHL, and others based on t (such as CMLHL), can show the evoluton through the tme of the system response. In the IDS feld, the tme varable (or temporal relatonshp between packets) s very mportant because t s decsve n the detecton of some knds of attacks. A hgh concentraton n tme can mply an anomalous stuaton by tself. A typcal example of ths can be a MIB nformaton transfer, where a hgh temporal concentraton means a transference of great quantty of nformaton. It s a transfer of some nformaton contaned n the SNMP MIB, and s consdered a qute dangerous stuaton because a hacker can come up wth all sorts of nterestng and sometmes useful nformaton. Ths varable from the dataset does not provde as much nformaton when other unsupervsed connectonst models are appled. That s the case of Self-Organsng Maps (SOM) [26]. Several authors have appled ths model [2], [3] n the data-analyss process wthout takng nto account the tme dmenson of the data set. On the other hand, most of the sgnature-verfcaton models do not take nto account ths tme dmenson. They work at a packet level, so they cannot use the tme ssues of the dataset as a whole. It mples that these models do not take nto account the tme concentraton of anomalous or rsky packets, as t s done by the model proposed n ths paper. Fnally, the model ntroduced n ths work uses ths mportant varable, allowng a dynamc analyss and a better study of the nformaton, as can be seen n Fgure 2.
5 Group 1 tme evoluton Group 2 b) a) Fgure 2: a) Data proecton dsplayed by the connectonst model for a MIB nformaton transfer. b) Vsualzaton of an example of a hgh temporal concentraton of packets. In Fgure 2.a t s easy to dentfy several packet groups. Groups 1 and 2 are related to a MIB nformaton transfer: they contan packets sent and receved durng the transfer embedded n the data set. Group 1 contans all the traffc n one way (from destnaton to source), whle Group 2 contans all the traffc n the other way (from source to destnaton). These groups have been labelled as anomalous ones due to two combned ssues: hgh temporal concentraton of packets, and because they are made up of dfferent sze packets, stuaton whch s related to the MIB nformaton transfer. Fgure 2.b shows a very hgh temporal concentraton of packets, whch caused the dentfcaton of Groups 1 and 2 as anomalous ones. CONCLUSIONS We propose an Agent-Based IDS model made up of two dfferent knds of agents: Snffer Agents and IDS Agent. Ths model allows us to dentfy the attacks happenng n each segment and the most general ones (those mplyng more than only one network segment). Automatc mechansms can developed and run to abort an attack. To handle and classfy all the pre-processed nformaton related wth the whole network, the IDS Agent should have a very bg calculus power. The IDS Agent can be located n the most powerful machne n the organzaton. It does not matter what network segment ths machne s located n. ACKNOWLEDGMENTS Ths research has been supported by the McyT proects: TIN REFERENCES [1] Debar, H;, Becker, M.; Sbon, D., 1992, A Neural Network Component for an Intruson Detecton System, IEEE Symposum on Research n Computer Securty and Prvacy. [2] Hätönen, K.; Höglund, A.; Sorvar, A., 2000, A Computer Host-Based User Anomaly Detecton System Usng the Self-Organzng Map, Internatonal Jont Conference of Neural Networks. [3] Zanero S.; Savares S.M., 2004, Unsupervsed Learnng Technques for an Intruson Detecton System, ACM Symposum on Appled Computng, pp
6 [4] Ghosh, A.; Schwartzbard A.; Schatz A., 1999, Learnng Program Behavor Profles for Intruson Detecton, Workshop on Intruson Detecton and Network Montorng. [5] Corchado, E.; Herrero, A.; Baruque, B.; Sáz J.M., 2005, Intruson Detecton System Based on a Cooperatve Topology Preservng Method, Internatonal Conference on Adaptve and Natural Computng Algorthms, Sprnger Computer Scence, pp [6] Herrero, A.; Corchado, E.; Sáz, J.M., 2005, Identfcaton of Anomalous SNMP Stuatons Usng a Cooperatve Connectonst Exploratory Proecton Pursut Model, Internatonal Conference on Intellgent Data Engneerng and Automated Learnng, Sprnger-Verlag, Lecture Notes n Computer Scence, vol. 3578, pp [7] Herrero, A.; Corchado, E.; Sáz, J.M., 2005, A Cooperatve Unsupervsed Connectonst Model Appled to Identfy Anomalous Massve SNMP Data Sendng, Internatonal Conference on Natural Computaton, Sprnger- Verlag, Lecture Notes n Computer Scence vol. 3610, pp [8] Corchado, E.; Herrero, A.; Sáz J.M., 2005, Detectng Compounded Anomalous SNMP Stuatons Usng Unsupervsed Pattern Recognton, Internatonal Conference on Artfcal Neural Networks (ICANN 05), Sprnger-Verlag, Lecture Notes n Computer Scence, vol ( In press ) [9] Wooldrdge, M., 1999, Multagent Systems: A Modern Approach to Dstrbuted Artfcal Intelgence, Gerhard Wess. [10] Spafford, E.H.; Zambon, D., 2000, Intruson Detecton Usng Autonomous Agents, Computer Networks: The Internatonal Journal of Computer and Telecommuncatons Networkng, vol. 34(4), pp [11] Hegazy, I.M.; Al-Arf, T.; Fayed, Z.T.; Faheem, H.M., 2003, A Framework for Multagent-based System for Intruson Detecton, Intellgent Systems Desgn and Applcatons, Sprnger-Verlag, Adv. n Soft Computng Sere. [12] Csco Secure Consultng, 2000, Vulnerablty Statstcs Report. [13] Case, J.; Fedor, M.S.; Schoffstall, M.L.; Davn, C., 1990, Smple Network Management (SNMP), RFC [14] Postel, J., 1989, IAB Offcal Protocol Standards, RFC [15] Myerson, J.M., 2002, Identfyng Enterprse Network Vulnerabltes, Internatonal Journal of Network Management, vol. 12. [16] Davn, J.; Galvn, J.; McCloghre, K., 1992, SNMP Admnstratve Model, RFC [17] Fredman J.; Tukey. J., 1974, A Proecton Pursut Algorthm for Exploratory Data Analyss, IEEE Transacton on Computers, vol. 23, pp [18] Hyvärnen, A., 2001, Complexty Pursut: Separatng Interestng Components from Tme Seres, Neural Computaton, vol. 13, pp [19] Corchado, E.; MacDonald, D.; Fyfe, C., 2004, Maxmum and Mnmum Lkelhood Hebban Learnng for Exploratory Proecton Pursut, Data Mnng and Knowledge Dscovery, vol. 8(3), Kluwer Academc Publshng, pp [20] Fyfe, C.; Corchado, E., 2002, Maxmum Lkelhood Hebban Rules, European Symposum on Artfcal Neural Networks. [21] Corchado, E.; Han, Y.; Fyfe, C., 2003, Structurng Global Responses of Local Flters Usng Lateral Connectons, Journal of Expermental and Theoretcal Artfcal Intellgence, vol. 15(4), pp [22] Corchado, E.; Fyfe, C., 2003, Connectonst Technques for the Identfcaton and Suppresson of Interferng Underlyng Factors, Internatonal Journal of Pattern Recognton and Artfcal Intellgence, vol. 17(8), pp [23] Corchado, E.; Corchado, J.M.; Sáz, L.; Lara, A., 2004, Constructng a Global and Integral Model of Busness Management Usng a CBR System Frst Internatonal Conference on Cooperatve Desgn, Vsualzaton and Engneerng. [24] Seung, H.S.; Socc, N.D.; Lee, D., 1998, The Rectfed Gaussan Dstrbuton Advances n Neural Informaton Processng Systems, vol. 10, pp [25] Charles, D., 1999, Unsupervsed Artfcal Neural Networks for the Identfcaton of Multple Causes n Data, Ph.D. Thess, Unversty of Pasley. [26] T. Kohonen, 2000, Self-Organzng Maps, Sprnger, 3 rd edton, ISBN:
A cooperative connectionist IDS model to identify independent anomalous SNMP situations
A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract
More informationTesting CAB-IDS through Mutations: on the Identification of Network Scans
Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationA Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationA Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationNegative Selection and Niching by an Artificial Immune System for Network Intrusion Detection
Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.
More informationA Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
More informationInvoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow
Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl
More informationQOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
More informationIWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationCONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM
Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationAutomated Network Performance Management and Monitoring via One-class Support Vector Machine
Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationAdaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier
Adaptve Intruson Detecton based on Boostng and Naïve Bayesan Classfer Dewan Md. Fard Department of CSE Jahangrnagar Unversty Dhaka-1342, Bangladesh Mohammad Zahdur Rahman Department of CSE Jahangrnagar
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationSingle and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationA Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks
A Perfect QoS Routng Algorthm for Fndng the Best Path for Dynamc Networks Hazem M. El-Bakry Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT helbakry20@yahoo.com Nkos Mastoraks
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationClassification of Network Traffic via Packet-Level Hidden Markov Models
Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,
More informationPERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW
PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW S. Devaraju 1 and S. Ramakrshnan 2 1 Department of Computer Applcatons, Dr. Mahalngam College of Engneerng and Technology,
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationOffline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1)
Internatonal Journal of Sgnal Processng Systems Vol, No June 203 Offlne Verfcaton of Hand Wrtten Sgnature usng Adaptve Resonance Theory Net (Type-) Trtharaj Dash Veer Surendra Sa Unversty of Technology,
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationData security in Intelligent Transport Systems
Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc
More informationResearch Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks
The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed
More informationFigure 1. Time-based operation of AIDP.
Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK a.nadeem@surrey.ac.u ABSTRACT Moble ad-hoc networs (MANETs)
More informationAbstract. 1. Introduction
System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,
More informationAn artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki*
Journal of Industral Engneerng Internatonal July 008, Vol. 4, No. 7, 04 Islamc Azad Unversty, South Tehran Branch An artfcal Neural Network approach to montor and dagnose multattrbute qualty control processes
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationHow To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
More informationA neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *
Internatonal Journal of Computatonal Scence 992-6669 (Prnt) 992-6677 (Onlne) Global Informaton Publsher 27, Vol., No., 27-39 A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano,
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationMACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION
MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté
More informationOptimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms
Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred
More informationVEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM
IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More information= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1
A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL
More information1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac.
The Co-evoluton of Tradng Strateges n A Mult-agent Based Smulated Stock Market Through the Integraton of Indvdual Learnng and Socal Learnng Graham Kendall School of Computer Scence and IT ASAP Research
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationSome literature also use the term Process Control
A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationNetwork traffic analysis optimization for signature-based intrusion detection systems
Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems
More informationEnsuring Secure Info-Communication Networks Based on the Special Filtering Mode
Ensurng Secure Info-Communcaton Networks Based on the Specal Flterng Mode Abstract In ths artcle was developed a method for calculatng the nvarant characterstcs of traffcs for a specal flterng mode wth
More informationTime Delayed Independent Component Analysis for Data Quality Monitoring
IWSSIP 1-17th Internatonal Conference on Systems, Sgnals and Image Processng Tme Delayed Independent Component Analyss for Data Qualty Montorng José Márco Faer Sgnal Processng Laboratory, COE/Pol Federal
More informationUsing Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council
Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2)
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationDaily Mood Assessment based on Mobile Phone Sensing
2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and
More informationData Visualization by Pairwise Distortion Minimization
Communcatons n Statstcs, Theory and Methods 34 (6), 005 Data Vsualzaton by Parwse Dstorton Mnmzaton By Marc Sobel, and Longn Jan Lateck* Department of Statstcs and Department of Computer and Informaton
More informationGaining Insights to the Tea Industry of Sri Lanka using Data Mining
Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 2008 Vol I Ganng Insghts to the Tea Industry of Sr Lanka usng Data Mnng H.C. Fernando, W. M. R Tssera, and R. I. Athauda
More informationMONITORING OF DISTILLATION COLUMN OPERATION THROUGH SELF -ORGANIZING MAPS. Y.S. Ng and R. Srinivasan*
MONITORING OF DISTILLATION COLUMN OPERATION THROUGH SELF -ORGANIZING MAPS Y.S. Ng and R. Srnvasan* Laboratory for Intellgent Applcatons n Chemcal Engneerng, Department of Chemcal and Bomolecular Engneerng,
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationDBA-VM: Dynamic Bandwidth Allocator for Virtual Machines
DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More information