Testing CAB-IDS through Mutations: on the Identification of Network Scans

Size: px
Start display at page:

Download "Testing CAB-IDS through Mutations: on the Identification of Network Scans"

Transcription

1 Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, Abstract. Ths study demonstrates the ablty of powerful vsualzaton tools (based on the use of connectonst models) to dentfy network ntruson attempts n an effectve and relable manner. It presents a novel technque to test and evaluate a prevously developed network-based ntruson detecton system (IDS). Ths technque apples mutant operators and s ntended to test IDSs usng numercal data sets. It should be made clear that some mutatons were dscarded as they dd not all provde real lfe stuatons. As an applcaton example of the proposed testng model, t has been specally appled to the dentfcaton of network scans and mutatons of these. The tested Connectonst Agent-Based IDS (CAB-IDS) s used as a method to nvestgate the traffc whch travels along the analysed network, detectng anomalous traffc patterns. The specfc tests performed n ths study were based on the mutaton of one or several varables analysed by CAB-IDS. 1 Introducton Intruson Detecton Systems (IDSs) are tools desgned to montor and analyse computer system or network events n order to detect suspect patterns that may relate to a network or system attack. An IDS that analyses packets travellng over an entre network s referred to as a network-based IDS. Vsualzaton technques are startng to be appled n the feld of IDSs [1], [2], [3], [4], [5], [6] and they are generally appled to numerc data. However, n the feld of Computer Securty, traffc data sets normally have a categorcal and/or textual nature and ther converson nto a data type to whch vsualzaton technques (such as scatter plot or proectonst models) may be appled s not always obvous. Prevous attempts are presented n [1], [4], [5], [6]. IDS evaluaton s not a clear cut task [7]. Prevous works have presented several technques to test and evaluate msuse detecton models for network-based IDSs. Some of these technques were based [8] on a mechansm that generates a large number of varatons on a known explot by applyng mutant operators to ts template. In ths study, a method s proposed to apply such a mutaton technque for vsualzaton technques usng numercal data sets. In ths case, the method s used to analyse the response of CAB-IDS (Connectonst Agent-Based IDS) [4], [5], [6] n the detecton of a network scan. The ablty to detect such scans can help to dentfy wder and potentally more dangerous threats to a

2 network. The man advantage of ths testng model s that t allows analyss of IDSs based on numercal data sets. A port scan may be defned as seres of messages sent to dfferent port numbers to gan nformaton on ts actvty status. These messages can be sent by an external agent attemptng to access a host to fnd out more about the network servces ths host s provdng. A port scan provdes nformaton on where to probe for weaknesses, for whch reason scannng generally precedes any further ntrusve actvty. Ths work focuses on the dentfcaton of network scans, n whch the same port s the target for a number of computers. A network scan s one of the most common technques used to dentfy servces that mght then be accessed wthout permsson [3]. The prncpal research nterest and novelty of ths work les n the development of a testng method. The man goal of ths method s to prove the effectveness and capablty of any IDS based on numercal data to confront unknown attacks. In ths partcular study t has been used to test CAB-IDS. 2 CAB-IDS CAB-IDS (Connectonst Agent-Based Intruson Detecton System) s a tool that has prevously been descrbed [4], [5] and can be defned as an IDS formed of dfferent software agents [9] that work n unson [6] n order to detect anomalous stuatons by takng full advantage of an unsupervsed connectonst model. To detect anomalous stuatons, CAB-IDS conssts of dfferent knds of agents: Snffer Agent (S-A): ths type of agent "controls" each segment (n whch the network s dvded). IDS Agent (IDS-A): there s only one agent of ths knd, whch s n charge of processng the nformaton sent by S-As and alertng the network admnstrator. The dfferent functons performed by these agents are: 1 st step.- Network Traffc Capture: captures packets travellng over the network segments where S-As are located. 2 nd step.- Data Pre-processng: the captured data s selected, pre-processed and sent to the IDS-A. A set of packets and features contaned n the headers of the captured data s selected from the raw network traffc. 3 rd step.- Data Analyss: once the IDS-A receves the pre-processed data, a connectonst model (see Sect. 2.1) s appled to analyse the data and dentfy anomalous patterns. 4 th step.- Vsualzaton: the proectons are presented to the network admnstrator. 2.1 The Unsupervsed Connectonst Model The data analyss task performed by the IDS-A s based on the use of a neural Exploratory Proecton Pursut (EPP) [10], [11] model called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL) [12], [13], [14]. It was ntally appled n the feld of Artfcal Vson [12], [13] to dentfy local flters n space and tme. In CAB-

3 IDS t s appled n the feld of Computer Network Securty. CMLHL s based on Maxmum Lkelhood Hebban Learnng (MLHL) [15], [16] addng lateral connectons [12], [13] whch have been derved from the Rectfed Gaussan Dstrbuton [17]. The resultant net can fnd the ndependent factors of a data set but does so n a way that captures some type of global orderng n the data set. Consderng an N-dmensonal nput vector ( x ), an M-dmensonal output vector ( y ) and wth W beng the weght (lnkng nput to output ), CMLHL can be expressed [12], [13], [14] as: 1. Feed-forward step: 2. Lateral actvaton passng: 3. Feedback step: 4. Weght change: y y N = W = 1 x,. ( t + ) = [ y (t) + τ( b Ay) ] + 1. (2) e = x M = 1 W y,. p 1 ( e ) e ΔW = η. y. sgn. (4) Where: η s the learnng rate, τ s the "strength" of the lateral connectons, b p a parameter related to the energy functon [13], [15], [16] and A bas parameter, symmetrc matrx used to modfy the response to the data. The effect of ths matrx s based on the relaton between the dstances among the output neurons. (1) (3) the a 3 A Mutaton Testng Model for Numercal Data Sets Testng an IDS tool s the only way to establsh ts effectveness. In order to test CAB-IDS, t was decded to measure ts results confrontng unknown anomalous stuatons. Furthermore, t was decded to compare t alongsde other models such as Prncpal Component Analyss (PCA) [18] or MLHL [10], [11] as no other IDS, as far as the authors are aware, shares smlar characterstcs. It s notceable that few unsupervsed methods have been appled to the feld of IDSs. Examples nclude PCA [1], EPP [4], [5] and Self-Organzng Maps (SOM) [19], [20]. Proectonst models such as PCA, EPP, MLHL or CMLHL have one mportant advantage over SOM n the feld of computer network securty n that they use tme as a key varable when analysng the evoluton of the packets n the traffc data set. Msuse IDSs based on sgnatures rely on models of known attacks. The effectveness of these IDSs depends on the "goodness" of ther models. Ths s to say, f a model of an attack does not cover all the possble modfcatons, the performance of the IDS wll be greatly mpared.

4 Our mutaton testng model s nspred by prevous testng models [8], [21], but ths s the frst one for IDSs based on numercal data sets. In general, a mutaton can be defned as a random change. In keepng wth ths dea, the testng model modfes dfferent features of the numercal nformaton extracted from the packet headers. The modfcatons created by ths model may nvolve changes n aspects such as: attack length (amount of tme that each attack lasts), packet densty (number of packets per tme unt), attack densty (number of attacks per tme unt) and tme ntervals between attacks. The mutatons can also concern both source and destnaton ports, varyng between the dfferent three ranges of TCP/UDP port numbers: well known (from 0 to 1023), regstered (from 1024 to 49151) and dynamc and/or prvate (from to 65535). Tme s another fascnatng ssue of great mportance when consderng ntrusons snce the chance of detectng an attack ncreases n relaton to the duraton of t. There are therefore two man strateges: Drastcally reduce the tme used to perform a scan. Spread the packets out over tme, whch s to say, reduce the number of packets sent per tme unt that are lkely to slp by unnotced. It should be taken nto account and wll be explaned further on that any of the possble mutatons may be meanngless such as a sweep of less than 5 hosts n the case of a network scan. Several tests have been desgned to verfy the performance of CAB-IDS. Each test s related to a data set obtaned by mutatng the orgnal one (see Sect. 4). Changes were made to the traffc related to the sweeps to take the followng ponts nto account: Number of sweeps n the scan (that s, number of scanned ports). Destnaton port numbers at whch sweeps are amed. Tme ntervals when sweeps are performed. Number of packets (densty) formng the sweeps (number of scanned hosts). Takng these ssues nto account, the collecton of data sets desgned for the research (see Sect. 4) covers the maorty of the dfferent scan-related stuatons wth whch a network mght be confronted. Despte the fact that ths technque s unable to provde a formal evaluaton, t represents n our opnon a good approxmaton. 4 Data Sets and Tests It was prevously ndcated that the proposed CAB-IDS [4], [5], [6] s able to dentfy a network scan contaned n a data set wth the followng attrbutes: Three dfferent sweeps to several hosts. Each sweep amed at port numbers 161, 162 and A tme dfference between the frst and the last packet ncluded n each sweep of ms for port number 161, ms for port number 162 and ms for port number An MIB (Management Informaton Base) nformaton transfer event. Ths anomalous stuaton and ts potental rsks are fully descrbed n [4], [5].

5 As prevously explaned, several testng data sets contanng the followng key features were presented to CAB-IDS followng ther mutaton n order to measure the performance of CAB-IDS: Case 1 (modfyng both the amount of sweeps and the destnaton ports): Data set 1.- only one sweep: port Data set 2.- two sweeps: ports 161 and 162. Data set 3.- only one sweep: port Data set 4.- two sweeps: ports 4427 and Case 2 (modfyng both tme and the number of sweeps): Data set 5.- three tme-expanded sweeps: ports 161, 162 and Data set 6.- three tme-contracted sweeps: ports 161, 162 and Data set 7.- one tme-expanded sweep: port Case 3 (modfyng both the amount of packets and the destnaton ports): Data set 8.- two 5-packet sweeps: ports 4427 and Data set 9.- two 30-packet sweeps: ports 1434 and The frst ssue to consder s the amount of sweeps n the scan. Data sets contanng 1 sweep (Data sets 1, 3 and 7), 2 sweeps (Data sets 2, 4, 8 and 9) or 3 sweeps (Data sets 5 and 6) have been used. Each sweep s amed at a dfferent port number. The mplcatons are crystal clear; hackers can check the vulnerablty of as many servces/protocols as they want. The number of sweeps (rangng from 1 to ) can be modfed from one scan to another. A scan attemptng to check port protocol/servce can be amed at any port number (from 0 to 65535). The data sets contan sweeps amed at port numbers such as 161 and 162 (well known ports assgned to Smple Network Management Protocol), 1434 (regstered port assgned to Mcrosoft-SQL-Montor, the target of the W32.SQLExp.Worm), 3750 (regstered port assgned to CBOS/IP ncapsalaton), 4427 and 4439 (regstered ports, as yet unassgned) and (dynamc or prvate port). In order to check our system n relaton to the tme-related strateges, data sets 5, 6 and 7 were used. Data set 5 was obtaned by spreadng the packets contaned n the three dfferent sweeps (161, 162 and 3750) over the captured sesson. In ths data set, there s a tme dfference of ms between the frst (n the sweep amed at port 161) and the last scan packet (n the sweep amed at port 3750). The duraton of the captured sesson (all the packets contaned n the data set) s ms, whereas n the orgnal data set the scan lasts ms. In the case of data set 7, the same mutaton has been performed but only for packets relatng to the sweep amed at port On the other hand, the strategy of reducng the tme was used to obtan data set 6. In ths case, the tme dfference between the frst and the last packet s about ms. Fnally, the number of packets contaned n each sweep was also consdered. In the case of a network scan, each packet means a dfferent host ncluded n the scan. Data sets 8 and 9 were desgned wth ths ssue n mnd. Data set 8 contans low-densty sweeps gven that they have been reduced to only 5 packets. It was decded that a sweep scannng less than 5 hosts should not consttute a network scan. Ths s a fuzzy lower lmt because t could also be set as 4 or 6 packets. On the other hand, data set 9 contans medum-densty sweeps. In ths case, each one of them has been extended to 30 packets. Ths s also a fuzzy upper lmt.

6 Apart from dentfyng the mutated sweeps, the detecton of the MIB nformaton transfer contaned n all the data sets also represented a serous test for the performance of CAB-IDS. The expermental results obtaned for these data sets are shown n the followng secton. 5 Results and Comparson All the results were obtaned by tranng the connectonst model for each new data set. The applcaton of our model to the dfferent scenaros (see Sect. 4) led to the results that are shown n Fgs.1 to 6. Only fgures for the most representatve cases are presented. Through these fgures, t may be seen how CAB-IDS s able to dentfy the dfferent mutated anomalous stuatons, even though some are dentfed wth greater clarty than others. Apart from traffc related to the scan, these fgures also show packets nterrelated wth the rest of the traffc. Stuatons are labelled anomalous whenever they tend not to resemble parallel and smooth drectons (normal stuatons). In Fg. 1 two anomalous stuatons are hghlghted (MIB nformaton transfer and the network scan), both dentfed by CMLHL. As prevously explaned n [4], [5], [6], those stuatons are dentfed by CMLHL as anomalous by takng account of such aspects as traffc densty or "anomalous" traffc drectons. Consderable experence s requred to dentfy the sweep n the case of the proecton for data set 7 (Fg. 2). Conversely, the other anomalous stuaton (the MIB nformaton transfer) s dentfed wth far greater clarty than n any of the other cases. Fg. 1. CMLHL proecton for data set 5 Fg. 2. CMLHL proecton for data set 7 When sweeps contan only 5 packets (Data set 8 Fg. 3), an expert s once agan requred to dentfy the anomalous scan stuatons. On the other hand, CAB-IDS very clearly detects hgh-densty sweeps (Fg. 4).

7 Fg. 3. CMLHL proecton for data set 8 Fg. 4. CMLHL proecton for data set 9 For comparson purposes, we have also appled PCA to the prevous mutated data. As t can be seen n Fg. 5, the best PCA proecton (Factor par 1-3) s capable of dentfyng the 3-sweep scan but t s not capable of dentfyng the MIB nformaton transfer. The proecton of the two frst prncpal components (Factor par 1-2) obtaned by applyng PCA s unable to detect these anomalous stuatons. On the other hand, Fg. 6 shows how CMLHL s capable of dentfyng both stuatons. Fg. 5. PCA proecton for data set 6 Fg. 6. CMLHL proecton for data set 6 6 Conclusons and Future Work Ths paper has ntroduced a novel mutaton testng model for IDSs orented to analyse numercal traffc data sets. It was used to test CAB-IDS and demonstrate ts ablty to dentfy most of the anomalous stuatons t confronted. The dentfcaton of these mutated scans can, n broad terms, be explaned by the generalzaton capablty of the connectonst model appled n ths work. That s to say, through the use of one of these models, the IDS s capable of dentfyng not only the real anomalous stuatons contaned n the data sets (known) but also the mutated (unknown) ones whch may be real. Ths generalzaton capablty of CAB-IDS represents ts man advantage over the maorty of sgnature-based IDSs. Future work wll be based on the applcaton of new learnng rules to mprove CMLHL.

8 Acknowledgments Ths research has been supported by the MCyT proect TIN and the proect BU008B05 of the JCyL. References 1. Goldrng, T.: Scatter (and Other) Plots for Vsualzng User Proflng Data and Network Traffc. ACM Workshop on Vsualzaton and Data Mnng for Computer Securty (2004) Muelder, Ch., Ma, K-L., Bartolett: Interactve Vsualzaton for Network and Port Scan Detecton. 8th Internatonal Symposum on Recent Advances n Intruson Detecton (RAID). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Abdullah, K., Lee, Ch., Cont, G., Copeland, J.A.: Vsualzng Network Data for Intruson Detecton. IEEE Workshop on Informaton Assurance and Securty (2002) Herrero, A., Corchado, E., Sáz, J.M.: Identfcaton of Anomalous SNMP Stuatons Usng a Cooperatve Connectonst Exploratory Proecton Pursut Model. Internatonal Conference on Intellgent Data Engneerng and Automated Learnng (IDEAL). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Corchado, E., Herrero, A., Sáz J.M.: Detectng Compounded Anomalous SNMP Stuatons Usng Unsupervsed Pattern Recognton. Internatonal Conference on Artfcal Neural Networks (ICANN). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2005) Corchado, E., Herrero, A., Sáz, J.M.: A Feature Selecton Agent-Based IDS. Frst European Symposum on Nature-Inspred Smart Informaton Systems (2005) 7. Ranum, M.J.: Experences Benchmarkng Intruson Detecton Systems. NFR Securty (2001) 8. Vgna, G., Robertson, W., Balzarott, D.: Testng Network-Based Intruson Detecton Sgnatures Usng Mutant Explots. ACM Conference on Computer and Communcaton Securty (ACM CCS) (2004) Wooldrdge, M.: Multagent Systems: A Modern Approach to Dstrbuted Artfcal Intellgence, Gerhard Wess (1999) 10.Fredman J., Tukey. J.: A Proecton Pursut Algorthm for Exploratory Data Analyss. IEEE Transacton on Computers, Vol. 23 (1974) Hyvärnen A.: Complexty Pursut: Separatng Interestng Components from Tme Seres. Neural Computaton, Vol. 13(4) (2001) Corchado, E., Han, Y., Fyfe, C.: Structurng Global Responses of Local Flters Usng Lateral Connectons. Journal of Expermental and Theoretcal Artfcal Intellgence, Vol. 15(4) (2003) Corchado, E., Fyfe, C.: Connectonst Technques for the Identfcaton and Suppresson of Interferng Underlyng Factors. Internatonal Journal of Pattern Recognton and Artfcal Intellgence, Vol. 17(8) (2003) Corchado, E., Corchado, J.M., Sáz, L., Lara, A.: Constructng a Global and Integral Model of Busness Management Usng a CBR System. Frst Internatonal Conference on Cooperatve Desgn, Vsualzaton and Engneerng (CDVE). Lecture Notes n Computer Scence, Vol Sprnger-Verlag, Berln Hedelberg New York (2004) Corchado, E., MacDonald, D., Fyfe, C.: Maxmum and Mnmum Lkelhood Hebban Learnng for Exploratory Proecton Pursut. Data Mnng and Knowledge Dscovery, Vol. 8(3), Kluwer Academc Publshng (2004) Fyfe, C., Corchado, E.: Maxmum Lkelhood Hebban Rules. European Symposum on Artfcal Neural Networks (2002) Seung, H.S., Socc, N.D., Lee, D.: The Rectfed Gaussan Dstrbuton. Advances n Neural Informaton Processng Systems, Vol. 10 (1998) Oa, E.: Neural Networks, Prncpal Components and Subspaces. Internatonal Journal of Neural Systems, Vol. 1 (1989) Hätönen, K., Höglund, A., Sorvar, A.: A Computer Host-Based User Anomaly Detecton System Usng the Self-Organzng Map. Internatonal Jont Conference of Neural Networks (2000) Zanero, S., Savares, S.M.: Unsupervsed Learnng Technques for an Intruson Detecton System. ACM Symposum on Appled Computng (2004) Marty, R.: Thor: A Tool to Test Intruson Detecton Systems by Varatons of Attacks. ETH Zurch. Dploma Thess (2002)

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW

PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES A REVIEW S. Devaraju 1 and S. Ramakrshnan 2 1 Department of Computer Applcatons, Dr. Mahalngam College of Engneerng and Technology,

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac.

1. Introduction. Graham Kendall School of Computer Science and IT ASAP Research Group University of Nottingham Nottingham, NG8 1BB gxk@cs.nott.ac. The Co-evoluton of Tradng Strateges n A Mult-agent Based Smulated Stock Market Through the Integraton of Indvdual Learnng and Socal Learnng Graham Kendall School of Computer Scence and IT ASAP Research

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Data Visualization by Pairwise Distortion Minimization

Data Visualization by Pairwise Distortion Minimization Communcatons n Statstcs, Theory and Methods 34 (6), 005 Data Vsualzaton by Parwse Dstorton Mnmzaton By Marc Sobel, and Longn Jan Lateck* Department of Statstcs and Department of Computer and Informaton

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello *

A neuro-fuzzy collaborative filtering approach for Web recommendation. G. Castellano, A. M. Fanelli, and M. A. Torsello * Internatonal Journal of Computatonal Scence 992-6669 (Prnt) 992-6677 (Onlne) Global Informaton Publsher 27, Vol., No., 27-39 A neuro-fuzzy collaboratve flterng approach for Web recommendaton G. Castellano,

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2)

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Figure 1. Time-based operation of AIDP.

Figure 1. Time-based operation of AIDP. Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK a.nadeem@surrey.ac.u ABSTRACT Moble ad-hoc networs (MANETs)

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier

Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier Adaptve Intruson Detecton based on Boostng and Naïve Bayesan Classfer Dewan Md. Fard Department of CSE Jahangrnagar Unversty Dhaka-1342, Bangladesh Mohammad Zahdur Rahman Department of CSE Jahangrnagar

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Detecting Credit Card Fraud using Periodic Features

Detecting Credit Card Fraud using Periodic Features Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,

More information

Network traffic analysis optimization for signature-based intrusion detection systems

Network traffic analysis optimization for signature-based intrusion detection systems Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Web Spam Detection Using Machine Learning in Specific Domain Features

Web Spam Detection Using Machine Learning in Specific Domain Features Journal of Informaton Assurance and Securty 3 (2008) 220-229 Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Hassan Najadat 1, Ismal Hmed 2 Department of Computer Informaton Systems Faculty

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A graph-theoretic framework for isolating botnets in a network

A graph-theoretic framework for isolating botnets in a network SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Distributing Functionalities in a SOA-Based Multi-agent Architecture

Distributing Functionalities in a SOA-Based Multi-agent Architecture Dstrbutng Functonaltes n a SOA-Based Mult-agent Archtecture Dante I. Tapa, Javer Bajo, and Juan M. Corchado Departamento Informátca y Automátca Unversdad de Salamanca Plaza de la Merced s/n, 37008, Salamanca,

More information

Offline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1)

Offline Verification of Hand Written Signature using Adaptive Resonance Theory Net (Type-1) Internatonal Journal of Sgnal Processng Systems Vol, No June 203 Offlne Verfcaton of Hand Wrtten Sgnature usng Adaptve Resonance Theory Net (Type-) Trtharaj Dash Veer Surendra Sa Unversty of Technology,

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Topic Identification based on Bayesian Belief Networks in the context of an Air Traffic Control Task

Topic Identification based on Bayesian Belief Networks in the context of an Air Traffic Control Task Procesamento del Lenguaje Natural, núm. 35 (2005), pp. 327-332 recbdo 06-05-2005; aceptado 01-06-2005 Topc Identfcaton based on Bayesan Belef Networs n the context of an Ar Traffc Control Tas F. Fernández,

More information