A FEATURE SELECTION AGENT-BASED IDS

Size: px
Start display at page:

Download "A FEATURE SELECTION AGENT-BASED IDS"

Transcription

1 A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: , emal: ABSTRACT: Ths paper ntroduces an Intruson Detecton System (IDS) based on the use of several Artfcal Intellgence (AI) technques. The anomalous detecton ssue s approached from a feature selecton pont of vew, where a connectonst model s appled as a data analyss technque n an IDS. By explotng the strengths of connectonst archtectures n recognton, classfcaton and generalzaton, ths work shows the benefts of applyng connectonst models and agent technology to the Intruson Detecton (ID) feld. Ths work s based on the fact that proectonst systems have never been appled to the IDS feld and network securty untl ths research proect. It helps network admnstrators to decde f anomalous stuatons are real ntrusons or not. To cover the more complex stuatons related to segment-dvded networks, we ntroduce a new approach based on a dstrbuted archtecture where dfferent software agents cooperate to detect anomalous SNMP (Smple Network Management Protocol) stuatons n a bg-sze network. KEYWORDS: connectonst models, unsupervsed learnng, ntruson detecton systems, mult-agent systems INTRODUCTION Computer securty actons are amed to prevent and detect unauthorzed use of computers or computer networks. IDS have become one of the most mportant securty tool. They are hardware or software systems that montor the events occurrng n a computer system or network, analysng them to dentfy securty problems. They have become a necessary addtonal tool to the securty nfrastructure as the number of network attacks has ncreased very fast durng the last years. IDS have been prevously bult by hand. AI technques can decrease the effort needed to buld IDS and can also mprove ther performance. Some technques are used to mplement IDS (such as state-transton dagrams, expert systems, petr nets, sgnature verfcaton, etc.). Among them, connectonst models have been dentfed as a very promsng method of addressng the ID problem due to two man features: they are sutable to detect day-0 attacks and they have the ablty to classfy patterns (attack classfcaton, alert valdaton, etc.). Up to now, there have been several attends to apply connectonst models [1] (such as Self-Organsng Maps [2], [3] or Elman Networks [4]) to the network securty feld. Ths paper presents an IDS based on a connectonst archtecture whch has never been appled to the ID problem before ths research. Ths archtecture s called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL), and has been shown [5], [6], [7], [8] a very effectve one to perform the data analyss process (see Fgure 1). The actual demands of effectveness and complexty have caused the development of new computng paradgms. One of these new paradgms are agent and mult-agent systems. A software agent can be defned as a system wth capacty of adaptaton and provded wth mechansms allowng t to decde what to do (accordng to ther obectves) [9]. Ths knd of systems has been prevously used n the feld of IDS [10], [11]. PROBLEM OVERVIEW A protocol n a computer network context s a specfcaton that descrbes low-level detals of host-to-host nterfaces or hgh-level exchanges between applcaton programs. Among all the mplemented network protocols we have focused our effort n the study of SNMP because an attack based on ths protocol may severely compromse the system securty. SNMP was dentfed as one of the top fve most vulnerable servces (n order of mportance) by CISCO [12].

2 In the short-term, SNMP was orented to manage nodes n the Internet communty [13]. That s, t s used to control routers, brdges, and other network elements, readng and wrtng a wde varety of nformaton about the devces: operatng system, verson, routng tables, default TTL (Tme To Lve) and so on. Some of ths data can be extremely senstve. The IAB (Internet Actvtes Board) recommended that all IP (Internet Protocol) and TCP (Transmsson Control Protocol) mplementatons were network manageable [14]. The mplementaton of the Internet Management Informaton Base (MIB) and at least one of the management protocols lke SNMP s the consequence of ths suggeston. The MIB can be roughly defned as a database that contans nformaton about some elements or devces that can be network-controlled. Ths database s used by SNMP to store nformaton about the elements that t controls. There are some dangerous anomalous stuatons related to SNMP [8], such as port sweep and MIB nformaton transfer. SEGMENTED SNMP (AGENT APPROACH) An SNMP Agent s the operatonal role assumed by an SNMP party (generally a devce controlled by ths protocol) when t performs SNMP management operatons n response to receved SNMP messages [16]. An SNMP Proxy Agent s an SNMP Agent that performs management operatons by communcatng wth another logcally remote party. In the case of a segmented network, logcally remote means that each party s located n a dfferent network segment. The transparency prncple [16] defnes the behavor of an SNMP party and says that the manner n whch one SNMP party processes SNMP protocol messages receved from another SNMP party s entrely transparent to the latter. Implct n ths prncple s the requrement that, throughout ts nteracton wth a Proxy Agent, a management staton s suppled wth no nformaton about the nature or progress of the proxy mechansms by whch ts requests are realzed. That s, t should seem to the management staton as f t were nteractng va SNMP drectly wth the proxed devce. THE MULTI-AGENT IDS MODEL To upgrade the connectonst IDS model prevously developed [8], t s splt out nto dfferent software agents [9] workng together n order to detect the ntrusve actons defned above. Corporatve networks can be very bg-sze ones, where computers are set up nto dfferent network segments, manly caused by the IP address lmtatons. Here s where a dstrbuted IDS can take advantage. By usng ths knd of IDS (where a lstener entty capture the traffc travellng along each dfferent network segment), the model s able to dentfy all the anomales caused n a segment-dvded network. Otherwse, only the anomales caused n the segment where the IDS s located could be dentfed. All the dfferent SNMP anomalous stuatons can be produced n every dfferent segment (where SNMP Agents are set up). In order to detect all these stuatons we propose ths dstrbuted agent-based IDS. It s shown n Fgure 1 and conssts on two dfferent knds of agents: - Snffer Agent (): each segment (n whch the network s dvded) s controlled by an agent of ths knd. - IDS Agent (IDS-A): there s only one agent of ths knd, whch s n charge of processng the nformaton sent by Snffer Agents and alertng the network admnstrator. Ths structure allows the system to use the source and destnaton IP address n such a way that every Agent could know from whch network segment the packet s comng. Snffer Agents carry out two man functons: - Network Traffc Capture Functon: one of the network nterfaces of the host where the Snffer Agent s located s set up as promscuous mode. It captures all the packets travellng along ths network segment. - Data Pre-processng Functon: the captured data s selected, pre-processed and sent to the IDS Agent. The nformaton analysed by these Agents s obtaned from the packets that travel along the network. The necessary data for the traffc analyss s contaned on the captured packets headers. Ths data can be obtaned usng a network analyser. The study of SNMP s the reason why only packets based on UDP (User Datagram Protocol) are selected. Ths means that n terms of TCP/IP (Transmsson Control Protocol/Internet Protocol) protocol stack, the model captures only the packets usng UDP at transport layer and IP at network layer. So n addton to the SNMP packets, the data sets contan traffc related to other protocols nstalled n our network, lke NETBIOS and BOOTPS.

3 Durng the Data Pre-processng Functon (Fgure 1), a data selecton of all the nformaton captured s performed. So the varables used are: tmestamp, protocol ID, source port, destnaton port, source IP address, destnaton IP address and packet sze. Only the pre-processed data s sent to the IDS Agent. Network Segment 1 Network Traffc Capture Data Pre-processng Network Segment 2 IDS-A Data Analyss (CMLHL) Network Segment 3 Intellgent process IDS-A Snffer Agent IDS Agent Network Admnstrator Fgure 1: Structure of the Agent-Based IDS Once the pre-processed data s receved n the IDS Agent, a connectonst model (see Equatons 1 to 5) s appled to analyse the data and dentfy anomalous patterns. Wth ths dstrbuted structure, ths Agent s capable of dentfyng anomalous stuatons concernng to dfferent network segments. That s, an anomalous stuaton can affect SNMP Agents located n dfferent segments. The IDS Agent can be equpped wth dfferent mechansms to abort an attack. That s, after dentfyng an anomalous stuaton, t can carry out concrete actons to abort the attack (such as deactvatng SNMP). Fnally, the network admnstrator s alerted about the anomalous stuatons that are happenng (or had happened) along all the segments n whch the network s dvded. THE UNSUPERVISED CONNECTIONIST IDS MODEL Exploratory Proecton Pursut (EPP) [17], [18], [19], [20] s a statstcal method for solvng the complex problem of dentfyng structure n hgh dmensonal data. It s based on the proecton of the data onto a lower dmensonal subspace n whch ts structure s searched by eye. It s necessary to defne an ndex to measure the varyng degrees of nterest generated by each proecton. Subsequently, the data s transformed by maxmzng the ndex and the assocated nterest. From a statstcal pont of vew the most nterestng drectons are those that are as non-gaussan as possble.

4 The Data Analyss step performed by the IDS Agent (Fgure 1) s based on the use of a neural EPP model called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL) [21], [22], [23]. It was ntally appled to the feld of Artfcal Vson [21], [22] to dentfy local flters n space and tme. Here, we have appled t to the feld of Computer Securty. It s based on Maxmum Lkelhood Hebban Learnng (MLHL) [19], [20] addng lateral connectons [21], [22], whch have been derved from the Rectfed Gaussan Dstrbuton [24]. The resultant net can fnd the ndependent factors of a data set but do so n a way that captures some type of global orderng n the data set. Consder an N-dmensonal nput vector, x, and an M-dmensonal output vector, y, wth lnkng nput to output and let η be the learnng rate. CMLHL can be expressed as: W beng the weght N y = W x, = 1 (1) Lateral connectons are appled: y ( t + ) = [ y (t) + τ( b Ay) ] + 1 A s a symmetrc matrx used to modfy the response to the data whose effect s based on the relaton between the dstances among the output neurons. It s based on the Cooperatve Dstrbuton [24], but to speed learnng up, t can be smplfed to [25]: ( 2 ( ) M ) A(, ) = δ cos π / (3) (2) The actvaton ( e ) s fed back through the same weghts and subtracted from the nput: Weght update: e = x M = 1 W y, p 1 ( e ) e ΔW = η. y. sgn (5) (4) Where: η s the learnng rate, τ s the strength of the lateral connectons, b s the bas parameter and p s a parameter related to the energy functon [19], [20], and δ s the Kronecker delta. COMPARISON WITH OTHER TECHNIQUES The proecton method called MLHL, and others based on t (such as CMLHL), can show the evoluton through the tme of the system response. In the IDS feld, the tme varable (or temporal relatonshp between packets) s very mportant because t s decsve n the detecton of some knds of attacks. A hgh concentraton n tme can mply an anomalous stuaton by tself. A typcal example of ths can be a MIB nformaton transfer, where a hgh temporal concentraton means a transference of great quantty of nformaton. It s a transfer of some nformaton contaned n the SNMP MIB, and s consdered a qute dangerous stuaton because a hacker can come up wth all sorts of nterestng and sometmes useful nformaton. Ths varable from the dataset does not provde as much nformaton when other unsupervsed connectonst models are appled. That s the case of Self-Organsng Maps (SOM) [26]. Several authors have appled ths model [2], [3] n the data-analyss process wthout takng nto account the tme dmenson of the data set. On the other hand, most of the sgnature-verfcaton models do not take nto account ths tme dmenson. They work at a packet level, so they cannot use the tme ssues of the dataset as a whole. It mples that these models do not take nto account the tme concentraton of anomalous or rsky packets, as t s done by the model proposed n ths paper. Fnally, the model ntroduced n ths work uses ths mportant varable, allowng a dynamc analyss and a better study of the nformaton, as can be seen n Fgure 2.

5 Group 1 tme evoluton Group 2 b) a) Fgure 2: a) Data proecton dsplayed by the connectonst model for a MIB nformaton transfer. b) Vsualzaton of an example of a hgh temporal concentraton of packets. In Fgure 2.a t s easy to dentfy several packet groups. Groups 1 and 2 are related to a MIB nformaton transfer: they contan packets sent and receved durng the transfer embedded n the data set. Group 1 contans all the traffc n one way (from destnaton to source), whle Group 2 contans all the traffc n the other way (from source to destnaton). These groups have been labelled as anomalous ones due to two combned ssues: hgh temporal concentraton of packets, and because they are made up of dfferent sze packets, stuaton whch s related to the MIB nformaton transfer. Fgure 2.b shows a very hgh temporal concentraton of packets, whch caused the dentfcaton of Groups 1 and 2 as anomalous ones. CONCLUSIONS We propose an Agent-Based IDS model made up of two dfferent knds of agents: Snffer Agents and IDS Agent. Ths model allows us to dentfy the attacks happenng n each segment and the most general ones (those mplyng more than only one network segment). Automatc mechansms can developed and run to abort an attack. To handle and classfy all the pre-processed nformaton related wth the whole network, the IDS Agent should have a very bg calculus power. The IDS Agent can be located n the most powerful machne n the organzaton. It does not matter what network segment ths machne s located n. ACKNOWLEDGMENTS Ths research has been supported by the McyT proects: TIN REFERENCES [1] Debar, H;, Becker, M.; Sbon, D., 1992, A Neural Network Component for an Intruson Detecton System, IEEE Symposum on Research n Computer Securty and Prvacy. [2] Hätönen, K.; Höglund, A.; Sorvar, A., 2000, A Computer Host-Based User Anomaly Detecton System Usng the Self-Organzng Map, Internatonal Jont Conference of Neural Networks. [3] Zanero S.; Savares S.M., 2004, Unsupervsed Learnng Technques for an Intruson Detecton System, ACM Symposum on Appled Computng, pp

6 [4] Ghosh, A.; Schwartzbard A.; Schatz A., 1999, Learnng Program Behavor Profles for Intruson Detecton, Workshop on Intruson Detecton and Network Montorng. [5] Corchado, E.; Herrero, A.; Baruque, B.; Sáz J.M., 2005, Intruson Detecton System Based on a Cooperatve Topology Preservng Method, Internatonal Conference on Adaptve and Natural Computng Algorthms, Sprnger Computer Scence, pp [6] Herrero, A.; Corchado, E.; Sáz, J.M., 2005, Identfcaton of Anomalous SNMP Stuatons Usng a Cooperatve Connectonst Exploratory Proecton Pursut Model, Internatonal Conference on Intellgent Data Engneerng and Automated Learnng, Sprnger-Verlag, Lecture Notes n Computer Scence, vol. 3578, pp [7] Herrero, A.; Corchado, E.; Sáz, J.M., 2005, A Cooperatve Unsupervsed Connectonst Model Appled to Identfy Anomalous Massve SNMP Data Sendng, Internatonal Conference on Natural Computaton, Sprnger- Verlag, Lecture Notes n Computer Scence vol. 3610, pp [8] Corchado, E.; Herrero, A.; Sáz J.M., 2005, Detectng Compounded Anomalous SNMP Stuatons Usng Unsupervsed Pattern Recognton, Internatonal Conference on Artfcal Neural Networks (ICANN 05), Sprnger-Verlag, Lecture Notes n Computer Scence, vol ( In press ) [9] Wooldrdge, M., 1999, Multagent Systems: A Modern Approach to Dstrbuted Artfcal Intelgence, Gerhard Wess. [10] Spafford, E.H.; Zambon, D., 2000, Intruson Detecton Usng Autonomous Agents, Computer Networks: The Internatonal Journal of Computer and Telecommuncatons Networkng, vol. 34(4), pp [11] Hegazy, I.M.; Al-Arf, T.; Fayed, Z.T.; Faheem, H.M., 2003, A Framework for Multagent-based System for Intruson Detecton, Intellgent Systems Desgn and Applcatons, Sprnger-Verlag, Adv. n Soft Computng Sere. [12] Csco Secure Consultng, 2000, Vulnerablty Statstcs Report. [13] Case, J.; Fedor, M.S.; Schoffstall, M.L.; Davn, C., 1990, Smple Network Management (SNMP), RFC [14] Postel, J., 1989, IAB Offcal Protocol Standards, RFC [15] Myerson, J.M., 2002, Identfyng Enterprse Network Vulnerabltes, Internatonal Journal of Network Management, vol. 12. [16] Davn, J.; Galvn, J.; McCloghre, K., 1992, SNMP Admnstratve Model, RFC [17] Fredman J.; Tukey. J., 1974, A Proecton Pursut Algorthm for Exploratory Data Analyss, IEEE Transacton on Computers, vol. 23, pp [18] Hyvärnen, A., 2001, Complexty Pursut: Separatng Interestng Components from Tme Seres, Neural Computaton, vol. 13, pp [19] Corchado, E.; MacDonald, D.; Fyfe, C., 2004, Maxmum and Mnmum Lkelhood Hebban Learnng for Exploratory Proecton Pursut, Data Mnng and Knowledge Dscovery, vol. 8(3), Kluwer Academc Publshng, pp [20] Fyfe, C.; Corchado, E., 2002, Maxmum Lkelhood Hebban Rules, European Symposum on Artfcal Neural Networks. [21] Corchado, E.; Han, Y.; Fyfe, C., 2003, Structurng Global Responses of Local Flters Usng Lateral Connectons, Journal of Expermental and Theoretcal Artfcal Intellgence, vol. 15(4), pp [22] Corchado, E.; Fyfe, C., 2003, Connectonst Technques for the Identfcaton and Suppresson of Interferng Underlyng Factors, Internatonal Journal of Pattern Recognton and Artfcal Intellgence, vol. 17(8), pp [23] Corchado, E.; Corchado, J.M.; Sáz, L.; Lara, A., 2004, Constructng a Global and Integral Model of Busness Management Usng a CBR System Frst Internatonal Conference on Cooperatve Desgn, Vsualzaton and Engneerng. [24] Seung, H.S.; Socc, N.D.; Lee, D., 1998, The Rectfed Gaussan Dstrbuton Advances n Neural Informaton Processng Systems, vol. 10, pp [25] Charles, D., 1999, Unsupervsed Artfcal Neural Networks for the Identfcaton of Multple Causes n Data, Ph.D. Thess, Unversty of Pasley. [26] T. Kohonen, 2000, Self-Organzng Maps, Sprnger, 3 rd edton, ISBN:

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

Testing CAB-IDS through Mutations: on the Identification of Network Scans

Testing CAB-IDS through Mutations: on the Identification of Network Scans Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier

Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier Adaptve Intruson Detecton based on Boostng and Naïve Bayesan Classfer Dewan Md. Fard Department of CSE Jahangrnagar Unversty Dhaka-1342, Bangladesh Mohammad Zahdur Rahman Department of CSE Jahangrnagar

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks A Perfect QoS Routng Algorthm for Fndng the Best Path for Dynamc Networks Hazem M. El-Bakry Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT helbakry20@yahoo.com Nkos Mastoraks

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Classification of Network Traffic via Packet-Level Hidden Markov Models

Classification of Network Traffic via Packet-Level Hidden Markov Models Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,

More information

PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW

PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW S. Devaraju 1 and S. Ramakrshnan 2 1 Department of Computer Applcatons, Dr. Mahalngam College of Engneerng and Technology,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Offline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1)

Offline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1) Internatonal Journal of Sgnal Processng Systems Vol, No June 203 Offlne Verfcaton of Hand Wrtten Sgnature usng Adaptve Resonance Theory Net (Type-) Trtharaj Dash Veer Surendra Sa Unversty of Technology,

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Data security in Intelligent Transport Systems

Data security in Intelligent Transport Systems Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Figure 1. Time-based operation of AIDP.

Figure 1. Time-based operation of AIDP. Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK a.nadeem@surrey.ac.u ABSTRACT Moble ad-hoc networs (MANETs)

More information

Abstract. 1. Introduction

Abstract. 1. Introduction System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,

More information

An artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki*

An artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki* Journal of Industral Engneerng Internatonal July 008, Vol. 4, No. 7, 04 Islamc Azad Unversty, South Tehran Branch An artfcal Neural Network approach to montor and dagnose multattrbute qualty control processes

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *

A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello * Internatonal Journal of Computatonal Scence 992-6669 (Prnt) 992-6677 (Onlne) Global Informaton Publsher 27, Vol., No., 27-39 A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano,

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1 A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL

More information

1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac.

1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac. The Co-evoluton of Tradng Strateges n A Mult-agent Based Smulated Stock Market Through the Integraton of Indvdual Learnng and Socal Learnng Graham Kendall School of Computer Scence and IT ASAP Research

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Network traffic analysis optimization for signature-based intrusion detection systems

Network traffic analysis optimization for signature-based intrusion detection systems Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems

More information

Ensuring Secure Info-Communication Networks Based on the Special Filtering Mode

Ensuring Secure Info-Communication Networks Based on the Special Filtering Mode Ensurng Secure Info-Communcaton Networks Based on the Specal Flterng Mode Abstract In ths artcle was developed a method for calculatng the nvarant characterstcs of traffcs for a specal flterng mode wth

More information

Time Delayed Independent Component Analysis for Data Quality Monitoring

Time Delayed Independent Component Analysis for Data Quality Monitoring IWSSIP 1-17th Internatonal Conference on Systems, Sgnals and Image Processng Tme Delayed Independent Component Analyss for Data Qualty Montorng José Márco Faer Sgnal Processng Laboratory, COE/Pol Federal

More information

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2)

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

Data Visualization by Pairwise Distortion Minimization

Data Visualization by Pairwise Distortion Minimization Communcatons n Statstcs, Theory and Methods 34 (6), 005 Data Vsualzaton by Parwse Dstorton Mnmzaton By Marc Sobel, and Longn Jan Lateck* Department of Statstcs and Department of Computer and Informaton

More information

Gaining Insights to the Tea Industry of Sri Lanka using Data Mining

Gaining Insights to the Tea Industry of Sri Lanka using Data Mining Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 2008 Vol I Ganng Insghts to the Tea Industry of Sr Lanka usng Data Mnng H.C. Fernando, W. M. R Tssera, and R. I. Athauda

More information

MONITORING OF DISTILLATION COLUMN OPERATION THROUGH SELF -ORGANIZING MAPS. Y.S. Ng and R. Srinivasan*

MONITORING OF DISTILLATION COLUMN OPERATION THROUGH SELF -ORGANIZING MAPS. Y.S. Ng and R. Srinivasan* MONITORING OF DISTILLATION COLUMN OPERATION THROUGH SELF -ORGANIZING MAPS Y.S. Ng and R. Srnvasan* Laboratory for Intellgent Applcatons n Chemcal Engneerng, Department of Chemcal and Bomolecular Engneerng,

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information