Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Size: px
Start display at page:

Download "Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering"

Transcription

1 Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe , Cha E-mal: lsg69@sohu.com, cepuckb@163.com Abstract Spam s so wdely speared that has a bad effect o daly use of E-mal. Nowadays, amog the prmary techologes of spam flterg, support vector mache (SVM) s appled wdely, because t s effcet ad has hgh separatg accuracy. The ma problem of support vector mache arthmetc s how to choose the kerel fucto. To solve ths problem people propose spam flterg arthmetc of support vector mache based o Boolea kerel. The arthmetc uses flterg methods based o attrbutes, such as IP address, subject words, keywords cotet, eclosure formato, etc. These attrbutes compose the feature vectors, ad the vectors are classfed by SVM-MDNF based o Boolea kerel. The expermet results show that ths arthmetc has hgh separatg accuracy, hgh recall rato ad precso rato. The arthmetc has ts value theory ad applcato. Keywords: Spam, Support Vector Mache, Boolea Kerel 1. Itroducto E-mal s oe of the ma meas for people to commucate formato o Iteret. As the Iteret s so wdely used, sedg ad recevg E-mal has almost become a part of cosderable amout of people s daly lfe. However, wth the coveece the Iteret brgs, t also brgs the exstece ad wde spread of spams, whch cause a lot of troubles to people. It s evdet that people s work effcecy ad ther emoto wll be flueced, f they have to sped tme ad efforts o detfcato E-mal every day. So to auto-dstgush spam has mportat meag ad applyg value(shawe-taylor J, Crsta N. KereI. 2005). Spam meas that publczg E-mals, cotag all kds of publctes, such as ads, electroc publcatos, are ot requested or accepted by recevers advace. To classfy the techologes of spam flterg, they ca be classfed to two kds: server spam flterg ad clet spam flterg, accordg to dfferet places the flter s executed. But f we classfy the techologes based o dfferet flterg methods, there are three ways: spam flterg based o blacklst/ whtelst, spam flterg based o prcples ad spam flterg based cotet. 1) Spam Flterg Based O Blacklst/Whtelst Ay E-mals, set by seders the whtelst, are cosdered legal E-mals, whle ay E-mals set by the seders the blacklst are treated as spams. The followg method s wdely used spam flterg recetly. Usually t collects a blacklst ad a whtelst. I these lsts, the cotet ca be E-mal addresses, the DNS of E-mal servers or IP addresses. They help recevers to check seders real tme. 2) Spam Flterg Based O Prcples Ths method eeds people to set some prcples. Ad the spam s the E-mal that meets oe of several prcples. These prcples always clude aalyss o header, flterg o multple sed, accurate matchg o keywords ad other features of the E-mal. 3) Spam Flterg Based O Cotet Actually, the producers who sed spam vary cotuously. So the blacklst/whtelst has great lmtatos. Ad spam flterg based o prcples also has some dsadvatages: prcples are made by people, ad those users who are lack of experece wll affect the valdty ad accuracy of prcples. Therefore, may experts come up wth a dea that aalyze the cotet of E-mal frst, ad the dstgush whether t s a spam. Ths method combes spam flterg wth other techologes, such as text classfcato ad formato flterg. It requres the arthmetc of text classfcato 27

2 Vol. 3, No. 10 Moder Appled Scece ad formato flterg to be troduced to the spam flterg. To solve ths problem, a great amout of measures have bee adopted, such as exteso of E-mal protocols, certfcato of E-mal server, spam flterg ad legslato. Amog these measures, the spam flterg s more realstc. Nowadays, may arthmetc of text classfcato have bee troduced to applcatos of spam flterg based o cotet, lke Bayes, Decso Tree, K-Most Neghborg Arthmetc, Support Vector Maches, etc(wag b, Pa wefeg. 2005). Ad applcatos of SVM are more successful spam flterg. 2. Evaluate Stadard of Spam Flterg System The performace evaluato o spam flterg ofte makes use of some related dexes text classfcato. The stadard, whch ca decde whether text classfcato s mature or ot, s the mappg accuracy ad mappg speed. Ad the mappg speed s decded by the complexty of mappg arthmetc; the mappg accuracy s evaluated by formato retreval evaluato. The followgs are the deftos about two commo dexes: Recall Rato ad Precso Rato of formato retreval spam flterg feld(c.j. va Rjsberge. 1979). Def 1: Recall Rato s the rato of the amout of spam that has bee fltered to the amout of E-mals that should be fltered. The computg formula of Recall Rato s: amout of fltered spam Re call (1) amout of E mals that should be fltered Def 2: Precso Rato s the rato of the amout of spam that has bee fltered to the amout of E-mals that have bee fltered. The computg formula of Precso Rato s: amout of fltered spam Pr ecso (2) amout of E mals that have bee fltered Both of Recall Rato ad Precso Rato reflect the qualty of E-mal classfcato. They should be cosdered together rather tha oly oe of them s pad atteto. So F1 Test Value s ofte used to pla the classfcato result of evaluato E-mals as a whole. The computg formula of F1 Test Value s: Pr ecso Rato Re call Rato 2 F1 (3) Pr ecso Rato + Re call Rato Ad there are Mcro Average ad Macro Average to calculate Recall Rato, Precso Rato ad F1 Test Value. Mcro Average couts respectvely every kd s recall rato, precso rato ad test value; ad Macro Average ufedly calculates all kds recall rato, precso rato ad test value. It s evdet that all E-mal flterg arthmetc s amed at reachg the performace requsto of recall rato ad precso rato E-mal classfcato the ed. 3. Support Vector Mache Based o Boolea Kerel Fucto Support vector mache (SVM)(Zhag Yag, L Zhahua, Tag Ya, Cu Keb, DRC-BK. 2004) s a learg method proposed by Vapk ad the research group, whch s led by hm Bell Laboratory. Ad ths method s based o statstcs. SVM s developed from Optmal Separatg Plae o lear classfyg. The basc dea of t s maxmum-separato (marg). The so called optmal meas that separatg plae s requred ot oly to separate two kds of text correctly, but also to fd a max marg. Actually, the maxmum-marg s the cotrol of promoto ablty. Lear support vector mache separates the yes ad o examples, through costructg optmal hyperplae W, X + b 0 put space. Here the <,> represets the er product; W R, b R, to make that: y W, X + b 1 0 1,2,..., d (4) It ca be proved that the optmal separatg plae s what leads to mmum W put space. To solve ths problem we eed to trasform t to dual form wth Lagrage Optmzato. The dual form ca also be called costrats: The solvg s as follows: d y 0 1, 2,..., d 1 α (5) 28

3 Moder Appled Scece October, 2009 d 1 d d r r Q( α) arg max α y y X, X 1 α 2 1 j 1 α j j j α (6) α s the correspodg Lagrage multpler of costrat (5) prmary problem. Ths s a problem of seekg optmzato for quadratc fucto o the costrat of equalty ad t has uque aswer. It ca be proved easly that oly part (ofte a lttle part) of α aswers are ot equal to zero, ad the correspodg examples are the support vector. Through workg out the above-metoed problem, we get the optmal separatg fucto. That s: d r f ( X) sg( α y X, X b) 1 + (7) I the fucto: fact, the summato oly works support vector. The b s separatg threshold. It ca be worked out wth ay support vector (satsfyg formula 5th) or through the meda of ay par of support vectors two classes. d r r b ys α y X, Xs, s 0 1 α (8) Here, the sg() s a symbol fucto. Wth No-lear-Mappgφ, vectors of put space ca be trasformed to vectors of hgher-dmeso space, whch s amed as feature space. The feature space has a hgher dmeso tha the put space. No-lear SVM makes use of No-lear-Mappg φ to trasform vectors of put space to vectors of hgh-dmeso space. Therefore, X r, X the above equato are respectvely replaced by φ( X r ), φ ( X ). So we ca get that: I the fucto: d r f ( X) sg( α y ( X ), ( X) b) 1 φ φ + d r r b ys α y ( X ), ( Xs), s 0 1 φ φ α We ame the fucto lke K( xy, ) ( φ( x), φ( y)) 2 x x 1) Gaussa Radal bass fuctos: K( x, x ) exp( ) 2 2σ 2) Polyomal: K( x, x ) ((, ) 1) d x x +, for d1,..,n 3) Hyperbolc taget: K( x, x ) tamj( β x + b) as kerel fucto. Some commo kerel fuctos clude: 4) Sple kerel fuctos: K( x, x) B2+ 1( x x) Choosg dfferet kerel fuctos, you ca get dfferet No-lear support vector mache. If x ad y the kerel fuctos above are Boolea, the we ca suppose that U {0,1}, V {0,1}, σ > 0, p N, for I represets ut vector. So: K MDNF ( U, V) 1 + ( σu V 1) 1 + (9) (10) (11) We call K MDNF as Mootoe Dsjuctve Normal Form (MDNF) kerel fucto. MDNF kerel fucto s the kerel fucto we use ths paper as SVM arthmetc. 4. SVM Spam Flterg Based o Boolea Kerel Fucto ad the Expermet Results 4.1 The Strategy of SVM Spam Flterg Based O Boolea Kerel Ths expermet adopts Ero-spam E-mal dataset. Ad the dataset cludes two parts: pre-processed s the set of E-mals that have bee pretreated, ad the part raw are pretreated based o eeds to get preprocessed. Our expermet cramps out some preprocessed as trag set, ad some as testg set. We select 2000 E-mals. Amog these E-mals, 1100 are spam ad 900 are ormal E-mals. The specfc procedures of the strategy of SVM spam flterg based o Boolea kerel are as followgs: 1) Frstly, we process the dataset wth stadard. Wpe off the ose words (such as spellg mstakes, etc), ad 29

4 Vol. 3, No. 10 Moder Appled Scece flter words whose text frequecy are betwee 2 ad 8000; set dfferet weghg to the subject ad text cotet of every E-mal, ad the subject s set hgher weghg to cocer the words appearg the E-mal subject. Takg subject, text cotet ad may other features of the E-mal to cosderato, we wll get the feature vector of every E-mal. 2) Make baryzato towards the features the feature vector. That s to gve every feature the value 0 or 1. Sce we use Boolea kerel MDNF here, there s a eed to trasform the feature vector to Boolea feature vector. 3) Flter spam wth SVM based o MDNF Boolea kerel. I order to verfy whether the arthmetc s vald or ot, we use k cross for our expermet. K cross s to separate E-mals to k parts. We make use of the k-1 parts for trag, ad the remag for testg. The procedure loops k tmes, so every part has bee tested. Fally, the average of tests values s used as the result of test for evaluato. Here we make k equal Expermet Result ad Aalyss I ths expermet, we compare the separatg accuracy of the spam flterg arthmetc based o Boolea kerel SVM wth that of some arthmetc-naïve Bayes, lear SVM ad No-lear SVM based o radal bass fuctos. The result s show s the table 1: From the comparso result of separatg accuracy, t s evdet that the hghest s SVM based o MDNF Boolea kerel. Secod top s the No-lear SVM based o radal bass fuctos. The lowest s Naïve Bayes. Durg the evaluato of the effcecy of E-mal separatg arthmetc, t caot evaluate the arthmetc completely oly to compare the separatg accuracy. So we evaluate the arthmetc further usg precso rato, recall rato ad F 1 gve the Secto 2. I table 2, t compares the recall rato, precso rato ad F. Ad from these targets, we ca evaluate the valdty of the arthmetc a more comprehesve way. From the expermet result, we ca fd that SVM based o MDNF Boolea kerel has the best spam flterg effect, comparg wth the other three. 5. Cocluso After the aalyss of all the characterstcs of spam, we propose the SVM based o MDNF Boolea kerel spam flterg arthmetc whe we make the feature vector usg E-mal subject, text cotet, etc. The expermet shows that ths arthmetc has hgher separatg accuracy, ad has better spam flterg effect recall rato ad precso rato, comparg wth Naïve Bayes, Lear SVM ad SVM based o radal bass fuctos. Ad the expermets thereafter, we wll apply SVM wth more Boolea kerels to spam flterg, ad look forward a better effect. Refereces C.J. va Rjsberge. (1979). Iformato Retreval (2d edto), Butterworths, Lodo, Shawe-Taylor J, Crsta N. KereI. (2005). Methods for Patter Aa1yss. Be jg: Cha Mache Press, 2005: Wag, b, Pa, wefeg. (2005). Cotet-based spam flterg techology. Joural of Chese Iformato Processg. Be jg: 2005, 19(5):1-10. Zhag Yag, L Zhahua, Tag Ya, Cu Keb, DRC-BK. (2004). Mg Classfcato Rules wth Help of SVM. I the Proceedgs of the 8th Pacfc-Asa Coferece o Kowledge Dscovery ad Data Mg(PAKDD'04), Lecture Notes Artfcal Itellgece, Volume 3056, Sprger-Verlag Press, Table 1. Comparso of separatg accuracy Classfy algorthm Classfy accuracy NB 92.5% Ler SVM 93.8% RBF kerel SVM 94.7% MDNF-SVM 97.8% 30

5 Moder Appled Scece October, 2009 Table 2. Comparso of recall, precso ad F Classfy algorthm recall precso F 1 NB 90.4% 88.7% 89.5% Ler SVM 91.2% 90.5% 90.8% RBF kerel SVM 92.2% 92.5% 92.3% MDNF-SVM 94.2% 95.5% 94.8% 31

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Evaluating the Network and Information System Security Based on SVM Model

Evaluating the Network and Information System Security Based on SVM Model JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1 Learg to Flter Spam E-Mal: A Comparso of a Nave Bayesa ad a Memory-Based Approach 1 Io Adroutsopoulos, Georgos Palouras, Vagels Karkaletss, Georgos Sakks, Costate D. Spyropoulos ad Paagots Stamatopoulos

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data Usg Data Mg Techques to Predct Product Qualty from Physcochemcal Data A. Nachev 1, M. Hoga 1 1 Busess Iformato Systems, Cares Busess School, NUI, Galway, Irelad Abstract - Product qualty certfcato s sometmes

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

Measuring the Quality of Credit Scoring Models

Measuring the Quality of Credit Scoring Models Measur the Qualty of Credt cor Models Mart Řezáč Dept. of Matheatcs ad tatstcs, Faculty of cece, Masaryk Uversty CCC XI, Edurh Auust 009 Cotet. Itroducto 3. Good/ad clet defto 4 3. Measur the qualty 6

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning CIS63 - Artfcal Itellgece Logstc regresso Vasleos Megalookoomou some materal adopted from otes b M. Hauskrecht Supervsed learg Data: D { d d.. d} a set of eamples d < > s put vector ad s desred output

More information

An Evaluation of Naive Bayesian Anti-Spam Filtering

An Evaluation of Naive Bayesian Anti-Spam Filtering Proceedgs of the workshop o Mache earg the New Iformato Age, G. Potamas, V. Moustaks ad M. va omere (eds.), th Europea Coferece o Mache earg, Barceloa, pa, pp. 9-7, 2000. A Evaluato of Nave Bayesa At-pam

More information

GRADUATION PROJECT REPORT

GRADUATION PROJECT REPORT SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

An Operating Precision Analysis Method Considering Multiple Error Sources of Serial Robots

An Operating Precision Analysis Method Considering Multiple Error Sources of Serial Robots MAEC Web of Cofereces 35, 02013 ( 2015) DOI: 10.1051/ mateccof/ 2015 3502013 C Owe by the authors, publshe by EDP Sceces, 2015 A Operatg Precso Aalyss Metho Coserg Multple Error Sources of Seral Robots

More information

Curve Fitting and Solution of Equation

Curve Fitting and Solution of Equation UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A Comparative Study of Medical Data Classification Methods Based on Decision Tree and System Reconstruction Analysis

A Comparative Study of Medical Data Classification Methods Based on Decision Tree and System Reconstruction Analysis IEMS Vol. 4, No., pp. 0-08, Jue 005. A Comparatve Study o Medcal Data Classcato Methods Based o Decso Tree ad System Recostructo Aalyss Tzug-I Tag Departmet o Iormato & Electroc Commerce Kaa Uversty, Tawa

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

FINANCIAL MATHEMATICS 12 MARCH 2014

FINANCIAL MATHEMATICS 12 MARCH 2014 FINNCIL MTHEMTICS 12 MRCH 2014 I ths lesso we: Lesso Descrpto Make use of logarthms to calculate the value of, the tme perod, the equato P1 or P1. Solve problems volvg preset value ad future value autes.

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Maximization of Data Gathering in Clustered Wireless Sensor Networks

Maximization of Data Gathering in Clustered Wireless Sensor Networks Maxmzato of Data Gatherg Clustere Wreless Sesor Networks Taq Wag Stuet Member I We Hezelma Seor Member I a Alreza Seye Member I Abstract I ths paper we vestgate the maxmzato of the amout of gathere ata

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Synthesized Articulated Behavior using Space-temporal On-line Principal Component Analysis

Synthesized Articulated Behavior using Space-temporal On-line Principal Component Analysis Sytheszed Artculated Behavor usg Space-temporal O-le Prcpal Compoet Aalyss YUICHI MOAI Uversty of Vermot, USA, ymota@uvm.edu Abstract hs paper presets a ew framework to sythesze humaod behavor by learg

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information