The Impact of Feature Selection on Web Spam Detection
|
|
- Terence Ward
- 8 years ago
- Views:
Transcription
1 I.J. Itelliget Systems ad Applicatios, 2012, 9, Published Olie August 2012 i MECS ( DOI: /ijisa The Impact of Feature Selectio o Web Spam Detectio Jaber Karimpour Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira karimpour@tabrizu.ac.ir Ali A. Noroozi Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira aliasghar.oroozi@gmail.com Adeleh Abadi Dept. of Computer Sciece, Uiversity of Tabriz, Tabriz, Ira adeleh.abadi@gmail.com Abstract Search egie is oe of the most importat tools for maagig the massive amout of distributed web cotet. Web spammig tries to deceive search egies to rak some pages higher tha they deserve. May methods have bee proposed to combat web spammig ad to detect spam pages. Oe basic oe is usig classificatio, i.e., learig a classificatio model for classifyig web pages to spam or o-spam. This work tries to select the best feature set for classificatio of web spam usig imperialist competitive algorithm ad geetic algorithm. Imperialist competitive algorithm is a ovel optimizatio algorithm that is ispired by socio-political process of imperialism i the real world. Experimets are carried out o WEBSPAM- UK2007 data set, which show feature selectio improves classificatio accuracy, ad imperialist competitive algorithm outperforms GA. Idex Terms Web Spam Detectio, Feature Selectio, Imperialistic Competitive Algorithm, Geetic Algorithm I. Itroductio With the explosive growth of iformatio o the web, it has become the most successful ad giat distributed computig applicatio today. Billios of web pages are shared by millios of orgaizatios, uiversities, researchers, etc. Web search provides great fuctioality for distributig, sharig, orgaizig, ad retrievig the growig amout of iformatio [1]. Search egies have become more ad more importat ad are used by millios of people to fid ecessary iformatio. It has become very importat for a web page, to be raked high i the importat search egies results. As a result may techiques are proposed to ifluece rakig ad improve the rak of a page. Some of these techiques are legal ad are called Search Egie Optimizatio (SEO) techiques, but some are ot legal or ethical ad try to deceive rakig algorithms. These spam pages try to rak pages higher tha they deserve [2]. Web spam refers to web cotet that get high rak i search egie results despite low iformatio value. Spammig ot oly misleads users, but also imposes time ad space cost to search egie crawlers ad idexers. That is why crawlers try to detect web spam pages to avoid processig ad idexig them. Cotet-based spammig methods basically tailor the cotets of the text fields i HTML pages to make spam pages more relevat to some queries. This kid of spammig is also called term spammig. There are two mai cotet spammig techiques, which simply create sythetic cotets cotaiig spam terms: repeatig some importat terms ad dumpig may urelated terms [3,4]. Lik spammig misuses lik structure of the web to spam pages. There are two mai kids of lik spammig. Out-lik spammig tries to boost the hub score of a page by addig out-liks i it poitig to some authoritative pages. Oe of the commo techiques of this kid of spammig is directory cloig, i.e., replicatig a large portio of a directory like Yahoo! i the spam page. I-lik spammig refers to persuadig other pages, especially authoritative oes, to poit to the spam page. I order to do this, a spammer might adopt these strategies: creatig a hoey pot, ifiltratig a web directory, postig liks o usergeerated cotet, participatig i lik exchage, buyig expired domais, ad creatig ow spam farm [2]. Hidig techiques are also used by spammers who wat to coceal or to hide the spammig seteces, terms, ad liks so that web users do ot see those [3]. Cotet hidig is used to make spam items ivisible. Oe simple method is to make the spam terms the same color as the page backgroud color. I cloakig, spam Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
2 62 The Impact of Feature Selectio o Web Spam Detectio web servers retur a HTML documet to the user ad a differet documet to a web crawler. I redirectig, a spammer ca hide the spammed page by automatically redirectig the browser to aother URL as soo as the page is loaded. I two latter techiques, the spammer ca preset the user with the iteded cotet ad the search egie with spam cotet [5]. Various methods have bee proposed to combat web spammig ad to detect spam pages. Oe importat ad basic type of methods is cosiderig web spam detectio as a biary classificatio problem [4]. I this kid of methods, some web pages are collected as traiig data ad labeled as spam or o-spam by a expert. The, a classifier model is leared from the traiig data. Oe ca use ay supervised learig algorithm to build this model. Further, the model is used to classify ay web page to spam or o-spam. The key issue is to desig features used i learig. Ntoulas et al. [4] propose some cotet-based features to detect cotet spam. Lik-based features are proposed for lik spam detectio [6,7]. Liu et al. [8] propose some user behavior features extracted from access logs of web server of a page. These features depict user behavior patters whe reachig a page (spam or o-spam). These patters are used to separate spam pages from o-spam oes, regardless of spammig techiques used. Erdelyi et al. [9] ivestigate the tradeoff betwee feature geeratio ad spam classificatio accuracy. They coclude that more features achieve better performace; however, the appropriate choice of the machie learig techiques for classificatio is probably more importat tha devisig ew complex features. Feature selectio is the process of fidig a optimal subset of features that cotribute sigificatly to the classificatio. Selectig a small subset of features ca decrease the cost ad the ruig time of a classificatio system. It may also icrease the classificatio accuracy because irrelevat or redudat features are removed [10]. Amog the may methods proposed for feature selectio, evolutioary optimizatio algorithms such as geetic algorithm (GA) have gaied a lot of attetio. Geetic algorithm has bee used as a efficiet feature selectio method i may applicatios [11,16]. I this paper, we icorporate geetic algorithm, ad imperialist competitive algorithm [12] to fid a optimal subset of features of the WEBSPAM-UK2007 data set [13,14]. The selected features are used for classificatio of the WEBSPAM-UK2007 data. The rest of the paper is orgaized as follows. Sectio 2 gives a brief itroductio of the imperialist competitive algorithm (ICA). Sectio 3 describes the feature selectio process by ICA ad GA. Experimetal results are discussed i sectio 4, ad fially, sectio 5 cocludes the paper. II. Imperialistic Competitive Algorithm The imperialist competitive algorithm is ispired by imperialism i the real world [12]. Imperialism is the policy of extedig the power of a coutry beyod its boudaries ad weakeig other coutries to take cotrol of them. Fig. 1 Iitializatio of the empires: The more coloies a imperialist possesses, the bigger is its mark [12] This algorithm starts with a iitial society of radom geerated coutries. Some of the best coutries are selected to be imperialists ad others are selected to be coloies of these imperialists. The power of a empire which is the couterpart of fitess value i geetic algorithms, is the power of the imperialist coutry plus a percetage of mea power of its coloies. Figure 1 depicts the iitializatio of the empires. After assigig all coutries to imperialists, ad formig empires, coloies start movig towards the relevat imperialist (Assimilatio). The, some coutries radomly chage positio i the search space (Revolutio). After assimilatio ad revolutio, a coloy may get a better positio i the search space ad take cotrol the empire (substitutio for the imperialist). Fig. 2 Imperialistic competitio: The weakest coloy of the weakest empire is possessed by other empires [12] The, imperialistic competitio begis. All empires try to take cotrol of the weakest coloy of the weakest empire. This competitio reduces the power of weaker empires ad icreases the power of the powerful oes. Ay empire that caot compete with other empires ad icrease its power or at least prevet decreasig it, will Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
3 The Impact of Feature Selectio o Web Spam Detectio 63 gradually collapse. As a result, after some iteratios, the algorithm coverges ad oly oe imperialist remais ad all other coutries are coloies of it. Figure 2 depicts the imperialistic competitio. The more powerful a empire is, the more likely it will take cotrol of the weakest coloy of the weakest empire. The pseudo code of ICA is as follows: 1. Iitialize the empires 2. Assimilatio: Move the coloies toward their relevat imperialist 3. Revolutio: Radomly chage the characteristics of some coloies 4. Exchage the positio of a coloy ad Imperialist. If a coloy has more power tha that of imperialist, exchage the positios of that coloy ad the imperialist 5. Compute the total power of all empires 6. Imperialistic competitio: Give the weakest coloy from the weakest empire to the empire that has the most likelihood to possess it 7. Elimiate the powerless empires 8. If there is just oe empire, stop, else, go to 2 III. Feature Selectio WEBSPAM-UK2007 data set cotais 96 cotet based features. We use the imperialist competitive ad geetic algorithms to optimize the features that cotribute sigificatly to the classificatio. A. Feature Selectio Usig ICA I this sectio, the steps of feature selectio usig ICA are described. 1) Iitialize the empires I the geetic algorithm, each solutio to a optimizatio problem is a array, called chromosome. I ICA, this array is called coutry. I feature selectio, each coutry is a array of biary umbers. Whe coutry[i] is 1, the i th feature is selected for classificatio, ad whe it is 0, the i th feature is removed [15]. Figure 3 depicts the feature represetatio as a coutry. F F F Coutry F -1 F Feature subset = {F, F,..., F } Fig. 3 Feature represetatio as a coutry i ICA [15] The power of each coutry is calculated by F-score. F-score is a commoly used measure i machie learig ad iformatio retrieval [3,10]. The cofusio matrix of a give a classifier is cosidered as table 1. Table 1. Cofusio Matrix Classified spam Classified o-spam Actual spam A B Actual o-spam C D F-score is determied as follows F-score = 1 / (1 / Recall + 1 / Precisio) (1) Where Recall, ad Precisio are defied as follows Recall = C / (C + D) (2) Precisio = B / (B + D) (3) The algorithm starts by radomly iitializig a populatio of size N. N of the most powerful pop imp coutries are selected as imperialists ad form the empires. The remaiig coutries ( ) are assiged to empires based o the power of each empire. The ormalized power of each imperialist is defied by NP P N imp i 1 P i N Where P is the power of coutry. The iitial umber of coloies of col col empire will be (4) NC roud { NP * N } (5) To assig coloies to empires, is chose radomly ad assiged to coloies alog with the NC of the coloies imperialist. These imperialist will form empire. 2) Assimilatio I this phase, coloies move towards the relevat imperialist. Sice feature selectio is a discrete problem, we use followig operator for assimilatio [15] For each coloy Create a biary strig ad assig a radom geerated biary to each cell Copy the cells of the relevat imperialist, correspodig to the locatio of 1 s i the biary strig, to the same positios i the coloy 3) Revolutio The purpose of revolutio is preservig ad itroducig diversity. It allows the algorithm to avoid local miimum. Revolutio occurs accordig to a user defied revolutio probability. For each coloy, some cells are selected radomly ad their cotaiig biary is iverted ( 1 is iverted to 0, ad 0 is iverted to 1 ). Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
4 64 The Impact of Feature Selectio o Web Spam Detectio 4) Exchage the positios of a coloy ad imperialist After assimilatio ad revolutio, a coloy may gai more power tha that of imperialist. As a result, the best coloy of a empire ad its imperialist exchage positios. The, the algorithm will cotiue by the imperialist i a ew positio. 5) Compute the total power of empires The total power of a empire is maily affected by the power of its imperialist. Aother factor i computig the total power of a empire is the power of coloies of that empire. Of course, the mai power is by the power of the imperialist, ad the power of coloies has less impact. As a result, we defie the total power of empire is defied TP power ( imperialist ) mea{ power ( coloies of empire )} (6) Where is a positive factor which is cosidered to be less tha 1. Decreasig the value of icreases the role of the imperialist i determiig the total power of a empire ad icreasig it will icrease the role of the coloies. 6) Imperialistic Competitio I this importat phase of the algorithm, the empires compete to take cotrol of the weakest coloy of the weakest empire. Each empire has a likelihood of possessig the metioed coloy. The possessio probability of empire is obtaied by P emp TP i 1 N imp TP i (7) As you ca otice, the most powerful empire does ot take possessio of the weakest coloy of the weakest empire, but it will be more likely to possess the metioed coloy. 7) Elimiate the powerless empires Imperialistic competitio causes some empires to lose power ad gradually collapse. Whe a empire loses all its coloies, we assume it is collapsed ad elimiate it. The imperialist of this powerless empire is possessed by other empires as a coloy. 8) Covergece As a result of imperialistic competitio ad elimiatio of powerless empires, the algorithm will coverge to the most powerful empire ad all the coutries will be uder the cotrol of this empire. The imperialist of this empire will determie the optimal subset of features selected for classificatio, because this imperialist is the most powerful of all coutries. B. Feature selectio usig GA I the geetic algorithm, each solutio to the feature selectio problem is a strig of biary umbers, called chromosome. Whe chromosome[i] is 1, the i th feature is selected for classificatio, ad whe it is 0, the i th feature is ot selected [11,16]. The fitess fuctio is cosidered the accuracy of the classificatio model. I this research, we calculate the fitess value of each chromosome by F-score. F-score was described i the previous sectio. The algorithm starts by radomly iitializig a populatio of size N. The, crossover ad mutatio are doe. pop Crossover allows the geeratio of ew chromosomes by combiig curret best chromosomes. To do crossover, sigle poit crossover techique is used, i.e., oe crossover poit is selected, biary strig from begiig of chromosome to the crossover poit is copied from oe paret, the rest is copied from the secod paret. Figure 4 shows how childre are geerated from each pair of chromosomes by crossover. Mutatio is similar to revolutio i ICA. It maitais geetic diversity ad allows the algorithm to avoid local miimum. To do mutatio, i each chromosome, a radom cell is selected ad its cotaiig bit i iverted ( 1 is iverted to 0, ad 0 is iverted to 1 ). Mutatio ad crossover occur accordig to a previously defied mutatio ad crossover probability. Geetic algorithm iterates for some user defied umber of geeratios. Fig. 4 how childre are geerated from parets by crossover [17] IV. Experimetal Results I order to ivestigate the impact of feature selectio o web spam classificatio, WEBSPAM-UK2007 data are used. It is a publicly available web spam data collectio ad is based o a crawl of the.uk domai doe i May 2007 [13, 14]. It icludes 105 millio pages ad over 3 billio liks i hosts. The traiig set cotais 3849 hosts. This data set cotais cotet ad lik based features. I our experimets, we used oly cotet based features because they were eough to meet our purposes. The selected data set cotais 3849 data, with 208 spam ad 3641 o-spam pages. We partitioed this data set to two disjoit sets: traiig data set with 2449 data, ad test data set with 1000 data. After performig feature Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
5 The Impact of Feature Selectio o Web Spam Detectio 65 selectio usig the traiig set, the test set was used to evaluate the selected subset of features. The evaluatio of the overall process was based o weighted f-score which is a suitable measure for the spam classificatio problem. It was also used as the power fuctio i ICA ad fitess fuctio i GA. Bayesia Network, Decisio Tree (C4.5 algorithm), ad Support Vector Machie (SVM) were chose as learig algorithms to perform the classificatio ad calculate the weighted F-score. These algorithms are powerful learig algorithms used i may web spam detectio researches [4, 5, 18]. Followig parameters were used for ICA Number of coutries = 100 Number of imperialists = 10 = 0.1 Revolutio rate = 0.01 Selected parameters for GA are as follows Iitial populatio = 100 Number of geeratios (iteratios) = 100 Crossover rate = 0.6 Mutatio rate = 0.01 Figure 5 depicts maximum ad mea power of all imperialists versus iteratio, usig Decisio Tress, SVM, ad Bayesia Network classifiers, i ICA. As show i this figure, by SVM ad Decisio Tree classifiers, the global maximum of the fuctio (maximum power) is foud i less tha 5 iteratios, while by Bayesia Network, it is foud i 12 th iteratio. Fig. 5 Mea ad maximum power of all imperialists versus iteratio, usig differet classifiers, i ICA Figures 6, ad 7 compare ICA power fuctio ad GA fitess fuctio versus iteratio. Figure 6 shows the power (fitess) of best aswer versus iteratio (geeratio), usig Bayesia Network classifier, i ICA ad GA. As you ca see, ICA coverges faster tha GA, ad has more power tha GA i all iteratios. Aother importat poit is that the iitial value of f-score which is the result of radom iitializatio of populatio i both algorithms, gets a higher icrease by ICA over iteratios. This poit shows that imperialistic competitio outperforms geetic evolutio i the problem of spam classificatio. Fig. 6 Power (fitess) of best aswer versus iteratio, usig Bayesia Network classifier Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
6 66 The Impact of Feature Selectio o Web Spam Detectio Fig. 7 Mea power (fitess) of all aswers versus iteratio, usig Bayesia Network classifier Figure 7 depicts mea power (fitess) of all aswers versus iteratio, usig Bayesia Network classifier, i ICA ad GA. As you ca see, ICA gets a higher icrease i mea power of all aswers. The optimal subset of features selected by ICA ad GA are used to trai a classificatio model. This model is evaluated by the test data set. Evaluatio results obtaied for Bayesia Network, Decisio Tree, ad SVM classifiers are show i table 2. These results idicate that feature selectio by both ICA ad GA techiques improves web spam classificatio. Furthermore, ICA based feature selectio outperforms GA based feature selectio i the problem of web spam detectio. Table 2 The impact of ICA ad GA based feature selectio o web spam classificatio, usig differet classifiers Bayesia Network Decisio Tress SVM Number of features F-score Number of features F-score Number of features F-score All features GA ICA V. Coclusio I this paper, we studied the impact of feature selectio o the problem of web spam classificatio. Feature selectio was performed by Imperialist Competitive Algorithm ad Geetic Algorithm. Experimetal results showed that selectig a optimal subset of features icreases classificatio accuracy, but ICA could fid better optimal aswers tha GA. I fact, we observed that reducig the umber of features decreases the classificatio cost ad icreases the classificatio accuracy. Other optimizatio methods, such as PSO ad at coloy ca be used for feature selectio ad compared with ICA ad GA i future works. Refereces [1] Caverlee J, Liu L, Webb S. A Parameterized Approach to Spam-Resiliet Lik Aalysis of the Web. IEEE Trasactios o Parallel ad Distributed Systems (TPDS), 2009, 20: [2] Gyogyi Z,Garcia-Molia H. Web spam taxoomy. I: First iteratioalworkshop o adversarial iformatio retrieval o the web (AIRWeb 05), Japa, [3] Liu B. Web Data Miig, Explorig Hyperliks, Cotets, ad Usage Data. Spriger, [4] Ntoulas A, Najork M, Maasse M, et al. Detectig Spam Web Pages through Cotet Aalysis. I Proc. of the 15th Itl. World Wide Web Coferece (WWW 06), [5] Wag W, Zeg G, Tag D. Usig evidece based cotet trust model for spam detectio. Expert Systems with Applicatios, (8): [6] Becchetti L, Castillo C, Doato D, et al. Lik-based characterizatio ad detectio of Web Spam. I Proc. Of 2d It. Workshop o Adversarial Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
7 The Impact of Feature Selectio o Web Spam Detectio 67 Iformatio Retrieval o the Web (AIRWeb 06), Seattle, WA, [7] Castillo C, Doato D, Giois A, et al. Kow your eighbors: Web spam detectio usig the web topology. I Proc. Of 30th Au. It. ACM SIGIR Cof. Research ad Developmet i Iformatio Retrieval (SIGIR 07), New York, [8] Liu Y, Ce R, Zhag M, et al. Idetifyig web spam with user behavior aalysis. I Proc. Of 4th It. Workshop o Adversarial Iformatio Retrieval o the Web (AIRWeb 08), Chia, [9] Erdelyi M, Garzo A, Beczur A A. Web spam classificatio: a few features worth more. I Proceedigs of the 2011 Joit WICOW/AIRWeb Workshop o Web Quality2011, Idia, [10] Ha J, Kaber M, Pei J. Data Miig, Cocepts ad Techiques. 3 rd ed, Morga Kaufma, [11] Vafaie H, De Jog K. Geetic algorithms as a tool for feature selectio i machie learig. I Proceedigs of Fourth Iteratioal Coferece o Tools with Artificial Itelligece (TAI '92), [12] Atashpaz-Gargari E, Lucas C. Imperialist competitive algorithm: A algorithm for optimizatio ispired by imperialistic competitio. IEEE Cogress o Evolutioary Computatio (CEC 2007), [13] Castillo C, Doato D, Becchetti L, et al. A referece collectio for webspam. SIGIR Forum, 2006, 40(2): [14] Yahoo Research. Web Spam Collectios. [cited 2011 May], Available from: ets/, 2007 [15] Mousavi Rad S J, Mollazade K, Akhlagia Tab F. Applicatio of Imperialist Competitive Algorithm for Feature Selectio: A Case Study o Bulk Rice Classificatio. Iteratioal Joural of Computer Applicatios, (16):41-48 [16] Yag J, Hoavar V. Feature subset selectio usig a geetic algorithm. Itelliget Systems ad their Applicatios, IEEE, (2): [17] Eibe A E, Smith J E. Itroductio to Evolutioary Computig, Spriger, [18] Araujo L, Martiez-Romo J. Web Spam Detectio: New Classificatio Features Based o Qualified Lik Aalysis ad Laguage Models. IEEE Trasactios o Iformatio Foresics ad Security, (3): KARIMPOUR Jaber ( ), male, Tabriz, Ira, Assistat Professor, his research directios iclude verificatio ad formal methods. NOROOZI Ali A. (1986-), male, Tabriz, Ira, Master of Sciece, his research directios iclude adversarial iformatio retrieval ad distributed systems. ABADI Adeleh ( ) female, Tabriz, Ira, Master of Sciece, his research directios iclude verificatio ad formal methods. Copyright 2012 MECS I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
More informationA Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:
More information5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationProject Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
More informationLECTURE 13: Cross-validation
LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M
More informationIn nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationEvaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
More informationDomain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
More informationEvaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System
Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,
More information1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
More informationEngineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
More informationSpam Detection. A Bayesian approach to filtering spam
Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it
More informationLocating Performance Monitoring Mobile Agents in Scalable Active Networks
Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira a_haddad@itrc.ac.ir, {dehgha,
More informationApplication and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode
SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of
More informationDepartment of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
More informationVirtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony
, March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat
More informationResearch Article Crude Oil Price Prediction Based on a Dynamic Correcting Support Vector Regression Machine
Abstract ad Applied Aalysis Volume 2013, Article ID 528678, 7 pages http://dx.doi.org/10.1155/2013/528678 Research Article Crude Oil Price Predictio Based o a Dyamic Correctig Support Vector Regressio
More informationwhere: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
More informationA model of Virtual Resource Scheduling in Cloud Computing and Its
A model of Virtual Resource Schedulig i Cloud Computig ad Its Solutio usig EDAs 1 Jiafeg Zhao, 2 Wehua Zeg, 3 Miu Liu, 4 Guagmig Li 1, First Author, 3 Cogitive Sciece Departmet, Xiame Uiversity, Xiame,
More informationPre-Suit Collection Strategies
Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process
More informationSequences and Series
CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their
More informationDAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
More informationReliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
More information.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
More informationADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
More informationCHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
More informationLecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
More informationODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
More informationHeterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm
IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 247 Heterogeeous Vehicle Routig Problem with profits Dyamic
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More informationVolatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina
Overcomig the Crisis: Ecoomic ad Fiacial Developmets i Asia ad Europe Edited by Štefa Bojec, Josef C. Brada, ad Masaaki Kuboiwa http://www.hippocampus.si/isbn/978-961-6832-32-8/cotets.pdf Volatility of
More informationBaan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
More informationThe analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
More informationDetermining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
More informationSPC for Software Reliability: Imperfect Software Debugging Model
IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya
More informationExample 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).
BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly
More informationRecovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
More informationA Constant-Factor Approximation Algorithm for the Link Building Problem
A Costat-Factor Approximatio Algorithm for the Lik Buildig Problem Marti Olse 1, Aastasios Viglas 2, ad Ilia Zvedeiouk 2 1 Ceter for Iovatio ad Busiess Developmet, Istitute of Busiess ad Techology, Aarhus
More informationAutomatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
More informationConvention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
More informationResearch Article Heuristic-Based Firefly Algorithm for Bound Constrained Nonlinear Binary Optimization
Advaces i Operatios Research, Article ID 215182, 12 pages http://dx.doi.org/10.1155/2014/215182 Research Article Heuristic-Based Firefly Algorithm for Boud Costraied Noliear Biary Optimizatio M. Ferada
More informationLesson 15 ANOVA (analysis of variance)
Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi
More informationI. Why is there a time value to money (TVM)?
Itroductio to the Time Value of Moey Lecture Outlie I. Why is there the cocept of time value? II. Sigle cash flows over multiple periods III. Groups of cash flows IV. Warigs o doig time value calculatios
More informationResearch Method (I) --Knowledge on Sampling (Simple Random Sampling)
Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
More informationThe Forgotten Middle. research readiness results. Executive Summary
The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school
More informationPattern Synthesis Using Real Coded Genetic Algorithm and Accelerated Particle Swarm Optimization
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 3753-3760 Research Idia Publicatios. http://www.ripublicatio.com Patter Sythesis Usig Real Coded Geetic Algorithm
More informationHypergeometric Distributions
7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you
More informationChapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
More informationHypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
More informationPUBLIC RELATIONS PROJECT 2016
PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig
More informationHow To Train A Spam Classifier
Iteratioal Joural o Artificial Itelligece Tools Vol. XX, No. X (2006) 20 World Scietific Publishig Compay WORDS VS. CHARACTER N-GRAMS FOR ANTI-SPAM FILTERING IOANNIS KANARIS, KONSTANTINOS KANARIS, IOANNIS
More informationData Analysis and Statistical Behaviors of Stock Market Fluctuations
44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:
More information5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?
5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso
More informationNeolane Reporting. Neolane v6.1
Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of
More informationClustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks
JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;
More informationFinding the circle that best fits a set of points
Fidig the circle that best fits a set of poits L. MAISONOBE October 5 th 007 Cotets 1 Itroductio Solvig the problem.1 Priciples............................... Iitializatio.............................
More informationTrading rule extraction in stock market using the rough set approach
Tradig rule extractio i stock market usig the rough set approach Kyoug-jae Kim *, Ji-youg Huh * ad Igoo Ha Abstract I this paper, we propose the rough set approach to extract tradig rules able to discrimiate
More informationStudy on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
More informationThe Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms
The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer
More informationHow to read A Mutual Fund shareholder report
Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.
More informationPlug-in martingales for testing exchangeability on-line
Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk
More informationRanking Irregularities When Evaluating Alternatives by Using Some ELECTRE Methods
Please use the followig referece regardig this paper: Wag, X., ad E. Triataphyllou, Rakig Irregularities Whe Evaluatig Alteratives by Usig Some ELECTRE Methods, Omega, Vol. 36, No. 1, pp. 45-63, February
More informationhp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation
HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics
More informationTaking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
More informationDiscriminative Models of Integrating Document Evidence and Document-Candidate Associations for Expert Search
Discrimiative Models of Itegratig Documet Evidece ad Documet-Cadidate Associatios for Expert Search Yi Fag Departmet of Computer Sciece Purdue Uiversity West Lafayette, IN 47907, USA fagy@cs.purdue.edu
More informationThe Stable Marriage Problem
The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,
More informationDetecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1
Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig
More informationIncremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
More informationResearch Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands
Discrete Dyamics i Nature ad Society, Article ID 349341, 12 pages http://dx.doi.org/10.1155/2014/349341 Research Article Allocatig Freight Empty Cars i Railway Networks with Dyamic Demads Ce Zhao, Lixig
More informationRepeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.
5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers
More informationTradigms of Astundithi and Toyota
Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More informationVladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
More informationMatrix Model of Trust Management in P2P Networks
Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet
More informationEffective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation
Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,
More informationCS103X: Discrete Structures Homework 4 Solutions
CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least
More informationDesigning Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied
More informationStatistical inference: example 1. Inferential Statistics
Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either
More informationSystems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised
More informationINVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
More informationVEHICLE TRACKING USING KALMAN FILTER AND FEATURES
Sigal & Image Processig : A Iteratioal Joural (SIPIJ) Vol.2, No.2, Jue 2011 VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Amir Salarpour 1 ad Arezoo Salarpour 2 ad Mahmoud Fathi 2 ad MirHossei Dezfoulia
More informationAdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15
AdaLab AdaLab Adaptive Automated Scietific Laboratory (AdaLab) Adaptive Machies i Complex Eviromets Start Date: 1.4.15 Scietific Backgroud The Cocept of a Robot Scietist Computer systems capable of origiatig
More informationConfidence Intervals
Cofidece Itervals Cofidece Itervals are a extesio of the cocept of Margi of Error which we met earlier i this course. Remember we saw: The sample proportio will differ from the populatio proportio by more
More informationA Mathematical Perspective on Gambling
A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal
More informationA Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm
A Network Itrusios Detectio System based o a Quatum Bio Ispired Algorithm Omar S. Solima 1, Aliaa Rassem 2 1,2 Faculty of Computers ad Iformatio, Cairo Uiversity Abstract: Network itrusio detectio systems
More informationSEQUENCES AND SERIES
Chapter 9 SEQUENCES AND SERIES Natural umbers are the product of huma spirit. DEDEKIND 9.1 Itroductio I mathematics, the word, sequece is used i much the same way as it is i ordiary Eglish. Whe we say
More informationEffective Techniques for Message Reduction and Load Balancing in Distributed Graph Computation
Effective Techiques for Message Reductio ad Load Balacig i Distributed Graph Computatio ABSTRACT Da Ya, James Cheg, Yi Lu Dept. of Computer Sciece ad Egieerig The Chiese Uiversity of Hog Kog {yada, jcheg,
More informationSoving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
More informationAnnuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.
Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory
More informationAP Calculus BC 2003 Scoring Guidelines Form B
AP Calculus BC Scorig Guidelies Form B The materials icluded i these files are iteded for use by AP teachers for course ad exam preparatio; permissio for ay other use must be sought from the Advaced Placemet
More informationFEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING
FEATURE BASED RECOGNITION OF TRAFFIC VIDEO STREAMS FOR ONLINE ROUTE TRACING Christoph Busch, Ralf Dörer, Christia Freytag, Heike Ziegler Frauhofer Istitute for Computer Graphics, Computer Graphics Ceter
More informationLOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING
LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig
More informationA Method for Trust Quantificationin Cloud Computing Environments
A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology
More informationSWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN
VOL. 0, NO. 3, JULY 05 ISSN 89-6608 006-05 Asia Research Publishig Network (ARPN). All rights reserved. SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN M. Chadrasekara, Padmaabha S. ad V.
More informationPROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
More information7.1 Finding Rational Solutions of Polynomial Equations
4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?
More information