Testing CAB-IDS through Mutations: on the Identification of Network Scans
|
|
- Damian Rose
- 8 years ago
- Views:
Transcription
1 Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, Abstract. Ths study demonstrates the ablty of powerful vsualzaton tools (based on the use of connectonst models) to dentfy network ntruson attempts n an effectve and relable manner. It presents a novel technque to test and evaluate a prevously developed network-based ntruson detecton system (IDS). Ths technque apples mutant operators and s ntended to test IDSs usng numercal data sets. It should be made clear that some mutatons were dscarded as they dd not all provde real lfe stuatons. As an applcaton example of the proposed testng model, t has been specally appled to the dentfcaton of network scans and mutatons of these. The tested Connectonst Agent-Based IDS (CAB-IDS) s used as a method to nvestgate the traffc whch travels along the analysed network, detectng anomalous traffc patterns. The specfc tests performed n ths study were based on the mutaton of one or several varables analysed by CAB-IDS. 1 Introducton Intruson Detecton Systems (IDSs) are tools desgned to montor and analyse computer system or network events n order to detect suspect patterns that may relate to a network or system attack. An IDS that analyses packets travellng over an entre network s referred to as a network-based IDS. Vsualzaton technques are startng to be appled n the feld of IDSs [1], [2], [3], [4], [5], [6] and they are generally appled to numerc data. However, n the feld of Computer Securty, traffc data sets normally have a categorcal and/or textual nature and ther converson nto a data type to whch vsualzaton technques (such as scatter plot or proectonst models) may be appled s not always obvous. Prevous attempts are presented n [1], [4], [5], [6]. IDS evaluaton s not a clear cut task [7]. Prevous works have presented several technques to test and evaluate msuse detecton models for network-based IDSs. Some of these technques were based [8] on a mechansm that generates a large number of varatons on a known explot by applyng mutant operators to ts template. In ths study, a method s proposed to apply such a mutaton technque for vsualzaton technques usng numercal data sets. In ths case, the method s used to analyse the response of CAB-IDS (Connectonst Agent-Based IDS) [4], [5], [6] n the detecton of a network scan. The ablty to detect such scans can help to dentfy wder and potentally more dangerous threats to a
2 network. The man advantage of ths testng model s that t allows analyss of IDSs based on numercal data sets. A port scan may be defned as seres of messages sent to dfferent port numbers to gan nformaton on ts actvty status. These messages can be sent by an external agent attemptng to access a host to fnd out more about the network servces ths host s provdng. A port scan provdes nformaton on where to probe for weaknesses, for whch reason scannng generally precedes any further ntrusve actvty. Ths work focuses on the dentfcaton of network scans, n whch the same port s the target for a number of computers. A network scan s one of the most common technques used to dentfy servces that mght then be accessed wthout permsson [3]. The prncpal research nterest and novelty of ths work les n the development of a testng method. The man goal of ths method s to prove the effectveness and capablty of any IDS based on numercal data to confront unknown attacks. In ths partcular study t has been used to test CAB-IDS. 2 CAB-IDS CAB-IDS (Connectonst Agent-Based Intruson Detecton System) s a tool that has prevously been descrbed [4], [5] and can be defned as an IDS formed of dfferent software agents [9] that work n unson [6] n order to detect anomalous stuatons by takng full advantage of an unsupervsed connectonst model. To detect anomalous stuatons, CAB-IDS conssts of dfferent knds of agents: Snffer Agent (S-A): ths type of agent "controls" each segment (n whch the network s dvded). IDS Agent (IDS-A): there s only one agent of ths knd, whch s n charge of processng the nformaton sent by S-As and alertng the network admnstrator. The dfferent functons performed by these agents are: 1 st step.- Network Traffc Capture: captures packets travellng over the network segments where S-As are located. 2 nd step.- Data Pre-processng: the captured data s selected, pre-processed and sent to the IDS-A. A set of packets and features contaned n the headers of the captured data s selected from the raw network traffc. 3 rd step.- Data Analyss: once the IDS-A receves the pre-processed data, a connectonst model (see Sect. 2.1) s appled to analyse the data and dentfy anomalous patterns. 4 th step.- Vsualzaton: the proectons are presented to the network admnstrator. 2.1 The Unsupervsed Connectonst Model The data analyss task performed by the IDS-A s based on the use of a neural Exploratory Proecton Pursut (EPP) [10], [11] model called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL) [12], [13], [14]. It was ntally appled n the feld of Artfcal Vson [12], [13] to dentfy local flters n space and tme. In CAB-
3 IDS t s appled n the feld of Computer Network Securty. CMLHL s based on Maxmum Lkelhood Hebban Learnng (MLHL) [15], [16] addng lateral connectons [12], [13] whch have been derved from the Rectfed Gaussan Dstrbuton [17]. The resultant net can fnd the ndependent factors of a data set but does so n a way that captures some type of global orderng n the data set. Consderng an N-dmensonal nput vector ( x ), an M-dmensonal output vector ( y ) and wth W beng the weght (lnkng nput to output ), CMLHL can be expressed [12], [13], [14] as: 1. Feed-forward step: 2. Lateral actvaton passng: 3. Feedback step: 4. Weght change: y y N = W = 1 x,. ( t + ) = [ y (t) + τ( b Ay) ] + 1. (2) e = x M = 1 W y,. p 1 ( e ) e ΔW = η. y. sgn. (4) Where: η s the learnng rate, τ s the "strength" of the lateral connectons, b p a parameter related to the energy functon [13], [15], [16] and A bas parameter, symmetrc matrx used to modfy the response to the data. The effect of ths matrx s based on the relaton between the dstances among the output neurons. (1) (3) the a 3 A Mutaton Testng Model for Numercal Data Sets Testng an IDS tool s the only way to establsh ts effectveness. In order to test CAB-IDS, t was decded to measure ts results confrontng unknown anomalous stuatons. Furthermore, t was decded to compare t alongsde other models such as Prncpal Component Analyss (PCA) [18] or MLHL [10], [11] as no other IDS, as far as the authors are aware, shares smlar characterstcs. It s notceable that few unsupervsed methods have been appled to the feld of IDSs. Examples nclude PCA [1], EPP [4], [5] and Self-Organzng Maps (SOM) [19], [20]. Proectonst models such as PCA, EPP, MLHL or CMLHL have one mportant advantage over SOM n the feld of computer network securty n that they use tme as a key varable when analysng the evoluton of the packets n the traffc data set. Msuse IDSs based on sgnatures rely on models of known attacks. The effectveness of these IDSs depends on the "goodness" of ther models. Ths s to say, f a model of an attack does not cover all the possble modfcatons, the performance of the IDS wll be greatly mpared.
4 Our mutaton testng model s nspred by prevous testng models [8], [21], but ths s the frst one for IDSs based on numercal data sets. In general, a mutaton can be defned as a random change. In keepng wth ths dea, the testng model modfes dfferent features of the numercal nformaton extracted from the packet headers. The modfcatons created by ths model may nvolve changes n aspects such as: attack length (amount of tme that each attack lasts), packet densty (number of packets per tme unt), attack densty (number of attacks per tme unt) and tme ntervals between attacks. The mutatons can also concern both source and destnaton ports, varyng between the dfferent three ranges of TCP/UDP port numbers: well known (from 0 to 1023), regstered (from 1024 to 49151) and dynamc and/or prvate (from to 65535). Tme s another fascnatng ssue of great mportance when consderng ntrusons snce the chance of detectng an attack ncreases n relaton to the duraton of t. There are therefore two man strateges: Drastcally reduce the tme used to perform a scan. Spread the packets out over tme, whch s to say, reduce the number of packets sent per tme unt that are lkely to slp by unnotced. It should be taken nto account and wll be explaned further on that any of the possble mutatons may be meanngless such as a sweep of less than 5 hosts n the case of a network scan. Several tests have been desgned to verfy the performance of CAB-IDS. Each test s related to a data set obtaned by mutatng the orgnal one (see Sect. 4). Changes were made to the traffc related to the sweeps to take the followng ponts nto account: Number of sweeps n the scan (that s, number of scanned ports). Destnaton port numbers at whch sweeps are amed. Tme ntervals when sweeps are performed. Number of packets (densty) formng the sweeps (number of scanned hosts). Takng these ssues nto account, the collecton of data sets desgned for the research (see Sect. 4) covers the maorty of the dfferent scan-related stuatons wth whch a network mght be confronted. Despte the fact that ths technque s unable to provde a formal evaluaton, t represents n our opnon a good approxmaton. 4 Data Sets and Tests It was prevously ndcated that the proposed CAB-IDS [4], [5], [6] s able to dentfy a network scan contaned n a data set wth the followng attrbutes: Three dfferent sweeps to several hosts. Each sweep amed at port numbers 161, 162 and A tme dfference between the frst and the last packet ncluded n each sweep of ms for port number 161, ms for port number 162 and ms for port number An MIB (Management Informaton Base) nformaton transfer event. Ths anomalous stuaton and ts potental rsks are fully descrbed n [4], [5].
5 As prevously explaned, several testng data sets contanng the followng key features were presented to CAB-IDS followng ther mutaton n order to measure the performance of CAB-IDS: Case 1 (modfyng both the amount of sweeps and the destnaton ports): Data set 1.- only one sweep: port Data set 2.- two sweeps: ports 161 and 162. Data set 3.- only one sweep: port Data set 4.- two sweeps: ports 4427 and Case 2 (modfyng both tme and the number of sweeps): Data set 5.- three tme-expanded sweeps: ports 161, 162 and Data set 6.- three tme-contracted sweeps: ports 161, 162 and Data set 7.- one tme-expanded sweep: port Case 3 (modfyng both the amount of packets and the destnaton ports): Data set 8.- two 5-packet sweeps: ports 4427 and Data set 9.- two 30-packet sweeps: ports 1434 and The frst ssue to consder s the amount of sweeps n the scan. Data sets contanng 1 sweep (Data sets 1, 3 and 7), 2 sweeps (Data sets 2, 4, 8 and 9) or 3 sweeps (Data sets 5 and 6) have been used. Each sweep s amed at a dfferent port number. The mplcatons are crystal clear; hackers can check the vulnerablty of as many servces/protocols as they want. The number of sweeps (rangng from 1 to ) can be modfed from one scan to another. A scan attemptng to check port protocol/servce can be amed at any port number (from 0 to 65535). The data sets contan sweeps amed at port numbers such as 161 and 162 (well known ports assgned to Smple Network Management Protocol), 1434 (regstered port assgned to Mcrosoft-SQL-Montor, the target of the W32.SQLExp.Worm), 3750 (regstered port assgned to CBOS/IP ncapsalaton), 4427 and 4439 (regstered ports, as yet unassgned) and (dynamc or prvate port). In order to check our system n relaton to the tme-related strateges, data sets 5, 6 and 7 were used. Data set 5 was obtaned by spreadng the packets contaned n the three dfferent sweeps (161, 162 and 3750) over the captured sesson. In ths data set, there s a tme dfference of ms between the frst (n the sweep amed at port 161) and the last scan packet (n the sweep amed at port 3750). The duraton of the captured sesson (all the packets contaned n the data set) s ms, whereas n the orgnal data set the scan lasts ms. In the case of data set 7, the same mutaton has been performed but only for packets relatng to the sweep amed at port On the other hand, the strategy of reducng the tme was used to obtan data set 6. In ths case, the tme dfference between the frst and the last packet s about ms. Fnally, the number of packets contaned n each sweep was also consdered. In the case of a network scan, each packet means a dfferent host ncluded n the scan. Data sets 8 and 9 were desgned wth ths ssue n mnd. Data set 8 contans low-densty sweeps gven that they have been reduced to only 5 packets. It was decded that a sweep scannng less than 5 hosts should not consttute a network scan. Ths s a fuzzy lower lmt because t could also be set as 4 or 6 packets. On the other hand, data set 9 contans medum-densty sweeps. In ths case, each one of them has been extended to 30 packets. Ths s also a fuzzy upper lmt.
6 Apart from dentfyng the mutated sweeps, the detecton of the MIB nformaton transfer contaned n all the data sets also represented a serous test for the performance of CAB-IDS. The expermental results obtaned for these data sets are shown n the followng secton. 5 Results and Comparson All the results were obtaned by tranng the connectonst model for each new data set. The applcaton of our model to the dfferent scenaros (see Sect. 4) led to the results that are shown n Fgs.1 to 6. Only fgures for the most representatve cases are presented. Through these fgures, t may be seen how CAB-IDS s able to dentfy the dfferent mutated anomalous stuatons, even though some are dentfed wth greater clarty than others. Apart from traffc related to the scan, these fgures also show packets nterrelated wth the rest of the traffc. Stuatons are labelled anomalous whenever they tend not to resemble parallel and smooth drectons (normal stuatons). In Fg. 1 two anomalous stuatons are hghlghted (MIB nformaton transfer and the network scan), both dentfed by CMLHL. As prevously explaned n [4], [5], [6], those stuatons are dentfed by CMLHL as anomalous by takng account of such aspects as traffc densty or "anomalous" traffc drectons. Consderable experence s requred to dentfy the sweep n the case of the proecton for data set 7 (Fg. 2). Conversely, the other anomalous stuaton (the MIB nformaton transfer) s dentfed wth far greater clarty than n any of the other cases. Fg. 1. CMLHL proecton for data set 5 Fg. 2. CMLHL proecton for data set 7 When sweeps contan only 5 packets (Data set 8 Fg. 3), an expert s once agan requred to dentfy the anomalous scan stuatons. On the other hand, CAB-IDS very clearly detects hgh-densty sweeps (Fg. 4).
7 Fg. 3. CMLHL proecton for data set 8 Fg. 4. CMLHL proecton for data set 9 For comparson purposes, we have also appled PCA to the prevous mutated data. As t can be seen n Fg. 5, the best PCA proecton (Factor par 1-3) s capable of dentfyng the 3-sweep scan but t s not capable of dentfyng the MIB nformaton transfer. The proecton of the two frst prncpal components (Factor par 1-2) obtaned by applyng PCA s unable to detect these anomalous stuatons. On the other hand, Fg. 6 shows how CMLHL s capable of dentfyng both stuatons. Fg. 5. PCA proecton for data set 6 Fg. 6. CMLHL proecton for data set 6 6 Conclusons and Future Work Ths paper has ntroduced a novel mutaton testng model for IDSs orented to analyse numercal traffc data sets. It was used to test CAB-IDS and demonstrate ts ablty to dentfy most of the anomalous stuatons t confronted. The dentfcaton of these mutated scans can, n broad terms, be explaned by the generalzaton capablty of the connectonst model appled n ths work. That s to say, through the use of one of these models, the IDS s capable of dentfyng not only the real anomalous stuatons contaned n the data sets (known) but also the mutated (unknown) ones whch may be real. Ths generalzaton capablty of CAB-IDS represents ts man advantage over the maorty of sgnature-based IDSs. Future work wll be based on the applcaton of new learnng rules to mprove CMLHL.
8 Acknowledgments Ths research has been supported by the MCyT proect TIN and the proect BU008B05 of the JCyL. References 1. Goldrng, T.: Scatter (and Other) Plots for Vsualzng User Proflng Data and Network Traffc. ACM Workshop on Vsualzaton and Data Mnng for Computer Securty (2004) Muelder, Ch., Ma, K-L., Bartolett: Interactve Vsualzaton for Network and Port Scan Detecton. 8th Internatonal Symposum on Recent Advances n Intruson Detecton (RAID). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Abdullah, K., Lee, Ch., Cont, G., Copeland, J.A.: Vsualzng Network Data for Intruson Detecton. IEEE Workshop on Informaton Assurance and Securty (2002) Herrero, A., Corchado, E., Sáz, J.M.: Identfcaton of Anomalous SNMP Stuatons Usng a Cooperatve Connectonst Exploratory Proecton Pursut Model. Internatonal Conference on Intellgent Data Engneerng and Automated Learnng (IDEAL). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Corchado, E., Herrero, A., Sáz J.M.: Detectng Compounded Anomalous SNMP Stuatons Usng Unsupervsed Pattern Recognton. Internatonal Conference on Artfcal Neural Networks (ICANN). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Corchado, E., Herrero, A., Sáz, J.M.: A Feature Selecton Agent-Based IDS. Frst European Symposum on Nature-Inspred Smart Informaton Systems (2005) 7. Ranum, M.J.: Experences Benchmarkng Intruson Detecton Systems. NFR Securty (2001) 8. Vgna, G., Robertson, W., Balzarott, D.: Testng Network-Based Intruson Detecton Sgnatures Usng Mutant Explots. ACM Conference on Computer and Communcaton Securty (ACM CCS) (2004) Wooldrdge, M.: Multagent Systems: A Modern Approach to Dstrbuted Artfcal Intellgence, Gerhard Wess (1999) 10.Fredman J., Tukey. J.: A Proecton Pursut Algorthm for Exploratory Data Analyss. IEEE Transacton on Computers, Vol. 23 (1974) Hyvärnen A.: Complexty Pursut: Separatng Interestng Components from Tme Seres. Neural Computaton, Vol. 13(4) (2001) Corchado, E., Han, Y., Fyfe, C.: Structurng Global Responses of Local Flters Usng Lateral Connectons. Journal of Expermental and Theoretcal Artfcal Intellgence, Vol. 15(4) (2003) Corchado, E., Fyfe, C.: Connectonst Technques for the Identfcaton and Suppresson of Interferng Underlyng Factors. Internatonal Journal of Pattern Recognton and Artfcal Intellgence, Vol. 17(8) (2003) Corchado, E., Corchado, J.M., Sáz, L., Lara, A.: Constructng a Global and Integral Model of Busness Management Usng a CBR System. Frst Internatonal Conference on Cooperatve Desgn, Vsualzaton and Engneerng (CDVE). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2004) Corchado, E., MacDonald, D., Fyfe, C.: Maxmum and Mnmum Lkelhood Hebban Learnng for Exploratory Proecton Pursut. Data Mnng and Knowledge Dscovery, Vol. 8(3), Kluwer Academc Publshng (2004) Fyfe, C., Corchado, E.: Maxmum Lkelhood Hebban Rules. European Symposum on Artfcal Neural Networks (2002) Seung, H.S., Socc, N.D., Lee, D.: The Rectfed Gaussan Dstrbuton. Advances n Neural Informaton Processng Systems, Vol. 10 (1998) Oa, E.: Neural Networks, Prncpal Components and Subspaces. Internatonal Journal of Neural Systems, Vol. 1 (1989) Hätönen, K., Höglund, A., Sorvar, A.: A Computer Host-Based User Anomaly Detecton System Usng the Self-Organzng Map. Internatonal Jont Conference of Neural Networks (2000) Zanero, S., Savares, S.M.: Unsupervsed Learnng Technques for an Intruson Detecton System. ACM Symposum on Appled Computng (2004) Marty, R.: Thor: A Tool to Test Intruson Detecton Systems by Varatons of Attacks. ETH Zurch. Dploma Thess (2002)
A FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
More informationA cooperative connectionist IDS model to identify independent anomalous SNMP situations
A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationPERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW
PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW S. Devaraju 1 and S. Ramakrshnan 2 1 Department of Computer Applcatons, Dr. Mahalngam College of Engneerng and Technology,
More informationCS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationFREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationNegative Selection and Niching by an Artificial Immune System for Network Intrusion Detection
Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.
More information1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac.
The Co-evoluton of Tradng Strateges n A Mult-agent Based Smulated Stock Market Through the Integraton of Indvdual Learnng and Socal Learnng Graham Kendall School of Computer Scence and IT ASAP Research
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationUsing an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics
Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationData Visualization by Pairwise Distortion Minimization
Communcatons n Statstcs, Theory and Methods 34 (6), 005 Data Vsualzaton by Parwse Dstorton Mnmzaton By Marc Sobel, and Longn Jan Lateck* Department of Statstcs and Department of Computer and Informaton
More informationA Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationA neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *
Internatonal Journal of Computatonal Scence 992-6669 (Prnt) 992-6677 (Onlne) Global Informaton Publsher 27, Vol., No., 27-39 A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano,
More informationSemantic Link Analysis for Finding Answer Experts *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG
More informationInvoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow
Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl
More informationSoftware project management with GAs
Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationUsing Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council
Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2)
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More informationA Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationThe Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.
Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationAutomated Network Performance Management and Monitoring via One-class Support Vector Machine
Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths
More informationCONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM
Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationA Fast Incremental Spectral Clustering for Large Data Sets
2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School
More informationFigure 1. Time-based operation of AIDP.
Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK a.nadeem@surrey.ac.u ABSTRACT Moble ad-hoc networs (MANETs)
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationAdaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier
Adaptve Intruson Detecton based on Boostng and Naïve Bayesan Classfer Dewan Md. Fard Department of CSE Jahangrnagar Unversty Dhaka-1342, Bangladesh Mohammad Zahdur Rahman Department of CSE Jahangrnagar
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationDetecting Credit Card Fraud using Periodic Features
Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,
More informationNetwork traffic analysis optimization for signature-based intrusion detection systems
Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationEnd-to-end measurements of GPRS-EDGE networks have
End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationQOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
More informationWeb Spam Detection Using Machine Learning in Specific Domain Features
Journal of Informaton Assurance and Securty 3 (2008) 220-229 Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Hassan Najadat 1, Ismal Hmed 2 Department of Computer Informaton Systems Faculty
More informationMaster s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks
Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationA graph-theoretic framework for isolating botnets in a network
SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationCOMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova
Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven
More informationAnts Can Schedule Software Projects
Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,
More informationDistributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationAd-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationDistributing Functionalities in a SOA-Based Multi-agent Architecture
Dstrbutng Functonaltes n a SOA-Based Mult-agent Archtecture Dante I. Tapa, Javer Bajo, and Juan M. Corchado Departamento Informátca y Automátca Unversdad de Salamanca Plaza de la Merced s/n, 37008, Salamanca,
More informationOffline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1)
Internatonal Journal of Sgnal Processng Systems Vol, No June 203 Offlne Verfcaton of Hand Wrtten Sgnature usng Adaptve Resonance Theory Net (Type-) Trtharaj Dash Veer Surendra Sa Unversty of Technology,
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationComplex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationTopic Identification based on Bayesian Belief Networks in the context of an Air Traffic Control Task
Procesamento del Lenguaje Natural, núm. 35 (2005), pp. 327-332 recbdo 06-05-2005; aceptado 01-06-2005 Topc Identfcaton based on Bayesan Belef Networs n the context of an Ar Traffc Control Tas F. Fernández,
More information