Exploiting A Support-based Upper Bound of Pearson s Correlation Coefficient for Efficiently Identifying Strongly Correlated Pairs

Size: px
Start display at page:

Download "Exploiting A Support-based Upper Bound of Pearson s Correlation Coefficient for Efficiently Identifying Strongly Correlated Pairs"

Transcription

1 Exploiting A Support-baed Upper Bound of Pearon Correlation Coefficient for Efficiently Identifying Strongly Correlated Pair Hui Xiong Computer Science Univerity of Minneota [email protected] Shahi Shekhar Computer Science Univerity of Minneota [email protected] Pang-Ning Tan Computer Science Michigan State Univerity [email protected] Vipin Kumar Computer Science Univerity of Minneota [email protected] ABSTRACT Given a uer-pecified minimum correlation threhold θ and a market baket databae with N item and T tranaction, an all-trong-pair correlation query find all item pair with correlation above the threhold θ. However, when the number of item and tranaction are large, the computation cot of thi query can be very high. In thi paper, we identify an upper bound of Pearon correlation coefficient for binary variable. Thi upper bound i not only much cheaper to compute than Pearon correlation coefficient but alo exhibit a pecial monotone property which allow pruning of many item pair even without computing their upper bound. A Two-tep All-trong-Pair correlation query (TAPER) algorithm i propoed to exploit thee propertie in a filter-and-refine manner. Furthermore, we provide an algebraic cot model which how that the computation aving from pruning i independent or improve when the number of item i increaed in data et with common Zipf or linear rank-upport ditribution. Experimental reult from ynthetic and real data et exhibit imilar trend and how that the TAPER algorithm can be an order of magnitude fater than brute-force alternative. Categorie and Subject Decriptor H..8 [Databae Management]: Databae Application Data Mining Keyword Pearon Correlation Coefficient, Statitical Computing. INTRODUCTION With the wide pread ue of tatitical technique for data analyi, it i expected that many uch technique will be made available in a databae environment where uer can apply the technique more flexibly, efficiently, eaily, and Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. KDD 4, Augut 5, 4, Seattle, Wahington, USA. Copyright 4 ACM /4/8...$5.. with minimal mathematical aumption. Our reearch i directed toward developing uch technique. More pecifically, thi paper examine the problem of computing correlation efficiently from large databae. Correlation analyi play an important role in many application domain uch a market-baket analyi, climate tudie, and public health. Our focu, however, i on computing an alltrong-pair correlation query that return pair of high poitively correlated item (or binary attribute). Thi problem can be formalized a follow: Given a uer-pecified minimum correlation threhold θ and a market baket databae with N item and T tranaction, an all-trong-pair correlation query find all item pair with correlation above the minimum correlation threhold, θ. However, a the number of item and tranaction increae, the computation cot for an all-trong-pair correlation query become prohibitively expenive. For example, conider a databae of 6 item, which may repreent the collection of book available at an e-commerce Web ite. Anwering the all-trong-pair correlation query from uch a maive databae require computing the correlation of 6 `.5 poible item pair. Thu, it may not be computationally feaible to apply a brute-force approach to compute correlation for all half trillion item pair, particularly when the number of tranaction i alo large. Note that the all-trong-pair correlation query problem i different from the tandard aociation-rule mining problem [, 3, 5, 9, 4]. Given a et of tranaction, the objective of aociation rule mining i to extract all ubet of item that atify a minimum upport threhold. Support meaure the fraction of tranaction that contain a particular ubet of item. The notion of upport and correlation may not necearily agree with each other. Thi i becaue item pair with high upport may be poorly correlated while thoe that are highly correlated may have very low upport. For intance, uppoe we have an item pair {A, B}, where upp(a) = upp(b) =.8 and upp(a, B) =.64. Both item are uncorrelated becaue upp(a, B) = upp(a)upp(b). In contrat, an item pair {A, B} with upp(a) = upp(b) = upp(a, B) =. i perfectly correlated depite it low upport. Pattern with low upport but high correlation are ueful for capturing intereting aociation among rare anomalou event or rare but expenive item uch a gold necklace and earring. In thi paper, we focu on the efficient computation of tatitical correlation for all pair of item with high po-

2 itive correlation. More pecifically, we provide an upper bound of Pearon correlation coefficient for binary variable. The computation of thi upper bound i much cheaper than the computation of the exact correlation, ince thi upper bound can be computed a a function of the upport of individual item. Furthermore, we how that thi upper bound ha a pecial monotone property which allow elimination of many item pair even without computing their upper bound, a hown in Figure. The x-axi in the figure repreent the et of item having a lower level of upport than the upport for item x i. Thee item are orted from left to right in decreaing order of their individual upport value. The y-axi indicate the correlation between each item x and item x i. Upperbound(x i, x) repreent the upper bound of correlation(x i, x) and ha a monotone decreaing behavior. Thi behavior guarantee that an item pair (x i, x k ) can be pruned if there exit an item x j uch that upperbound(x i, x j) < θ and upp(x k ) < upp(x j). upperbound(x i, x) correlation(x i, x) x i+ x j x k x n item orted in decending order by upp(item) Figure : Illutration of the Filtering Technique. (The curve are only ued for illutration purpoe.) A Two-tep All-trong-Pair correlation query (TAPER) algorithm i propoed to exploit thee propertie in a filterand-refine manner which conit of two tep: filtering and refinement. In the filtering tep, many item pair are filtered out uing the eay-to-compute upperbound(x i, x) and it monotone property. In the refinement tep, the exact correlation i computed for remaining pair to determine the final query reult. In addition, we have proved the completene and correctne of the TAPER algorithm and provided an algebraic cot model to quantify it computational aving. A demontrated by our experiment on both real and ynthetic data et, TAPER can be an order of magnitude fater than brute-force alternative and the computational aving by TAPER i independent or improve when the number of item i increaed in data et with common Zipf [8] or linear rank-upport ditribution.. Related Work Related literature can be grouped into two categorie. One category ha focued on tatitical correlation meaure. Jermaine [] invetigated the implication of incorporating chi-quare (χ ) [5] baed querie to data cube computation. He howed that finding the ubcube that atify tatitical tet uch a χ are inherently NP-hard, but can be made more tractable uing approximation cheme. Alo, Jermaine preented an iterative procedure for highdimenional correlation analyi by having off part of the databae via feedback from human expert []. Finally, x Brin [3] propoed a χ -baed correlation rule mining trategy. However, χ doe not poe a deired upward cloure property for exploiting efficient computation [7]. In thi paper, we focu on the efficient computation of tatitical correlation for all pair of item with high poitive correlation. Given n item, a traditional brute force approach compute Pearon correlation coefficient for all `n n(n ) = item pair. Thi approach i often implemented uing matrix algebra in tatitical oftware package a the correlation matrix [] function, which compute Pearon correlation coefficient for all pair of column. Thi approach i applicable to but not efficient for the cae of Boolean matrice, which can model market-baket-type data et. The approach propoed in thi paper doe not need to compute all `n pair. In particular, for market-baket-type data et with a Zipf-like rank-upport ditribution, we how that only a mall portion of the item pair need to be examined. In the real world, Zipf-like ditribution have been oberved in a variety of application domain, uch a retail data and Web click-tream. Another category of related work i from the aociationrule mining framework [], namely contraint-baed aociation pattern mining [, 4, 6, 8, 3]. Intead of uing tatitical correlation meaure a the contraint, thee approache ue ome other meaure (contraint), uch a upport, lift, and the Jaccard meaure, for efficiently pruning the pattern earch pace and identifying intereting pattern.. Overview and Scope The remainder of thi paper i organized a follow. Section preent baic concept. In ection 3, we introduce the upper bound of Pearon correlation coefficient for binary variable. Section 4 propoe the TAPER algorithm. In ection 5, we analyze the TAPER algorithm in the area of completene, correctne, and computation gain. Section 6 preent the experimental reult. Finally, in ection 7, we draw concluion and ugget future work. The cope of the all-trong-pair correlation query problem propoed in thi paper i retricted to market baket databae with binary variable, and the correlation computational form i Pearon correlation coefficient for binary variable, which i alo called the φ correlation coefficient. Furthermore, we aume that the upport of item i between and but not equal to either or. Thee boundary cae can be handled eparately.. PEARSON S CORRELATION In tatitic, a meaure of aociation i a numerical index which decribe the trength or magnitude of a relationhip among variable. Although literally dozen of meaure exit, they can be categorized into two broad group: ordinal and nominal. Relationhip among ordinal variable can be analyzed with ordinal meaure of aociation uch a Kendall Tau and Spearman Rank Correlation Coefficient. In contrat, relationhip among nominal variable can be analyzed with nominal meaure of aociation uch a Pearon Correlation Coefficient, the Odd Ratio, and meaure baed on Chi Square [5]. The φ correlation coefficient [5] i the computation form of Pearon Correlation Coefficient for binary variable. In thi ection, we decribe the φ correlation coefficient and how how it can be computed uing the upport meaure of aociation-rule mining [].

3 In a two-way table hown in Figure, the calculation of the φ correlation coefficient reduce to φ = P ()P () P () P () p, () P(+) P (+) P (+) P (+) where P (ij), for i =, and j =,, denote the number of ample which are claified in the ith row and jth column of the table. Furthermore, we let P (i+) denote the total number of ample claified in the ith row, and we let P (+j) denote the total number of ample claified in the jth column. Thu, P (i+) = P j= P (ij) and P (+j) = P i= P (ij) A Column Total P P () () P (+) B P () P () P (+) Row Total P (+) P (+) Figure : A two-way table of item A and item B. In the two-way table, N i the total number of ample. Furthermore, we can tranform Equation a follow. φ = (N P () P () P () )P () P () P () p P(+) P (+) P (+) P (+) φ = NP () (P () + P () )(P () + P () ) p P(+) P (+) P (+) P (+) φ = P () N P (+) P (+) N N q P(+) P (+) P (+) P (+) N N N N Hence, when adopting the upport meaure of aociation rule mining [], for two item A and B in a market baket databae, we have upp(a) = P (+) /N, upp(b) = P (+) /N, and upp(a, B) = P () /N. With upport notation and the above new derivation of Equation, we can derive the upport form of the φ correlation coefficient a hown below in Equation. φ = upp(a, B) upp(a)upp(b) p upp(a)upp(b)( upp(a))( upp(b)) () 3. PROPERTIES OF φ CORRELATION In thi ection, we preent ome propertie of the φ correlation coefficient. Thee propertie are ueful for the efficient computation of all-trong-pair correlation query. 3. An Upper Bound In thi ubection, we reveal that the upport meaure i cloely related with the φ correlation coefficient. Specifically, we prove that an upper bound of the φ correlation coefficient for a given pair {A, B} exit and i determined only by the upport value of item A and the upport value of item B, a hown below in Lemma. Lemma. Given an item pair {A, B}, the upport value upp(a) for item A, and the upport value upp(b) for item B, without lo of generality, let upp(a) upp(b). The upper bound upper(φ {A,B} ) of the φ correlation coefficient for an item pair {A, B} can be obtained when upp(a, B) = upp(b) and upper(φ {A,B} ) = upp(b) upp(a) N upp(a) upp(b) (3) Proof: According to Equation, for an item pair {A, B}: φ {A,B} = upp(a, B) upp(a)upp(b) p upp(a)upp(b)( upp(a))( upp(b)) When the upport value upp(a) and upp(b) are fixed, φ {A,B} i monotone increaing with the increae of the upport value upp(a, B). By the given condition upp(a) upp(b) and the anti-monotone property of the upport meaure, we get the maximum poible value of upp(a, B) i upp(b). A a reult, the upper bound upper(φ {A,B} ) of the φ correlation coefficient for an item pair {A, B} can be obtained when upp(a, B) = upp(b). Hence, upp(b) upp(a)upp(b) upper(φ {A,B} ) = p upp(a)upp(b)( upp(a))( upp(b)) upp(b) upp(a) = upp(a) upp(b). A can be een in Equation 3, the upper bound of the φ correlation coefficient for an item pair {A, B} relie only on the upport value of item A and the upport value of item B. In other word, there i no requirement to get the upport value upp(a, B) of an item pair {A, B} for the calculation of thi upper bound. A already noted, when the number of item N become very large, it i difficult to tore the upport of every item pair in the memory, ince N(N )/ i a huge number. However, it i poible to tore the upport of individual item in the main memory. A a reult, thi upper bound can erve a a coare filter to filter out item pair which are of no interet, thu aving I/O cot by reducing the computation of the upport value of thoe pruned pair. 3. Conditional Monotone Property In thi ubection, we preent a conditional monotone property of the upper bound of the φ correlation coefficient a hown below in Lemma Lemma. For a pair of item {A, B}, if we let upp(a) > upp(b) and fix the item A, the upper(φ {A,B} ) of pair {A, B} i monotone decreaing with the decreae of the upport value of item B. Proof: By Lemma, we get: upper(φ {A,B} ) = upp(b) upp(a) upp(a) upp(b) For any given two item B and B with upp(a) > upp(b ) > upp(b ), we need to prove upper(φ {A,B }) > upper(φ {A,B }). Thi claim can be proved a follow: upper(φ {A,B }) upper(φ {A,B }) = upp(b ) upp(b ) upp(b ) upp(b ) > The above follow the given condition that upp(b ) > upp(b ) and ( upp(b )) < ( upp(b )). Lemma allow u to puh the upper bound of the φ correlation coefficient into the earch algorithm, thu efficiently pruning the earch pace. Corollary. When earching for all pair of item with correlation above a uer-pecified threhold θ, if an item lit {i, i,..., i m} i orted by item upport in non-increaing order, an item pair {i a, i c} with upp(i a) > upp(i c) can be pruned if upper(φ{i a, i b }) < θ and upp(i c) upp(i b ).

4 Proof: Firt, when upp(i c) = upp(i b ), we get upper(φ(i a, i c)) = upper(φ(i a, i b )) < θ according to Equation 3 and the given condition upper(φ{i a, i b }) < θ, then we can prune the item pair {i a, i c}. Next, we conider upp(i c) < upp(i b ). Since upp(i a) > upp(i b ) > upp(i c), by Lemma, we get upper(φ{i a, i c}) < upper(φ{i a, i b }) < θ. Hence, the pair {i a, i c} i pruned. 4. THE TAPER ALGORITHM In thi ection, we preent the Two-tep All-trong-Pair correlation query (TAPER) algorithm. The TAPER algorithm i a two-tep filter-and-refine query proceing trategy which conit of two tep: filtering and refinement. The Filtering Step: In thi tep, the TAPER algorithm applie two pruning technique. The firt technique ue the upper bound of the φ correlation coefficient a a coare filter. In other word, if the upper bound of the φ correlation coefficient for an item pair i le than the uer-pecified correlation threhold, we can prune thi item pair right way. The econd pruning technique prune item pair baed on the conditional monotone property of the upper bound of the φ correlation coefficient. The correctne of thi pruning i guaranteed by Corollary and the proce of thi pruning i illutrated in Figure a previouly noted in introduction. In ummary, the purpoe of the filtering tep i to reduce fale poitive item pair and further proceing cot. The Refinement Step: In the refinement tep, the TA- PER algorithm compute the exact correlation for each urviving pair from the filtering tep and retrieve the pair with correlation above the uer-pecified minimum correlation threhold a the query reult. Figure 3 how the peudocode of the TAPER algorithm, including the CoareF ilter and Refine procedure. Procedure CoareF ilter work a follow. Line initialize the variable and create an empty query reult et P. Line - ue Rymon generic et-enumeration tree earch framework [6] to enumerate candidate pair and filter out item pair whoe correlation are obviouly le than the uer-pecified correlation threhold θ. Line tart an outer loop. Each outer loop correpond to a earch tree branch. Line 3 pecifie the reference item A, and line 4 tart a earch within each branch. Line 5 pecifie the target item B, and line 6 compute the upper bound of the φ correlation coefficient for item pair {A, B}. In line 7, if thi upper bound i le than the uer-pecified correlation threhold θ, the earch within thi branch can top by exiting from the inner loop, a hown in line 8. The reaon i a follow. Firt, the reference item A i fixed in each branch and it ha the maximum upport value due to the way we contruct the branch. Alo, item within each branch are orted baed on their upport in non-increaing order. Then, by Lemma, the upper bound of the φ correlation coefficient for the item pair {A, B} i monotone decreaing with the decreae of the upport of item B. Hence, if we find the firt target item B which reult in an upper bound upper(φ {A,B} ) that i le than the uer-pecified correlation threhold θ, we can top the earch in thi branch. Line call the procedure Refine to compute the exact correlation for each urviving candidate pair and continue to check the next target item until no target item i left in the current earch branch. Procedure Refine work a follow. Line get the upport for the item pair {A, B}. Note that the I/O cot can TAPER ALGORITHM Input: S : an item lit orted by item upport in non-increaing order. θ: a uer-pecified minimum correlation threhold. Output: P: the reult of all-trong-pair correlation query. Variable: L: the ize of item et S. A: the item with larger upport. B: the item with maller upport. CoareFilter(S, θ) //The Filtering Step. L = ize(s ), P =. for i from to L- 3. A = S [i] 4. for j from i+ to L 5. B = S [j] q q upp(b) upp(a) upp(a) upp(b) 6. upper(φ) = 7. if(upper(φ) < θ) then //Pruning by the monotone property 8. break from inner loop 9. ele. P=P Refine(A, B, θ) Refine(A, B, θ) //The Refinement Step. Get the upport upp(a, B) of item et {A, B} upp(a,b) upp(a)upp(b). φ = upp(a)upp(b)( upp(a))( upp(b)) 3. if φ < θ then 4. return //return NULL 5. ele 6. return {{A, B}, φ} Figure 3: The TAPER Algorithm be very expenive for line when the number of item i large ince we cannot tore the upport of all item pair in the memory. Line calculate the exact correlation coefficient of thi item pair. If the correlation i greater than the uer-pecified minimum correlation threhold, thi item pair i returned a a query reult in line 6. Otherwie, the procedure return NULL in line 4. Example. To illutrate the TAPER algorithm, conider a databae hown in Figure 4. To implify the dicuion, we ue an item lit {,, 3, 4, 5, 6} which i orted by item upport in non-increaing order. For a given correlation threhold.36, we can ue Rymon generic et-enumeration tree earch framework [6] to demontrate how two-tep filterand-refine query proceing work. For intance, for the branch tarting from item, we identify that the upper bound of the φ correlation coefficient for the item pair {, 3} i.333, which i le than the given correlation threhold.36. Hence, we can prune thi item pair immediately. Alo, ince the item lit {,, 3, 4, 5, 6} i orted by item upport in non-increaing order, we can prune pair {, 4}, {, 5}, and {, 6} by Lemma without any further computation cot. In contrat, for the traditional filter-and-refine paradigm, the coare filter can only prune the item pair {, 3}. There i no technique to prune item pair{, 4}, {, 5}, and {, 6}. Finally, in the refinement tep, only even item pair are required to compute the exact correlation coefficient, a hown in Figure 4 (c). More than half of the item pair are pruned in the filter tep even though the correlation threhold i a low a.36.

5 TID Item Item Support Pair UPPER (Φ) Correlation ,, 3,, 3, 3,,,,, 3, 4, 5, 6,, 4, 5,, 4 3 ( a ) ( b ) {,} {,3} {,4} {,5} {,6} {,3} {,4} {,5} {,6} {3,4} {3,5} {3,6} {4,5} {4,6} {5,6} {} {, } {, 3} {, 4} {, 5} {, 6} {, 3} {, 4} {, 5} {, 6} {3, 4} {3, 5} {3, 6} {4, 5} {4, 6} {5, 6} Item -> {} {} {3} {4} {5} {6} Support -> (.9) (.8) (.5) (.3) (.) (.) ( c ) Figure 4: Illutration of the filter-and-refine trategy. mean there i no computation required. 5. ANALYSIS OF THE TAPER ALGORITHM In thi ection, we analyze TAPER in the area of completene, correctne, and the computation aving. 5. Completene and Correctne Lemma 3. The TAPER algorithm i complete. In other word, thi algorithm find all pair which have correlation above a uer-pecified minimum correlation threhold. Proof: Thi lemma proof a well a ome following lemma proof are preented in our Technical Report [7]. Lemma 4. The TAPER algorithm i correct. In other word, every pair thi algorithm find ha a correlation above a uer-pecified minimum correlation threhold. 5. Quantifying the Computation Saving Thi ection preent analytical reult for the amount of computational aving obtained by TAPER. Firt, we illutrate the relationhip between the choice of the minimum correlation threhold and the ize of the reduced earch pace (after performing the filtering tep). Knowing the relationhip give u an idea of the amount of pruning achieved uing the upper-bound function of correlation. Figure 5 illutrate a -dimenional plot for every poible combination of upport pair, upp(x) and upp(y). If we impoe the contraint that upp(x) upp(y), then all item pair mut be projected to the upper left triangle ince the diagonal line repreent the condition upp(x) = upp(y). To determine the ize of the reduced earch pace, let u tart from the upper bound function of correlation. upper(φ {x,y} ) = upp(x) upp(y) upp(y) upp(x) < θ = upp(x)( upp(y)) < θ upp(y)( upp(x)) = upp(y) > upp(x) θ + ( θ )upp(x) (4) The above inequality provide a lower bound on upp(y) uch that any item pair involving x and y can be pruned uing the conditional monotone property of the upper bound function. In other word, any urviving item pair that undergoe the refinement tep mut violate the condition given in Equation 4. Thee item pair are indicated by the haded region hown in Figure 5. During the refinement tep, TA- PER ha to compute the exact correlation for all item pair that fall in the haded region between the diagonal and the polyline drawn by Equation 5. upp(y) = upp(x) θ + ( θ )upp(x) A can be een from Figure 5, the ize of the reduced earch pace depend on the choice of minimum correlation threhold. If we increae the threhold from.5 to.8, the earch pace for the refinement tep i reduced ubtantially. When the correlation threhold i., the polyline from Equation 5 overlap with the diagonal line. In thi limit, the earch pace for the refinement tep become zero. Supp(y) θ =.5. θ =.8 θ = Supp(x) Figure 5: An illutration of the reduced earch pace for the refinement tep of the TAPER algorithm. Only item pair within the haded region mut be computed for their correlation. The above analyi how only the ize of the reduced earch pace that mut be explored during the refinement tep of the TAPER algorithm. The actual amount of pruning achieved by TAPER depend on the upport ditribution of item in the databae. To facilitate our dicuion, we firt introduce the definition of everal concept ued in the remainder of thi ection. Definition. The pruning ratio of the TAPER algorithm i defined by the following equation. (5) γ(θ) = S(θ) T, (6) where θ i the minimum correlation threhold, S(θ) i the number of item pair which are pruned before computing their exact correlation at the correlation threhold θ, and T i the total number of item pair in the databae. a given databae, T i a fixed number and i equal to `n = n(n ), where n i the number of item. For Definition. For a orted item lit, the rank-upport function f(k) i a dicrete function which preent the upport in term of the rank k.

6 For a given databae, let I = {A, A,..., A n} be an item lit orted by item upport in non-increaing order. Then item A ha the maximum upport and the rankupport function f(k) = upp(a k ), k n, which i monotone decreaing with the increae of the rank k. To quantify the computation aving for a given item A j ( j < n) at the threhold θ, we need to find only the firt item A l (j < l n) uch that upper(φ {Aj,A l }) < θ. By Lemma, if upper(φ {Aj,A l }) < θ, we can guarantee that upper(φ {Aj,A i }), where l i n, i le than the correlation threhold θ. In other word, all thee n l + pair can be pruned without a further computation requirement. According to Lemma, we get upper(φ {Aj,A l }) = < upp(a l ) upp(a j ) upp(a l ) upp(a j ) = upp(a j ) upp(a l ) f(l) f(j) < θ Since the rank-upport function f(k) i monotone decreaing with the increae of the rank k, we get l > f (θ f(j)) To make the computation imple, we let l = f (θ f(j))+. Therefore, for a given item A j ( < j n), the computation cot for (n f (θ f(j))) item pair can be aved. A a reult, the total computation aving of the TAPER algorithm i hown below in Equation 7. Note that the computation aving hown in Equation 7 i an underetimated value of the real computation aving which can be achieved by the TAPER algorithm. S(θ) = nx {n f (θ f(j))} (7) j= Finally, we conduct computation aving analyi on the data et with ome pecial rank-upport ditribution. Specifically, we conider three pecial rank-upport ditribution: a uniform ditribution, a linear ditribution, and a generalized Zipf ditribution [8], a hown in the following three cae. CASE I: A Uniform Ditribution. In thi cae, the rank-upport function f(k) = C, where C i a contant. According to Equation 3, the upper bound of the φ correlation coefficient for any item pair i, which i the maximum poible value for the correlation. Hence, for any given item A j, we cannot find an item A l (j < l n) uch that upper(φ {Aj,A l }) < θ, where θ. A a reult, the total computation aving S(θ) i zero. CASE II: A Linear Ditribution. In thi cae, the rank-upport function ha a linear ditribution and f(k) = a mk, where m i the abolute value of the lope and a i the intercept Lemma 5. When a databae ha a linear rank-upport ditribution f(k) and f(k) = a mk (a >, m > ), for a uer-pecified minimum correlation threhold θ, the pruning ratio of the TAPER algorithm increae with the decreae of the ratio a/m, the increae of the correlation threhold θ, and the increae of the number of item, where < θ. CASE III: A Generalized Zipf Ditribution. In thi cae, the rank-upport function ha a generalized Zipf ditribution and f(k) = c, where c and p are contant and k p p. When p i equal to, the rank-upport function ha a Zipf ditribution. Lemma 6. When a databae ha a generalized Zipf rankupport ditribution f(k) and f(k) = c, for a uer-pecified k p minimum correlation threhold θ, the pruning ratio of the TAPER algorithm increae with the increae of p and the correlation threhold θ, where < θ. Furthermore, the pruning ratio i independent when the number of item i increaed. Proof: Since the rank-upport function f(k) = c k p, the invere function f (y) = ( c y ) p. Accordingly, f (θ c f(j)) = ( θ c ) p = j j p (θ ) p Applying Equation 7, we get: nx S(θ) = {n f (θ f(j))} j= = n(n ) = n(n ) nx j= Since the pruning ratio γ(θ) = S(θ) T j (θ ) p (n )(n + ) γ(θ) = n + n and T = n(n ), Thu, we can derive three rule a follow: rule : θ n + n rule : p n + n rule 3 : n lim n γ(θ) γ(θ) n + n = Therefore, the claim that the pruning ratio of the TAPER algorithm increae with the increae of p and the correlation threhold θ hold. Alo, rule 3 indicate that the pruning ratio i independent when the number of item i increaed in data et with Zipf ditribution. 6. EXPERIMENTAL RESULTS In thi ection, we preent the reult of extenive experiment to evaluate the performance of the TAPER algorithm. Specifically, we demontrate: () a performance comparion between the TAPER algorithm and a brute-force approach, () the effectivene of the propoed algebraic cot model, and (3) the calability of the TAPER algorithm. Experimental Data Set: Our experiment were performed on both real and ynthetic data et. Synthetic data et were generated uch that the rank-upport ditribution follow Zipf law, a hown in Figure 6. Note that, in log-log cale, the rank-upport plot of a Zipf ditribution will be a traight line with a lope equal to the exponent P in the

7 8 Execution Time (ec) 5 5 Brute-force TAPER Execution Time (ec) 5 5 Brute-force TAPER Execution Time (ec) Brute-force TAPER Minimum Correlation Threhold Minimum Correlation Threhold Minimum Correlation Threhold (a) P umb (b) P umb (c) Retail Figure 7: TAPER v. a brute-force approach on the P umb, P umb, and retail data et. Prunning Ratio Prunning Ratio Prunning Ratio Minimum Correlation Threhold Minimum Correlation Threhold Minimum Correlation Threhold (a) P umb (b) P umb (c) Retail Figure 8: The pruning effect of TAPER on P umb, P umb, and retail data et. Table : Parameter of Synthetic Data Set. Data et name T N C P P.tab.8 P.tab.8.5 P3.tab.8.5 P4.tab.8.75 P5.tab.8 upport of item (log cale).... e-5 P.tab P.tab P3.tab P4.tab P5.tab e-6 rank of item (log cale) Figure 6: The plot of the Zipf rank-upport ditribution of ynthetic data et in log-log cale. Zipf ditribution. A ummary of the parameter etting ued to generate the ynthetic data et i preented in Table, where T i the number of tranaction, N i the number of item, C i the contant of a generalized Zipf ditribution, and P i the exponent of a generalized Zipf ditribution. The real data et were obtained from everal different application domain. Table how ome characteritic of thee data et. The firt five data et in the table, i.e., pumb, pumb, che, muhroom, and connect are often ued a benchmark for evaluating the performance of aociation rule algorithm on dene data et. The pumb Table : Real Data Set Characteritic. Data et #Item #Record Source Pumb IBM Almaden Pumb IBM Almaden Che UCI Repoitory Muhroom 9 84 UCI Repoitory Connect UCI Repoitory LA TREC-5 Retail Retail Store and pumb data et correpond to binarized verion of a cenu data et from IBM. The difference between them i that pumb doe not contain item with upport greater than 8%. The che, muhroom, and connect data et are benchmark data et from UCI machine learning repoitory. The LA data et i part of the TREC-5 collection ( and contain new article from the Lo Angele Time. Finally, retail i a maked data et obtained from a large mail-order company. Experimental Platform: We implemented TAPER uing C++ and all experiment were performed on a Sun Ultra worktation with a 44 MHz CPU and 8 Mbyte of memory running the SunOS 5.7 operating ytem. 6. TAPER v. the Brute-force Approach. In thi ubection, we preent a performance comparion between the TAPER algorithm and a brute-force approach uing everal benchmark data et from IBM, a UCI machine learning repoitory, and ome other ource, uch a retail tore. The implementation of the brute-force approach i Thee data et are obtained from IBM Almaden at Thee data et and data content decription are available at mlearn/mlrepoitory.html

8 Prunning Ratio Prunning Ratio Prunning Ratio Minimum Correlation Threhold Minimum Correlation Threhold Minimum Correlation Threhold (a) Connect (b) Muhroom (c) Che Figure 9: The pruning effect of TAPER on UCI Connect, Muhroom, Che data et. imilar to that of the TAPER algorithm except that the filtering mechanim implemented in the TAPER algorithm i not included in the brute-force approach. Figure 7 how the relative computation performance of the TAPER algorithm and the brute-force approach on the pumb, pumb, and retail data et. A can be een, the performance of the brute-force approach doe not change much for any of the three data et. However, the execution time of the TAPER algorithm can be an order of magnitude fater than the brute-force approach even if the minimum correlation threhold i low. For intance, a hown in Figure 7 (a), the execution time of TAPER on the pumb data et i one order of magnitude le than that of the bruteforce approach at the correlation threhold.4. Alo, when the minimum correlation threhold increae, the execution time of TAPER dramatically decreae on the pumb data et. Similar computation effect can alo be oberved on the pumb and retail data et although the computation aving on the retail data et i not a ignificant a it i on the other two data et. To better undertand the above computation effect, we alo preent the pruning ratio of the TAPER algorithm on thee data et in Figure 8. A can be een, the pruning ratio of TAPER on the retail data et i much maller than that on the pumb and pumb data et. Thi maller pruning ratio explain why the computation aving on retail i le than that on the other two data et. Alo, Figure 9 how the pruning ratio of TAPER on UCI connect, muhroom, and che data et. The pruning ratio achieved on thee data et are comparable with the pruning ratio we obtained on the pumb data et. Thi indicate that TA- PER alo achieve much better computation performance than the brute-force approach on UCI benchmark data et. 6. The Effect of Correlation Threhold In thi ubection, we preent the effect of correlation threhold on the computation aving of the TAPER algorithm. Recall that our algebraic cot model how that the pruning ratio of the TAPER algorithm increae with increae of the correlation threhold for data et with linear and Zipf-like ditribution. Figure 8 how uch an increaing trend of the pruning ratio on the pumb, pumb, and retail data et a correlation threhold increae. Alo, Figure 9 how a imilar increaing trend of the pruning ratio on the UCI benchmark dataet including muhroom, che, and connect. One common feature of all the above data et i the kewed nature of their rank-upport ditribution. A a reult, thee experimental reult till exhibit a imilar trend a the propoed algebraic cot model although the rankupport ditribution of thee dataet do not follow Zipf law exactly. Support Support Table 3: Group of item for the Retail data et Group I II III # Item # Tranaction a/m The Rank-Support Ditribution of Retail Dataet 4 8 Item orted by upport (a) Retail Dataet The Support Ditribution of Group II Trendline: y= x 3 4 Item orted by upport (c) Group II Support Support.5... The Support Ditribution of Group I Trendline: y= x 3 4 Item orted by upport (b) Group I The Support Ditribution of Group III Trendline: y= x 3 4 Item orted by upport (d) Group III Figure : The plot of the rank-upport ditribution of the retail data et and it three item group with a linear regreion fitting line (trendline). 6.3 The Effect of the Slope m Recall that the algebraic cot model for data et with a linear rank-upport ditribution provide rule which indicate that the pruning ratio of the TAPER algorithm increae with the decreae of the ratio a/m and the pruning ratio increae with the increae of the correlation threhold. In thi ubection, we empirically evaluate the effect of the

9 .8.7 Pruning Ratio Correlation Threhold =.9 Correlation Threhold =.8 Correlation Threhold =.3 upport of item (log cale) a/m ratio 6 5. rank of item (log cale) Figure : Pruning ratio with the decreae of a/m for data et with linear rank-upport ditribution. Figure 3: The plot of the rank-upport ditribution of the LA data et in log-log cale. ratio a/m on the performance of the TAPER algorithm for data et with a linear rank-upport ditribution. Firt, we generated three group of data from the retail data et by orting all the item in the data et in non-decreaing order and then partitioning them into four group. Each of the firt three group contain 47 item and the lat group contain 36 item. The firt three group are the group data et hown in Table 3. Figure (a) how the plot of the rank-upport ditribution of the retail data et and Figure (b), (c), and (d) how the plot of the rank-upport ditribution of three group of data generated from the retail data et. A can be een, the rank-upport ditribution of the three group approximately follow a linear ditribution. Table 3 lit ome of the characteritic of thee data et group. Each group ha the ame number of item and tranaction but a different a/m ratio. Group I ha the highet a/m ratio and Group III ha the lowet a/m ratio. Since the major difference among thee three data et group i the ratio a/m, we can apply thee data et to how the impact of the a/m on the performance of the TAPER algorithm. Figure how the pruning ratio of the TAPER algorithm on the data et with linear rank-upport ditribution. A can be een, the pruning ratio increae a the a/m ratio decreae at different correlation threhold. The pruning ratio alo increae a correlation threhold are increaed. Thee experimental reult confirm the trend exhibited by the cot model. Pruning Ratio Correlation Threhold =.9 Correlation Threhold =.6 Correlation Threhold = The exponent p. Figure : The increae of pruning ratio with the increae of p for data et with Zipf-like ditribution. 6.4 The Effect of the Exponent p In thi ubection, we examine the effect of the exponent P on the performance of the TAPER algorithm for data et with a generalized Zipf rank-upport ditribution. We ued the ynthetic data et preented in Table for thi experiment. All the ynthetic data et in the table have the ame number of tranaction and item. The rank-upport ditribution of thee data et follow Zipf law but with different exponent P. Figure diplay the pruning ratio of the TAPER algorithm on data et with different exponent P. Again, the pruning ratio of the TAPER algorithm increae with the increae of the exponent P at different correlation threhold. Alo, we can oberve that the pruning ratio of the TAPER algorithm increae with the increae of the correlation threhold. Recall that the propoed algebraic cot model for data et with a generalized Zipf ditribution provide two rule which confirm the above two obervation. Pruning Ratio Correlation Threhold =.8 Correlation Threhold =.6 Correlation Threhold = Number of item Figure 4: The effect of databae dimenion on the pruning ratio for data et with Zipf-like rankupport ditribution. 6.5 The Scalability of TAPER In thi ubection, we how the calability of the TAPER algorithm with repect to databae dimenion. Figure 3 how the plot of the rank-upport ditribution of the LA data et in log-log cale. Although thi plot doe not follow Zipf law exactly, it doe how Zipf-like behavior. In other word, the LA data et ha an approximate Zipf-like ditribution with the exponent P =.46. In thi experiment, we generated three data et, with, 8, and 4 item repectively, from the LA data et by random ampling on the item et. Due to the random ampling, the three data et can have almot the ame rank-upport ditribution a the LA data et. A a reult, we ued thee three

10 Execution Time (ec) Correlation Threhold =.3 Correlation Threhold =.6 Correlation Threhold = Number of item Figure 5: The effect of databae dimenion on the execution time for data et with Zipf-like rankupport ditribution. generated data et and the LA data et for our cale-up experiment. For data et with Zipf-like rank-upport ditribution, Figure 4 how the effect of databae dimenion on the performance of the TAPER algorithm. A can be een, the pruning ratio of the TAPER algorithm how almot no change or lightly increae at different correlation threhold. Thi indicate that the pruning ratio of the TAPER algorithm can be maintained when the number of item i increaed. Recall that the propoed algebraic cot model for data et with a generalized Zipf ditribution exhibit a imilar trend a the reult of thi experiment. Finally, in Figure 5, we how that the execution time for our cale-up experiment increae linearly with the increae of the number of item at everal different minimum correlation threhold. 7. COLUSIONS AND FUTURE WORK In thi paper, we propoed uing an upper bound of the φ correlation coefficient, which how a conditional monotonic property. Baed on thi upper bound, we deigned an efficient two-tep filter-and-refine algorithm, called TAPER, to earch all the item pair with correlation above a uerpecified minimum correlation threhold. In addition, we provided an algebraic cot model to quantify the computation aving of TAPER. A demontrated by our experimental reult on both real and ynthetic data et, the pruning ratio of TAPER can be maintained or even increae with the increae of databae dimenion, and the performance of TAPER confirm the propoed algebraic cot model. There are everal potential direction for future reearch. Firt, we plan to generalize the TAPER algorithm a a tandard algorithm for efficient computation of other meaure of aociation. In particular, we will examine the potential upper bound function of other meaure for their monotone property. Second, we propoe to extend our methodology to anwer correlation-like querie beyond pair of item. Finally, we will extend the TAPER algorithm to find all pair of high negatively correlated item. 8. ACKNOWLEDGMENTS Thi work wa partially upported by NASA grant # C 3, DOE/LLNL W-745-ENG-48, and by Army High Performance Computing Reearch Center under the aupice of the Department of the Army, Army Reearch Laboratory cooperative agreement number DAAD The content of thi work doe not necearily reflect the poition or policy of the government and no official endorement hould be inferred. Acce to computing facilitie wa provided by the AHPCRC and the Minneota Supercomputing Intitute. 9. REFEREES [] R. Agrawal, T. Imielinki, and A. Swami. Mining aociation rule between et of item in large databae. In ACM SIGMOD, 993. [] R. Bayardo, R. Agrawal, and D. Gunopulo. Contraint-baed rule mining in large, dene databae. Data Mining and Knowledge Dicovery Journal, page 7 4,. [3] S. Brin, R. Motwani, and C. Silvertein. Beyond market baket: Generalizing aociation rule to correlation. In ACM SIGMOD, 997. [4] C. Bucila, J. Gehrke, D. Kifer, and W. M. White. Dualminer: a dual-pruning algorithm for itemet with contraint. In ACM SIGKDD,. [5] D. Burdick, M. Calimlim, and J. Gehrke. Mafia: A maximal frequent itemet algorithm for tranactional databae. In ICDE,. [6] E. Cohen, M. Datar, S. Fujiwara, A. Gioni, P. Indyk, R. Motwani, J. Ullman, and C. Yang. Finding intereting aociation without upport pruning. In ICDE,. [7] W. DuMouchel and D. Pregibon. Empirical baye creening for multi-item aociation. In ACM SIGKDD,. [8] G. Grahne, L. V. Lakhmanan, and X. Wang. Efficient mining of contrained correlated et. In ICDE,. [9] J. Han, J. Pei, and Y. Yin. Mining frequent pattern without candidate generation. In ACM SIGMOD,. [] C. Jermaine. The computational complexity of high-dimenional correlation earch. In ICDM,. [] C. Jermaine. Playing hide-and-eek with correlation. In ACM SIGKDD, 3. [] S. K. Kachigan. Multivariate Statitical Analyi: A Conceptual Introduction. Radiu Pre, 99. [3] R. Ng, L. Lakhmanan, J. Han, and A. Pang. Exploratory mining via contrained frequent et querie. In ACM SIGMOD, 999. [4] R. Ratogi and K. Shim. Mining optimized aociation rule with categorical and numeric attribute. IEEE TKDE, 4(), January. [5] H. T. Reynold. The Analyi of Cro-claification. The Free Pre, New York, 977. [6] R. Rymon. Search through ytematic et enumeration. In Int l. Conf. on Principle of Knowledge Repreentation and Reaoning, 99. [7] H. Xiong,, S. Shekhar, P. Tan, and V. Kumar. Taper: An efficient two-tep approach for all-pair correlation query in tranaction databae. In Technical Report 3-, computer cience and engineering, Univerity of Minneota - Twin Citie, May 3. [8] G. Zipf. Human Behavior and Principle of Leat Effort: An Introduction to Human Ecology. Addion Weley, Cambridge, Maachuett, 949.

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Morningstar Fixed Income Style Box TM Methodology

Morningstar Fixed Income Style Box TM Methodology Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

Multi-Objective Optimization for Sponsored Search

Multi-Objective Optimization for Sponsored Search Multi-Objective Optimization for Sponored Search Yilei Wang 1,*, Bingzheng Wei 2, Jun Yan 2, Zheng Chen 2, Qiao Du 2,3 1 Yuanpei College Peking Univerity Beijing, China, 100871 (+86)15120078719 [email protected]

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Problem 1: The Pearson Correlation Coefficient (r) between two variables X and Y can be expressed in several equivalent forms; one of which is

Problem 1: The Pearson Correlation Coefficient (r) between two variables X and Y can be expressed in several equivalent forms; one of which is PubH 7405: BIOSTATISTICS REGRESSION, 011 PRACTICE PROBLEMS FOR SIMPLE LINEAR REGRESSION (Some are new & Some from Old eam; lat 4 are from 010 Midterm) Problem 1: The Pearon Correlation Coefficient (r)

More information

A model for the relationship between tropical precipitation and column water vapor

A model for the relationship between tropical precipitation and column water vapor Click Here for Full Article GEOPHYSICAL RESEARCH LETTERS, VOL. 36, L16804, doi:10.1029/2009gl039667, 2009 A model for the relationhip between tropical precipitation and column water vapor Caroline J. Muller,

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 [email protected] Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Introduction to the article Degrees of Freedom.

Introduction to the article Degrees of Freedom. Introduction to the article Degree of Freedom. The article by Walker, H. W. Degree of Freedom. Journal of Educational Pychology. 3(4) (940) 53-69, wa trancribed from the original by Chri Olen, George Wahington

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance?

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance? TI 011-045/3 Tinbergen Intitute Dicuion Paper Unoberved Heterogeneity and Rik in Wage Variance: Doe Schooling Provide Earning Inurance? Jacopo Mazza Han van Ophem Joop Hartog * Univerity of Amterdam; *

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences

G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences Behavior Reearch Method 007, 39 (), 75-9 G*Power 3: A flexible tatitical power analyi program for the ocial, behavioral, and biomedical cience FRAZ FAUL Chritian-Albrecht-Univerität Kiel, Kiel, Germany

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Brokerage Commissions and Institutional Trading Patterns

Brokerage Commissions and Institutional Trading Patterns rokerage Commiion and Intitutional Trading Pattern Michael Goldtein abon College Paul Irvine Emory Univerity Eugene Kandel Hebrew Univerity and Zvi Wiener Hebrew Univerity June 00 btract Why do broker

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Evaluating Teaching in Higher Education. September 2008. Bruce A. Weinberg The Ohio State University *, IZA, and NBER weinberg.27@osu.

Evaluating Teaching in Higher Education. September 2008. Bruce A. Weinberg The Ohio State University *, IZA, and NBER weinberg.27@osu. Evaluating Teaching in Higher Education September 2008 Bruce A. Weinberg The Ohio State Univerity *, IZA, and NBER [email protected] Belton M. Fleiher The Ohio State Univerity * and IZA [email protected]

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science aachuett Intitute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric achinery Cla Note 10: Induction achine Control and Simulation c 2003 Jame L. Kirtley Jr. 1 Introduction

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Graph Analyi I Network Meaure of the Networked Adaptive Agents

Graph Analyi I Network Meaure of the Networked Adaptive Agents Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom [email protected] ABSTRACT Experimental analyi of

More information

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected. 12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK BY ANGUS MACDONALD, DELME PRITCHARD AND PRADIP TAPADAR ABSTRACT The UK Biobank project

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information