The Impact of Feature Selection on Web Spam Detection

Size: px
Start display at page:

Download "The Impact of Feature Selection on Web Spam Detection"

Transcription

1 I.J. Itelliget Systems ad Applicatios, 2012, 9, Published Olie August 2012 i MECS ( DOI: /ijisa The Impact of Feature Selectio o Web Spam Detectio Jaber Karimpour Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira karimpour@tabrizu.ac.ir Ali A. Noroozi Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira aliasghar.oroozi@gmail.com Adeleh Abadi Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira adeleh.abadi@gmail.com Abstract Search egie is oe of the most importat tools for maagig the massive amout of distributed web cotet. Web spammig tries to deceive search egies to rak some pages higher tha they deserve. May methods have bee proposed to combat web spammig ad to detect spam pages. Oe basic oe is usig classificatio, i.e., learig a classificatio model for classifyig web pages to spam or o-spam. This work tries to select the best feature set for classificatio of web spam usig imperialist competitive algorithm ad geetic algorithm. Imperialist competitive algorithm is a ovel optimizatio algorithm that is ispired by socio-political process of imperialism i the real world. Experimets are carried out o WEBSPAM- UK2007 data set, which show feature selectio improves classificatio accuracy, ad imperialist competitive algorithm outperforms GA. Idex Terms Web Spam Detectio, Feature Selectio, Imperialistic Competitive Algorithm, Geetic Algorithm I. Itroductio With the explosive growth of iformatio o the web, it has become the most successful ad giat distributed computig applicatio today. Billios of web pages are shared by millios of orgaizatios, uiversities, researchers, etc. Web search provides great fuctioality for distributig, sharig, orgaizig, ad retrievig the growig amout of iformatio [1]. Search egies have become more ad more importat ad are used by millios of people to fid ecessary iformatio. It has become very importat for a web page, to be raked high i the importat search egies results. As a result may techiques are proposed to ifluece rakig ad improve the rak of a page. Some of these techiques are legal ad are called Search Egie Optimizatio (SEO) techiques, but some are ot legal or ethical ad try to deceive rakig algorithms. These spam pages try to rak pages higher tha they deserve [2]. Web spam refers to web cotet that get high rak i search egie results despite low iformatio value. Spammig ot oly misleads users, but also imposes time ad space cost to search egie crawlers ad idexers. That is why crawlers try to detect web spam pages to avoid processig ad idexig them. Cotet-based spammig methods basically tailor the cotets of the text fields i HTML pages to make spam pages more relevat to some queries. This kid of spammig is also called term spammig. There are two mai cotet spammig techiques, which simply create sythetic cotets cotaiig spam terms: repeatig some importat terms ad dumpig may urelated terms [3,4]. Lik spammig misuses lik structure of the web to spam pages. There are two mai kids of lik spammig. Out-lik spammig tries to boost the hub score of a page by addig out-liks i it poitig to some authoritative pages. Oe of the commo techiques of this kid of spammig is directory cloig, i.e., replicatig a large portio of a directory like Yahoo! i the spam page. I-lik spammig refers to persuadig other pages, especially authoritative oes, to poit to the spam page. I order to do this, a spammer might adopt these strategies: creatig a hoey pot, ifiltratig a web directory, postig liks o usergeerated cotet, participatig i lik exchage, buyig expired domais, ad creatig ow spam farm [2]. Hidig techiques are also used by spammers who wat to coceal or to hide the spammig seteces, terms, ad liks so that web users do ot see those [3]. Cotet hidig is used to make spam items ivisible. Oe simple method is to make the spam terms the same color as the page backgroud color. I cloakig, spam Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

2 62 The Impact of Feature Selectio o Web Spam Detectio web servers retur a HTML documet to the user ad a differet documet to a web crawler. I redirectig, a spammer ca hide the spammed page by automatically redirectig the browser to aother URL as soo as the page is loaded. I two latter techiques, the spammer ca preset the user with the iteded cotet ad the search egie with spam cotet [5]. Various methods have bee proposed to combat web spammig ad to detect spam pages. Oe importat ad basic type of methods is cosiderig web spam detectio as a biary classificatio problem [4]. I this kid of methods, some web pages are collected as traiig data ad labeled as spam or o-spam by a expert. The, a classifier model is leared from the traiig data. Oe ca use ay supervised learig algorithm to build this model. Further, the model is used to classify ay web page to spam or o-spam. The key issue is to desig features used i learig. Ntoulas et al. [4] propose some cotet-based features to detect cotet spam. Lik-based features are proposed for lik spam detectio [6,7]. Liu et al. [8] propose some user behavior features extracted from access logs of web server of a page. These features depict user behavior patters whe reachig a page (spam or o-spam). These patters are used to separate spam pages from o-spam oes, regardless of spammig techiques used. Erdelyi et al. [9] ivestigate the tradeoff betwee feature geeratio ad spam classificatio accuracy. They coclude that more features achieve better performace; however, the appropriate choice of the machie learig techiques for classificatio is probably more importat tha devisig ew complex features. Feature selectio is the process of fidig a optimal subset of features that cotribute sigificatly to the classificatio. Selectig a small subset of features ca decrease the cost ad the ruig time of a classificatio system. It may also icrease the classificatio accuracy because irrelevat or redudat features are removed [10]. Amog the may methods proposed for feature selectio, evolutioary optimizatio algorithms such as geetic algorithm (GA) have gaied a lot of attetio. Geetic algorithm has bee used as a efficiet feature selectio method i may applicatios [11,16]. I this paper, we icorporate geetic algorithm, ad imperialist competitive algorithm [12] to fid a optimal subset of features of the WEBSPAM-UK2007 data set [13,14]. The selected features are used for classificatio of the WEBSPAM-UK2007 data. The rest of the paper is orgaized as follows. Sectio 2 gives a brief itroductio of the imperialist competitive algorithm (ICA). Sectio 3 describes the feature selectio process by ICA ad GA. Experimetal results are discussed i sectio 4, ad fially, sectio 5 cocludes the paper. II. Imperialistic Competitive Algorithm The imperialist competitive algorithm is ispired by imperialism i the real world [12]. Imperialism is the policy of extedig the power of a coutry beyod its boudaries ad weakeig other coutries to take cotrol of them. Fig. 1 Iitializatio of the empires: The more coloies a imperialist possesses, the bigger is its mark [12] This algorithm starts with a iitial society of radom geerated coutries. Some of the best coutries are selected to be imperialists ad others are selected to be coloies of these imperialists. The power of a empire which is the couterpart of fitess value i geetic algorithms, is the power of the imperialist coutry plus a percetage of mea power of its coloies. Figure 1 depicts the iitializatio of the empires. After assigig all coutries to imperialists, ad formig empires, coloies start movig towards the relevat imperialist (Assimilatio). The, some coutries radomly chage positio i the search space (Revolutio). After assimilatio ad revolutio, a coloy may get a better positio i the search space ad take cotrol the empire (substitutio for the imperialist). Fig. 2 Imperialistic competitio: The weakest coloy of the weakest empire is possessed by other empires [12] The, imperialistic competitio begis. All empires try to take cotrol of the weakest coloy of the weakest empire. This competitio reduces the power of weaker empires ad icreases the power of the powerful oes. Ay empire that caot compete with other empires ad icrease its power or at least prevet decreasig it, will Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

3 The Impact of Feature Selectio o Web Spam Detectio 63 gradually collapse. As a result, after some iteratios, the algorithm coverges ad oly oe imperialist remais ad all other coutries are coloies of it. Figure 2 depicts the imperialistic competitio. The more powerful a empire is, the more likely it will take cotrol of the weakest coloy of the weakest empire. The pseudo code of ICA is as follows: 1. Iitialize the empires 2. Assimilatio: Move the coloies toward their relevat imperialist 3. Revolutio: Radomly chage the characteristics of some coloies 4. Exchage the positio of a coloy ad Imperialist. If a coloy has more power tha that of imperialist, exchage the positios of that coloy ad the imperialist 5. Compute the total power of all empires 6. Imperialistic competitio: Give the weakest coloy from the weakest empire to the empire that has the most likelihood to possess it 7. Elimiate the powerless empires 8. If there is just oe empire, stop, else, go to 2 III. Feature Selectio WEBSPAM-UK2007 data set cotais 96 cotet based features. We use the imperialist competitive ad geetic algorithms to optimize the features that cotribute sigificatly to the classificatio. A. Feature Selectio Usig ICA I this sectio, the steps of feature selectio usig ICA are described. 1) Iitialize the empires I the geetic algorithm, each solutio to a optimizatio problem is a array, called chromosome. I ICA, this array is called coutry. I feature selectio, each coutry is a array of biary umbers. Whe coutry[i] is 1, the i th feature is selected for classificatio, ad whe it is 0, the i th feature is removed [15]. Figure 3 depicts the feature represetatio as a coutry. F F F Coutry F -1 F Feature subset = {F, F,..., F } Fig. 3 Feature represetatio as a coutry i ICA [15] The power of each coutry is calculated by F-score. F-score is a commoly used measure i machie learig ad iformatio retrieval [3,10]. The cofusio matrix of a give a classifier is cosidered as table 1. Table 1. Cofusio Matrix Classified spam Classified o-spam Actual spam A B Actual o-spam C D F-score is determied as follows F-score = 1 / (1 / Recall + 1 / Precisio) (1) Where Recall, ad Precisio are defied as follows Recall = C / (C + D) (2) Precisio = B / (B + D) (3) The algorithm starts by radomly iitializig a populatio of size N. N of the most powerful pop imp coutries are selected as imperialists ad form the empires. The remaiig coutries ( ) are assiged to empires based o the power of each empire. The ormalized power of each imperialist is defied by NP P N imp i 1 P i N Where P is the power of coutry. The iitial umber of coloies of col col empire will be (4) NC roud { NP * N } (5) To assig coloies to empires, is chose radomly ad assiged to coloies alog with the NC of the coloies imperialist. These imperialist will form empire. 2) Assimilatio I this phase, coloies move towards the relevat imperialist. Sice feature selectio is a discrete problem, we use followig operator for assimilatio [15] For each coloy Create a biary strig ad assig a radom geerated biary to each cell Copy the cells of the relevat imperialist, correspodig to the locatio of 1 s i the biary strig, to the same positios i the coloy 3) Revolutio The purpose of revolutio is preservig ad itroducig diversity. It allows the algorithm to avoid local miimum. Revolutio occurs accordig to a user defied revolutio probability. For each coloy, some cells are selected radomly ad their cotaiig biary is iverted ( 1 is iverted to 0, ad 0 is iverted to 1 ). Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

4 64 The Impact of Feature Selectio o Web Spam Detectio 4) Exchage the positios of a coloy ad imperialist After assimilatio ad revolutio, a coloy may gai more power tha that of imperialist. As a result, the best coloy of a empire ad its imperialist exchage positios. The, the algorithm will cotiue by the imperialist i a ew positio. 5) Compute the total power of empires The total power of a empire is maily affected by the power of its imperialist. Aother factor i computig the total power of a empire is the power of coloies of that empire. Of course, the mai power is by the power of the imperialist, ad the power of coloies has less impact. As a result, we defie the total power of empire is defied TP power ( imperialist ) mea{ power ( coloies of empire )} (6) Where is a positive factor which is cosidered to be less tha 1. Decreasig the value of icreases the role of the imperialist i determiig the total power of a empire ad icreasig it will icrease the role of the coloies. 6) Imperialistic Competitio I this importat phase of the algorithm, the empires compete to take cotrol of the weakest coloy of the weakest empire. Each empire has a likelihood of possessig the metioed coloy. The possessio probability of empire is obtaied by P emp TP i 1 N imp TP i (7) As you ca otice, the most powerful empire does ot take possessio of the weakest coloy of the weakest empire, but it will be more likely to possess the metioed coloy. 7) Elimiate the powerless empires Imperialistic competitio causes some empires to lose power ad gradually collapse. Whe a empire loses all its coloies, we assume it is collapsed ad elimiate it. The imperialist of this powerless empire is possessed by other empires as a coloy. 8) Covergece As a result of imperialistic competitio ad elimiatio of powerless empires, the algorithm will coverge to the most powerful empire ad all the coutries will be uder the cotrol of this empire. The imperialist of this empire will determie the optimal subset of features selected for classificatio, because this imperialist is the most powerful of all coutries. B. Feature selectio usig GA I the geetic algorithm, each solutio to the feature selectio problem is a strig of biary umbers, called chromosome. Whe chromosome[i] is 1, the i th feature is selected for classificatio, ad whe it is 0, the i th feature is ot selected [11,16]. The fitess fuctio is cosidered the accuracy of the classificatio model. I this research, we calculate the fitess value of each chromosome by F-score. F-score was described i the previous sectio. The algorithm starts by radomly iitializig a populatio of size N. The, crossover ad mutatio are doe. pop Crossover allows the geeratio of ew chromosomes by combiig curret best chromosomes. To do crossover, sigle poit crossover techique is used, i.e., oe crossover poit is selected, biary strig from begiig of chromosome to the crossover poit is copied from oe paret, the rest is copied from the secod paret. Figure 4 shows how childre are geerated from each pair of chromosomes by crossover. Mutatio is similar to revolutio i ICA. It maitais geetic diversity ad allows the algorithm to avoid local miimum. To do mutatio, i each chromosome, a radom cell is selected ad its cotaiig bit i iverted ( 1 is iverted to 0, ad 0 is iverted to 1 ). Mutatio ad crossover occur accordig to a previously defied mutatio ad crossover probability. Geetic algorithm iterates for some user defied umber of geeratios. Fig. 4 how childre are geerated from parets by crossover [17] IV. Experimetal Results I order to ivestigate the impact of feature selectio o web spam classificatio, WEBSPAM-UK2007 data are used. It is a publicly available web spam data collectio ad is based o a crawl of the.uk domai doe i May 2007 [13, 14]. It icludes 105 millio pages ad over 3 billio liks i hosts. The traiig set cotais 3849 hosts. This data set cotais cotet ad lik based features. I our experimets, we used oly cotet based features because they were eough to meet our purposes. The selected data set cotais 3849 data, with 208 spam ad 3641 o-spam pages. We partitioed this data set to two disjoit sets: traiig data set with 2449 data, ad test data set with 1000 data. After performig feature Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

5 The Impact of Feature Selectio o Web Spam Detectio 65 selectio usig the traiig set, the test set was used to evaluate the selected subset of features. The evaluatio of the overall process was based o weighted f-score which is a suitable measure for the spam classificatio problem. It was also used as the power fuctio i ICA ad fitess fuctio i GA. Bayesia Network, Decisio Tree (C4.5 algorithm), ad Support Vector Machie (SVM) were chose as learig algorithms to perform the classificatio ad calculate the weighted F-score. These algorithms are powerful learig algorithms used i may web spam detectio researches [4, 5, 18]. Followig parameters were used for ICA Number of coutries = 100 Number of imperialists = 10 = 0.1 Revolutio rate = 0.01 Selected parameters for GA are as follows Iitial populatio = 100 Number of geeratios (iteratios) = 100 Crossover rate = 0.6 Mutatio rate = 0.01 Figure 5 depicts maximum ad mea power of all imperialists versus iteratio, usig Decisio Tress, SVM, ad Bayesia Network classifiers, i ICA. As show i this figure, by SVM ad Decisio Tree classifiers, the global maximum of the fuctio (maximum power) is foud i less tha 5 iteratios, while by Bayesia Network, it is foud i 12 th iteratio. Fig. 5 Mea ad maximum power of all imperialists versus iteratio, usig differet classifiers, i ICA Figures 6, ad 7 compare ICA power fuctio ad GA fitess fuctio versus iteratio. Figure 6 shows the power (fitess) of best aswer versus iteratio (geeratio), usig Bayesia Network classifier, i ICA ad GA. As you ca see, ICA coverges faster tha GA, ad has more power tha GA i all iteratios. Aother importat poit is that the iitial value of f-score which is the result of radom iitializatio of populatio i both algorithms, gets a higher icrease by ICA over iteratios. This poit shows that imperialistic competitio outperforms geetic evolutio i the problem of spam classificatio. Fig. 6 Power (fitess) of best aswer versus iteratio, usig Bayesia Network classifier Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

6 66 The Impact of Feature Selectio o Web Spam Detectio Fig. 7 Mea power (fitess) of all aswers versus iteratio, usig Bayesia Network classifier Figure 7 depicts mea power (fitess) of all aswers versus iteratio, usig Bayesia Network classifier, i ICA ad GA. As you ca see, ICA gets a higher icrease i mea power of all aswers. The optimal subset of features selected by ICA ad GA are used to trai a classificatio model. This model is evaluated by the test data set. Evaluatio results obtaied for Bayesia Network, Decisio Tree, ad SVM classifiers are show i table 2. These results idicate that feature selectio by both ICA ad GA techiques improves web spam classificatio. Furthermore, ICA based feature selectio outperforms GA based feature selectio i the problem of web spam detectio. Table 2 The impact of ICA ad GA based feature selectio o web spam classificatio, usig differet classifiers Bayesia Network Decisio Tress SVM Number of features F-score Number of features F-score Number of features F-score All features GA ICA V. Coclusio I this paper, we studied the impact of feature selectio o the problem of web spam classificatio. Feature selectio was performed by Imperialist Competitive Algorithm ad Geetic Algorithm. Experimetal results showed that selectig a optimal subset of features icreases classificatio accuracy, but ICA could fid better optimal aswers tha GA. I fact, we observed that reducig the umber of features decreases the classificatio cost ad icreases the classificatio accuracy. Other optimizatio methods, such as PSO ad at coloy ca be used for feature selectio ad compared with ICA ad GA i future works. Refereces [1] Caverlee J, Liu L, Webb S. A Parameterized Approach to Spam-Resiliet Lik Aalysis of the Web. IEEE Trasactios o Parallel ad Distributed Systems (TPDS), 2009, 20: [2] Gyogyi Z,Garcia-Molia H. Web spam taxoomy. I: First iteratioalworkshop o adversarial iformatio retrieval o the web (AIRWeb 05), Japa, [3] Liu B. Web Data Miig, Explorig Hyperliks, Cotets, ad Usage Data. Spriger, [4] Ntoulas A, Najork M, Maasse M, et al. Detectig Spam Web Pages through Cotet Aalysis. I Proc. of the 15th Itl. World Wide Web Coferece (WWW 06), [5] Wag W, Zeg G, Tag D. Usig evidece based cotet trust model for spam detectio. Expert Systems with Applicatios, (8): [6] Becchetti L, Castillo C, Doato D, et al. Lik-based characterizatio ad detectio of Web Spam. I Proc. Of 2d It. Workshop o Adversarial Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

7 The Impact of Feature Selectio o Web Spam Detectio 67 Iformatio Retrieval o the Web (AIRWeb 06), Seattle, WA, [7] Castillo C, Doato D, Giois A, et al. Kow your eighbors: Web spam detectio usig the web topology. I Proc. Of 30th Au. It. ACM SIGIR Cof. Research ad Developmet i Iformatio Retrieval (SIGIR 07), New York, [8] Liu Y, Ce R, Zhag M, et al. Idetifyig web spam with user behavior aalysis. I Proc. Of 4th It. Workshop o Adversarial Iformatio Retrieval o the Web (AIRWeb 08), Chia, [9] Erdelyi M, Garzo A, Beczur A A. Web spam classificatio: a few features worth more. I Proceedigs of the 2011 Joit WICOW/AIRWeb Workshop o Web Quality2011, Idia, [10] Ha J, Kaber M, Pei J. Data Miig, Cocepts ad Techiques. 3 rd ed, Morga Kaufma, [11] Vafaie H, De Jog K. Geetic algorithms as a tool for feature selectio i machie learig. I Proceedigs of Fourth Iteratioal Coferece o Tools with Artificial Itelligece (TAI '92), [12] Atashpaz-Gargari E, Lucas C. Imperialist competitive algorithm: A algorithm for optimizatio ispired by imperialistic competitio. IEEE Cogress o Evolutioary Computatio (CEC 2007), [13] Castillo C, Doato D, Becchetti L, et al. A referece collectio for webspam. SIGIR Forum, 2006, 40(2): [14] Yahoo Research. Web Spam Collectios. [cited 2011 May], Available from: ets/, 2007 [15] Mousavi Rad S J, Mollazade K, Akhlagia Tab F. Applicatio of Imperialist Competitive Algorithm for Feature Selectio: A Case Study o Bulk Rice Classificatio. Iteratioal Joural of Computer Applicatios, (16):41-48 [16] Yag J, Hoavar V. Feature subset selectio usig a geetic algorithm. Itelliget Systems ad their Applicatios, IEEE, (2): [17] Eibe A E, Smith J E. Itroductio to Evolutioary Computig, Spriger, [18] Araujo L, Martiez-Romo J. Web Spam Detectio: New Classificatio Features Based o Qualified Lik Aalysis ad Laguage Models. IEEE Trasactios o Iformatio Foresics ad Security, (3): KARIMPOUR Jaber ( ), male, Tabriz, Ira, Assistat Professor, his research directios iclude verificatio ad formal methods. NOROOZI Ali A. (1986-), male, Tabriz, Ira, Master of Sciece, his research directios iclude adversarial iformatio retrieval ad distributed systems. ABADI Adeleh ( ) female, Tabriz, Ira, Master of Sciece, his research directios iclude verificatio ad formal methods. Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Spam Detection. A Bayesian approach to filtering spam

Spam Detection. A Bayesian approach to filtering spam Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it

More information

Locating Performance Monitoring Mobile Agents in Scalable Active Networks

Locating Performance Monitoring Mobile Agents in Scalable Active Networks Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira a_haddad@itrc.ac.ir, {dehgha,

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony , March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat

More information

Research Article Crude Oil Price Prediction Based on a Dynamic Correcting Support Vector Regression Machine

Research Article Crude Oil Price Prediction Based on a Dynamic Correcting Support Vector Regression Machine Abstract ad Applied Aalysis Volume 2013, Article ID 528678, 7 pages http://dx.doi.org/10.1155/2013/528678 Research Article Crude Oil Price Predictio Based o a Dyamic Correctig Support Vector Regressio

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

A model of Virtual Resource Scheduling in Cloud Computing and Its

A model of Virtual Resource Scheduling in Cloud Computing and Its A model of Virtual Resource Schedulig i Cloud Computig ad Its Solutio usig EDAs 1 Jiafeg Zhao, 2 Wehua Zeg, 3 Miu Liu, 4 Guagmig Li 1, First Author, 3 Cogitive Sciece Departmet, Xiame Uiversity, Xiame,

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 247 Heterogeeous Vehicle Routig Problem with profits Dyamic

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Volatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina

Volatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina Overcomig the Crisis: Ecoomic ad Fiacial Developmets i Asia ad Europe Edited by Štefa Bojec, Josef C. Brada, ad Masaaki Kuboiwa http://www.hippocampus.si/isbn/978-961-6832-32-8/cotets.pdf Volatility of

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

A Constant-Factor Approximation Algorithm for the Link Building Problem

A Constant-Factor Approximation Algorithm for the Link Building Problem A Costat-Factor Approximatio Algorithm for the Lik Buildig Problem Marti Olse 1, Aastasios Viglas 2, ad Ilia Zvedeiouk 2 1 Ceter for Iovatio ad Busiess Developmet, Istitute of Busiess ad Techology, Aarhus

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Research Article Heuristic-Based Firefly Algorithm for Bound Constrained Nonlinear Binary Optimization

Research Article Heuristic-Based Firefly Algorithm for Bound Constrained Nonlinear Binary Optimization Advaces i Operatios Research, Article ID 215182, 12 pages http://dx.doi.org/10.1155/2014/215182 Research Article Heuristic-Based Firefly Algorithm for Boud Costraied Noliear Biary Optimizatio M. Ferada

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

I. Why is there a time value to money (TVM)?

I. Why is there a time value to money (TVM)? Itroductio to the Time Value of Moey Lecture Outlie I. Why is there the cocept of time value? II. Sigle cash flows over multiple periods III. Groups of cash flows IV. Warigs o doig time value calculatios

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Pattern Synthesis Using Real Coded Genetic Algorithm and Accelerated Particle Swarm Optimization

Pattern Synthesis Using Real Coded Genetic Algorithm and Accelerated Particle Swarm Optimization Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 3753-3760 Research Idia Publicatios. http://www.ripublicatio.com Patter Sythesis Usig Real Coded Geetic Algorithm

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

How To Train A Spam Classifier

How To Train A Spam Classifier Iteratioal Joural o Artificial Itelligece Tools Vol. XX, No. X (2006) 20 World Scietific Publishig Compay WORDS VS. CHARACTER N-GRAMS FOR ANTI-SPAM FILTERING IOANNIS KANARIS, KONSTANTINOS KANARIS, IOANNIS

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

Neolane Reporting. Neolane v6.1

Neolane Reporting. Neolane v6.1 Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Finding the circle that best fits a set of points

Finding the circle that best fits a set of points Fidig the circle that best fits a set of poits L. MAISONOBE October 5 th 007 Cotets 1 Itroductio Solvig the problem.1 Priciples............................... Iitializatio.............................

More information

Trading rule extraction in stock market using the rough set approach

Trading rule extraction in stock market using the rough set approach Tradig rule extractio i stock market usig the rough set approach Kyoug-jae Kim *, Ji-youg Huh * ad Igoo Ha Abstract I this paper, we propose the rough set approach to extract tradig rules able to discrimiate

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Ranking Irregularities When Evaluating Alternatives by Using Some ELECTRE Methods

Ranking Irregularities When Evaluating Alternatives by Using Some ELECTRE Methods Please use the followig referece regardig this paper: Wag, X., ad E. Triataphyllou, Rakig Irregularities Whe Evaluatig Alteratives by Usig Some ELECTRE Methods, Omega, Vol. 36, No. 1, pp. 45-63, February

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Discriminative Models of Integrating Document Evidence and Document-Candidate Associations for Expert Search

Discriminative Models of Integrating Document Evidence and Document-Candidate Associations for Expert Search Discrimiative Models of Itegratig Documet Evidece ad Documet-Cadidate Associatios for Expert Search Yi Fag Departmet of Computer Sciece Purdue Uiversity West Lafayette, IN 47907, USA fagy@cs.purdue.edu

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands Discrete Dyamics i Nature ad Society, Article ID 349341, 12 pages http://dx.doi.org/10.1155/2014/349341 Research Article Allocatig Freight Empty Cars i Railway Networks with Dyamic Demads Ce Zhao, Lixig

More information

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern. 5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation

Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Sigal & Image Processig : A Iteratioal Joural (SIPIJ) Vol.2, No.2, Jue 2011 VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Amir Salarpour 1 ad Arezoo Salarpour 2 ad Mahmoud Fathi 2 ad MirHossei Dezfoulia

More information

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15 AdaLab AdaLab Adaptive Automated Scietific Laboratory (AdaLab) Adaptive Machies i Complex Eviromets Start Date: 1.4.15 Scietific Backgroud The Cocept of a Robot Scietist Computer systems capable of origiatig

More information

Confidence Intervals

Confidence Intervals Cofidece Itervals Cofidece Itervals are a extesio of the cocept of Margi of Error which we met earlier i this course. Remember we saw: The sample proportio will differ from the populatio proportio by more

More information

A Mathematical Perspective on Gambling

A Mathematical Perspective on Gambling A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal

More information

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm A Network Itrusios Detectio System based o a Quatum Bio Ispired Algorithm Omar S. Solima 1, Aliaa Rassem 2 1,2 Faculty of Computers ad Iformatio, Cairo Uiversity Abstract: Network itrusio detectio systems

More information

SEQUENCES AND SERIES

SEQUENCES AND SERIES Chapter 9 SEQUENCES AND SERIES Natural umbers are the product of huma spirit. DEDEKIND 9.1 Itroductio I mathematics, the word, sequece is used i much the same way as it is i ordiary Eglish. Whe we say

More information

Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation

Effective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

AP Calculus BC 2003 Scoring Guidelines Form B

AP Calculus BC 2003 Scoring Guidelines Form B AP Calculus BC Scorig Guidelies Form B The materials icluded i these files are iteded for use by AP teachers for course ad exam preparatio; permissio for ay other use must be sought from the Advaced Placemet

More information

FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING

FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING Christoph Busch, Ralf Dörer, Christia Freytag, Heike Ziegler Frauhofer Istitute for Computer Graphics, Computer Graphics Ceter

More information

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN

SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN VOL. 0, NO. 3, JULY 05 ISSN 89-6608 006-05 Asia Research Publishig Network (ARPN). All rights reserved. SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN M. Chadrasekara, Padmaabha S. ad V.

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information