Feature Extraction based Approaches for Improving the Performance of Intrusion Detection Systems

Size: px
Start display at page:

Download "Feature Extraction based Approaches for Improving the Performance of Intrusion Detection Systems"

Transcription

1 , Mach 18-20, 2015, Hong Kong Featue Extaction based Appoaches fo Impoving the Pefomance of Intusion Detection Systems Long-Sheng Chen*, Jhih-Siang Syu Abstact In ecent yeas, the apid development of infomation and communication technology esults in too many loopholes in the netwo, and thus attacts lots of haces attacs. Intusion Detection System (IDS) has been developed to detect these attacs. Depending on diffeent data and analysis methods, this system will have diffeent detection methods. But, thee is no one model is absolutely effective. heefoe, this study will focus on impoving the classification pefomance of anomaly detection. In this study, we ll popose Local Latent Semantic Indexing (LLSI) and Local Kenel-Pincipal Component Analysis (LKPCA) based methods, which intoduce class infomation to featue extaction techniques. And the poposed methods will be integated into suppot vecto machine (SVM) to impove the pefomance of classification. Finally, KDD-NSL data set will be employed to testify the effectiveness of the poposed methods. Index ems Intusion Detection System, Featue Extaction, Latent Semantic Indexing, Kenel-Pincipal Component Analysis, Dimension Reduction. I I. INRODUCION nfomation and communication technology (IC) has become an indispensable pat of human life based on well-built infastuctue. No matte govenment, business o a vaiety of academic, medical, and othe oganizations, they inceasingly ely on IC. But, it also bings lots of secuity poblems and cisis. Lots of netwo attac tools can easily be found and downloaded on the Intenet. hough a vaiety of netwo vulneabilities and continuously developed new attac techniques and tools, it leads to cybe-attacs continue to evolve. So, this poblem cannot be undeestimated (Feng et al, 2014; Hubballi and Suyanaayanan, 2014; Govindaajan and Chandaseaan, 2012). o solve this poblem, intusion detection systems (IDS) have been fistly developed by Andeson (1980). Since then, vaious attac identification techniques have been poposed, such as ule-based, neual netwos, suppot vecto machines, Manuscipt eceived Januay 8, 2015; accepted Januay 22, his wo was suppoted in pat by the National Science Council of aiwan, R.O.C. (Gant No. MOS E MY3). *L.-S. Chen is an Associate Pofesso of Depatment of Infomation Management and Dean of Student Affais Office with the Chaoyang Univesity of echnology, aichung 41349, aiwan (phone: ext7752; fax: ; lschen@cyut.edu.tw). J.-S. Syu is a gaduate student with the Depatment of Infomation Management, Chaoyang Univesity of echnology, aichung 41349, aiwan ( s @gm.cyut.edu.tw ). and so on. Lots of well-constucted intusion detection systems have been developed and have been applied to eal wold compute systems (Mohammed and Sulaiman, 2012). But, 30 yeas has passed since Andeson s fist study. We cannot complete solve this poblem, mainly because of damatically advances in technology. Depending on data type and data analysis methods, IDS could be divided into seveal diffeent modes. Based on analytical methods, IDS can be divided into misuse detection and anomaly detection. he fome uses a nown attac signatue database, wheneve the login data match any featue, IDS will give alams. he latte uses nomative behavio model and then obseves behavios deviation. If the behavio is inconsistent with the model, IDS will give alams. he accuacy of misuse detection system is high, but it cannot detect unnown attacs. Anomaly detection methods have high false alam ate, but it s able to detect unnown attacs (Hubballi and Suyanaayanan, 2014). So, no single one intusion detection system is applicable to any situation. In addition to a vaiety of algoithms and intusion detection system model, dimension eduction methods ae often used to select impotant featues and to educe dimension size fo saving computational cost. ypically, thee ae two goups of algoithms to epesent the featue space used in classification. he fist one is featue selection which is to select a subset of most epesentative featues fom the oiginal featue space. he second algoithm is featue extaction which is to tansfom the oiginal featue space to a smalle featue space to educe the dimension. hese dimension eduction techniques have widely applied to solve eal poblems. Fo examples, Eesa et al. (2015) used cuttlefish based featue selection techniques to maintain data quality featues and emove edundant and ielevant featues. Gan et al. (2013) combined with Patial Least Squae (PLS) featue extaction technique and Coe Vecto Machine (CVM) algoithm to detect the abnomalities. Kuang et al. (2014) using a suppot vecto machine (SVM) combined enel pincipal component analysis (KPCA) and genetic algoithm (GA), whee KPCA is used to educe the data dimension. o sum up, featue extaction which is one of dimension eduction method can poduce a new set of featues by tansfoming the oiginal input vaiables (Yang et al., 2011). But, the new set of featues cannot etain the oiginal meanings of oiginal featues (Jain et al., 2000). Liu et al. (2004) and Chen et al. (2008) indicated that featue extaction can educe the dimensions of the featue space geatly compaed with featue selection.

2 , Mach 18-20, 2015, Hong Kong Because the ange of intusion detection system is wide, the majo objective of this study is to focus on impoving the classification pefomance of anomaly detection. Latent Semantic Indexing (LSI) (Deeweste et al., 1990; Guan et al., 2013; Uysal and Gunal, 2012; Wang et al., 2015) and KPCA will be employed to integate into Suppot Vecto Machines (SVM) to incease the anomaly detection pefomance. In this study, we ll to popose a Local Latent Semantic Indexing (LLSI) by singula value decomposition (SVD) and Local Kenel-Pincipal Component Analysis (LKPCA) based methods which intoduce class infomation to featue extaction techniques. And the poposed methods will be integated into suppot vecto machine (SVM) to impove the pefomance of classification. Finally, KDD-NSL data set will be employed to testify the effectiveness of the poposed methods. II. LIERAURE REVIEW A. Intusion Detection Systems hose unauthoized activities which have been designed to access system esouces o data ae called intusion (Hubballi and Suyanaayanan, 2014). he main coe of intusion detection system is to be able to detect these attacs o illegal activities to povide netwo manages coesponding teatment. he IDS can be classified into seveal diffeent modes accoding to its data souce and analytic methods. able 1 shows the categoy of IDS. Usually, we build IDS in the font end of a netwo segment, o behind/afte the fiewall, to analyze pacet though the inspected netwo section. In 30-yea histoy of IDS, ule-based ealy detection module has been fistly developed and become the main steam (Han, 2003; Lee, 1999). Afte then, diffeent algoithms based detection methods, such as genetic algoithm (GA) (Kuang et al., 2014), Bayes (Benfehat et al., 2013), neual netwos (NN) (homas and Balaishnan, 2008), and suppot vecto machine (SVM) (Feng et al, 2014; Mohammed and Sulaiman, 2012) have been constucted. ABLE I IDS CLASSIFICAION Classification Species Monitoing objectives and appoach. Netwobased Monitoing netwo pacets. Intenal ecods monitoing activities of Host-based Souces of the host system. infomation to Application distinguish -based Log file monitoing application geneated. Goal-based Monitoing special o secet achives. Hybid Monitoing netwo pacets and host systems combined ecod of activities. Analytical methods to distinguish Misusebased Anomalybased Hybid Uses a database of nown attac signatues, wheneve the login data match any featue, IDS will give alams. Nomative system behavio and obsevable deviations ae aised as alams. Combines signatue-based and anomaly-based appoach enables them to complement each othe. ill now, in ode to cope with the apid development of infomation technology, single one type of models has been insufficient to potect netwo secuity. So, the hybid appoaches gadually become the mainsteam (Kim and Kim, 2014). False positives (FP) is the most common indicatos in assessing the quality of an IDS. And, how to educe the so-called false positive ate in this field has become one of impotant issues (Hubballi and Suyanaayanan, 2014). Howeve, the eal pupose of this study is not to build complete IDS, but how to impove the classification pefomance. Kuang et al. (2014) pointed out that the intusion detection can be seen as essentially a classification poblem to distinguish abnomal activities. hus, the study focuses on the emphasis on the use of data mining techniques to detect abnomal pattens of classification pefomance, hoping to impove thei pefomance though effective data mining techniques. B. Featue Extaction Accoding to available liteatues, lots of wos used vaious featue extaction methods fo dimension eduction (Hoque and Bhattachayya, 2014; Lin et al., 2012). he most epesentative featue extaction algoithm is the Latent Semantic Indexing (LSI) (Deeweste et al., 1990; Guan et al., 2013; Uysal and Gunal, 2012; Wang et al., 2015) which is an automatic method that tansfoms the oiginal textual data to a smalle semantic space by taing advantage of some of the implicit highe-ode stuctue in associations of wods with text objects (Bey et al., 1995; Deeweste et al., 1990). he tansfomation is computed by applying tuncated singula value decomposition (SVD) to the tem-by-document matix. Afte SVD, tems which ae used in simila contexts will be meged togethe. SVD is an optimal linea tansfomation fo dimensionality eduction. It allows the aangement of the space to eflect the majo associative pattens in the data, and ignoe the smalle, less impotant influences. SVD tansfomation as well has the advantage of yielding zeo-mean and uncoelated featues (Castelli et al., 2003). Moeove, it has been epoted that SVD can be applied to education, solving linea least-squaes poblems, data compession (Aitas and Malaschono, 2004), document classification (Guan et al., 2013), and text classification (Uysal and Gunal, 2012). heefoe, LSI is employed as the featue extaction tool in this study. Anothe famous featue extaction method is Pincipal Component Analysis (PCA). PCA method can only extact the linea stuctue infomation in the data set, howeve, it cannot extact this nonlinea stuctue infomation. Except intusion detection, thee ae lots of successful applications in many aeas, such as face ecognition, stoc pediction model, and so on (Zhou et al, 2014; Kuang et al, 2014; Wang and Battiti, 2006;Wen et al ). KPCA (Scholopf et al., 1998) is an impoved PCA, which extacts the pincipal components by adopting a nonlinea enel method. A ey insight behind KPCA is to tansfom the input data into a high dimensional featue space F in which PCA is caied out, and in implementation, the implicit featue vecto in F does not need to be computed explicitly, while it is just done by computing the inne poduct of two vectos in F with a enel function (Kuang et al., 2014). Using non-linea enel function, KPCA impove the nonlinea poblems which cannot be solved by PCA (Chen et al, 2008; Ding et al, 2009). he main advantage of KPCA is that it does not involve nonlinea optimization; essentially it only equies linea algeba, which maes it as simple as standad PCA (Jia et al., 2012). KPCA equies only the

3 , Mach 18-20, 2015, Hong Kong solution of an eigenvalue poblem, and due to its ability to use diffeent enels, it can handle a wide ange of nonlineaities. In addition, KPCA does not equie the numbe of components to be extacted and specified pio to modeling. Due to these advantages, this study employs KPCA and compae its esults to LSI. III. IMPLEMENAL PROCEDURE he expeimental pocedue is divided into two stages, the fist stage, we use featue extaction methods to educe dimensionality. he oiginal 41 featues will be educed to smalle dimensionality. In the second phase, we find the optimal educed dimension size though evaluating by SVM classifie. he implemental pocedue can be shown in Figue 1. Actually, thee ae 6 majo steps. he concise steps can be found as follows. FIGURE 1 HE IMPLEMENAL PROCEDURE OF HIS WORK Step 1: Data Collection he employed tain20pecent data comes fom KDD-NSL data sets (Nsl-dd, 2009). his data set is used to detect intusion, and povided by well-nown public data sets KDD CUP 99 (Hettich and Bay, 1999). It s modified fom KDD CUP 99, and impove some disadvantages of oiginal data (avallaee et al., 2009). Step 2: Data Pepocessing In tain20pecent dataset, the attac type has been categoized 23 types. We combine all 23 attacs into one class abnomal. heefoe, it has become binay class classification poblems. Step 3: Featue Extaction his study uses 4 featue extaction methods, Global LSI, Local LSI, Global KPCA, and Local KPCA. Global LSI and Global KPCA mean the oiginal LSI and KPCA without intoducing class infomation. Local LSI and Local KPCA ae ou pesented methods. Step 3.1 LSI Let s biefly intoduce the concept of SVD. Let A be a m n matix of an whose ows epesent documents and columns denote tems (vaiables). Let the singula values of A (the Eigen values of A A ) be he singula value decomposition of A expesses A as the poduct of thee matices A USV, whee S diag( 1,..., ) is an matix, U (u1,..., u ) is an m matix whose columns ae othonomal, and V (v1,..., v ) is an n matix. LSI wos by omitting all but the lagest singula values in the above decomposition, fo some suitable ( is the dimension of the low-dimensional space). It should be small enough to enable fast etieval and lage enough to adequately captue the stuctue of the copus. Let S diag( 1,..., ), U (u1,..., u ) and V (v1,..., v ). hen A U SV is a matix of an, which is the appoximation of A. he ows of V S above ae then used to epesent the documents. In othe wods, the ow vectos of A ae pojected to the -dimensional space spanned by the ow vectos of U ; we sometimes call this space the LSI space of A. We implement Global LSI and Local LSI. Global LSI is the geneal method of using SVD. We can choose the educed dimension size, and then we use M U S to be a new set of input featues. In Local LSI (Liu et al., 2004), we fist divide data into seveal goups based on thei class labels. Next, we implement the same pocedue with Global LSI. So, Local LSI intoduces the additional infomation of class (dependent vaiables) while tansfoming. Step 3.2 KPCA Global KPCA Step Collect data X, and nomalize the data of each n m vaiable into mean 0 and vaiance 1. I I Step Compute the enel matix K R, note the elements as K. ij Step Cay out centeing in the featue space fo K. Step Cay out pincipal component decomposition fo, and detemine the numbe of PCs etained, ecoded as A, and then pojection is obtained. Local KPCA Step Collect data X, and nomalize the data of each n m vaiable into mean 0 and vaiance 1. Step Divide collected data into seveal goups based on thei class labels. Fo each goup, we implement sub-steps 3.3.3~3.3.5, espectively. I I Step Compute the enel matix K R, note the elements as K. ij Step Cay out centeing in the featue space fo K. Step Cay out pincipal component decomposition fo, and detemine the numbe of PCs etained, ecoded as A, and then pojection is obtained. Step 4 Build SVM classifie In ode to confim the pefomances of poposed Local LSI and Local KPCA, we use the educed dimensionality to build SVM. In this step, we use the taining data to constuct SVM classifie, and then input the test data to validate the built classifies. Moeove, 5 fold coss validation expeiment has been employed fo these taining data. Step 5 Results Evaluation We use oveall accuacy (OA) and F1 to evaluate the pefomances.

4 , Mach 18-20, 2015, Hong Kong Step 6 Daw Conclusions Based on esults, we can mae conclusion. A. Data Pepocessing IV. RESULS In this study, we employ tain20pecent file fom NSL-KDD (Nsl-dd, 2009). In this dataset, the attac type has been categoized in able 2. Besides, able 3 shows the data size and class distibution infomation. By the way, we define 4 attac types into one abnomal class. heefoe, it has become binay class classification poblems. In addition, 5 fold coss validation expeiment has been employed. All data will be nomalized. Attac ype U2R R2L DOS Pobe ABLE II AACK YPES IN NSL-KDD DAASE Attac detailed classification Buffe_oveflow, loadmodule, multihop, pel, ootit ftp_wite, guess_passwd, imap, phf, spy, waezclient, waezmaste ftp_wite, guess_passwd, imap, phf, spy, waezclient, waezmaste Ipsweep, nmap, potsweep, satan 2*Pecision*Re call F1 (4) Pecision Re call he oveall accuacy (OA) has been defined in equation (1). F1 is a weighted index both consideing Pecision and Recall indicatos. Pecision, Recall, F1 can be defined in equations (2)~(4). C. Expeimental Results Figue 2 povides the summay of esults when using LSI. Fom this figue, we can find that the pefomance of Global LSI and Local LSI eep stable when dimension size deceasing. But, even when the dimension size educe fom oiginal 41 attibutes to 1 attibutes, Local LSI has bette pefomance than Global LSI no matte consideing OA o F1. (a) (b) ABLE III DAA DISRIBUION Expeiment No. Data size Class distibution Fold-1 Fold-2 Fold-3 Fold-4 Fold-5 B. Measuement Index 25,192 Nomal:13,449 Attac:11,743 o illustate measuement index, we use table 4 to demonstate accuacy and F1. (a) FIGURE 2 RESULS OF GLOBAL LSI AND LOCAL LSI ABLE IV BINARY CLASSIFICAION Pedicted Nomal Pedicted Attac Actual Nomal P FP Actual Attac FN N (b) In able 4, the meanings of denotations P, FP, FN, N have given as follows. (1) P: Actual nomal examples classified into nomal. (2) FP: Actual nomal examples classified into attac. (3) FN: Actual attac examples classified into nomal. (4) N: Actual attacs examples classified into attac. P N OA (1) P FP N FN P P ecision (2) P FP P Re call (3) P FN FIGURE 3 RESULS OF GLOBAL KPCA AND LOCAL KPCA Figue 3 povides the summay of esults when using KPCA. Fom this figue, unlie LSI, we can find that the pefomance of Global KPCA gets wose when dimension size deceasing. But, even when the dimension size educe fom oiginal 41 attibutes to 1 attibutes, Local KPCA significantly outpefom Global LSI no matte consideing OA o F1. able 5 gives the compaison of oiginal SVM, Global

5 , Mach 18-20, 2015, Hong Kong LSI, and Local LSI. Fom this table, we can find the computational time save up to 98% no matte implementing Global LSI o Local LSI. But, Local LSI can maintain the classification pefomance. able 6 shows the compaisons of oiginal SVM, Global KPCA, and Local KPCA. Consideing computational time, Global KPCA and Local KPCA only use 1.34% and 0.017%, espectively. Local KPCA significantly outpefom oiginal SVM no matte in OA and F1. Fom ables 5~6, we can find that intoducing class infomation to featue extaction methods can not only eep the classification pefomance, but also emaably educe the computational time. OA (%) F1 (%) ime ABLE V COMPARISONS OF ORIGINAL SVM, GLOBAL LSI AND LOCAL LSI Oiginal (dimensions 41) (0.06) (0.05) 345, (12.25) Global LSI- SVM (23.90) (15.38) 7, (29.62) Local LSI- SVM (0.17) (0.16) 7, (0.15) Note: he numbe (0.06) in this table means Mean (Standad Deviation), espectively. ABLE VI COMPARISONS OF ORIGINAL SVM, GLOBAL KPCA AND LOCAL KPCA Oiginal (dimensions 41) Global KPCA Aveages Local KPCA (Standad Deviation) OA (%) (0.06) F1 (%) (0.05) 345, , ime (12.25) (19.19) (10.00) Note: he numbe (0.06) in this table means Mean (Standad Deviation), espectively. V. CONCLUSIONS In the pesent study, we utilize featue extaction selection method (LSI, KPCA) to impove the pefomance of intusion detection systems. By intoducing class infomation, we pesent Local-LSI and Local-KPCA. Results indicated that Local-LSI and Local-KPCA outpefom Global LSI and Global KPCA, and oiginal SVM, espectively. Local-KPCA cannot only damatically save computational time, but also emaably incease the classification pefomance. We can conclude that intoducing class infomation to featue extaction methods can not only eep the classification pefomance, but also emaably educe the computational time. Howeve, the esults obtained fom one data set. If we want to have a genealized conclusion, moe data sets and additional featue extaction methods can be used in the futue wos. Multi-class classification might be anothe one diection of futue eseaches. REFERENCES [1] A. S. Eesa, Z. Oman, A. M. A. Bifcani, A novel featue-selection appoach based on the cuttlefish optimization algoithm fo intusion detection systems, Expet Systems with Applications 42 (2015) [2] B. Scholopf, A. Smola, K. R. Mulle, Nonlinea Component Analysis as a Kenel Eigenvalue Poblem, Neual Computation 10(5) (1998) [3] C. homas, N. Balaishnan, Pefomance enhancement of intusion detection systems using advances in senso fusion, in: Fusion 08: Poceedings of the 11th Intenational Confeence on Infomation Fusion, (2008) [4] C. Zhou, L. Wang, Q. Zhang, X. Wei, Face ecognition based on PCA and logistic egession analysis, Opti - Intenational Jounal fo Light and Electon Optics,125:20(2014) [5] C.-C. Chen, L.-S. Chen, C.-C. Hsu,, and W.-R. Zeng, (2008) An infomation ganulation based data mining appoach fo classifying imbalanced data, Infomation Sciences, 178 (16): [6] F. Kuang, W. Xu, Zhang, S., A novel hybid KPCA and SVM with GA model fo intusion detection, Applied Soft Computing 18(2014) [7] F. Wen, J. Xiao, Z. He, X. Gong, Stoc Pice Pediction based on SSA and SVM, Pocedia Compute Science 31(2014) [8] G. Aitas, G. I. Malaschono, (2004). Applications of singula-value decomposition (SVD). Mathematics and Computes in Simulation, 67, [9] G. Kim, S. Lee, S. Kim, A novel hybid intusion detection method integation anomaly detection with misuse detection, Expet Systems with Applications 41(2014) [10] H. Guan, J. Zhou, B. Xiao, M. Guo,. Yang, (2013). Fast dimension eduction fo document classification based on impecise spectum analysis. Infomation Sciences, 222, [11] J. Wang, J. Peng, Q. Liu, (2015). A classification appoach fo less popula webpages based on latent semantic analysis and ough set model. Expet Systems with Applications, 42(1), [12] K. Bhattachayya, J. K. Kalita, Netwo anomaly detection: A machine leaning pespective, (2013),CRC Pess. [13] K. Jain, R. P. W. Duin, and J. Mao, (2000). Statistical patten ecognition: A eview, IEEE ansactions on Patten Analysis and Machine Intelligence, 22(1): [14] K. Uysal, and S. Gunal, (2012). A novel pobabilistic featue selection method fo text classification. Knowledge-Based Systems, 36, [15] M. Ding, Z. ian, H. Xu, Adaptive enel pincipal analysis fo online featueextaction, Poc. Wold Acad. Sci. Eng. echnol. 59 (2009) [16] M. Govindaajan, R. M. Chandaseaan, Intusion Detection using an Ensemble of Classification Methods, Poceedings of the Wold Congess on Engineeing and Compute Science (2012 )WCECS. [17] M. Jia, H. Xu, X. Liu, N. Wang, he optimization of the ind and paametes of enel function in KPCA fo pocess monitoing, Computes and Chemical Engineeing 46 (2012) [18] M. N. Mohammed, N. Sulaiman, Intusion Detection System Based on SVM fo WLAN, Pocedia echnology 1(2012) [19] M. avallaee, E. Baghei, W. Lu, and A. A. Ghobani, A Detailed Analysis of the KDD CUP 99 Data Set, poceedings of the 2009 IEEE Symposium on Computational Intelligence in Secuity and Defense Applications (CISDA 2009). [20] M.W. Bey, S.. Dumais, and G. W. O'Bien, (1995). Using linea algeba fo intelligent infomation etieval. SIAM Review, 37, pp [21] N. Hoque, D. K. Bhattachayya, J. K. Kalita, MIFS-ND: A mutual infomation-based featue selection method, Expet Systems with Applications 41 (2014) [22] N. Hubballi, V. Suyanaayanan, False alam minimization techniques in signatue-based intusion detection systems :A suvey, Compute Communications 49(2014)1-17 [23] Nsl-dd data set fo netwo-based intusion detection systems. Available on: Mach [24] P. Andeson, Compute Secuity heat Monitoing and Suveillance, Box 42 Fot Washington, Pa ,215(1980) [25] S. Benfehat, A. Boudjelida, K. abia, H. Dias, An intusion detection and alet coelation appoach based on evising pobabilistic classifies using expet nowledge, Int. J. Appl. Intell. 38 (4) (2013)

6 , Mach 18-20, 2015, Hong Kong [26] S. Deeweste, S.. Dumais, G. W. Funas,. K. Landaue, R. Hashman, Indexing by latent semantic analysis, Infomation Science,(1990) [27] S. Han, S. Cho, Rule-based integation of multiple measue-models fo effective intusion detection Systems, IEEE Intenational Confeence 1. 6(2003) [28] S. Hettich, S. D. Bay, he UCI KDD Achive [ Ivine, CA: Univesity of Califonia, Depatment of Infomation and Compute Science(1999). [29] S. W. Lin, K. C. Ying, C. Y. Lee, Z. J. Lee, An intelligent algoithm with featue selection and decision ules applied to anomaly intusion detection, Applied Soft Computing, 12(10) (2012) [30]. Liu, Z. Chen, B. Zhang, W. Ma, G. Wu, Impoving text classification using local latent semantic indexing, In Poceedings of he Fouth IEEE Intenational Confeence on Data Mining, Bighton, UK, Novembe 01-04, 2004 [31] V. Castelli, A. homasian, C.-S. Li, (2003). CSVD: Clusteing and Singula Value Decomposition fo appoximate similaity seach in high-dimensional spaces. IEEE ansaction on Knowledge and Data Engineeing, 15 (3), [32] W. Feng, Q. Zhang, G. Uu, J. X. Huang, Mining netwo data fo intusion detection though combining SVMs with ant colony netwos, Futue Geneation Compute Systems 37 (2014) [33] W. Lee, S. J. o. Stolf, K. W. Mo, A data mining famewo fo building intusion detection models. Poceedings of the 1999 IEEE Symposium Secuity and Pivacy 13(1999) [34] W. Wang, R. Battiti, Identifying intusions in compute netwos with pincipal component analysis, in: ARES 06:Poceedings of the Fist Intenational Confeence on Availability Reliability and Secuity (2006) [35] W. Yang, C. Sun, L. Zhang, (2011) A multi-manifold disciminant analysis method fo image featue extaction, Patten Recognition, 44 (8), [36] X. S. Gan, J. S. Duanmu, J. F. Wang, Cong, W., Anomaly intusion detection based on PLS featue extaction and coe vecto machine, Knowledge-Based Systems 40 (2013) 1 6. [37] Z. G. Chen, H. D. Ren, X. J. Du, Minimax pobability machine classifie with featueextaction by enel PCA fo intusion detection, Wieless Communications,Netw. Mobile Comput. (2008) 1 4.

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD)

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD) A Hybid - Video Compession echnique (H) ong, Lin; Rao, K.R. Abstact A new hybid - (H) video compession technique is poposed in this pape. Discete cosine tansfom () is widely used in video coding due to

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract Tading Volume and Seial Coelation in Stock Retuns in Pakistan Khalid Mustafa Assistant Pofesso Depatment of Economics, Univesity of Kaachi e-mail: khalidku@yahoo.com and Mohammed Nishat Pofesso and Chaiman,

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

Improving Software Effort Estimation Using Neuro-Fuzzy Model with SEER-SEM

Improving Software Effort Estimation Using Neuro-Fuzzy Model with SEER-SEM Global Jounal of Compute Science and Technology Vol. 10 Issue 12 (Ve. 1.0) Octobe 2010 a g e 51 Impoving Softwae Effot Estimation Using Neuo-Fuzzy Model with SEER-SEM Wei Lin Du 1, Danny Ho 2, Luiz Fenando

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Supporting Efficient Top-k Queries in Type-Ahead Search

Supporting Efficient Top-k Queries in Type-Ahead Search Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Epdf Sulf petroleum, Eflecti and Eeflecti

Epdf Sulf petroleum, Eflecti and Eeflecti ANALYSIS OF GLOBAL WARMING MITIGATION BY WHITE REFLECTING SURFACES Fedeico Rossi, Andea Nicolini Univesity of Peugia, CIRIAF Via G.Duanti 67 0615 Peugia, Italy T: +9-075-585846; F: +9-075-5848470; E: fossi@unipg.it

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

FIRST EXPERIENCES WITH THE DEFORMATION ANALYSIS OF A LARGE DAM COMBINING LASERSCANNING AND HIGH-ACCURACY SURVEYING

FIRST EXPERIENCES WITH THE DEFORMATION ANALYSIS OF A LARGE DAM COMBINING LASERSCANNING AND HIGH-ACCURACY SURVEYING FIRST EXPERIENCES WITH THE DEFORMATION ANALYSIS OF A LARGE DAM COMBINING LASERSCANNING AND HIGH-ACCURACY SURVEYING Diego González Aguilea a*, Javie Gómez Lahoz a and José Antonio Sánchez Seano b a Land

More information

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1145-116 (006) Automatic Closed Caption Detection and Filteing in MPEG Videos fo Video Stuctuing Depatment of Compute Science and Infomation Engineeing National

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

UNIVERSIDAD DE CANTABRIA TESIS DOCTORAL

UNIVERSIDAD DE CANTABRIA TESIS DOCTORAL UNIVERSIDAD DE CANABRIA Depatamento de Ingenieía de Comunicaciones ESIS DOCORAL Cyogenic echnology in the Micowave Engineeing: Application to MIC and MMIC Vey Low Noise Amplifie Design Juan Luis Cano de

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate

More information

Pessu Behavior Analysis for Autologous Fluidations

Pessu Behavior Analysis for Autologous Fluidations EXPERIENCE OF USING A CFD CODE FOR ESTIMATING THE NOISE GENERATED BY GUSTS ALONG THE SUN- ROOF OF A CAR Liang S. Lai* 1, Geogi S. Djambazov 1, Choi -H. Lai 1, Koulis A. Peicleous 1, and Fédéic Magoulès

More information

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011 Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12

More information

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures 2012 IEEE Fifth Intenational Confeence on Cloud Computing Self-Adaptive and Resouce-Efficient SLA Enactment fo Cloud Computing Infastuctues Michael Maue, Ivona Bandic Distibuted Systems Goup Vienna Univesity

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

The Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing?

The Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing? The Pedictive Powe of Dividend Yields fo Stock Retuns: Risk Picing o Mispicing? Glenn Boyle Depatment of Economics and Finance Univesity of Cantebuy Yanhui Li Depatment of Economics and Finance Univesity

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE 1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Referral service and customer incentive in online retail supply Chain

Referral service and customer incentive in online retail supply Chain Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

How do investments in heat pumps affect household energy consumption?

How do investments in heat pumps affect household energy consumption? Discussion Papes Statistics Noway Reseach depatment No. 737 Apil 203 Bente Halvosen and Bodil Meethe Lasen How do investments in heat pumps affect household enegy consumption? Discussion Papes No. 737,

More information

Multiband Microstrip Patch Antenna for Microwave Applications

Multiband Microstrip Patch Antenna for Microwave Applications IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

Manual ultrasonic inspection of thin metal welds

Manual ultrasonic inspection of thin metal welds Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Exam #1 Review Answers

Exam #1 Review Answers xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%

More information

LARGE DOMAIN SATELLITE BASED ESTIMATORS OF CROP PLANTED AREA

LARGE DOMAIN SATELLITE BASED ESTIMATORS OF CROP PLANTED AREA LARGE DOMAIN SATELLITE BASED ESTIMATORS OF CROP PLANTED AREA Michael E. Bellow, USDA/NASS Reseach Division, 3251 Old Lee wy., Rm. 305, Faifax, VA 22030 KEY WORDS: Regession, atio, aea sampling fame, impovements

More information

Statistics and Data Analysis

Statistics and Data Analysis Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the

More information

Ignorance is not bliss when it comes to knowing credit score

Ignorance is not bliss when it comes to knowing credit score NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL

More information

Supply chain information sharing in a macro prediction market

Supply chain information sharing in a macro prediction market Decision Suppot Systems 42 (2006) 944 958 www.elsevie.com/locate/dss Supply chain infomation shaing in a maco pediction maket Zhiling Guo a,, Fang Fang b, Andew B. Whinston c a Depatment of Infomation

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

A Glossary Of Complex Envelope Vectoization And Its Working Principle

A Glossary Of Complex Envelope Vectoization And Its Working Principle Complex Envelope Vectoization fo the solution of mid-high fequency acoustic poblems A. Sestiei Depatment of Mechanical and Aeospace Engineeing Univesity of Rome la Sapienza Pesentation layout - Low fequency

More information

On the Algorithmic Implementation of Multiclass Kernel-based Vector Machines

On the Algorithmic Implementation of Multiclass Kernel-based Vector Machines Jounal of Machine Leaning Reseach 2 (2001) 265-292 Submitted 03/01; Published 12/01 On the Algoithmic Implementation of Multiclass Kenel-based Vecto Machines Koby Camme Yoam Singe School of Compute Science

More information

Instituto Superior Técnico Av. Rovisco Pais, 1 1049-001 Lisboa E-mail: virginia.infante@ist.utl.pt

Instituto Superior Técnico Av. Rovisco Pais, 1 1049-001 Lisboa E-mail: virginia.infante@ist.utl.pt FATIGUE LIFE TIME PREDICTIO OF POAF EPSILO TB-30 AIRCRAFT - PART I: IMPLEMETATIO OF DIFERET CYCLE COUTIG METHODS TO PREDICT THE ACCUMULATED DAMAGE B. A. S. Seano 1, V. I. M.. Infante 2, B. S. D. Maado

More information

Application of the VISEVA demand generation software to Berlin using publicly available behavioral data

Application of the VISEVA demand generation software to Berlin using publicly available behavioral data Justen, Beuck, Nagel 1 Application of the VISEVA demand geneation softwae to Belin using publicly available behavioal data Submission date: 15-Nov-06 Wods: 5973 Figues and tables: 6 ( = 1500 Wods) Total:

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Choosing the best hedonic product represents a challenging

Choosing the best hedonic product represents a challenging Thosten Hennig-Thuau, Andé Machand, & Paul Max Can Automated Systems Help Consumes Make Bette Choices? Because hedonic poducts consist pedominantly of expeience attibutes, often with many available altenatives,

More information

PORTFOLIO OPTIMIZATION WHEN ASSET RETURNS HAVE THE GAUSSIAN MIXTURE DISTRIBUTION

PORTFOLIO OPTIMIZATION WHEN ASSET RETURNS HAVE THE GAUSSIAN MIXTURE DISTRIBUTION PORTFOLIO OPTIMIZATION WHEN ASSET RETURNS HAVE THE GAUSSIAN MIXTURE DISTRIBUTION IAN BUCKLEY, GUSTAVO COMEZAÑA, BEN DJERROUD, AND LUIS SECO Abstact. Potfolios of assets whose etuns have the Gaussian mixtue

More information

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION Shunqiao Sun, Athina P. Petopulu and Waheed U. Bajwa Depatment of Electical & Compute Engineeing, Rutges, The State Univesity of New Jesey

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

Model-based clustering of longitudinal data. McNicholas, Paul D.; Murphy, Thomas Brendan. Canadian Journal of Statistics, 38 (1): 153-168

Model-based clustering of longitudinal data. McNicholas, Paul D.; Murphy, Thomas Brendan. Canadian Journal of Statistics, 38 (1): 153-168 Povided by the autho(s) and Univesity College Dublin Libay in accodance with publishe policies Please cite the published vesion when available Title Model-based clusteing of longitudinal data Autho(s)

More information