Feature Extraction based Approaches for Improving the Performance of Intrusion Detection Systems
|
|
- Annabella Johnson
- 8 years ago
- Views:
Transcription
1 , Mach 18-20, 2015, Hong Kong Featue Extaction based Appoaches fo Impoving the Pefomance of Intusion Detection Systems Long-Sheng Chen*, Jhih-Siang Syu Abstact In ecent yeas, the apid development of infomation and communication technology esults in too many loopholes in the netwo, and thus attacts lots of haces attacs. Intusion Detection System (IDS) has been developed to detect these attacs. Depending on diffeent data and analysis methods, this system will have diffeent detection methods. But, thee is no one model is absolutely effective. heefoe, this study will focus on impoving the classification pefomance of anomaly detection. In this study, we ll popose Local Latent Semantic Indexing (LLSI) and Local Kenel-Pincipal Component Analysis (LKPCA) based methods, which intoduce class infomation to featue extaction techniques. And the poposed methods will be integated into suppot vecto machine (SVM) to impove the pefomance of classification. Finally, KDD-NSL data set will be employed to testify the effectiveness of the poposed methods. Index ems Intusion Detection System, Featue Extaction, Latent Semantic Indexing, Kenel-Pincipal Component Analysis, Dimension Reduction. I I. INRODUCION nfomation and communication technology (IC) has become an indispensable pat of human life based on well-built infastuctue. No matte govenment, business o a vaiety of academic, medical, and othe oganizations, they inceasingly ely on IC. But, it also bings lots of secuity poblems and cisis. Lots of netwo attac tools can easily be found and downloaded on the Intenet. hough a vaiety of netwo vulneabilities and continuously developed new attac techniques and tools, it leads to cybe-attacs continue to evolve. So, this poblem cannot be undeestimated (Feng et al, 2014; Hubballi and Suyanaayanan, 2014; Govindaajan and Chandaseaan, 2012). o solve this poblem, intusion detection systems (IDS) have been fistly developed by Andeson (1980). Since then, vaious attac identification techniques have been poposed, such as ule-based, neual netwos, suppot vecto machines, Manuscipt eceived Januay 8, 2015; accepted Januay 22, his wo was suppoted in pat by the National Science Council of aiwan, R.O.C. (Gant No. MOS E MY3). *L.-S. Chen is an Associate Pofesso of Depatment of Infomation Management and Dean of Student Affais Office with the Chaoyang Univesity of echnology, aichung 41349, aiwan (phone: ext7752; fax: ; lschen@cyut.edu.tw). J.-S. Syu is a gaduate student with the Depatment of Infomation Management, Chaoyang Univesity of echnology, aichung 41349, aiwan ( s @gm.cyut.edu.tw ). and so on. Lots of well-constucted intusion detection systems have been developed and have been applied to eal wold compute systems (Mohammed and Sulaiman, 2012). But, 30 yeas has passed since Andeson s fist study. We cannot complete solve this poblem, mainly because of damatically advances in technology. Depending on data type and data analysis methods, IDS could be divided into seveal diffeent modes. Based on analytical methods, IDS can be divided into misuse detection and anomaly detection. he fome uses a nown attac signatue database, wheneve the login data match any featue, IDS will give alams. he latte uses nomative behavio model and then obseves behavios deviation. If the behavio is inconsistent with the model, IDS will give alams. he accuacy of misuse detection system is high, but it cannot detect unnown attacs. Anomaly detection methods have high false alam ate, but it s able to detect unnown attacs (Hubballi and Suyanaayanan, 2014). So, no single one intusion detection system is applicable to any situation. In addition to a vaiety of algoithms and intusion detection system model, dimension eduction methods ae often used to select impotant featues and to educe dimension size fo saving computational cost. ypically, thee ae two goups of algoithms to epesent the featue space used in classification. he fist one is featue selection which is to select a subset of most epesentative featues fom the oiginal featue space. he second algoithm is featue extaction which is to tansfom the oiginal featue space to a smalle featue space to educe the dimension. hese dimension eduction techniques have widely applied to solve eal poblems. Fo examples, Eesa et al. (2015) used cuttlefish based featue selection techniques to maintain data quality featues and emove edundant and ielevant featues. Gan et al. (2013) combined with Patial Least Squae (PLS) featue extaction technique and Coe Vecto Machine (CVM) algoithm to detect the abnomalities. Kuang et al. (2014) using a suppot vecto machine (SVM) combined enel pincipal component analysis (KPCA) and genetic algoithm (GA), whee KPCA is used to educe the data dimension. o sum up, featue extaction which is one of dimension eduction method can poduce a new set of featues by tansfoming the oiginal input vaiables (Yang et al., 2011). But, the new set of featues cannot etain the oiginal meanings of oiginal featues (Jain et al., 2000). Liu et al. (2004) and Chen et al. (2008) indicated that featue extaction can educe the dimensions of the featue space geatly compaed with featue selection.
2 , Mach 18-20, 2015, Hong Kong Because the ange of intusion detection system is wide, the majo objective of this study is to focus on impoving the classification pefomance of anomaly detection. Latent Semantic Indexing (LSI) (Deeweste et al., 1990; Guan et al., 2013; Uysal and Gunal, 2012; Wang et al., 2015) and KPCA will be employed to integate into Suppot Vecto Machines (SVM) to incease the anomaly detection pefomance. In this study, we ll to popose a Local Latent Semantic Indexing (LLSI) by singula value decomposition (SVD) and Local Kenel-Pincipal Component Analysis (LKPCA) based methods which intoduce class infomation to featue extaction techniques. And the poposed methods will be integated into suppot vecto machine (SVM) to impove the pefomance of classification. Finally, KDD-NSL data set will be employed to testify the effectiveness of the poposed methods. II. LIERAURE REVIEW A. Intusion Detection Systems hose unauthoized activities which have been designed to access system esouces o data ae called intusion (Hubballi and Suyanaayanan, 2014). he main coe of intusion detection system is to be able to detect these attacs o illegal activities to povide netwo manages coesponding teatment. he IDS can be classified into seveal diffeent modes accoding to its data souce and analytic methods. able 1 shows the categoy of IDS. Usually, we build IDS in the font end of a netwo segment, o behind/afte the fiewall, to analyze pacet though the inspected netwo section. In 30-yea histoy of IDS, ule-based ealy detection module has been fistly developed and become the main steam (Han, 2003; Lee, 1999). Afte then, diffeent algoithms based detection methods, such as genetic algoithm (GA) (Kuang et al., 2014), Bayes (Benfehat et al., 2013), neual netwos (NN) (homas and Balaishnan, 2008), and suppot vecto machine (SVM) (Feng et al, 2014; Mohammed and Sulaiman, 2012) have been constucted. ABLE I IDS CLASSIFICAION Classification Species Monitoing objectives and appoach. Netwobased Monitoing netwo pacets. Intenal ecods monitoing activities of Host-based Souces of the host system. infomation to Application distinguish -based Log file monitoing application geneated. Goal-based Monitoing special o secet achives. Hybid Monitoing netwo pacets and host systems combined ecod of activities. Analytical methods to distinguish Misusebased Anomalybased Hybid Uses a database of nown attac signatues, wheneve the login data match any featue, IDS will give alams. Nomative system behavio and obsevable deviations ae aised as alams. Combines signatue-based and anomaly-based appoach enables them to complement each othe. ill now, in ode to cope with the apid development of infomation technology, single one type of models has been insufficient to potect netwo secuity. So, the hybid appoaches gadually become the mainsteam (Kim and Kim, 2014). False positives (FP) is the most common indicatos in assessing the quality of an IDS. And, how to educe the so-called false positive ate in this field has become one of impotant issues (Hubballi and Suyanaayanan, 2014). Howeve, the eal pupose of this study is not to build complete IDS, but how to impove the classification pefomance. Kuang et al. (2014) pointed out that the intusion detection can be seen as essentially a classification poblem to distinguish abnomal activities. hus, the study focuses on the emphasis on the use of data mining techniques to detect abnomal pattens of classification pefomance, hoping to impove thei pefomance though effective data mining techniques. B. Featue Extaction Accoding to available liteatues, lots of wos used vaious featue extaction methods fo dimension eduction (Hoque and Bhattachayya, 2014; Lin et al., 2012). he most epesentative featue extaction algoithm is the Latent Semantic Indexing (LSI) (Deeweste et al., 1990; Guan et al., 2013; Uysal and Gunal, 2012; Wang et al., 2015) which is an automatic method that tansfoms the oiginal textual data to a smalle semantic space by taing advantage of some of the implicit highe-ode stuctue in associations of wods with text objects (Bey et al., 1995; Deeweste et al., 1990). he tansfomation is computed by applying tuncated singula value decomposition (SVD) to the tem-by-document matix. Afte SVD, tems which ae used in simila contexts will be meged togethe. SVD is an optimal linea tansfomation fo dimensionality eduction. It allows the aangement of the space to eflect the majo associative pattens in the data, and ignoe the smalle, less impotant influences. SVD tansfomation as well has the advantage of yielding zeo-mean and uncoelated featues (Castelli et al., 2003). Moeove, it has been epoted that SVD can be applied to education, solving linea least-squaes poblems, data compession (Aitas and Malaschono, 2004), document classification (Guan et al., 2013), and text classification (Uysal and Gunal, 2012). heefoe, LSI is employed as the featue extaction tool in this study. Anothe famous featue extaction method is Pincipal Component Analysis (PCA). PCA method can only extact the linea stuctue infomation in the data set, howeve, it cannot extact this nonlinea stuctue infomation. Except intusion detection, thee ae lots of successful applications in many aeas, such as face ecognition, stoc pediction model, and so on (Zhou et al, 2014; Kuang et al, 2014; Wang and Battiti, 2006;Wen et al ). KPCA (Scholopf et al., 1998) is an impoved PCA, which extacts the pincipal components by adopting a nonlinea enel method. A ey insight behind KPCA is to tansfom the input data into a high dimensional featue space F in which PCA is caied out, and in implementation, the implicit featue vecto in F does not need to be computed explicitly, while it is just done by computing the inne poduct of two vectos in F with a enel function (Kuang et al., 2014). Using non-linea enel function, KPCA impove the nonlinea poblems which cannot be solved by PCA (Chen et al, 2008; Ding et al, 2009). he main advantage of KPCA is that it does not involve nonlinea optimization; essentially it only equies linea algeba, which maes it as simple as standad PCA (Jia et al., 2012). KPCA equies only the
3 , Mach 18-20, 2015, Hong Kong solution of an eigenvalue poblem, and due to its ability to use diffeent enels, it can handle a wide ange of nonlineaities. In addition, KPCA does not equie the numbe of components to be extacted and specified pio to modeling. Due to these advantages, this study employs KPCA and compae its esults to LSI. III. IMPLEMENAL PROCEDURE he expeimental pocedue is divided into two stages, the fist stage, we use featue extaction methods to educe dimensionality. he oiginal 41 featues will be educed to smalle dimensionality. In the second phase, we find the optimal educed dimension size though evaluating by SVM classifie. he implemental pocedue can be shown in Figue 1. Actually, thee ae 6 majo steps. he concise steps can be found as follows. FIGURE 1 HE IMPLEMENAL PROCEDURE OF HIS WORK Step 1: Data Collection he employed tain20pecent data comes fom KDD-NSL data sets (Nsl-dd, 2009). his data set is used to detect intusion, and povided by well-nown public data sets KDD CUP 99 (Hettich and Bay, 1999). It s modified fom KDD CUP 99, and impove some disadvantages of oiginal data (avallaee et al., 2009). Step 2: Data Pepocessing In tain20pecent dataset, the attac type has been categoized 23 types. We combine all 23 attacs into one class abnomal. heefoe, it has become binay class classification poblems. Step 3: Featue Extaction his study uses 4 featue extaction methods, Global LSI, Local LSI, Global KPCA, and Local KPCA. Global LSI and Global KPCA mean the oiginal LSI and KPCA without intoducing class infomation. Local LSI and Local KPCA ae ou pesented methods. Step 3.1 LSI Let s biefly intoduce the concept of SVD. Let A be a m n matix of an whose ows epesent documents and columns denote tems (vaiables). Let the singula values of A (the Eigen values of A A ) be he singula value decomposition of A expesses A as the poduct of thee matices A USV, whee S diag( 1,..., ) is an matix, U (u1,..., u ) is an m matix whose columns ae othonomal, and V (v1,..., v ) is an n matix. LSI wos by omitting all but the lagest singula values in the above decomposition, fo some suitable ( is the dimension of the low-dimensional space). It should be small enough to enable fast etieval and lage enough to adequately captue the stuctue of the copus. Let S diag( 1,..., ), U (u1,..., u ) and V (v1,..., v ). hen A U SV is a matix of an, which is the appoximation of A. he ows of V S above ae then used to epesent the documents. In othe wods, the ow vectos of A ae pojected to the -dimensional space spanned by the ow vectos of U ; we sometimes call this space the LSI space of A. We implement Global LSI and Local LSI. Global LSI is the geneal method of using SVD. We can choose the educed dimension size, and then we use M U S to be a new set of input featues. In Local LSI (Liu et al., 2004), we fist divide data into seveal goups based on thei class labels. Next, we implement the same pocedue with Global LSI. So, Local LSI intoduces the additional infomation of class (dependent vaiables) while tansfoming. Step 3.2 KPCA Global KPCA Step Collect data X, and nomalize the data of each n m vaiable into mean 0 and vaiance 1. I I Step Compute the enel matix K R, note the elements as K. ij Step Cay out centeing in the featue space fo K. Step Cay out pincipal component decomposition fo, and detemine the numbe of PCs etained, ecoded as A, and then pojection is obtained. Local KPCA Step Collect data X, and nomalize the data of each n m vaiable into mean 0 and vaiance 1. Step Divide collected data into seveal goups based on thei class labels. Fo each goup, we implement sub-steps 3.3.3~3.3.5, espectively. I I Step Compute the enel matix K R, note the elements as K. ij Step Cay out centeing in the featue space fo K. Step Cay out pincipal component decomposition fo, and detemine the numbe of PCs etained, ecoded as A, and then pojection is obtained. Step 4 Build SVM classifie In ode to confim the pefomances of poposed Local LSI and Local KPCA, we use the educed dimensionality to build SVM. In this step, we use the taining data to constuct SVM classifie, and then input the test data to validate the built classifies. Moeove, 5 fold coss validation expeiment has been employed fo these taining data. Step 5 Results Evaluation We use oveall accuacy (OA) and F1 to evaluate the pefomances.
4 , Mach 18-20, 2015, Hong Kong Step 6 Daw Conclusions Based on esults, we can mae conclusion. A. Data Pepocessing IV. RESULS In this study, we employ tain20pecent file fom NSL-KDD (Nsl-dd, 2009). In this dataset, the attac type has been categoized in able 2. Besides, able 3 shows the data size and class distibution infomation. By the way, we define 4 attac types into one abnomal class. heefoe, it has become binay class classification poblems. In addition, 5 fold coss validation expeiment has been employed. All data will be nomalized. Attac ype U2R R2L DOS Pobe ABLE II AACK YPES IN NSL-KDD DAASE Attac detailed classification Buffe_oveflow, loadmodule, multihop, pel, ootit ftp_wite, guess_passwd, imap, phf, spy, waezclient, waezmaste ftp_wite, guess_passwd, imap, phf, spy, waezclient, waezmaste Ipsweep, nmap, potsweep, satan 2*Pecision*Re call F1 (4) Pecision Re call he oveall accuacy (OA) has been defined in equation (1). F1 is a weighted index both consideing Pecision and Recall indicatos. Pecision, Recall, F1 can be defined in equations (2)~(4). C. Expeimental Results Figue 2 povides the summay of esults when using LSI. Fom this figue, we can find that the pefomance of Global LSI and Local LSI eep stable when dimension size deceasing. But, even when the dimension size educe fom oiginal 41 attibutes to 1 attibutes, Local LSI has bette pefomance than Global LSI no matte consideing OA o F1. (a) (b) ABLE III DAA DISRIBUION Expeiment No. Data size Class distibution Fold-1 Fold-2 Fold-3 Fold-4 Fold-5 B. Measuement Index 25,192 Nomal:13,449 Attac:11,743 o illustate measuement index, we use table 4 to demonstate accuacy and F1. (a) FIGURE 2 RESULS OF GLOBAL LSI AND LOCAL LSI ABLE IV BINARY CLASSIFICAION Pedicted Nomal Pedicted Attac Actual Nomal P FP Actual Attac FN N (b) In able 4, the meanings of denotations P, FP, FN, N have given as follows. (1) P: Actual nomal examples classified into nomal. (2) FP: Actual nomal examples classified into attac. (3) FN: Actual attac examples classified into nomal. (4) N: Actual attacs examples classified into attac. P N OA (1) P FP N FN P P ecision (2) P FP P Re call (3) P FN FIGURE 3 RESULS OF GLOBAL KPCA AND LOCAL KPCA Figue 3 povides the summay of esults when using KPCA. Fom this figue, unlie LSI, we can find that the pefomance of Global KPCA gets wose when dimension size deceasing. But, even when the dimension size educe fom oiginal 41 attibutes to 1 attibutes, Local KPCA significantly outpefom Global LSI no matte consideing OA o F1. able 5 gives the compaison of oiginal SVM, Global
5 , Mach 18-20, 2015, Hong Kong LSI, and Local LSI. Fom this table, we can find the computational time save up to 98% no matte implementing Global LSI o Local LSI. But, Local LSI can maintain the classification pefomance. able 6 shows the compaisons of oiginal SVM, Global KPCA, and Local KPCA. Consideing computational time, Global KPCA and Local KPCA only use 1.34% and 0.017%, espectively. Local KPCA significantly outpefom oiginal SVM no matte in OA and F1. Fom ables 5~6, we can find that intoducing class infomation to featue extaction methods can not only eep the classification pefomance, but also emaably educe the computational time. OA (%) F1 (%) ime ABLE V COMPARISONS OF ORIGINAL SVM, GLOBAL LSI AND LOCAL LSI Oiginal (dimensions 41) (0.06) (0.05) 345, (12.25) Global LSI- SVM (23.90) (15.38) 7, (29.62) Local LSI- SVM (0.17) (0.16) 7, (0.15) Note: he numbe (0.06) in this table means Mean (Standad Deviation), espectively. ABLE VI COMPARISONS OF ORIGINAL SVM, GLOBAL KPCA AND LOCAL KPCA Oiginal (dimensions 41) Global KPCA Aveages Local KPCA (Standad Deviation) OA (%) (0.06) F1 (%) (0.05) 345, , ime (12.25) (19.19) (10.00) Note: he numbe (0.06) in this table means Mean (Standad Deviation), espectively. V. CONCLUSIONS In the pesent study, we utilize featue extaction selection method (LSI, KPCA) to impove the pefomance of intusion detection systems. By intoducing class infomation, we pesent Local-LSI and Local-KPCA. Results indicated that Local-LSI and Local-KPCA outpefom Global LSI and Global KPCA, and oiginal SVM, espectively. Local-KPCA cannot only damatically save computational time, but also emaably incease the classification pefomance. We can conclude that intoducing class infomation to featue extaction methods can not only eep the classification pefomance, but also emaably educe the computational time. Howeve, the esults obtained fom one data set. If we want to have a genealized conclusion, moe data sets and additional featue extaction methods can be used in the futue wos. Multi-class classification might be anothe one diection of futue eseaches. REFERENCES [1] A. S. Eesa, Z. Oman, A. M. A. Bifcani, A novel featue-selection appoach based on the cuttlefish optimization algoithm fo intusion detection systems, Expet Systems with Applications 42 (2015) [2] B. Scholopf, A. Smola, K. R. Mulle, Nonlinea Component Analysis as a Kenel Eigenvalue Poblem, Neual Computation 10(5) (1998) [3] C. homas, N. Balaishnan, Pefomance enhancement of intusion detection systems using advances in senso fusion, in: Fusion 08: Poceedings of the 11th Intenational Confeence on Infomation Fusion, (2008) [4] C. Zhou, L. Wang, Q. Zhang, X. Wei, Face ecognition based on PCA and logistic egession analysis, Opti - Intenational Jounal fo Light and Electon Optics,125:20(2014) [5] C.-C. Chen, L.-S. Chen, C.-C. Hsu,, and W.-R. Zeng, (2008) An infomation ganulation based data mining appoach fo classifying imbalanced data, Infomation Sciences, 178 (16): [6] F. Kuang, W. Xu, Zhang, S., A novel hybid KPCA and SVM with GA model fo intusion detection, Applied Soft Computing 18(2014) [7] F. Wen, J. Xiao, Z. He, X. Gong, Stoc Pice Pediction based on SSA and SVM, Pocedia Compute Science 31(2014) [8] G. Aitas, G. I. Malaschono, (2004). Applications of singula-value decomposition (SVD). Mathematics and Computes in Simulation, 67, [9] G. Kim, S. Lee, S. Kim, A novel hybid intusion detection method integation anomaly detection with misuse detection, Expet Systems with Applications 41(2014) [10] H. Guan, J. Zhou, B. Xiao, M. Guo,. Yang, (2013). Fast dimension eduction fo document classification based on impecise spectum analysis. Infomation Sciences, 222, [11] J. Wang, J. Peng, Q. Liu, (2015). A classification appoach fo less popula webpages based on latent semantic analysis and ough set model. Expet Systems with Applications, 42(1), [12] K. Bhattachayya, J. K. Kalita, Netwo anomaly detection: A machine leaning pespective, (2013),CRC Pess. [13] K. Jain, R. P. W. Duin, and J. Mao, (2000). Statistical patten ecognition: A eview, IEEE ansactions on Patten Analysis and Machine Intelligence, 22(1): [14] K. Uysal, and S. Gunal, (2012). A novel pobabilistic featue selection method fo text classification. Knowledge-Based Systems, 36, [15] M. Ding, Z. ian, H. Xu, Adaptive enel pincipal analysis fo online featueextaction, Poc. Wold Acad. Sci. Eng. echnol. 59 (2009) [16] M. Govindaajan, R. M. Chandaseaan, Intusion Detection using an Ensemble of Classification Methods, Poceedings of the Wold Congess on Engineeing and Compute Science (2012 )WCECS. [17] M. Jia, H. Xu, X. Liu, N. Wang, he optimization of the ind and paametes of enel function in KPCA fo pocess monitoing, Computes and Chemical Engineeing 46 (2012) [18] M. N. Mohammed, N. Sulaiman, Intusion Detection System Based on SVM fo WLAN, Pocedia echnology 1(2012) [19] M. avallaee, E. Baghei, W. Lu, and A. A. Ghobani, A Detailed Analysis of the KDD CUP 99 Data Set, poceedings of the 2009 IEEE Symposium on Computational Intelligence in Secuity and Defense Applications (CISDA 2009). [20] M.W. Bey, S.. Dumais, and G. W. O'Bien, (1995). Using linea algeba fo intelligent infomation etieval. SIAM Review, 37, pp [21] N. Hoque, D. K. Bhattachayya, J. K. Kalita, MIFS-ND: A mutual infomation-based featue selection method, Expet Systems with Applications 41 (2014) [22] N. Hubballi, V. Suyanaayanan, False alam minimization techniques in signatue-based intusion detection systems :A suvey, Compute Communications 49(2014)1-17 [23] Nsl-dd data set fo netwo-based intusion detection systems. Available on: Mach [24] P. Andeson, Compute Secuity heat Monitoing and Suveillance, Box 42 Fot Washington, Pa ,215(1980) [25] S. Benfehat, A. Boudjelida, K. abia, H. Dias, An intusion detection and alet coelation appoach based on evising pobabilistic classifies using expet nowledge, Int. J. Appl. Intell. 38 (4) (2013)
6 , Mach 18-20, 2015, Hong Kong [26] S. Deeweste, S.. Dumais, G. W. Funas,. K. Landaue, R. Hashman, Indexing by latent semantic analysis, Infomation Science,(1990) [27] S. Han, S. Cho, Rule-based integation of multiple measue-models fo effective intusion detection Systems, IEEE Intenational Confeence 1. 6(2003) [28] S. Hettich, S. D. Bay, he UCI KDD Achive [ Ivine, CA: Univesity of Califonia, Depatment of Infomation and Compute Science(1999). [29] S. W. Lin, K. C. Ying, C. Y. Lee, Z. J. Lee, An intelligent algoithm with featue selection and decision ules applied to anomaly intusion detection, Applied Soft Computing, 12(10) (2012) [30]. Liu, Z. Chen, B. Zhang, W. Ma, G. Wu, Impoving text classification using local latent semantic indexing, In Poceedings of he Fouth IEEE Intenational Confeence on Data Mining, Bighton, UK, Novembe 01-04, 2004 [31] V. Castelli, A. homasian, C.-S. Li, (2003). CSVD: Clusteing and Singula Value Decomposition fo appoximate similaity seach in high-dimensional spaces. IEEE ansaction on Knowledge and Data Engineeing, 15 (3), [32] W. Feng, Q. Zhang, G. Uu, J. X. Huang, Mining netwo data fo intusion detection though combining SVMs with ant colony netwos, Futue Geneation Compute Systems 37 (2014) [33] W. Lee, S. J. o. Stolf, K. W. Mo, A data mining famewo fo building intusion detection models. Poceedings of the 1999 IEEE Symposium Secuity and Pivacy 13(1999) [34] W. Wang, R. Battiti, Identifying intusions in compute netwos with pincipal component analysis, in: ARES 06:Poceedings of the Fist Intenational Confeence on Availability Reliability and Secuity (2006) [35] W. Yang, C. Sun, L. Zhang, (2011) A multi-manifold disciminant analysis method fo image featue extaction, Patten Recognition, 44 (8), [36] X. S. Gan, J. S. Duanmu, J. F. Wang, Cong, W., Anomaly intusion detection based on PLS featue extaction and coe vecto machine, Knowledge-Based Systems 40 (2013) 1 6. [37] Z. G. Chen, H. D. Ren, X. J. Du, Minimax pobability machine classifie with featueextaction by enel PCA fo intusion detection, Wieless Communications,Netw. Mobile Comput. (2008) 1 4.
Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor
> PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task
More informationThe transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
More informationSoftware Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
More informationIlona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
More informationDistributed Computing and Big Data: Hadoop and MapReduce
Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents
More informationAN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
More informationHEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
More informationON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS
ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy
More informationSTUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
More informationA Hybrid DCT-SVD Video Compression Technique (HDCTSVD)
A Hybid - Video Compession echnique (H) ong, Lin; Rao, K.R. Abstact A new hybid - (H) video compession technique is poposed in this pape. Discete cosine tansfom () is widely used in video coding due to
More informationResearch on Risk Assessment of the Transformer Based on Life Cycle Cost
ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,
More informationSUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA
Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.
More informationEffect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
More informationChapter 3 Savings, Present Value and Ricardian Equivalence
Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,
More informationMETHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION
ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix
More informationTrading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract
Tading Volume and Seial Coelation in Stock Retuns in Pakistan Khalid Mustafa Assistant Pofesso Depatment of Economics, Univesity of Kaachi e-mail: khalidku@yahoo.com and Mohammed Nishat Pofesso and Chaiman,
More informationYARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH
nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav
More informationMining Relatedness Graphs for Data Integration
Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact
More informationAn Epidemic Model of Mobile Phone Virus
An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity
More informationEvaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter
Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu
More informationA framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods
A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com
More informationTracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors
Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg
More informationAn Introduction to Omega
An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom
More informationAutomatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
More informationQuestions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
More informationest using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
More informationSemipartial (Part) and Partial Correlation
Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated
More informationDatabase Management Systems
Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012
More informationThe Detection of Obstacles Using Features by the Horizon View Camera
The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp
More informationImproving Software Effort Estimation Using Neuro-Fuzzy Model with SEER-SEM
Global Jounal of Compute Science and Technology Vol. 10 Issue 12 (Ve. 1.0) Octobe 2010 a g e 51 Impoving Softwae Effot Estimation Using Neuo-Fuzzy Model with SEER-SEM Wei Lin Du 1, Danny Ho 2, Luiz Fenando
More informationThe Role of Gravity in Orbital Motion
! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State
More informationOptimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems
Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe
More informationThe impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011
The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility
More informationIBM Research Smarter Transportation Analytics
IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition
More informationTiming Synchronization in High Mobility OFDM Systems
Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of
More informationSupporting Efficient Top-k Queries in Type-Ahead Search
Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),
More informationVISCOSITY OF BIO-DIESEL FUELS
VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use
More informationINITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
More informationAn Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance
More informationStrength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
More informationEpdf Sulf petroleum, Eflecti and Eeflecti
ANALYSIS OF GLOBAL WARMING MITIGATION BY WHITE REFLECTING SURFACES Fedeico Rossi, Andea Nicolini Univesity of Peugia, CIRIAF Via G.Duanti 67 0615 Peugia, Italy T: +9-075-585846; F: +9-075-5848470; E: fossi@unipg.it
More informationSupplementary Material for EpiDiff
Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module
More informationChannel selection in e-commerce age: A strategic analysis of co-op advertising models
Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of
More informationHigh Availability Replication Strategy for Deduplication Storage System
Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data
More informationFIRST EXPERIENCES WITH THE DEFORMATION ANALYSIS OF A LARGE DAM COMBINING LASERSCANNING AND HIGH-ACCURACY SURVEYING
FIRST EXPERIENCES WITH THE DEFORMATION ANALYSIS OF A LARGE DAM COMBINING LASERSCANNING AND HIGH-ACCURACY SURVEYING Diego González Aguilea a*, Javie Gómez Lahoz a and José Antonio Sánchez Seano b a Land
More informationAutomatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1145-116 (006) Automatic Closed Caption Detection and Filteing in MPEG Videos fo Video Stuctuing Depatment of Compute Science and Infomation Engineeing National
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability
More informationUNIVERSIDAD DE CANTABRIA TESIS DOCTORAL
UNIVERSIDAD DE CANABRIA Depatamento de Ingenieía de Comunicaciones ESIS DOCORAL Cyogenic echnology in the Micowave Engineeing: Application to MIC and MMIC Vey Low Noise Amplifie Design Juan Luis Cano de
More informationUncertain Version Control in Open Collaborative Editing of Tree-Structured Documents
Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem
More informationEfficient Redundancy Techniques for Latency Reduction in Cloud Systems
Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo
More informationMATHEMATICAL SIMULATION OF MASS SPECTRUM
MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec
More informationElectricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system
Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate
More informationPessu Behavior Analysis for Autologous Fluidations
EXPERIENCE OF USING A CFD CODE FOR ESTIMATING THE NOISE GENERATED BY GUSTS ALONG THE SUN- ROOF OF A CAR Liang S. Lai* 1, Geogi S. Djambazov 1, Choi -H. Lai 1, Koulis A. Peicleous 1, and Fédéic Magoulès
More informationarxiv:1110.2612v1 [q-fin.st] 12 Oct 2011
Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12
More informationSelf-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures
2012 IEEE Fifth Intenational Confeence on Cloud Computing Self-Adaptive and Resouce-Efficient SLA Enactment fo Cloud Computing Infastuctues Michael Maue, Ivona Bandic Distibuted Systems Goup Vienna Univesity
More informationValuation of Floating Rate Bonds 1
Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned
More informationThe Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing?
The Pedictive Powe of Dividend Yields fo Stock Retuns: Risk Picing o Mispicing? Glenn Boyle Depatment of Economics and Finance Univesity of Cantebuy Yanhui Li Depatment of Economics and Finance Univesity
More informationChris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment
Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability
More informationAn Approach to Optimized Resource Allocation for Cloud Simulation Platform
An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,
More informationConcept and Experiences on using a Wiki-based System for Software-related Seminar Papers
Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,
More informationReview Graph based Online Store Review Spammer Detection
Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu
More informationINVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE
1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of
More informationMemory-Aware Sizing for In-Memory Databases
Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA
More informationConverting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
More informationFirstmark Credit Union Commercial Loan Department
Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and
More informationReferral service and customer incentive in online retail supply Chain
Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics
More informationData Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation
(213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute
More informationHow do investments in heat pumps affect household energy consumption?
Discussion Papes Statistics Noway Reseach depatment No. 737 Apil 203 Bente Halvosen and Bodil Meethe Lasen How do investments in heat pumps affect household enegy consumption? Discussion Papes No. 737,
More informationMultiband Microstrip Patch Antenna for Microwave Applications
IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications
More informationTowards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure
Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich
More informationThey aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run
End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca
More informationFinancing Terms in the EOQ Model
Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad
More informationCloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
More informationAnalyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis
Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency
More informationManual ultrasonic inspection of thin metal welds
Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640
More informationSpirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
More informationExam #1 Review Answers
xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%
More informationLARGE DOMAIN SATELLITE BASED ESTIMATORS OF CROP PLANTED AREA
LARGE DOMAIN SATELLITE BASED ESTIMATORS OF CROP PLANTED AREA Michael E. Bellow, USDA/NASS Reseach Division, 3251 Old Lee wy., Rm. 305, Faifax, VA 22030 KEY WORDS: Regession, atio, aea sampling fame, impovements
More informationStatistics and Data Analysis
Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the
More informationIgnorance is not bliss when it comes to knowing credit score
NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news
More informationSecure Smartcard-Based Fingerprint Authentication
Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity
More informationFinancial Planning and Risk-return profiles
Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun
More informationAn application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty
An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,
More informationSTABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION
Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL
More informationSupply chain information sharing in a macro prediction market
Decision Suppot Systems 42 (2006) 944 958 www.elsevie.com/locate/dss Supply chain infomation shaing in a maco pediction maket Zhiling Guo a,, Fang Fang b, Andew B. Whinston c a Depatment of Infomation
More informationTowards Automatic Update of Access Control Policy
Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia
More information9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
More informationA Glossary Of Complex Envelope Vectoization And Its Working Principle
Complex Envelope Vectoization fo the solution of mid-high fequency acoustic poblems A. Sestiei Depatment of Mechanical and Aeospace Engineeing Univesity of Rome la Sapienza Pesentation layout - Low fequency
More informationOn the Algorithmic Implementation of Multiclass Kernel-based Vector Machines
Jounal of Machine Leaning Reseach 2 (2001) 265-292 Submitted 03/01; Published 12/01 On the Algoithmic Implementation of Multiclass Kenel-based Vecto Machines Koby Camme Yoam Singe School of Compute Science
More informationInstituto Superior Técnico Av. Rovisco Pais, 1 1049-001 Lisboa E-mail: virginia.infante@ist.utl.pt
FATIGUE LIFE TIME PREDICTIO OF POAF EPSILO TB-30 AIRCRAFT - PART I: IMPLEMETATIO OF DIFERET CYCLE COUTIG METHODS TO PREDICT THE ACCUMULATED DAMAGE B. A. S. Seano 1, V. I. M.. Infante 2, B. S. D. Maado
More informationApplication of the VISEVA demand generation software to Berlin using publicly available behavioral data
Justen, Beuck, Nagel 1 Application of the VISEVA demand geneation softwae to Belin using publicly available behavioal data Submission date: 15-Nov-06 Wods: 5973 Figues and tables: 6 ( = 1500 Wods) Total:
More informationMULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with
More informationCONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS
CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.
More informationChoosing the best hedonic product represents a challenging
Thosten Hennig-Thuau, Andé Machand, & Paul Max Can Automated Systems Help Consumes Make Bette Choices? Because hedonic poducts consist pedominantly of expeience attibutes, often with many available altenatives,
More informationPORTFOLIO OPTIMIZATION WHEN ASSET RETURNS HAVE THE GAUSSIAN MIXTURE DISTRIBUTION
PORTFOLIO OPTIMIZATION WHEN ASSET RETURNS HAVE THE GAUSSIAN MIXTURE DISTRIBUTION IAN BUCKLEY, GUSTAVO COMEZAÑA, BEN DJERROUD, AND LUIS SECO Abstact. Potfolios of assets whose etuns have the Gaussian mixtue
More informationTARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa
TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION Shunqiao Sun, Athina P. Petopulu and Waheed U. Bajwa Depatment of Electical & Compute Engineeing, Rutges, The State Univesity of New Jesey
More information2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,
3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects
More informationwho supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors
Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division
More informationModel-based clustering of longitudinal data. McNicholas, Paul D.; Murphy, Thomas Brendan. Canadian Journal of Statistics, 38 (1): 153-168
Povided by the autho(s) and Univesity College Dublin Libay in accodance with publishe policies Please cite the published vesion when available Title Model-based clusteing of longitudinal data Autho(s)
More information