Research of Video Steganalysis Algorithm Based on H265 Protocol

Size: px
Start display at page:

Download "Research of Video Steganalysis Algorithm Based on H265 Protocol"

Transcription

1 MATEC Web of Conferences 5, ( 05) DOI: 0.05/ matecconf/ C Owned by the authors, publshed by EDP Scences, 05 Research of Vdeo Steganalyss Algorthm Based on H65 Protocol Kacheng Wu School of Mathematcs and Computer Scence, Janghan Unversty, Wuhan, Hube, Chna ABSTRACT: A new generaton of vdeo codng standard H65 has rased a publc concern by relevant scholars from all walks of lfe snce Aprl 00. Hgh-defnton vdeo s characterzed by huge data sze, complex encodng structure, hgh real-tme performance and so on. Therefore, to desgn encrypton and decrypton program accordng to the actual needs and combned wth applcaton scenaros s mperatve. Vdeo steganalyss algorthm s a key content of vdeo steganalyss (VSA), and VSA s a key technology of vdeo decrypton. Ths paper researches LSB matchng VSA based on H65 protocol wth the research background of 6 orgnal Vdeo sequences, t frstly extracts classfcaton features out from tranng samples as nput of SVM, and trans n SVM to obtan hgh-qualty category classfcaton model, and then tests whether there s suspcous nformaton n the vdeo sample. The expermental results show that VSA algorthm based on LSB matchng can be more practcal to obtan all frame embedded secret nformaton and carrer and vdeo of local frame embedded. In addton, VSA adopts the method of frame by frame wth a strong robustness n resstng attack n the correspondng tme doman. Keywords: vdeo steganalyss; LSB matchng; medan flter; characterstc; secret nformaton INTRODUCTION Wth the rapd development of hgh and new technology n the Internet and streamng meda, multmeda communcaton has become an ndspensable part for people to exchange nformaton. Recently, the Jont Collaboratve Team on Vdeo Codng (JCT-VC) proposes a new generaton of vdeo codng standard HEVC. The frst edton of HEVC standard was completed n January 03, whch was called as H65 by ITU-T. Steganography and steganalyss s one of themes of network nformaton confrontaton. Steganography embeds the secret nformaton nto the text, mage, vdeo and other dgtal carrer n dsguse to acheve unknown covert communcaton. Steganalyss s dvded nto actve and passve steganalyss. The passve steganalyss ams at determnng whether the vdeo contans the secret nformaton, whle the actve steganalyss ams at estmatng the secret nformaton tself, that s, calculatng the length of secret nformaton, hdng place or parameters used n the process of steganalyss. To explore the prncple of H65 vdeo steganalyss, ths paper proposes a vdeo steganalyss algorthm based on LSB matchng, so as to provde the theoretcal bass for the development of hgh-qualty multmeda communcaton technology. Many people have made efforts on the vdeo steganalyss. Wedong Zhong, et al. (0) proposed a real-tme vdeo steganalyss method, whch obtans an estmated value of vdeo frame by a sldng wndow wth the sze of L+, extracts the correspondng DCT and Markov characterstcs, and tests steganographc vdeo by the use of neural network, support vector machne and multple classfcaton methods []. Yfeng Sun, et al. (00) proposed a vdeo steganalyss detectng algorthm based on moton estmaton, whch researches the mpact of non-moton estmaton on embedded nformaton through the changes of error of mean square, fndng that the moton vector s senstve to steganography. The smaller the block s, the more senstve t s to the steganography []. Changyong Xu, et al. (00) analyzed the mpact of nose supermposton on temporal correlaton and spatal correlaton of the vdeo sequence, and proposed a steganalyss algorthm based on space-tme correlaton by the use of mpact of metrc steganography of four-drectonal dfference hstogram for each frame n the vdeo sequence on the spatal correlaton, and use of metrc steganography of adjacent frame dfference hstogram on the temporal correlaton [3]. Based on prevous research, ths paper proposes a vdeo LSB matchng steganalyss method through constructng regonal correlaton dagrams, and adopts ths method for vdeo steganalyss of H65 protocol, so as to provde theoretcal groundwork for the development of Chna s multmeda communcaton technology. OVERVIEW OF H65 CODEC People have an endless pursut on vdeo resoluton. Because of ths demand, the hgh-defnton vdeo ncreasngly emerges, but the butt jont of the current vdeo CODEC standard and hgh-defnton vdeo has dervaton [4]. To acheve seamless jont, the frst sesson of JCT-VC was held n Germany n Aprl 00. JCT-VC refers to a vdeo compresson standard organzaton. In ths sesson, a new generaton of vdeo 4 Artcle avalable at or

2 MATEC Web of Conferences Fgure. Framework of mxed vdeo encoder wth H65 standard Table. Lst of basc stuaton of H65 model confguraton scheme HE LC Tree structure codng unt Tree structure codng unt (Lumnance component 8 8 to 64 64) (Lumnance component 8 8 to 64 64) Predcton unt Predcton unt Tree structure transformaton unt (Three layers of depth) Tree structure transformaton unt (Two layers of depth) Converson unt s any consecutve three layers from 4 4 Converson unt s any consecutve three layers from 4 4 to 3 3 (always square) to 3 3 (always square) Intra-frame predcton (up to 35 knds of pattern) Intra-frame predcton (up to 35 knds of pattern) Brghtness pxel nterpolaton flter based on the dscrete Brghtness pxel nterpolaton flter based on the dscrete cosne transform cosne transform (/4 pxel 8-tab flter) (/4 pxel 8-tab flter) Brghtness pxel nterpolaton flter based on DCT transforform Brghtness pxel nterpolaton flter based on DCT trans- (/8 pxel 4-tap flter) (/8 pxel 4-tap flter) Encodng unt Skp mode, combned advanced moton Encodng unt Skp mode, combned advanced moton vector predcton of predcton unt vector predcton of predcton unt Self-adapton bnary arthmetc codng based on syntax Low complexty encodng(lcec) elements X (SBAC) Extended converson accuracy (4 bts) Increase the depth of the nternal bts (4 bts) Deblockng flter X X Deblockng flter Self-adapton recursve flter codng standard s proposed: HEVC (Hgh Effcency Vdeo Codng), namely, H65, and a predcton model (TMuC) [5],[6],[7] s establshed, then a new generaton of vdeo codng standard H65 emerges. The desgn of H65 standard ams at mprovng codng effcency and transmsson system ntegraton degree and data loss robustness, as well as enforceablty of parallel processng archtecture. Vdeo codng layer of H65 stll apples for the way of mxng performance of H64 vdeo compresson standard rules. As shown n Fgure, the framework of the mxed vdeo encoder wth H65 standard s as follows. H65 encoder contans two knds of encodng schemes [8] : the Hgh Effcency (HE) encodng scheme and the Low Complexty (LC) encodng scheme. The specfc confguraton stuaton of HE and LC encodng schemes s shown n Table p.

3 EMME 05 Fgure. Schematc dagram of MSU steganography prncple 3 VIDEO STEGANALYSIS METHOD 3. Steganography prncple Snce embeddng of secret nformaton s dstrbuted n dfferent frequency bands of vdeo, whch makes the secret nformaton n the ndvdual frame s dffcult to be detected. If the spread spectrum technology s used, t may make such secret nformaton sgnal amplfed and easy to detect nformaton. Three ways of embeddng the secret nformaton are as follows: v v x () v v x () v v e x (3) Where: v n the formula (), () and (3) represents coeffcent of the orgnal carrer mage; x represents the embedded nformaton sequence; represents the embedded strength coeffcent, and v represents the steganography coeffcent after embeddng. MSU Stego Vdeo [9] s a knd of software for addng and processng nformaton secret, whch s a knd of new software appearng n combnaton wth vdeo content n the current network. Such software has a hgh robustness n terms of the types of nformaton hdng, whch can bascally hde any type of fles n the AVI vdeo fles. Su, et al [0] construct a vdeo test frame sequence wth a specal sgnfcance by the use of a sngle gray value mage wth several frames, and then add secret nformaton for frame content n each frequency band of Vdeo by the use of MSU Vdeo steganography software, and also compare and analyze the dfferent mage sgnals between secret carrer mage and orgnal mage, so as to make clear of VSA mode features. MSU s a knd of mproved spread spectrum watermarkng algorthm. Such algorthm has a very strong robustness to some extent. It s bascally consstent wth dstrbuton rules of hdden nformaton data n a sngle gray value mage. In addton, such algorthm can also resst the mpact of varous standard vdeo compresson codng systems by ratonal selecton of the embedded parameters. MSU steganography prncple s shown n Fgure. 3. LSB matchng steganalyss algorthm In dfferent types of fles, that s, secrete nformaton, t s necessary to mbed the secret fles nto the target vdeo (carrer embed pont) n a way of secret nformaton, but both bts are often not compatble. Based on the above ncompatble stuaton, ths paper uses the LSB matchng steganalyss algorthm. Such algorthm adds and subtracts for pxel value at ths pont based on the stochastc crtera. By the use of matchng crtera based on related regons and to clarfy the correlaton T between the regons, such algorthm represents the correlaton, 55, 55 T through calculatng the dfference value and mean value between the pxel value and center pxel value n eght neghborhoods. The smaller the absolute value of such value s, the hgher the correlaton of the regon s. Its calculaton s shown n formula (4): j, j x u, v 9x (4) j 8 u v j T, Usng the above formula (4),, we can obtan regonal correlaton T and absolute value T n each pxel pont of vdeo for vdeo pretreatment, so that the vdeo consttuted by pxel ponts turns nto a vdeo frame consttuted by the value of regonal correlaton. Ths paper names t as RC (Regonal Correlaton) Dagram. Based on the above matchng crtera, the prncple of LSB matchng steganography can be descrbed by the formula (5). Where: x represents the pxel value of the embedded ponts; m represents the bts wth embedded secret nformaton; m represents the pxel value after embeddng secret nformaton: m x mod x mod & & x 55 T 0 x mod & & x 0 T 0 x x x m (5) x m Assume that the sze of vdeo frame s m n and defne that h d s a hstogram of RC Dagram. Its calculaton s shown n formula (6): p.3

4 h m n d T, j, j d (6) The regonal correlaton of the carrer vdeo frame s relatvely strong, whle LSB matchng steganography wll weaken such correlaton, so that the value of T s 0, and the number value of decreases. However, when T, the value wll have a correspondng ncrease. By the use of t,t classfcaton, Feature and Feature are shown n formula (7) as t,t, and the two features of the vdeo frame after steganography wll ncrease. The Feature 3 as shown n formula (8) that t 3 represents the centrod of the characterstc functon n the hstogram, N s DFT length, and Hk DEThd. To make the trend dsplayed by the hstogram of RC Dagram more obvous, there s a need n smoothng orgnal mage. The process of such smoothng s the elmnaton of burr n mage, such as settng up a low pass flter. t 0 h t hd d 0 h d 0 ; 6 h N / H k 0 k k k h 6 6 d 0 h h d d MATEC Web of Conferences (7) k 0 t 3 (8) N / H Features 4, 5, 6, 7, 8 and 9 are respectvely represented by M, d, r, U, e, 3d. Where: M represents the mean value of RC Dagram; d represents the varance; r represents the magntude of varance, whch s used to reflect the smoothness of RC Dagram; U represents the magntude of consstency; e represents the nformaton entropy of RC Dagram; 3d represents the thrd moment of RC Dagram, degree of skewness of the hstogram. The calculaton of above characterstc s shown n formula (9): M L d 0 h m d d d ; r n d L d d M e 3 L d 0 d d M ; U d h m n d 0 hd hd log m n m n L 3 hd m n d 0 L d 0 d h m n (9) The calculaton as two-dmensonal hstogram of RC Dagram s descrbed n formula (0). x takes four drectons: horzontal drecton m 0, n, vertcal drecton m, n 0, opposte angle and ant-opposte angle m, n. Where: h d, d represents the mean value of four drectons n two-dmensonal hstogram of RC Dagram. h h m n x d, d T, j d, T m, j n d j (0) d, d h d, d h d, d h d, d h d, d 4 h v Feature 0 and Feature can be calculated by the formula (0). Its values are represented by t0 and t. Its calculaton s shown n formula (): t 0 k t L h d0d 0 N N 0k0 N H k0k0 d, d h d, d k, k k k N L d0d0 H k, k, H d ad k, k DFT h d, d () 3.3 Classfcaton methods of selected model n support vector machne Ths paper adopts the support vector machne (SVM) showng sgnfcant advantages n dealng wth small samples, nonlnear and hgh-dmensonal pattern recognton problems as a classfer []. SVM s a learnng method based on statstcal theory. The core dea of ths method s explaned as follows: ) Based on mnmzaton of structural rsks, to control structural rsks of learnng machne through VC dmenson of the mnmum functon set, t may have strong generalzaton ablty. ) To obtan scentfc control of VC dmenson, t can be acheved by the use of maxmzng class nterval. 3) To avod solvng nonlnear mappng for solvng nner product, corng technology can be used to effectvely acheve the goals. SVM seeks for a functon based on functonal Mercer theorem, so as to make the nner product of the sample space correspond to nner product of the transformaton space. In order to get better test results, t s necessary for the classfer to select approprate estmated parameters. In tranng classfer of the support vector machne, the selecton of estmated parameters manly consders the followng three aspects: ) Compromse between the decson functon and tranng sample, that s, computatonal cost C. ) Selecton of mappng functon. 3) Kernel functon: Kx, x x x Ths paper carres out classfcaton of carrer and secret vdeo by the use of lbsvm classfcaton procedures provded by Ln ChhJen, and uses the radal bass functon as the kernel functon. Before classfcaton and accordng to the formula (), the features j j p.4

5 EMME 05 Fgure 3. Effect dagram of the feature classfcaton (Left - Drect extracton; rght - extracton after medan flterng) Table. Lst of classfcaton results of dfferent embeddng rates when all frames are embedded wth nformaton Sngle frame embeddng rate Accuracy False alarm rate Omsson rate 00.00% 99.95% 0.09% 0.00% 75.00% 99.93% 0.4% 0.00% 50.00% 99.9% 0.05% 0.4% 5.00% 99.88% 0.3% 0.00% 0.00% 97.44%.77%.35% Table 3. Lst of classfcaton results of dfferent embeddng rates when a part of frame s embedded Frame embeddng rate Sngle frame embeddng rate 80.00% 60.00% 40.00% 0.00% Accuracy Accuracy Accuracy Accuracy 00.00% 9.5% 97.5% 94.40% 90.0% 75.00% 00.00% 99.90% 99.87% 99.73% 50.00% 00.00% 99.78% 00.00% 99.3% 5.00% 00.00% 00.00% 99.6% 98.43% 0.00% 93.8% 9.76% 79.74% 66.88% Mean value of detecton rate 97.06% 97.99% 94.65% 90.9% used for classfcaton shall be normalzed n the range of [-, + ]: t t t 3mn t max t, t t max mn () mn max t n formula () respectvely represent the mnmum and maxmum values of Feature. 4 EXPERIMENTAL RESULT AND ANALYSIS The expermental object of ths paper s the vdeo sequence. A total of 6 orgnal vdeo sequences are selected, ncludng all knds of vdeo sequences of multple knds of velocty. The frame sze of each sequence s 00 frames. There are three types of frame sze, namely: 4CIF, CIF and QCIF. The experment adopts the trple cross valdaton, and randomly selects tranng samples and testng samples from the sample lbrary wth the proporton of :, and frstly selects the classfcaton features n the tranng samples as SVM nput, mplements tranng, and obtans optmal classfcaton model, and then uses the traned classfer to detect whether the vdeo sample to be tested contans suspcous nformaton. To get an accurate classfcaton results, the experment s repeated for 50 tmes accordng to the above process, and t obtans the average results. 4. Classfcaton results Medan flter can remove the dstncton between varous dsparate vdeo carrers that respectvely extracts features of the orgnal carrer and Stego Vdeo, and then compare wth features obtaned after the medan flterng. The orgnal feature s represented by,,, ; the feature after flterng s repre- t sented by,,, t. To dsplay the dfference target more ntutve, the research just verfes the same features 3, 4, 9 that extracted from three vdeo sequences. Each of them produces a three-dmensonal scatter dagram as shown n Fgure p.5

6 MATEC Web of Conferences ()Vdeo.ste-fan-cf.yuv;()Vdeo.moble_cf.yuv; (3) Vdeo 3.harbour_4cf.yuv. [XX] n Fgure 3 s XX Stego Vdeo, [XX] s XX carrer Vdeo. The effect of feature classfcaton n the fgure shows that drectly extracted three-dmensonal classfcaton features have partal overlappng n ste-fan-cf.yuv carrer Vdeo and harbour_4cf.yuv Stego Vdeo, whle three-dmensonal classfcaton features extracted from the medan flter can clearly dstngush carrer and Stego Vdeo. Thus, ths paper adopts the medan flter to remove the effect of dfferences between dfferent vdeo carrers, so as to serve for the hgh-qualty classfcaton performance. 4. Classfcaton performance analyss of frame embeddng n dfferent ways The secret nformaton s embedded n each frame n Vdeo sequences, wth the same embeddng rate of sngle frame. The embeddng rate s respectvely 00%, 75%, 50%, 5% and 0%. The test results of the Stego Vdeo are shown n Table. As shown n Table, the relatonshp trend curve of embeddng rate, accuracy, false alarm rate and omsson rate of sngle frame s shown n Fgure 4 and Fgure 5: The classfcaton effect of VSA on embeddng by all frames s very good, and the false alarm rate and omsson rate are relatvely low. Wth the decrease of the embeddng rate, the detecton rate also has a slght decrease. When the embeddng rate s 0%, a hgh detecton rate can also be ganed. A part of vdeo s randomly selected for embeddng. The number of secrete frames can be respectvely selected as 80%, 60%, 40% and 0%. The embeddng rate of sngle frame n each vdeo sequence can randomly select one from the embeddng rate p of 75%, 50%, 5% and 0%. Its classfcaton results are shown n Table 3. As shown n Table 3, when varous knds of embeddng rates are avalable n a vdeo sequence, LSB matchng VSA algorthm proposed n ths paper has a hgher detecton rate for the frame wth a hgher embeddng rate or non-steganography frame. For the frame wth a lower embeddng rate, t s prone to be msjudged as a vdeo frame wthout the secret nformaton. Wth the decrease of Stego Vdeo frame rato n the vdeo sequence, the msjudgment rate has a correspondng ncrease. But on the whole, LSB matchng VSA algorthm has a very hgh mean value of the detecton rate wth a hgh avalablty based on the stuaton of steganographc mxed embeddng of Vdeo LSB matchng. 5 CONCLUSION Fgure 4. Trend chart of the mpact of dfferent embeddng rates of sngle frame on accuracy Fgure 5. Trend dagram of the mpact of dfferent embeddng rates of sngle frame on false alarm rate and omsson rate Based on the summarzaton of H65 CODEC, ths paper sets forth the prncple of VSA, and proposes a LSB matchng VSA algorthm, and gves out a knd of computatonal algorthm of the classfcaton of features value, and carres out vdeo steganalyss analyss and experment on 6 orgnal vdeo sequences by the use of a classfcaton method used for selectng models by the support vector machne. The expermental result shows that: ) Analyss of the carrer and Stego Vdeo can be realzed through constructng RC Dagram and extractng relevant statstcal characterstcs, and removng the dfference of features n dfferent vdeo sequences by the medan flter. ) The classfcaton effect of LSB matchng VSA algorthm on embeddng by all frames s very good, and the false alarm rate and omsson rate are relatvely low. Wth the decrease of the embeddng rate, the detecton rate also has a slght decrease. When the embeddng rate s 0%, a hgh detecton rate can also be ganed. 3) When varous knds of embeddng rates are avalable n a vdeo sequence, LSB matchng VSA algorthm proposed n ths paper has a hgher detecton rate for the frame wth a hgher embeddng rate or non-steganography frame. 4) LSB matchng VSA algorthm has a very hgh mean value of the detecton rate wth a hgh avalablty based on the stuaton of steganographc mxed p.6

7 EMME 05 embeddng of Vdeo LSB matchng. In concluson, the vdeo steganalyss algorthm based on LSB matchng has a very strong robustness. The further research shall focus on LSB matchng steganography n the detecton feld and other vdeo steganalyss algorthms, so as to expand an applcable scope of such algorthm. REFERENCES [] Wedong Zhong, Junqng Wu, Gengru Wu & Habn Yang. 0. Invsble vdeo steganalyss method based on space-tme redundancy statstcs. Applcaton Research of Computer. 9 (0): [] Yfeng Sun & Fenln Lu. 00. Vdeo steganalyss method based on moton estmaton. Pattern recognton and artfcal ntellgence. 3 (6): [3] Changyong Xu & Xjan Png. 00. Vdeo steganalyss method based on space-tme correlaton. Journal of Chna Image and Graphcs. 5 (9): [4] Fang Guo. 03. Research of vdeo securty CODEC program based on standard H65. Chengdu: Southwest Jaotong Unversty. [5] Taoran Lu, Xaoan Lu, Qan Xu, Yunfe Zheng, Joel Sole, & Peng Yn. 0. A Vdeo Codng Analyzer for Next-Generaton Compresson Standards. IEEE Internatonal Conference on Consumer Electroncs (ICCE). [6] Ken McCann, Samsung, & ZetaCast. 00. Tool Experment : Evaluaton of TMuC Tools [R], ITU-T/ISO/IEC Jont Collaboratve Team on Vdeo Codng (JCT-VC) document JCTV-B3, July. [7] Frank Bossen. 00. AHG report: Software development and TMuC software techncal evaluaton [R], ITU-T/ISO/IEC Jont Collaboratve Team on Vdeo Codng (JCT-VC) document JCTVC-B003, July. [8] Sze V, Budagav M & Chandrakasan A Massvely Parallel SBAC [R], ITU-Y SGI 6/Q. 6VCEG-AL. [S..]: JCT-VC. [9] WANG We-hong, & FARID H Exposng dgtal forgeres n vdeo by detectng duplcaton. Proc of the 9th Workshop on Multmeda & Securty. New York: ACM Press: [0]SU Yu-tng, WANG L-l, & ZHANG Chun-tan A new dgtal vdeo steganalyss algorthm aganst moton vector. Proc of WCOM: []Rong L, Shwe Ye, & Zhongzh Sh. 00. SVM-KNN classfer: a new method of mprovng SVM classfcaton accuracy. Journal of Electroncs. 30 (5): p.7

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

An interactive system for structure-based ASCII art creation

An interactive system for structure-based ASCII art creation An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa [email protected], [email protected], [email protected],

More information

A Multi-mode Image Tracking System Based on Distributed Fusion

A Multi-mode Image Tracking System Based on Distributed Fusion A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna [email protected]

More information

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting 161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding Effectve wavelet-based compresson method wth adaptve quantzaton threshold and zerotree codng Artur Przelaskowsk, Maran Kazubek, Tomasz Jamrógewcz Insttute of Radoelectroncs, Warsaw Unversty of Technology,

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht [email protected] 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn [email protected]

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler [email protected] Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble 1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, [email protected] Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In

More information

Biometric Signature Processing & Recognition Using Radial Basis Function Network

Biometric Signature Processing & Recognition Using Radial Basis Function Network Bometrc Sgnature Processng & Recognton Usng Radal Bass Functon Network Ankt Chadha, Neha Satam, and Vbha Wal Abstract- Automatc recognton of sgnature s a challengng problem whch has receved much attenton

More information

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns A study on the ablty of Support Vector Regresson and Neural Networks to Forecast Basc Tme Seres Patterns Sven F. Crone, Jose Guajardo 2, and Rchard Weber 2 Lancaster Unversty, Department of Management

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Detecting Global Motion Patterns in Complex Videos

Detecting Global Motion Patterns in Complex Videos Detectng Global Moton Patterns n Complex Vdeos Mn Hu, Saad Al, Mubarak Shah Computer Vson Lab, Unversty of Central Florda {mhu,sal,shah}@eecs.ucf.edu Abstract Learnng domnant moton patterns or actvtes

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

A novel Method for Data Mining and Classification based on

A novel Method for Data Mining and Classification based on A novel Method for Data Mnng and Classfcaton based on Ensemble Learnng 1 1, Frst Author Nejang Normal Unversty;Schuan Nejang 641112,Chna, E-mal: [email protected] Abstract Data mnng has been attached great

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Development of an intelligent system for tool wear monitoring applying neural networks

Development of an intelligent system for tool wear monitoring applying neural networks of Achevements n Materals and Manufacturng Engneerng VOLUME 14 ISSUE 1-2 January-February 2006 Development of an ntellgent system for tool wear montorng applyng neural networks A. Antć a, J. Hodolč a,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

The Network flow Motoring System based on Particle Swarm Optimized

The Network flow Motoring System based on Particle Swarm Optimized The Network flow Motorng System based on Partcle Swarm Optmzed Neural Network Adult Educaton College, Hebe Unversty of Archtecture, Zhangjakou Hebe 075000, Chna Abstract The compatblty of the commercal

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Investigation of Normalization Techniques and Their Impact on a Recognition Rate in Handwritten Numeral Recognition

Investigation of Normalization Techniques and Their Impact on a Recognition Rate in Handwritten Numeral Recognition S C H E D A E I N F O R M A T I C A E VOLUME 19 010 Investgaton of Normalzaton Technques and Ther Impact on a Recognton Rate n Handwrtten Numeral Recognton WIESŁAW CHMIELNICKI 1, KATARZYNA STĄPOR 1 Faculty

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

A spam filtering model based on immune mechanism

A spam filtering model based on immune mechanism Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png

More information

Image Compression of MRI Image using Planar Coding

Image Compression of MRI Image using Planar Coding (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Image Compresson of MRI Image usng Planar Codng Laltha Y. S Department of Electroncs & Communcaton Engg. Appa Insttute of Engneerng

More information

Using Multi-objective Metaheuristics to Solve the Software Project Scheduling Problem

Using Multi-objective Metaheuristics to Solve the Software Project Scheduling Problem Usng Mult-obectve Metaheurstcs to Solve the Software Proect Schedulng Problem Francsco Chcano Unversty of Málaga, Span [email protected] Francsco Luna Unversty of Málaga, Span [email protected] Enrque Alba

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Dynamic Resource Allocation for MapReduce with Partitioning Skew

Dynamic Resource Allocation for MapReduce with Partitioning Skew Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI 1.119/TC.216.253286, IEEE Transactons

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion 212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Learning from Multiple Outlooks

Learning from Multiple Outlooks Learnng from Multple Outlooks Maayan Harel Department of Electrcal Engneerng, Technon, Hafa, Israel She Mannor Department of Electrcal Engneerng, Technon, Hafa, Israel [email protected] [email protected]

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

BRNO UNIVERSITY OF TECHNOLOGY

BRNO UNIVERSITY OF TECHNOLOGY BRNO UNIVERSITY OF TECHNOLOGY FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INTELLIGENT SYSTEMS ALGORITHMIC AND MATHEMATICAL PRINCIPLES OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEMS B.SC. THESIS AUTHOR

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES In ths chapter, we wll learn how to descrbe the relatonshp between two quanttatve varables. Remember (from Chapter 2) that the terms quanttatve varable

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information